Submitted URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Effective URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1...
Submission: On April 29 via manual from US

Summary

This website contacted 69 IPs in 7 countries across 53 domains to perform 364 HTTP transactions. The main IP is 2606:4700::6811:7563, located in United States and belongs to CLOUDFLARENET, US. The main domain is www.darkreading.com.
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on January 28th 2020. Valid for: 8 months.
This is the only time www.darkreading.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 199.15.215.8 53580 (MARKETO)
2 13 2606:4700::68... 13335 (CLOUDFLAR...)
1 2001:4de0:ac1... 20446 (HIGHWINDS3)
12 2606:4700:303... 13335 (CLOUDFLAR...)
2 2a00:1450:400... 15169 (GOOGLE)
3 2606:4700:303... 13335 (CLOUDFLAR...)
53 2606:4700:303... 13335 (CLOUDFLAR...)
3 2606:4700:303... 13335 (CLOUDFLAR...)
1 151.101.113.131 54113 (FASTLY)
3 2606:4700:303... 13335 (CLOUDFLAR...)
1 2a00:1450:400... 15169 (GOOGLE)
3 52.50.184.22 16509 (AMAZON-02)
2 2a00:1450:400... 15169 (GOOGLE)
1 143.204.202.59 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
1 216.58.206.2 15169 (GOOGLE)
2 13.35.253.126 16509 (AMAZON-02)
9 2606:2800:234... 15133 (EDGECAST)
2 2600:9000:205... 16509 (AMAZON-02)
1 1 2a02:26f0:10c... 20940 (AKAMAI-ASN1)
1 2620:119:50e6... 14413 (LINKEDIN)
11 2a00:1450:400... 15169 (GOOGLE)
1 12 172.217.16.130 15169 (GOOGLE)
7 2a00:1450:400... 15169 (GOOGLE)
2 15.188.105.205 16509 (AMAZON-02)
1 1 66.117.28.86 15224 (OMNITURE)
12 143.204.212.151 16509 (AMAZON-02)
2 2606:4700:303... 13335 (CLOUDFLAR...)
1 4 104.124.133.20 16625 (AKAMAI-AS)
4 2a03:2880:f02... 32934 (FACEBOOK)
2 46.105.202.39 16276 (OVH)
12 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 2620:1ec:c11:... 8068 (MICROSOFT...)
1 52.209.33.201 16509 (AMAZON-02)
2 2a00:1450:400... 15169 (GOOGLE)
1 99.86.1.26 16509 (AMAZON-02)
1 2 2600:9000:205... 16509 (AMAZON-02)
1 143.204.89.60 16509 (AMAZON-02)
1 2001:4de0:ac1... 20446 (HIGHWINDS3)
55 23.210.250.213 16625 (AKAMAI-AS)
1 107.23.162.230 14618 (AMAZON-AES)
1 2a00:1450:400... 15169 (GOOGLE)
4 2a03:2880:f12... 32934 (FACEBOOK)
5 52.16.75.38 16509 (AMAZON-02)
1 54.77.128.97 16509 (AMAZON-02)
2 2 185.33.220.241 29990 (ASN-APPNEX)
2 3.227.165.230 14618 (AMAZON-AES)
1 3 2a00:1450:400... 15169 (GOOGLE)
1 3.126.160.214 16509 (AMAZON-02)
1 13.224.194.18 16509 (AMAZON-02)
3 2.18.232.7 16625 (AKAMAI-AS)
1 1 216.58.212.130 15169 (GOOGLE)
1 2 35.241.8.149 15169 (GOOGLE)
1 143.204.202.7 16509 (AMAZON-02)
1 104.76.46.10 16625 (AKAMAI-AS)
1 2 2620:103::192... 19994 (RACKSPACE)
1 52.21.45.91 14618 (AMAZON-AES)
40 13.35.253.124 16509 (AMAZON-02)
4 2606:2800:134... 15133 (EDGECAST)
1 2 104.244.42.136 13414 (TWITTER)
1 2a00:1450:400... 15169 (GOOGLE)
1 2 142.0.160.13 7160 (NETDYNAMICS)
1 2 209.167.231.17 7160 (NETDYNAMICS)
1 142.0.173.134 7160 (NETDYNAMICS)
22 2606:2800:134... 15133 (EDGECAST)
3 23.210.248.12 16625 (AKAMAI-AS)
11 3.126.42.246 16509 (AMAZON-02)
1 5 23.210.248.216 16625 (AKAMAI-AS)
1 1 63.32.63.32 16509 (AMAZON-02)
2 3.248.28.111 16509 (AMAZON-02)
1 54.84.119.213 14618 (AMAZON-AES)
2 2 34.246.123.201 16509 (AMAZON-02)
2 2 52.49.190.28 16509 (AMAZON-02)
1 3.120.214.218 16509 (AMAZON-02)
364 69
Apex Domain
Subdomains
Transfer
56 moatads.com
z.moatads.com
geo.moatads.com
px.moatads.com
893 KB
53 deusm.com
img.deusm.com
662 KB
52 celtra.com
ads.celtra.com
cache-ssl.celtra.com
track.celtra.com
282 KB
26 twimg.com
cdn.syndication.twimg.com
pbs.twimg.com
ton.twimg.com
371 KB
18 googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
868 KB
15 doubleclick.net
securepubads.g.doubleclick.net
googleads.g.doubleclick.net
cm.g.doubleclick.net
stats.g.doubleclick.net
108 KB
14 darkreading.com
www.darkreading.com
trk.darkreading.com
58 KB
12 boltdns.net
cf-images.us-east-1.prod.boltdns.net
53 KB
12 twimgs.com
twimgs.com
1 MB
11 googletagservices.com
www.googletagservices.com
296 KB
11 twitter.com
platform.twitter.com
syndication.twitter.com
112 KB
7 adroll.com
s.adroll.com
d.adroll.com
47 KB
6 teads.tv
a.teads.tv
t.teads.tv
sync.teads.tv
142 KB
6 ml314.com
ml314.com
in.ml314.com
16 KB
6 ubm-us.net
i.ubm-us.net
dsimg.ubm-us.net
72 KB
4 eloqua.com
s657486201.t.eloqua.com
s2150.t.eloqua.com
2 KB
4 facebook.com
www.facebook.com
277 B
4 facebook.net
connect.facebook.net
265 KB
4 scorecardresearch.com
sb.scorecardresearch.com
3 KB
4 techweb.com
ins.techweb.com
ng.techweb.com
3 KB
4 flipboard.com
cdn.flipboard.com
fpn.flipboard.com
6 KB
4 demdex.net
dpm.demdex.net
ubm.demdex.net
3 KB
3 dpmsrv.com
s.dpmsrv.com
a.dpmsrv.com
83 KB
3 bibblio.org
cdn.bibblio.org
api.bibblio.org
15 KB
3 gstatic.com
www.gstatic.com
fonts.gstatic.com
139 KB
3 cmpnet.com
i.cmpnet.com
67 KB
2 crwdcntrl.net
sync.crwdcntrl.net
1006 B
2 adsrvr.org
match.adsrvr.org
928 B
2 google-analytics.com
www.google-analytics.com
18 KB
2 rlcdn.com
idsync.rlcdn.com
431 B
2 adnxs.com
ib.adnxs.com
3 KB
2 bing.com
bat.bing.com
8 KB
2 heatmap.it
u.heatmap.it
11 KB
2 omtrdc.net
ubmtech.d3.sc.omtrdc.net
763 B
2 google.de
adservice.google.de
www.google.de
953 B
2 linkedin.com
platform.linkedin.com
platform-src.linkedin.com
55 KB
2 google.com
www.google.com
671 B
2 ubembed.com
6600d6d98e534115970f9529a45f3195.js.ubembed.com
assets.ubembed.com
46 KB
2 googleapis.com
fonts.googleapis.com
1 KB
1 eyeota.net
ps.eyeota.net
344 B
1 consensu.org
d.adroll.mgr.consensu.org
136 B
1 chartbeat.net
ping.chartbeat.net
168 B
1 en25.com
img.en25.com
3 KB
1 lightreading.com
img.lightreading.com
372 B
1 youtube.com
www.youtube.com
1 informa.com
assets.informa.com
12 KB
1 jquery.com
code.jquery.com
33 KB
1 chartbeat.com
static.chartbeat.com
14 KB
1 everesttech.net
cm.everesttech.net
554 B
1 googleadservices.com
www.googleadservices.com
10 KB
1 googletagmanager.com
www.googletagmanager.com
26 KB
1 bootstrapcdn.com
maxcdn.bootstrapcdn.com
7 KB
1 pulsesecure.net
go.pulsesecure.net
940 B
364 53
Domain Requested by
53 img.deusm.com www.darkreading.com
securepubads.g.doubleclick.net
code.jquery.com
www.googletagservices.com
46 px.moatads.com www.darkreading.com
40 cache-ssl.celtra.com ads.celtra.com
www.darkreading.com
go.pulsesecure.net
22 pbs.twimg.com www.darkreading.com
platform.twitter.com
13 www.darkreading.com 2 redirects go.pulsesecure.net
www.darkreading.com
img.deusm.com
12 tpc.googlesyndication.com securepubads.g.doubleclick.net
www.darkreading.com
www.googletagservices.com
tpc.googlesyndication.com
12 cf-images.us-east-1.prod.boltdns.net www.darkreading.com
12 securepubads.g.doubleclick.net 1 redirects www.googletagservices.com
securepubads.g.doubleclick.net
go.pulsesecure.net
12 twimgs.com www.darkreading.com
securepubads.g.doubleclick.net
11 track.celtra.com www.darkreading.com
11 www.googletagservices.com www.darkreading.com
securepubads.g.doubleclick.net
9 z.moatads.com securepubads.g.doubleclick.net
