nab-sec4.com
Open in
urlscan Pro
91.208.197.224
Malicious Activity!
Public Scan
Effective URL: https://nab-sec4.com/bdg
Submission: On January 10 via manual from AU — Scanned from AU
Summary
TLS certificate: Issued by R3 on January 10th 2023. Valid for: 3 months.
This is the only time nab-sec4.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bendigo Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 8 | 91.208.197.224 91.208.197.224 | 200019 (ALEXHOST) (ALEXHOST) | |
1 | 69.16.175.42 69.16.175.42 | 20446 (STACKPATH...) (STACKPATH-CDN) | |
8 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
nab-sec4.com
1 redirects
nab-sec4.com |
110 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 943 |
31 KB |
8 | 2 |
Domain | Requested by | |
---|---|---|
8 | nab-sec4.com |
1 redirects
nab-sec4.com
code.jquery.com |
1 | code.jquery.com |
nab-sec4.com
|
8 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
demo.bendigobank.com.au |
itunes.apple.com |
play.google.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
nab-sec4.com R3 |
2023-01-10 - 2023-04-10 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2022-08-03 - 2023-07-14 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://nab-sec4.com/bdg
Frame ID: AE387E44DE83748A53F8F04788F8D48D
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
Bendigo Bank - Logon to e-bankingPage URL History Show full URLs
-
https://nab-sec4.com/
HTTP 302
https://nab-sec4.com/bdg Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
3 Outgoing links
These are links going to different origins than the main page.
Title: Take a tour
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://nab-sec4.com/
HTTP 302
https://nab-sec4.com/bdg Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
bdg
nab-sec4.com/ Redirect Chain
|
34 KB 12 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.css
nab-sec4.com/assets/bdg/ |
19 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.6.0.min.js
code.jquery.com/ |
87 KB 31 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
actions.js
nab-sec4.com/assets/js/ |
778 B 667 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
kb-banner.jpg
nab-sec4.com/assets/bdg/ |
69 KB 69 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
proximanova-regular__510298c5f4.woff2
nab-sec4.com/assets/bdg/ |
12 KB 12 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
proximanova-bold__aac7e61091.woff2
nab-sec4.com/assets/bdg/ |
11 KB 11 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
action
nab-sec4.com/apis/lr/ |
25 B 338 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bendigo Bank (Banking)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontentvisibilityautostatechange function| $ function| jQuery string| lrbank string| lrinfo boolean| continueupdate1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
nab-sec4.com/ | Name: PHPSESSID Value: 9v2vrfjpiai0mgpn3qasrrpvbc |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
nab-sec4.com
69.16.175.42
91.208.197.224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