nfcuoneijg.temp.swtest.ru
Open in
urlscan Pro
77.222.62.39
Malicious Activity!
Public Scan
Submission: On April 01 via automatic, source openphish
Summary
This is the only time nfcuoneijg.temp.swtest.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Navy Federal Credit Union (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 77.222.62.39 77.222.62.39 | 44112 (SWEB-AS) (SWEB-AS) | |
14 | 104.108.39.58 104.108.39.58 | 16625 (AKAMAI-AS) (AKAMAI-AS - Akamai Technologies) | |
1 | 172.217.22.10 172.217.22.10 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 172.217.22.3 172.217.22.3 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
21 | 5 |
ASN44112 (SWEB-AS, RU)
PTR: vh26.sweb.ru
nfcuoneijg.temp.swtest.ru |
ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US)
PTR: a104-108-39-58.deploy.static.akamaitechnologies.com
strongauth.navyfederal.org |
ASN15169 (GOOGLE - Google LLC, US)
PTR: fra16s14-in-f10.1e100.net
fonts.googleapis.com |
ASN15169 (GOOGLE - Google LLC, US)
PTR: fra16s14-in-f3.1e100.net
fonts.gstatic.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
navyfederal.org
strongauth.navyfederal.org |
226 KB |
4 |
swtest.ru
nfcuoneijg.temp.swtest.ru |
9 KB |
1 |
gstatic.com
fonts.gstatic.com |
8 KB |
1 |
googleapis.com
fonts.googleapis.com |
576 B |
0 |
Failed
function sub() { [native code] }. Failed |
|
21 | 5 |
Domain | Requested by | |
---|---|---|
14 | strongauth.navyfederal.org |
nfcuoneijg.temp.swtest.ru
|
4 | nfcuoneijg.temp.swtest.ru |
nfcuoneijg.temp.swtest.ru
|
1 | fonts.gstatic.com |
nfcuoneijg.temp.swtest.ru
|
1 | fonts.googleapis.com |
nfcuoneijg.temp.swtest.ru
|
0 | Failed |
nfcuoneijg.temp.swtest.ru
|
21 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://nfcuoneijg.temp.swtest.ru/new/nf/navyfederal/LoginWithDevicePrint.do.html
Frame ID: C7E802692F5A5E04E0B63582FF601F90
Requests: 21 HTTP requests in this frame
Screenshot
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
LoginWithDevicePrint.do.html
nfcuoneijg.temp.swtest.ru/new/nf/navyfederal/ |
28 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles.css
strongauth.navyfederal.org/nfcu_css/ |
51 KB 11 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
css
fonts.googleapis.com/ |
2 KB 576 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
facebox.css
strongauth.navyfederal.org/nfcu_css/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.4.2.min.js
strongauth.navyfederal.org/nfcu_jq/ |
70 KB 25 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.getUrlParam.js
strongauth.navyfederal.org/nfcu_jq/ |
2 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
facebox.js
strongauth.navyfederal.org/nfcu_jq/ |
9 KB 10 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pm_fp.js
strongauth.navyfederal.org/ |
25 KB 26 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
navy_fed_logo.png
strongauth.navyfederal.org/nfcu_images/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
footer_navy_fed_logo.png
strongauth.navyfederal.org/nfcu_images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
footer_equal_housing_logo.png
strongauth.navyfederal.org/nfcu_images/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
q_mark.gif
/C:/Users/SONY/Desktop/questions/Navy%20Questions_files/eSAuthDispatch_data/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg_gradient.png
strongauth.navyfederal.org/nfcu_images/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
globe_bg.png
strongauth.navyfederal.org/nfcu_images/ |
57 KB 58 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
footer_bg.jpg
strongauth.navyfederal.org/nfcu_images/ |
11 KB 11 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
log_in_bg_with_shadow.png
strongauth.navyfederal.org/nfcu_images/ |
67 KB 67 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
info_question_mark_icon.png
strongauth.navyfederal.org/nfcu_images/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
neIIzCqgsI0mp9gz25WBFqwYUp31.woff2
fonts.gstatic.com/s/gudea/v5/ |
8 KB 8 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
close.png
nfcuoneijg.temp.swtest.ru/new/nf/navyfederal/nfcu_images/modal_images/ |
1 KB 1 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
modal-close.png
nfcuoneijg.temp.swtest.ru/new/nf/navyfederal/nfcu_images/modal_images/ |
1 KB 1 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loader_large.gif
nfcuoneijg.temp.swtest.ru/new/nf/navyfederal/nfcu_images/modal_images/ |
1 KB 1 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Navy Federal Credit Union (Government)21 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery string| SEP string| PAIR function| activeXDetect function| stripIllegalChars function| stripFullPath object| BrowserDetect function| FingerPrint function| Hashtable function| IE_FingerPrint function| Mozilla_FingerPrint function| Opera_FingerPrint function| add_deviceprint function| urlEncode function| encode_deviceprint function| decode_deviceprint function| post_deviceprint object| theBody object| d number| yr3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.navyfederal.org/ | Name: bm_sz Value: 05A20402D3483BE0228BB1D067C2D308~QAAQ1rL3SOfaaXBiAQAAzvHrf5qsR+g3nKQzM7c/KY2i55slUy8O+WqZeiQbvlgY6qVDfa+BJ3pMRZeDg2Y+YgPf8XZScAM1jMzVsReW2xPAc97ecb5Za0qu1AGvfysg8J2q9KwQzh10VhoO53zEwL2mikDq7YMxdSWisatDLW9z8LMdMdD4nFTd4OTIeE8de4BwTg== |
|
.navyfederal.org/ | Name: _abck Value: 0720AED7587CBCB5A776C64D4581BDF048F7B2D6926A0000F07DC05A23014546~-1~SnFVsRUH6GbLU349N8SZv91m/iVeUDooFsmypEQxab0=~-1~-1 |
|
.navyfederal.org/ | Name: dc Value: v |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
fonts.gstatic.com
nfcuoneijg.temp.swtest.ru
strongauth.navyfederal.org
104.108.39.58
172.217.22.10
172.217.22.3
77.222.62.39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