9 platform.twitter.com www.darkreading.com
platform.twitter.com
6 pagead2.googlesyndication.com www.darkreading.com
securepubads.g.doubleclick.net
5 s.adroll.com 1 redirects www.darkreading.com
s.adroll.com
5 ml314.com z.moatads.com
ml314.com
4 www.facebook.com www.darkreading.com
connect.facebook.net
4 connect.facebook.net www.darkreading.com
connect.facebook.net
4 sb.scorecardresearch.com 1 redirects www.darkreading.com
3 ton.twimg.com platform.twitter.com
www.darkreading.com
3 a.teads.tv securepubads.g.doubleclick.net
a.teads.tv
3 dpm.demdex.net i.cmpnet.com
www.darkreading.com
3 dsimg.ubm-us.net www.darkreading.com
3 i.cmpnet.com www.darkreading.com
3 i.ubm-us.net www.darkreading.com
2 sync.crwdcntrl.net 2 redirects
2 match.adsrvr.org 2 redirects
2 d.adroll.com
2 t.teads.tv www.darkreading.com
2 s2150.t.eloqua.com 1 redirects img.en25.com
2 s657486201.t.eloqua.com 1 redirects www.darkreading.com
2 syndication.twitter.com 1 redirects www.darkreading.com
2 ng.techweb.com 1 redirects img.deusm.com
2 www.google-analytics.com 1 redirects www.googletagmanager.com
2 idsync.rlcdn.com 1 redirects www.darkreading.com
2 a.dpmsrv.com www.darkreading.com
2 ib.adnxs.com 2 redirects
2 fpn.flipboard.com 1 redirects www.darkreading.com
2 fonts.gstatic.com www.darkreading.com
go.pulsesecure.net
2 bat.bing.com www.darkreading.com
2 u.heatmap.it www.darkreading.com
u.heatmap.it
2 ins.techweb.com www.darkreading.com
ins.techweb.com
2 ubmtech.d3.sc.omtrdc.net i.cmpnet.com
2 cdn.flipboard.com www.darkreading.com
2 cdn.bibblio.org www.darkreading.com
2 www.google.com dsimg.ubm-us.net
www.darkreading.com
2 fonts.googleapis.com www.darkreading.com
go.pulsesecure.net
1 ps.eyeota.net
1 in.ml314.com ml314.com
1 d.adroll.mgr.consensu.org 1 redirects
1 sync.teads.tv a.teads.tv
1 trk.darkreading.com www.darkreading.com
1 stats.g.doubleclick.net www.darkreading.com
1 cdn.syndication.twimg.com platform.twitter.com
1 ping.chartbeat.net www.darkreading.com
1 img.en25.com www.darkreading.com
1 api.bibblio.org cdn.bibblio.org
1 cm.g.doubleclick.net 1 redirects
1 img.lightreading.com www.darkreading.com
1 ads.celtra.com www.darkreading.com
1 www.youtube.com i.ubm-us.net
1 geo.moatads.com z.moatads.com
1 www.google.de www.darkreading.com
1 assets.informa.com securepubads.g.doubleclick.net
1 code.jquery.com securepubads.g.doubleclick.net
1 s.dpmsrv.com go.pulsesecure.net
1 static.chartbeat.com www.darkreading.com
1 ubm.demdex.net i.cmpnet.com
1 googleads.g.doubleclick.net www.googleadservices.com
1 cm.everesttech.net 1 redirects
1 adservice.google.de www.googletagservices.com
1 platform-src.linkedin.com www.darkreading.com
1 platform.linkedin.com 1 redirects
1 www.googleadservices.com www.darkreading.com
1 www.gstatic.com www.google.com
1 assets.ubembed.com 6600d6d98e534115970f9529a45f3195.js.ubembed.com
1 www.googletagmanager.com www.darkreading.com
1 6600d6d98e534115970f9529a45f3195.js.ubembed.com www.darkreading.com
1 maxcdn.bootstrapcdn.com www.darkreading.com
1 go.pulsesecure.net
364 80
Subject Issuer Validity Valid
darkreading.com
CloudFlare Inc ECC CA-2
2020-01-28 -
2020-10-09
8 months crt.sh
*.bootstrapcdn.com
Sectigo RSA Domain Validation Secure Server CA
2019-09-14 -
2020-10-13
a year crt.sh
sni.cloudflaressl.com
CloudFlare Inc ECC CA-2
2020-02-04 -
2020-10-09
8 months crt.sh
upload.video.google.com
GTS CA 1O1
2020-04-07 -
2020-06-30
3 months crt.sh
z.ssl.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2020-04-22 -
2021-04-23
a year crt.sh
*.google-analytics.com
GTS CA 1O1
2020-04-07 -
2020-06-30
3 months crt.sh
*.demdex.net
DigiCert SHA2 High Assurance Server CA
2018-01-09 -
2021-02-12
3 years crt.sh
www.google.com
GTS CA 1O1
2020-04-07 -
2020-06-30
3 months crt.sh
assets.ubembed.com
Amazon
2020-04-04 -
2021-05-04
a year crt.sh
*.gstatic.com
GTS CA 1O1
2020-04-07 -
2020-06-30
3 months crt.sh
www.googleadservices.com
GTS CA 1O1
2020-04-07 -
2020-06-30
3 months crt.sh
cdn.bibblio.org
Amazon
2019-07-18 -
2020-08-18
a year crt.sh
*.twimg.com
DigiCert SHA2 High Assurance Server CA
2019-11-12 -
2020-11-18
a year crt.sh
*.flipboard.com
DigiCert SHA2 High Assurance Server CA
2019-11-02 -
2021-11-15
2 years crt.sh
static-src.linkedin.com
DigiCert SHA2 Secure Server CA
2020-03-04 -
2020-09-04
6 months crt.sh
*.g.doubleclick.net
GTS CA 1O1
2020-04-07 -
2020-06-30
3 months crt.sh
*.google.de
GTS CA 1O1
2020-04-07 -
2020-06-30
3 months crt.sh
*.d3.sc.omtrdc.net
DigiCert SHA2 High Assurance Server CA
2020-02-28 -
2022-03-04
2 years crt.sh
*.prod.boltdns.net
Amazon
2019-12-19 -
2021-01-19
a year crt.sh
techweb.com
CloudFlare Inc ECC CA-2
2020-04-02 -
2020-10-09
6 months crt.sh
*.scorecardresearch.com
Sectigo RSA Organization Validation Secure Server CA
2019-12-16 -
2020-12-25
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2020-04-15 -
2020-07-14
3 months crt.sh
*.heatmap.it
Sectigo RSA Domain Validation Secure Server CA
2019-06-14 -
2020-06-26
a year crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2020-04-07 -
2020-06-30
3 months crt.sh
www.bing.com
Microsoft IT TLS CA 2
2019-04-30 -
2021-04-30
2 years crt.sh
*.chartbeat.com
Gandi Standard SSL CA 2
2020-04-04 -
2021-04-04
a year crt.sh
*.dpmsrv.com
Amazon
2019-05-14 -
2020-06-14
a year crt.sh
jquery.org
COMODO RSA Domain Validation Secure Server CA
2018-10-17 -
2020-10-16
2 years crt.sh
moatads.com
DigiCert SHA2 Secure Server CA
2020-01-17 -
2021-03-17
a year crt.sh
informa.com
Amazon
2020-04-23 -
2021-05-23
a year crt.sh
www.google.de
GTS CA 1O1
2020-04-07 -
2020-06-30
3 months crt.sh
*.ml314.com
Amazon
2020-02-17 -
2021-03-17
a year crt.sh
*.moatads.com
DigiCert SHA2 Secure Server CA
2019-03-12 -
2021-06-10
2 years crt.sh
*.google.com
GTS CA 1O1
2020-04-07 -
2020-06-30
3 months crt.sh
celtra.com
Amazon
2020-04-09 -
2021-05-09
a year crt.sh
*.lightreading.com
Amazon
2019-12-30 -
2021-01-30
a year crt.sh
teads.tv
Let's Encrypt Authority X3
2020-04-15 -
2020-07-14
3 months crt.sh
*.rlcdn.com
Sectigo RSA Domain Validation Secure Server CA
2020-04-14 -
2021-04-23
a year crt.sh
api.bibblio.org
Amazon
2019-11-05 -
2020-12-05
a year crt.sh
*.en25.com
DigiCert SHA2 Secure Server CA
2019-06-21 -
2020-08-19
a year crt.sh
ng.techweb.com
Let's Encrypt Authority X3
2020-03-24 -
2020-06-22
3 months crt.sh
*.chartbeat.net
Thawte RSA CA 2018
2019-12-16 -
2020-12-30
a year crt.sh
syndication.twitter.com
DigiCert SHA2 High Assurance Server CA
2020-03-05 -
2021-03-02
a year crt.sh
*.t.eloqua.com
DigiCert SHA2 Secure Server CA
2020-03-09 -
2022-04-08
2 years crt.sh
trk.darkreading.com
RapidSSL RSA CA 2018
2020-03-03 -
2021-03-03
a year crt.sh
*.adroll.com
DigiCert SHA2 Secure Server CA
2020-01-29 -
2021-04-29
a year crt.sh
adroll.mgr.consensu.org
Amazon
2019-11-06 -
2020-12-06
a year crt.sh
*.eyeota.net
Let's Encrypt Authority X3
2020-04-10 -
2020-07-09
3 months crt.sh

This page contains 23 frames:

Primary Page: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Frame ID: C5A9A11F48DC153E21D5BF95A80AFBD5
Requests: 235 HTTP requests in this frame

Frame: https://ubm.demdex.net/dest5.html?d_nsid=0
Frame ID: E22597A5C06AA9A5897933BC81593E18
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstB-8GdFMt2kmINy414NKcWxbsJ11NYKTRU9kSMcH0d2InkR_dfGu97MmPfdgbRKlXJuWL5vuKXAXujvvghS7W99wlUEpOKWVQguNrA7nInnNgAKyiXvvUIBjK4NzV9JUpfzGtNf48a3rQHuVcl1fvY_nWKIB5L7-vm-olYStNPampSNbnaR7kZ3-jkRZkKRsJmsYaUpSkK_cAooCQqoz42mRgzyp5PSyzeCmZ0NxhR6MdlQdYVGxQ-PqIjUC0r-suoycCIVZeX4hkM0X2Bmfoj4E0cO_6g5crJEIs5AnmCguKI5WgZ9w&sai=AMfl-YRV02mAeBtl9ZwoD-eJ1RAC26dGZTx2mHVG_CxzqAqVG0vjbMFgrdnJyamo7wW7f93NxMVon7LYI_wuhJLB3fhStV_zNssfoiL1m16v&sig=Cg0ArKJSzAkWDMcXyklHEAE&urlfix=1&adurl=
Frame ID: 872B88ECBD512B1E149497C285B53EBA
Requests: 16 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvMcl6s4GwrImOH2M-pwEVkkxQWlHXHmmGOdIZiP0x87P22RlWV5Gs1B9KT15rbvpX5qe6jGWgj63yZEEAVyk_EUJRK7-qH-Mla6ARXsB95OxVpgstEvsbCZfMS1HLX-NI0Zl2Wiw6TGvQBpFNmdsZz-MKV-5_kBSaRKo5EF4oEZ5dOrtxgGX0gNVuFL_q4JzeyeQr8483B22Op_BBAWy6PjveGnGBpw5H0AhL-7MsXLdIBE3cbYp47qlddIOWvOK7Lw8L90vMP-HkrM7V4iTfWklUK_bfZBag7qEEH&sai=AMfl-YTd-npzrjvUir7uWUfgGmS9IKsIsGSanszJ9c9iH6mGctoOUMYKnMsZzP02XOttWKvWbkqHntJTcz9jpXM4j1nXsDECEA0xfdiL4I5n&sig=Cg0ArKJSzLnIYQurnGq2EAE&urlfix=1&adurl=
Frame ID: 43A2FFAD8B764B78E586D447C15A48D3
Requests: 5 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuQtfAkQUsj93q7TbCTYyhCuAmdcBmDv7ZxF164UZCTQnvP1dnulVm6G14KddseJih1OPaCC1qZqUwpUeR_y4FvNTZIJdf-ErpdeYgnZqfJEVajkkDl5VTqfepx5zi8zjWwbE6KuSRApZMoi4Q3vMfjkm7YO1fxpR7UPOF3SZsk6TTdvRLZsWpRIyB8uoe329nPZu-eL2LxBGTpnHn_geEQnzwDqIKWun0Cmv0aWP-0wJQzdRUeHTM8x314gTYMcDY_Aqo-d_ceX8UKBCa-LTJpPrsBrmk&sai=AMfl-YQnsFCi53xSAruMzB6T8DHuyisHwAn1z6JgDd6LMA3xJ04trIuWs0U99hxm2KaATQxxKlPml6gCduxLGRvqLvtwaMk99Vea7x4tvAC4&sig=Cg0ArKJSzMNR6FF_31EzEAE&adurl=
Frame ID: 814FAAEFEB096486C792FD507DA57FAB
Requests: 7 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstMIIkmRIg_4AgFxthuIRo7i3Xc0bWLMpaF37X1VuITjoFuENLxNaQPx0_ez7CQlOTct8qHOMygqHvWb8BQgCzd3Xb1K7f1jxgYjfcnUrRWeG0yymslPkkeSQ45YuR73pNFVDI3Q61jw0qh0zQyZR2HT8yM6aqDshm_yPIVeDKMwOYDozlgefUPwr4Dmxm_-TTVsLRqZcv4yh76P8qqVt2nqv2eVo1Zp3dhMbsuwEGC2pOqIjr4SE97Exr09BpYDgFthOTRkjEVZXi9NgpH40amnxcFZRd6BGA&sai=AMfl-YQRVE6lRF-8K-TpJ6lgGG-7by0mgA8KqmusQAdZYRbov3yipFdipDM3wJXAlulUem9pFeQKkD8oq56b-WQnCujhr1zwhJgHvCtUtIl0&sig=Cg0ArKJSzF_4YK0zlUroEAE&urlfix=1&adurl=
Frame ID: FBD02C4E2E06E333C6592F764A4E51C9
Requests: 3 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstIqsQxtMsm5yEpnZMCiQfnqQMu716v_U9PsNaDnzmAJn_fGDMXpUk2vAlwmFLl11823pU0IkTE2zzN_CTaRQgkyLQnCmekidMkNoMBDg_HKH-ZC1A2ygSsNmwH_gCFvV39B8mHoEL4BAC339HGenOiFhg1ojiynmHRV04l3gDz_v1-6s8HNiDgMfKllw7L6vbGFQy4iPVHx-2Aojbh7RT9E4AamDf9K9ET0PAABUrA09xin1e2YegCSI4Qbu6i-LQBu_RsKnH9h5g_EZcd2Yz2dUJ7AjI-XMc&sai=AMfl-YRALmWwXFv6wDnXnxAda6BxO4G2v_fX_KUiJvXe-km0CkEj0oyVasYoLoqKVkpUoNmi209lHynjT44207y2RStiOlBM3TyFU7NzvMhS&sig=Cg0ArKJSzJ3B5CUp5Xg2EAE&urlfix=1&adurl=
Frame ID: 47713DBB76C4CA34E66BA565A5AAB97B
Requests: 4 HTTP requests in this frame

Frame: https://www.youtube.com/embed/rf-dl6ktX-0?rel=0&showinfo=0
Frame ID: 634E55D297612393980DB6DA58ECC2AB
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstX5KGsXibjNHqGOE__9Vb6nyfo_rTjctHI9ZiC-YkxNkC1lqtwUXjUmH7_5A4Hk83vefZaxpFAWYO5H4GOL-8hMyq7aCd-OJaiihcZuqZKo_T2dHU4C8DHJx2y5lPRjHluyYnWl2xC6GCCJQ8XZWWHSBcFwNuQrJ4qujjixnVTwkox3GUAy0RRspgQTJisDeIVo93nR-l8DKE6DEOxR1ArBaC-z8cShJ9gwXSgpni_5dVJ5efDnSLBaIlWvVETFRvXnaGWTOtu7SZP5tbGBOcg0yDknMwwMBjT&sai=AMfl-YQBNpQYn5zbd-Ivo48OYv9j_yItJF_mGlMFMYId-iKLWdS91LyMMzBY0KTVuG4aY8sO5_M7fPnC7Ueo4-n8XqKeJ-rJdVLjt8pLQDJF&sig=Cg0ArKJSzK9_1voZvRdfEAE&urlfix=1&adurl=
Frame ID: 5C843242E94D93D3D25EB32B535D5CE8
Requests: 8 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstj8CyJ6zfyUZxudN-jl3UNPsCb0Xpf-CyfxQs43daKhePrCtiLze4nYWOR4aLi5SlD4Mog3EfgG_tnzACP-jCrxTVxM39gy6AjNYH519IbeN-3vk1mn5-3BeU7ujACHrjSbqumrvTeOMFER69mqbym9fvnB7RARS-eLiB9NjAKgpL3WhmgS9kLXxOy-8gjwYf167qFIDUL7JDh8Hxl2ROtje0J9aQKmKT2-hhMiw3bUA9nVjg_32UCsuF9L5Am2QfPcmIgtl3xv5JUQjtatGZ1CR3smc3Gp5-K&sai=AMfl-YTaxRtwfIRHqn2f5559c_7s4ImLUqEUikgcxDK-Yua28KmKTnxY0kP36jqc41i4nVaiL-wFjHZjyGKkJb1AhNI2U5W3uBMgGqZ9zW_G&sig=Cg0ArKJSzAznBxIjCtZQEAE&adurl=
Frame ID: 8CED47D5543774C55EF0A756875CDB05
Requests: 7 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjst7GtDOJ2Z9t48UPZDtCDKI859bnO8lnPaANTBvO5aSx3CoMmX0BscQJ-qbIJJmqBXlCoOnNW48M8Q0gkJcps4n_H8w5u5gGV1ySvk3Ys7UdIpnAsea8fa0lGp-ukaisbXrxNvlEtQOcg4QGMLW1cGHLuyEjKP8sw5UurwCQMrGcyGeAQMYRIJ8TjGqVkU9SBw_8tQ4UzeKAFlH0f5CzRsSNls6MPb4Hhi7Bac4ocI_-zvZdKv60Tdz2_9KHLvOaLXvvySrBZW5f4C14vpkQ3e7V4zWXSxYfjor&sai=AMfl-YSi5gGiyfUgI8xu00EJFEpfew7sRv1aOH_FW0j944vaXIGEG7fbaXct9Mf3ilJHj96jZeBxSWwoAWFN8_Be0dM4fuPMztW0Yy7bHr05&sig=Cg0ArKJSzHiYbqyOYm0gEAE&adurl=
Frame ID: CBA436FD40BAAD53AEEC7BADF6B30E65
Requests: 6 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvWfHbxqGejAmLuvFAI-GlGsibpG5HNpCjXkXU340mG3Hvobygo2G6XXcVAkqpJ8GscEAyraDrCX3K1zH-UyD7yRZ0bSK0GOXqAJgNpwmMc9euodnne_x4XIw5tadyw5Hje-NGNu13gWbOfzQpxw5HUupbsHOyNFBS4-o4P-DgVSk1GsRKfPpwcCsJH53T--AeGWMG5JfOtZ-WwQ7x9FN-AwtxCS3aarrXfnk-bFbGXA4da1P-MT0xURaqMtLmRXVP5e5aI6e9O3gtPn4NYpQjhK3jdOw&sai=AMfl-YSer1CGbmtYguRgusPHtrGcQthJrN6UVz2YTz3g3JqpG_Y4XUz78_b_EKlDLELfeePHjUfqaasuYJpKfB5ky0R_LaeHsyHjFnONhSUF&sig=Cg0ArKJSzPrjMvpwJW7GEAE&urlfix=1&adurl=
Frame ID: 0896FE5AE640671F236EF252BEADD390
Requests: 5 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/widget_iframe.c63890edc4243ee77048d507b181eeec.html?origin=https%3A%2F%2Fwww.darkreading.com
Frame ID: C0BD9C7391B10E4E1A80787962BE09A0
Requests: 1 HTTP requests in this frame

Frame: https://www.facebook.com/plugins/like.php?app_id=640989409269461&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D46%23cb%3Df32b80a387f3eb%26domain%3Dwww.darkreading.com%26origin%3Dhttps%253A%252F%252Fwww.darkreading.com%252Ff1895c10ff34fd8%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&layout=button&locale=en_US&sdk=joey&send=false&show_faces=false&width=87
Frame ID: 0851B5B2F29DAFDADB5310B24649F10A
Requests: 1 HTTP requests in this frame

Frame: https://ins.techweb.com/beacon/record.do?a=68841bbbf037b3bd9eda236cfd0edcb96932f665438d7b833aaa994d869277ac&u=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%252Fd%252Fd-id%252F1336729%253Fmkt_tok%253DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&t=P
Frame ID: 5CE2A07796319AD3A8CD1B151A592B02
Requests: 1 HTTP requests in this frame

Frame: https://ng.techweb.com/authds/login/login.jsp?type=iframe&cdsocket_client=https://www.darkreading.com/cdsocket_proxy.html
Frame ID: 53D3712EA7CB72A06D3CF76A10372583
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/tweet_button.c63890edc4243ee77048d507b181eeec.en.html
Frame ID: EB5B3A5A05E07CD0F91A7E8C3FDFF871
Requests: 1 HTTP requests in this frame

Frame: https://pbs.twimg.com/card_img/1255579641403723777/e9_1_uuD?format=jpg&name=144x144_2
Frame ID: F4E54255C04E6C8A5795189D4F6234E7
Requests: 29 HTTP requests in this frame

Frame: https://sync.teads.tv/iframe?pid=21882&gdprIab={%22status%22:22,%22consent%22:%22%22,%22reason%22:220}&fromFormat=true&env=js-web&vid=29e59dbb-f4ea-4c4f-8b5e-347e66278550&1588195043691
Frame ID: 8BB08B89B0D32CD424BC285CEAE7BBAB
Requests: 1 HTTP requests in this frame

Frame: https://fonts.googleapis.com/css?family=Lato:400&text=%20CDEIMORSUVadeor
Frame ID: 9827E6EC712BEB749FEDA98CDA11F8F3
Requests: 41 HTTP requests in this frame

Frame: https://platform.twitter.com/jot.html
Frame ID: F7F82C1BC5EEA89003FE8331471E1E0A
Requests: 1 HTTP requests in this frame

Frame: https://www.darkreading.com/ng_initgatewaycheck.asp?init_gateway=true&httpscheck=true
Frame ID: 2C1C9910C26A07DFE10D3D3F3B5C07E1
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Frame ID: A5A63084C7C381414CBB6C932553F13C
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf Page URL
  2. https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomw... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • script /ubembed\.com/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • script /chartbeat\.js/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Overall confidence: 100%
Detected patterns
  • html /<!-- (?:End )?Google Tag Manager -->/i

Overall confidence: 100%
Detected patterns
  • script /\/s[_-]code.*\.js/i

Overall confidence: 100%
Detected patterns
  • script /\/\/platform\.twitter\.com\/widgets\.js/i

Overall confidence: 100%
Detected patterns
  • html /<iframe[^>]* (?:id="comscore"|scr=[^>]+comscore)|\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • script /\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i

Overall confidence: 100%
Detected patterns
  • script /jquery[.-]([\d.]*\d)[^/]*\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

364
Requests

99 %
HTTPS

43 %
IPv6

53
Domains

80
Subdomains

69
IPs

7
Countries

6098 kB
Transfer

13252 kB
Size

48
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf Page URL
  2. https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 60
  • https://platform.linkedin.com/in.js HTTP 302
  • https://platform-src.linkedin.com/in.js
Request Chain 66
  • https://cm.everesttech.net/cm/dd?d_uuid=64015353523897809531862099748640673429 HTTP 302
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=Xqnu4QAAAgtjAi3-
Request Chain 100
  • https://www.darkreading.com/client_pathlog.asp?p=%2Fdarkreading%2Fsection%2F314&f=%2Fdarkreading%2Fsection%2F314%2F1336729&rndserial=62241 HTTP 302
  • https://img.deusm.com/images/spacer.gif
Request Chain 126
  • https://fpn.flipboard.com/pix/__fpn.gif?utm_source=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9 HTTP 307
  • https://fpn.flipboard.com/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fattacks-breaches%25252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%25252Fd%25252Fd-id%25252F1336729%25253Fmkt_tok%25253DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&rh=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%252Fd%252Fd-id%252F1336729%253Fmkt_tok%253DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Request Chain 132
  • https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstB-8GdFMt2kmINy414NKcWxbsJ11NYKTRU9kSMcH0d2InkR_dfGu97MmPfdgbRKlXJuWL5vuKXAXujvvghS7W99wlUEpOKWVQguNrA7nInnNgAKyiXvvUIBjK4NzV9JUpfzGtNf48a3rQHuVcl1fvY_nWKIB5L7-vm-olYStNPampSNbnaR7kZ3-jkRZkKRsJmsYaUpSkK_cAooCQqoz42mRgzyp5PSyzeCmZ0NxhR6MdlQdYVGxQ-PqIjUC0r-suoycCIVZeX4hkM0X2Bmfoj4E0cO_6g5crJEIs5AnmCguKI5WgZ9w&sai=AMfl-YRV02mAeBtl9ZwoD-eJ1RAC26dGZTx2mHVG_CxzqAqVG0vjbMFgrdnJyamo7wW7f93NxMVon7LYI_wuhJLB3fhStV_zNssfoiL1m16v&sig=Cg0ArKJSzAkWDMcXyklHEAE&urlfix=1&adurl=https://tpc.googlesyndication.com/simgad/17295047894583974417 HTTP 302
  • https://tpc.googlesyndication.com/simgad/17295047894583974417
Request Chain 149
  • https://sb.scorecardresearch.com/b?c1=2&c2=3005435&ns__t=1588195042232&ns_c=windows-1252&cv=3.5&c8=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&c7=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&c9=http%3A%2F%2Fgo.pulsesecure.net%2FB700uS3Eq000g0zN0ZzNjTf HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=3005435&ns__t=1588195042232&ns_c=windows-1252&cv=3.5&c8=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&c7=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&c9=http%3A%2F%2Fgo.pulsesecure.net%2FB700uS3Eq000g0zN0ZzNjTf
Request Chain 156
  • https://ib.adnxs.com/getuid?https://a.dpmsrv.com/dpmpxl/index.php?id=$UID&q%3DxImp%26v%3D1.x%26cl%3D55%26pixelIndex%3D0%26r%3D845532%26tzOffset%3D-120%26url%3Dhttps%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%252Fd%252Fd-id%252F1336729%253Fmkt_tok%253DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&_=1588195042425 HTTP 307
  • https://ib.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Fa.dpmsrv.com%2Fdpmpxl%2Findex.php%3Fid%3D%24UID%26q%253DxImp%2526v%253D1.x%2526cl%253D55%2526pixelIndex%253D0%2526r%253D845532%2526tzOffset%253D-120%2526url%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fattacks-breaches%25252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%25252Fd%25252Fd-id%25252F1336729%25253Fmkt_tok%25253DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9%26_%3D1588195042425 HTTP 302
  • https://a.dpmsrv.com/dpmpxl/index.php?id=7108042600408666025&q=xImp&v=1.x&cl=55&pixelIndex=0&r=845532&tzOffset=-120&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&_=1588195042425
Request Chain 196
  • https://cm.g.doubleclick.net/pixel?google_nid=datapoint_dmp&google_cm&ap_id=7108042600408666025&pixelIndex=0&_=1588195042426 HTTP 302
  • https://a.dpmsrv.com/dpmpxl/index.php?q=dfp&ap_id=7108042600408666025&pixelIndex=0&_=1588195042426&google_gid=CAESEGOfLsWJJlXEGNNPLb1eelI&google_cver=1
Request Chain 220
  • https://www.google-analytics.com/r/collect?v=1&_v=j81&a=1936501576&t=pageview&_s=1&dl=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&dr=http%3A%2F%2Fgo.pulsesecure.net%2FB700uS3Eq000g0zN0ZzNjTf&dp=%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&ul=en-us&de=windows-1252&dt=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=YAhAAEAB~&jid=1087840019&gjid=1973065679&cid=1778322720.1588195042&tid=UA-135180592-2&_gid=1398873549.1588195043&_r=1&gtm=2wg4f0WJ9RHF7&cd1=news%20analysis&cd2=jai%20vijayan&cd3=1&cd4=null&cd5=20200106&cd6=attacks%2Fbreaches%20-%20attacks%2Fbreaches&z=273431369 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-135180592-2&cid=1778322720.1588195042&jid=1087840019&_gid=1398873549.1588195043&gjid=1973065679&_v=j81&z=273431369
Request Chain 224
  • https://s657486201.t.eloqua.com/visitor/v200/svrGP?pps=50&siteid=657486201&DLKey=7435f16d0b5c4189a89d0d109d2517f5&DLLookup=&ms=414&firstPartyCookieDomain=trk.darkreading.com HTTP 302
  • https://s657486201.t.eloqua.com/visitor/v200/svrGP.aspx?pps=50&siteid=657486201&DLKey=7435f16d0b5c4189a89d0d109d2517f5&DLLookup=&ms=414&firstPartyCookieDomain=trk.darkreading.com&elqCookie=1
Request Chain 225
  • https://s2150.t.eloqua.com/visitor/v200/svrGP?pps=3&siteid=2150&ref2=http%3A%2F%2Fgo.pulsesecure.net%2FB700uS3Eq000g0zN0ZzNjTf&tzo=-60&ms=414&optin=disabled&firstPartyCookieDomain=trk.darkreading.com HTTP 302
  • https://trk.darkreading.com/visitor/v200/svrGP.aspx?pps=3&siteid=2150&ref2=http:%2F%2Fgo.pulsesecure.net%2FB700uS3Eq000g0zN0ZzNjTf&tzo=-60&ms=414&optin=disabled&elq1pcGUID=A9B12BF13E0D4F9CAD6E72416C42FA4A
Request Chain 325
  • https://syndication.twitter.com/i/jot HTTP 302
  • https://platform.twitter.com/jot.html
Request Chain 332
  • https://www.darkreading.com/ng_initgatewaycheck.asp HTTP 301
  • https://ng.techweb.com/authds/gateway?gateway=true&return=https%3A%2F%2Fwww%2Edarkreading%2Ecom%2Fng%5Finitgatewaycheck%2Easp%3Finit%5Fgateway%3Dtrue%26httpscheck%3Dtrue HTTP 302
  • https://www.darkreading.com/ng_initgatewaycheck.asp?init_gateway=true&httpscheck=true
Request Chain 336
  • https://s.adroll.com/j/exp/TQSV74R4GVCSJITSZC2MCP/index.js HTTP 302
  • https://s.adroll.com/j/exp/index.js
Request Chain 338
  • https://d.adroll.mgr.consensu.org/consent/iabcheck/TQSV74R4GVCSJITSZC2MCP?_s=14d8f680a748e80fa4422b094c816fbe&_b=2 HTTP 302
  • https://d.adroll.com/consent/check/TQSV74R4GVCSJITSZC2MCP/?_s=14d8f680a748e80fa4422b094c816fbe&_b=2
Request Chain 344
  • https://idsync.rlcdn.com/395886.gif?partner_uid=3609927701626880044 HTTP 307
  • https://ml314.com/csync.ashx?fp=fd82fb426601693a5f6cad1fa849945f35c595c7eb5558d09fccec7ded94ef8df4cb09cee1a4f8eb&person_id=3609927701626880044&eid=50082
Request Chain 345
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=d0tro1j&ttd_tpi=1 HTTP 302
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=d0tro1j&ttd_tpi=1 HTTP 302
  • https://ml314.com/utsync.ashx?eid=53819&et=0&fp=7bca4d88-b2bc-402f-a27a-9bcab2637b53
Request Chain 346
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3609927701626880044 HTTP 302
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3609927701626880044 HTTP 302
  • https://ml314.com/csync.ashx?fp=f6d1eb689a5fdd1caef7ff49329e3715&eid=50146&person_id=3609927701626880044

364 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Cookie set B700uS3Eq000g0zN0ZzNjTf
go.pulsesecure.net/
655 B
940 B
Document
General
Full URL
http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
HTTP/1.1
Server
199.15.215.8 , United States, ASN53580 (MARKETO, US),
Reverse DNS
Software
Apache /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Host
go.pulsesecure.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 21:17:20 GMT
Server
Apache
Cache-Control
private, no-cache, no-store, max-age=0
Connection
close
X-Content-Type-Options
nosniff
Vary
Accept-Encoding
Content-Encoding
gzip
Transfer-Encoding
chunked
Content-Type
text/html
Set-Cookie
BIGipServersj_mailtracking_http=!vDmOoZi82SEU3SLInuzRy4alk/3R/m4MGmLmo9r7N/SYxnzd+hG/GBnPar7AEITPYA7ZqbLByQfQNUA=; path=/; Httponly
Primary Request 1336729
www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/
174 KB
31 KB
Document
General
Full URL
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7563 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
15fdb45e4e1202b8e37faddae7ad1ef372ace195c94d061b3864c3aa5fa14561
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains

Request headers

:method
GET
:authority
www.darkreading.com
:scheme
https
:path
/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
document
referer
http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf

Response headers

status
200
date
Wed, 29 Apr 2020 21:17:21 GMT
content-type
text/html
set-cookie
__cfduid=daa9f347e511668a29d873da95d07f98b1588195040; expires=Fri, 29-May-20 21:17:20 GMT; path=/; domain=.darkreading.com; HttpOnly; SameSite=Lax darkreading_lastvisit=4/29/2020 5:17:20 PM; expires=Sun, 29-Apr-2035 21:17:20 GMT; path=/; HttpOnly darkreading_lastvisit=4/29/2020 5:17:20 PM; expires=Sun, 29-Apr-2035 21:17:20 GMT; path=/; HttpOnly cplChannelTagID=; path=/; secure darkreading%2Dmeter=1336729; expires=Thu, 30-Apr-2020 04:00:00 GMT; path=/ darkreading%5Fvisits=2; expires=Sun, 29-Apr-2035 04:00:00 GMT; path=/ gatewayChecked=; path=/; secure
vary
Accept-Encoding
cache-control
private
x-pingback
http://www.staging.new.informationweek.com/xmlrpc.asp
x-powered-by
ASP.NET
strict-transport-security
max-age=63072000; includeSubDomains
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
58bc0c992beebece-FRA
content-encoding
gzip
cf-request-id
02696633bd0000becea9894200000001
font-awesome.min.css
maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/
30 KB
7 KB
Stylesheet
General
Full URL
https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4de0:ac19::1:b:3b , Netherlands, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 12 Dec 2018 18:35:20 GMT
status
200
etag
"1544639720"
vary
Accept-Encoding
x-cache
HIT
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=31536000
cross-origin-resource-policy
cross-origin
accept-ranges
bytes
timing-allow-origin
*
content-length
7050
common-footer.css
twimgs.com/nojitter/css/
9 KB
2 KB
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/common-footer.css?
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::681c:1ce0 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3eea91bd1f33507891a2909689d21be3a6e0fb1b688037c2a7d59c042503d910

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 09 Jan 2020 06:37:35 GMT
server
cloudflare
age
1624
etag
W/"23cf-59baf3e93a9c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-ray
58bc0ca1f8d1c272-FRA
cf-request-id
026966393f0000c272d00fb200000001
css
fonts.googleapis.com/
2 KB
672 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto+Slab:700
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
549f49487512850a6147e411ca138deb4d69f5b370e636147619992b45c77c2c
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
x-xss-protection
0
last-modified
Wed, 29 Apr 2020 21:17:21 GMT
server
ESF
date
Wed, 29 Apr 2020 21:17:21 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Wed, 29 Apr 2020 21:17:21 GMT
darkreading.css
twimgs.com/nojitter/css/
17 KB
3 KB
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/darkreading.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::681c:1ce0 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
cf167be72549318f78f8c03d0d93b923f8e8e290acec47b870a1cede920e859b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 27 Apr 2017 09:38:14 GMT
server
cloudflare
age
2298
etag
W/"45f8-54e22b7428d80"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-ray
58bc0ca1f8d5c272-FRA
cf-request-id
026966393f0000c272d00fc200000001
pano-framework.css
www.darkreading.com/styles/
128 KB
10 KB
Stylesheet
General
Full URL
https://www.darkreading.com/styles/pano-framework.css?v1.27
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7563 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
e9b216c18a520089ac2a2bbb7881baf067da96f01ba42284ec42e096c0e13ef4
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
gzip
cf-cache-status
HIT
age
3297
x-powered-by
ASP.NET
status
200
strict-transport-security
max-age=63072000; includeSubDomains
cf-request-id
02696639220000becea98e1200000001
last-modified
Tue, 07 Jan 2020 07:22:15 GMT
server
cloudflare
etag
W/"352ed22f2bc5d51:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
cache-control
public, max-age=7200
cf-ray
58bc0ca1dd14bece-FRA
expires
Wed, 29 Apr 2020 23:17:21 GMT
styles.css
www.darkreading.com/styles/
292 B
343 B
Stylesheet
General
Full URL
https://www.darkreading.com/styles/styles.css?v7
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7563 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
a8fc74838ba253a4076b8eb46aeed79c10341380609dcfe11bed40d974d1fd10
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
gzip
cf-cache-status
HIT
age
3296
x-powered-by
ASP.NET
status
200
strict-transport-security
max-age=63072000; includeSubDomains
cf-request-id
02696639220000becea98e2200000001
last-modified
Mon, 03 Apr 2017 14:07:44 GMT
server
cloudflare
etag
W/"b08d92aa83acd21:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
cache-control
public, max-age=7200
cf-ray
58bc0ca1dd15bece-FRA
expires
Wed, 29 Apr 2020 23:17:21 GMT
dr_nativead.css
i.ubm-us.net/oas/nativead/css/
2 KB
963 B
Stylesheet
General
Full URL
https://i.ubm-us.net/oas/nativead/css/dr_nativead.css?v3
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::6818:7975 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
f5932acd6c5f2796f354dedc5e8dfe30e206787365186bbf0f9789d083472a75

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
br
cf-cache-status
HIT
age
6936
cf-polished
origSize=2145
status
200
cf-request-id
0269663940000017721f877200000001
last-modified
Wed, 06 Feb 2019 18:48:56 GMT
server
cloudflare
etag
W/"861-5813e2d913600"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
cache-control
max-age=14400
cf-ray
58bc0ca20ac41772-FRA
cf-bgj
minify
nativead.js
i.ubm-us.net/oas/nativead/js/
1 KB
527 B
Script
General
Full URL
https://i.ubm-us.net/oas/nativead/js/nativead.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::6818:7975 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
984cd1fa5dd20c2b1b8fd77b6bb876a3a211cdf14aaaed6bc1481e3c98027544

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 30 Jul 2015 14:31:41 GMT
server
cloudflare
age
39726
cf-polished
origSize=1373
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
58bc0ca20ac71772-FRA
cf-request-id
0269663941000017721f878200000001
cf-bgj
minify
dr_nativead.js
i.ubm-us.net/oas/nativead/js/
8 KB
1 KB
Script
General
Full URL
https://i.ubm-us.net/oas/nativead/js/dr_nativead.js?v3
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::6818:7975 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
b309c9c4a6c27c7cfc64ab2bc7f545e8d7b41a795c46202ab2a9c633f7128287

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 06 Oct 2017 16:50:20 GMT
server
cloudflare
age
78052
cf-polished
origSize=8434
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
58bc0ca20ac91772-FRA
cf-request-id
0269663941000017721f879200000001
cf-bgj
minify
respond.min.js
www.darkreading.com/script/
4 KB
2 KB
Script
General
Full URL
https://www.darkreading.com/script/respond.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7563 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
cf7bdb0487590885c13a3cc0a2a1450b3ac649a465de267af12f552be8bcb5fe
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
gzip
cf-cache-status
HIT
age
3292
x-powered-by
ASP.NET
status
200
strict-transport-security
max-age=63072000; includeSubDomains
cf-request-id
02696639220000becea98e3200000001
last-modified
Mon, 22 Sep 2014 21:04:30 GMT
server
cloudflare
etag
W/"03ccda8d6cf1:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
public, max-age=7200
cf-ray
58bc0ca1dd17bece-FRA
expires
Wed, 29 Apr 2020 23:17:21 GMT
jquery.mobile.custom.min.js
www.darkreading.com/script/
8 KB
3 KB
Script
General
Full URL
https://www.darkreading.com/script/jquery.mobile.custom.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7563 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
b4cf7d6d50b6a36f070f6c49e975198a9a8930838695b64e480bf1f6199f0572
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
gzip
cf-cache-status
HIT
age
3293
x-powered-by
ASP.NET
status
200
cf-request-id
02696639220000becea98e4200000001
last-modified
Mon, 22 Sep 2014 21:04:30 GMT
server
cloudflare
x-frame-options
SAMEORIGIN
etag
W/"03ccda8d6cf1:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
public, max-age=7200
cf-ray
58bc0ca1dd18bece-FRA
expires
Wed, 29 Apr 2020 23:17:21 GMT
complete.js
twimgs.com/nojitter/js/
45 KB
9 KB
Script
General
Full URL
https://twimgs.com/nojitter/js/complete.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::681c:1ce0 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
8420f59cd348cf0e10e05482724523ad6b83f88467bbfacf6826eaadd3a03985

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 05 May 2017 06:04:53 GMT
server
cloudflare
age
37982
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
58bc0ca208dec272-FRA
cf-request-id
02696639410000c272d0101200000001
jquery.mobile-1.4.5.js
img.deusm.com/darkreading/JQuery_Library/
256 KB
62 KB
Script
General
Full URL
https://img.deusm.com/darkreading/JQuery_Library/jquery.mobile-1.4.5.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a456c328bbb88fc991a5ddb80db492ec9e179a3ef443d50bf80b3fbbb5e8a7f7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Tue, 17 Mar 2020 04:33:16 GMT
server
cloudflare
age
3808
etag
W/"71b34-5a1056f31db00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cf-polished
origSize=465716
cf-ray
58bc0ca20c13177e-FRA
cf-request-id
02696639400000177e0bb46200000001
cf-bgj
minify
Jquery_3.4.1.js
img.deusm.com/darkreading/JQuery_Library/
140 KB
39 KB
Script
General
Full URL
https://img.deusm.com/darkreading/JQuery_Library/Jquery_3.4.1.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
d50d436889f46d5b9455690493e877e02ad30ea4dca963ffcaa3024c45c1d58c

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Mon, 16 Mar 2020 04:36:27 GMT
server
cloudflare
age
1453
etag
W/"47090-5a0f15cbce8c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cf-polished
origSize=290960
cf-ray
58bc0ca20c16177e-FRA
cf-request-id
02696639400000177e0bb47200000001
cf-bgj
minify
darkreading.js
img.deusm.com/darkreading/JQuery_Library/
20 KB
3 KB
Script
General
Full URL
https://img.deusm.com/darkreading/JQuery_Library/darkreading.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
74a584aafb20fa5524e8005c8f236bb47119e12225ac0d9e30d6c6ae69354808

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Mon, 16 Mar 2020 04:36:15 GMT
server
cloudflare
age
6934
etag
W/"6a97-5a0f15c05cdc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cf-polished
origSize=27287
cf-ray
58bc0ca20c17177e-FRA
cf-request-id
02696639400000177e0bb48200000001
cf-bgj
minify
VisitorAPI.js
i.cmpnet.com/s_code/
45 KB
14 KB
Script
General
Full URL
https://i.cmpnet.com/s_code/VisitorAPI.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681b:9074 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
aa92b44ae441805b86a9603ffea3890a8df348fb2269d716c557b6970c11e9f4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 12 Feb 2020 19:20:49 GMT
server
cloudflare
age
39976
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
58bc0ca20b093260-FRA
cf-request-id
0269663940000032607b811200000001
at.js
i.cmpnet.com/s_code/
106 KB
33 KB
Script
General
Full URL
https://i.cmpnet.com/s_code/at.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681b:9074 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
42eb48be2f9f6fc91fcda10af9802cb6aa0733e2dd007c224570ae6ece3dac33

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 12 Feb 2020 19:20:49 GMT
server
cloudflare
age
58531
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
58bc0ca20b0c3260-FRA
cf-request-id
0269663940000032607b812200000001
informa-iribbon.css
img.deusm.com/darkreading/
2 KB
1 KB
Stylesheet
General
Full URL
https://img.deusm.com/darkreading/informa-iribbon.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
1ae4b8548f250831a2443bd449af625f6331b7c72e1f408789642a3050596d45

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 25 Apr 2019 07:05:41 GMT
server
cloudflare
age
1453
etag
W/"cea-58755722bdb40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cf-polished
origSize=3306
cf-ray
58bc0ca20c12177e-FRA
cf-request-id
02696639400000177e0bb45200000001
cf-bgj
minify
informa-iribbon.js
img.deusm.com/darkreading/
489 B
311 B
Script
General
Full URL
https://img.deusm.com/darkreading/informa-iribbon.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
fb295c2a72d39784b18a1d2d5b0c9976807f7cf010fe730b86d43bc55b0ae251

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 25 Apr 2019 07:05:52 GMT
server
cloudflare
age
1453
etag
W/"229-5875572d3b400"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cf-polished
origSize=553
cf-ray
58bc0ca20c19177e-FRA
cf-request-id
02696639400000177e0bb49200000001
cf-bgj
minify
cookie_banner.js
www.darkreading.com/script/
2 KB
898 B
Script
General
Full URL
https://www.darkreading.com/script/cookie_banner.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7563 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
020d8d4a55a5f088527c3c75c3ac4920b8f190393f841071d6f3d00807e07abc
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
gzip
cf-cache-status
HIT
age
3290
x-powered-by
ASP.NET
status
200
cf-request-id
02696639230000becea98e5200000001
last-modified
Mon, 06 Jan 2020 08:32:43 GMT
server
cloudflare
x-frame-options
SAMEORIGIN
etag
W/"b753a1dd6bc4d51:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
public, max-age=7200
cf-ray
58bc0ca1dd19bece-FRA
expires
Wed, 29 Apr 2020 23:17:21 GMT
/
6600d6d98e534115970f9529a45f3195.js.ubembed.com/
480 B
657 B
Script
General
Full URL
https://6600d6d98e534115970f9529a45f3195.js.ubembed.com/
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.113.131 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
b8bbc9c674e5e6a44dfbe7668f95920bda9f19b3bad9ae6155ec34f9f0dbf88e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
br
x-backend-region
eu_west_1
age
2617
x-amz-apigw-id
LxCqZFxhDoEFmWQ=
etag
aaab40e12ca91eabbcb0f8f10bd5715a-v0.178.1
vary
Accept-Encoding
x-cache
Miss from cloudfront, HIT
content-type
application/json
status
200
cache-control
max-age=0, must-revalidate
x-amz-cf-pop
FRA6-C1
accept-ranges
none
access-control-allow-origin
*
jplayer.blue.monday.css
twimgs.com/nojitter/css/
12 KB
3 KB
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/jplayer.blue.monday.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::681c:1ce0 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0a4f12795a11d0957a7e476cdd2516967e3e00f54841456fbd8c0dd607984d92

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 05 May 2017 07:28:28 GMT
server
cloudflare
age
5087
etag
W/"2f89-54ec1d5e89f00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-ray
58bc0ca1f8d6c272-FRA
cf-request-id
026966393f0000c272d00fd200000001
style.css
twimgs.com/nojitter/css/
912 B
696 B
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/style.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::681c:1ce0 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3a08be5766c0e198ba8171f7decd09065c08a5c850276325cc1792f25e7b356e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 05 May 2017 07:30:36 GMT
server
cloudflare
age
5095
etag
W/"390-54ec1dd89bf00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-ray
58bc0ca1f8d9c272-FRA
cf-request-id
026966393f0000c272d00fe200000001
jquery.jplayer.min.js
twimgs.com/nojitter/js/
48 KB
11 KB
Script
General
Full URL
https://twimgs.com/nojitter/js/jquery.jplayer.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::681c:1ce0 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
cddbf405266cd4b3e66229592e63666012dbceaaad02635af5da9d303bfd3ed1

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 27 Apr 2017 11:20:55 GMT
server
cloudflare
age
31435
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
58bc0ca208dfc272-FRA
cf-request-id
02696639410000c272d0102200000001
jquery.tablesorter.min.js
twimgs.com/nojitter/js/
16 KB
5 KB
Script
General
Full URL
https://twimgs.com/nojitter/js/jquery.tablesorter.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::681c:1ce0 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
b90279154254e108748dc80dd226eab336e2c320e4a40569952b46dc5d785536

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 27 Apr 2017 11:21:05 GMT
server
cloudflare
age
31435
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
58bc0ca208dbc272-FRA
cf-request-id
02696639410000c272d0100200000001
ubm-widget-style.css
dsimg.ubm-us.net/ubm-widget/css/
29 KB
5 KB
Stylesheet
General
Full URL
https://dsimg.ubm-us.net/ubm-widget/css/ubm-widget-style.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3035::6818:7875 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
6414656f939f73a463499bd2c5a8f75793658adf6e05d0e4cd61d1ba36636b94

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
br
cf-cache-status
HIT
age
942
cf-polished
origSize=29587
status
200
cf-request-id
0269663940000006010b3ed200000001
last-modified
Wed, 11 Apr 2018 16:31:21 GMT
server
cloudflare
etag
W/"7393-569952b4c0840"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
cache-control
max-age=14400
cf-ray
58bc0ca20e850601-FRA
cf-bgj
minify
ubm-widget-min.js
dsimg.ubm-us.net/ubm-widget/js/
192 KB
50 KB
Script
General
Full URL
https://dsimg.ubm-us.net/ubm-widget/js/ubm-widget-min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3035::6818:7875 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
ffcaeef328a1e67717f714997426aaf936e4b9d378a5fbe1bd2a063dfeb50750

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 11 Apr 2018 17:29:33 GMT
server
cloudflare
age
942
etag
W/"2fe99-56995fb6fbbe3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=14400
cf-ray
58bc0ca20e880601-FRA
cf-request-id
0269663940000006010b3ee200000001
ng_forms.js
www.darkreading.com/script/
31 KB
7 KB
Script
General
Full URL
https://www.darkreading.com/script/ng_forms.js?v7.9
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7563 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
ccb577fe731d9954057d10cd6d941eef90e15af6d1b0e4b1469f0ad3af3e84e4
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
gzip
cf-cache-status
HIT
age
3289
x-powered-by
ASP.NET
status
200
strict-transport-security
max-age=63072000; includeSubDomains
cf-request-id
02696639230000becea98e6200000001
last-modified
Wed, 09 Oct 2019 05:19:47 GMT
server
cloudflare
etag
W/"d8d5ac2a617ed51:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
public, max-age=7200
cf-ray
58bc0ca1dd1abece-FRA
expires
Wed, 29 Apr 2020 23:17:21 GMT
widget-extra.css
twimgs.com/nojitter/css/
443 B
323 B
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/widget-extra.css?v1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::681c:1ce0 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
61494fd1b573b217034bef7e22044bda91962797d68efada6726910d32bb995b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 13 Sep 2017 07:28:37 GMT
server
cloudflare
age
4906
etag
W/"1bb-5590d1ba81340"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-ray
58bc0ca1f8dac272-FRA
cf-request-id
026966393f0000c272d00ff200000001
gtm.js
www.googletagmanager.com/
77 KB
26 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-WJ9RHF7
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
f5941e53f298b248e603a0d68c9dd0f26635977b7106ff7b20814438b4c4958b
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
br
vary
Accept-Encoding
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
26492
x-xss-protection
0
last-modified
Wed, 29 Apr 2020 21:00:00 GMT
server
Google Tag Manager
strict-transport-security
max-age=31536000; includeSubDomains
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Wed, 29 Apr 2020 21:17:21 GMT
id
dpm.demdex.net/
362 B
1 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=3.1.2&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_orgid=77FB1CFE532B22840A490D45%40AdobeOrg&d_nsid=0&ts=1588195041664
Requested by
Host: i.cmpnet.com
URL: https://i.cmpnet.com/s_code/VisitorAPI.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.50.184.22 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-50-184-22.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
0ebc1ffaeabef06c3d76613d626ea05b74b575a0e7ad50bbdd244ddec7c3de83
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v067-078aae0f2.edge-irl1.demdex.com 5.68.0.20200428121513 2ms (+1ms)
Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
Content-Encoding
gzip
X-TID
dOYpDsahT/8=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://www.darkreading.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
299
Expires
Thu, 01 Jan 1970 00:00:00 GMT
api.js
www.google.com/recaptcha/
729 B
561 B
Script
General
Full URL
https://www.google.com/recaptcha/api.js?onload=rcCallback&render=explicit
Requested by
Host: dsimg.ubm-us.net
URL: https://dsimg.ubm-us.net/ubm-widget/js/ubm-widget-min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
12853732a344aeb9ba00e9a7497dd3c37826a5f73a5744df768a72e05c37a893
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self'
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
GSE
x-frame-options
SAMEORIGIN
content-type
text/javascript; charset=UTF-8
status
200
cache-control
private, max-age=300
content-security-policy
frame-ancestors 'self'
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
467
x-xss-protection
1; mode=block
expires
Wed, 29 Apr 2020 21:17:21 GMT
bundle.js
assets.ubembed.com/universalscript/releases/v0.178.1/
162 KB
46 KB
Script
General
Full URL
https://assets.ubembed.com/universalscript/releases/v0.178.1/bundle.js
Requested by
Host: 6600d6d98e534115970f9529a45f3195.js.ubembed.com
URL: https://6600d6d98e534115970f9529a45f3195.js.ubembed.com/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.202.59 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-202-59.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
df25786bc3951d78d0f763a2a75a1f33b01b8ae2a5157831d2cf4d0348c2ede7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 21 Feb 2020 17:13:45 GMT
content-encoding
gzip
last-modified
Wed, 11 Dec 2019 22:14:50 GMT
server
AmazonS3
age
5889817
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
x-amz-cf-id
FvuSzmpeo4aLyATNTp4W8jlj1wbjUFeDTu8ODqZE2F35M2WdGgg0UQ==
via
1.1 61adf71a363fe0f836dc69dbb43de824.cloudfront.net (CloudFront)
recaptcha__en.js
www.gstatic.com/recaptcha/releases/wk6lx42JIeYmEAQSHndnyT8Q/
299 KB
121 KB
Script
General
Full URL
https://www.gstatic.com/recaptcha/releases/wk6lx42JIeYmEAQSHndnyT8Q/recaptcha__en.js
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api.js?onload=rcCallback&render=explicit
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b3f949c5fa5809887926e9351f3d35a72b6c9b542bcbfffbc41e0fd87424ae71
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 20 Apr 2020 16:59:00 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 20 Apr 2020 04:05:48 GMT
server
sffe
age
793101
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
124243
x-xss-protection
0
expires
Tue, 20 Apr 2021 16:59:00 GMT
conversion.js
www.googleadservices.com/pagead/
27 KB
10 KB
Script
General
Full URL
https://www.googleadservices.com/pagead/conversion.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
4a9abec4e9f9962a1b4ac3f8c3f637be75b3dd39e37a670ca8a33c3c4f9eb2bc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
10582
x-xss-protection
0
server
cafe
etag
11280618715274700684
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Wed, 29 Apr 2020 21:17:21 GMT
adblockDetector.js
www.darkreading.com/prestitial/
116 B
249 B
Script
General
Full URL
https://www.darkreading.com/prestitial/adblockDetector.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7563 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
3f81e097214e8827172d879ab5ceea8fc8c1c9265830fd1d2938d1cc2b3f0528
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
gzip
cf-cache-status
HIT
age
1676
x-powered-by
ASP.NET
status
200
strict-transport-security
max-age=63072000; includeSubDomains
cf-request-id
02696639b60000becea98f7200000001
last-modified
Wed, 29 May 2019 04:12:00 GMT
server
cloudflare
etag
W/"aa108aad415d51:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
public, max-age=7200
cf-ray
58bc0ca2bdf6bece-FRA
expires
Wed, 29 Apr 2020 23:17:21 GMT
iwk-it-network-dr.gif
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/iwk-it-network-dr.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
d6df7d1f2b9c65c06c5ae1e798650b6c388f26f6852b8814f942557d712b9745

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Wed, 02 Nov 2016 13:53:05 GMT
server
cloudflare
age
6924
etag
"abc-54051c29ab240"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
58bc0ca4192a177e-FRA
content-length
2748
cf-request-id
0269663a930000177e0bb60200000001
DR_mobile_User_nav.png
img.deusm.com/darkreading/
1 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_mobile_User_nav.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7b02cdb496b954e874c4b87d48eb1ea16f088258786ed0d2f0771acc3d01649e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:03 GMT
server
cloudflare
age
6927
etag
"5be-4f2ebd21a06c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca4192c177e-FRA
content-length
1470
cf-request-id
0269663a930000177e0bb61200000001
spacer.gif
img.deusm.com/images/
49 B
190 B
Image
General
Full URL
https://img.deusm.com/images/spacer.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3c5b83e390d046c3623c4b8e35b58aaf64a7481bb2372fb51ae2e0e7818f7407

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Fri, 13 Oct 2000 01:54:07 GMT
server
cloudflare
age
937
etag
"31-3737c29f20dc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
58bc0ca4192e177e-FRA
content-length
49
cf-request-id
0269663a930000177e0bb62200000001
DR_search.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_search.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
dafb72bcf008c9b9754482b88e8ba8b8e854f1a69483f0753b1c3f12101c1a9f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:03 GMT
server
cloudflare
age
6927
etag
"7e9-4f2ebd21a06c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca41932177e-FRA
content-length
2025
cf-request-id
0269663a930000177e0bb63200000001
DR_mobile_SM.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_mobile_SM.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
bfc1797e85a0565d0cfba1621eac801dc5ebd78a02f45e0ab8de5c6c2eb3f987

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:03 GMT
server
cloudflare
age
6927
etag
"864-4f2ebd21a06c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca41933177e-FRA
content-length
2148
cf-request-id
0269663a930000177e0bb64200000001
DR-sections-nav.png
img.deusm.com/darkreading/
2 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-sections-nav.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
4f89a03faa36f0b6eeb92b9a8f0b8d2f9d3e564ba8bf13bb169bf05b126ca81e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:03 GMT
server
cloudflare
age
6926
etag
"9aa-4f2ebd21a06c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca41934177e-FRA
content-length
2474
cf-request-id
0269663a930000177e0bb65200000001
mobile_close.jpg
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/mobile_close.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
b5c543f59d71e1e4f6b51c896febf86975206dcf9e34757f475b125d64d16ea6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Thu, 13 Mar 2014 12:44:20 GMT
server
cloudflare
age
6924
etag
"638-4f47c4fdf5100"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
58bc0ca41935177e-FRA
content-length
1592
cf-request-id
0269663a930000177e0bb66200000001
DR_logo_314x49.png
img.deusm.com/darkreading/
7 KB
7 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_logo_314x49.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0615fb751c4db849533b1e432f05428e307591466902876f8ab30d7873b7f38b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Mon, 15 Oct 2018 10:02:43 GMT
server
cloudflare
age
6926
etag
"1b78-5784189c2b6f8"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca41937177e-FRA
content-length
7032
cf-request-id
0269663a930000177e0bb67200000001
DR_Newsletters.png
img.deusm.com/darkreading/
4 KB
4 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_Newsletters.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
33194e1b282eaf349b01b68de4fee20452ff6877b4b82605d5c68c5132444f96

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Wed, 18 Sep 2019 13:04:00 GMT
server
cloudflare
age
6926
etag
"fec-592d378715000"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca41938177e-FRA
content-length
4076
cf-request-id
0269663a930000177e0bb68200000001
bib-related-content.min.css
cdn.bibblio.org/rcm/4.9/
22 KB
4 KB
Stylesheet
General
Full URL
https://cdn.bibblio.org/rcm/4.9/bib-related-content.min.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.126 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-126.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
fa30597c8340ed18b045cc801a2dfb2e1185f9ca5ea02753e5935e64df5aa4c5

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 00:32:57 GMT
content-encoding
gzip
last-modified
Fri, 20 Mar 2020 10:35:36 GMT
server
AmazonS3
age
74665
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/css
status
200
x-amz-cf-pop
FRA6-C1
x-amz-cf-id
kTzM1r7_QbwGdsJxRYoZgIwPCVO4fwJCOCQcX423kvrmCg95aSDGiw==
via
1.1 3095e870e1a1a1b03178e40ab1872de5.cloudfront.net (CloudFront)
bib-related-content.min.js
cdn.bibblio.org/rcm/4.9/
45 KB
11 KB
Script
General
Full URL
https://cdn.bibblio.org/rcm/4.9/bib-related-content.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.126 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-126.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
5b21d495e672a89a4d8dc047b17ab94531525297644c1a4340a2bc3f26ab782f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 00:36:51 GMT
content-encoding
gzip
last-modified
Fri, 20 Mar 2020 10:35:37 GMT
server
AmazonS3
age
74431
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-pop
FRA6-C1
x-amz-cf-id
qHZ6I-e5Mb7sTGSnrIwpNxT8-UTMjjRO8H5KrI9VLCw3jTMjg6GcgQ==
via
1.1 3095e870e1a1a1b03178e40ab1872de5.cloudfront.net (CloudFront)
Jai-Vijayan.jpg
img.deusm.com/informationweek/
11 KB
11 KB
Image
General
Full URL
https://img.deusm.com/informationweek/Jai-Vijayan.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2e9b6fed568a85ee88f1eb2aa1d51cb2073d907cbb0109a5dd703f0b1e5651d6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Mon, 29 Sep 2014 13:34:14 GMT
server
cloudflare
age
5093
etag
"2c67-5043452972180"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
58bc0ca4193a177e-FRA
content-length
11367
cf-request-id
0269663a930000177e0bb69200000001
editor-TW.png
img.deusm.com/informationweek/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/editor-TW.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
32821e69d091e71a62b9dbefcd09516c2133b50c50a3f8d597207d9cab5d59b8

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Thu, 14 Nov 2013 19:33:41 GMT
server
cloudflare
age
45
etag
"60d-4eb2828b4cf40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca4193d177e-FRA
content-length
1549
cf-request-id
0269663a930000177e0bb6a200000001
editor-IN.png
img.deusm.com/informationweek/
1 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/editor-IN.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e5cc2027e2da5b3d553fba6a4d2d7276aafa604001e9b0321e18d1fd62b03b3f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Thu, 14 Nov 2013 19:33:41 GMT
server
cloudflare
age
4668
etag
"5b7-4eb2828b4cf40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca4193e177e-FRA
content-length
1463
cf-request-id
0269663a930000177e0bb6b200000001
editor-RSS.png
img.deusm.com/informationweek/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/editor-RSS.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a8f4fa7376444ffe05d0f7b296439401fb9729bdee84d760ee6286e7b663c753

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Thu, 14 Nov 2013 19:33:41 GMT
server
cloudflare
age
45
etag
"6fa-4eb2828b4cf40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca41940177e-FRA
content-length
1786
cf-request-id
0269663a930000177e0bb6c200000001
editor-email.png
img.deusm.com/informationweek/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/editor-email.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
190f689e0f479324a217a5ea88c1acc132b66d24b16559052d59b892ff5dcba2

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Thu, 14 Nov 2013 19:33:40 GMT
server
cloudflare
age
3328
etag
"70f-4eb2828a58d00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca41942177e-FRA
content-length
1807
cf-request-id
0269663a930000177e0bb6d200000001
DR-comment.png
img.deusm.com/darkreading/
1011 B
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-comment.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
63484bd691450c081b848e5159315bfcd02720741d3f72a69717643d6630e578

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:02 GMT
server
cloudflare
age
2231
etag
"3f3-4f2ebd20ac480"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca41943177e-FRA
content-length
1011
cf-request-id
0269663a930000177e0bb6e200000001
thumbs-up.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/thumbs-up.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0c9111d9514a49ad97e7c6d5fd97a00f3232b73537e9155726f32f123eb69b5a

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Fri, 14 Mar 2014 16:09:21 GMT
server
cloudflare
age
524
etag
"607-4f4934ae90e40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca41944177e-FRA
content-length
1543
cf-request-id
0269663a930000177e0bb6f200000001
thumbs-down.png
img.deusm.com/informationweek/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/thumbs-down.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
b19f14d674857362b6e10d0dcb1703b149d9dda6f350d1737562fc36e4e67a81

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Wed, 20 Nov 2013 19:20:31 GMT
server
cloudflare
age
524
etag
"624-4eba0acaa9dc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca41945177e-FRA
content-length
1572
cf-request-id
0269663a930000177e0bb70200000001
email-decode.min.js
www.darkreading.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/
1 KB
832 B
Script
General
Full URL
https://www.darkreading.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7563 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2595496fe48df6fcf9b1bc57c29a744c121eb4dd11566466bc13d2e52e6bbcc8
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
gzip
vary
Accept-Encoding
last-modified
Tue, 21 Apr 2020 17:12:03 GMT
server
cloudflare
etag
W/"5e9f2963-4d7"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
application/javascript
status
200
cache-control
max-age=172800, public
cf-ray
58bc0ca3ef1dbece-FRA
cf-request-id
0269663a6e0000becea9901200000001
expires
Fri, 01 May 2020 21:17:21 GMT
widgets.js
platform.twitter.com/
96 KB
29 KB
Script
General
Full URL
https://platform.twitter.com/widgets.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40AE) /
Resource Hash
f4eeb4ceea453fd7c1e54e6990325e6f6659219ba99debdf1d0fe69a14e6851d

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 21:17:21 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Apr 2020 21:45:57 GMT
Server
ECS (fcn/40AE)
Age
1152
Etag
"1f8f0f4b5562e951d241e51fb1f76e2e+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=1800
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
29152
flipboard_srsw.png
cdn.flipboard.com/badges/
322 B
763 B
Image
General
Full URL
https://cdn.flipboard.com/badges/flipboard_srsw.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2057:b800:e:5a70:ca47:86e1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
44fc0a3d10c47ae5aa6c77c76b4b8f81aa08022ca464ef235005ddd86570eb5b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 01:21:04 GMT
via
1.1 2f0580a0593ad9d3fb82aee9226d8179.cloudfront.net (CloudFront)
last-modified
Wed, 07 Feb 2018 22:03:59 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
atime:1518040945/ctime:1518040834/gid:20/gname:staff/md5:37351783e1813119a3e0710c16137273/mode:33152/mtime:1518064798/uid:502/uname:jlee
age
71778
etag
"37351783e1813119a3e0710c16137273"
x-cache
Hit from cloudfront
content-type
image/png
status
200
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-length
322
x-amz-cf-id
fHN1OIlKJ_NyRI7T0PkjzsY1X2gmQys4DR3HWkL_CdMwTJndHAGlBQ==
flbuttons.min.js
cdn.flipboard.com/web/buttons/js/
7 KB
4 KB
Script
General
Full URL
https://cdn.flipboard.com/web/buttons/js/flbuttons.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2057:b800:e:5a70:ca47:86e1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
8e7ad8de87781f6ad65b36a7d3243b44d80dc182df6af076484a2bec85051550

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 01:18:28 GMT
content-encoding
gzip
last-modified
Wed, 11 Oct 2017 00:24:00 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:502/gname:staff/uname:alee/gid:20/mode:33188/mtime:1507680760/atime:1507680783/md5:ec6e4306e5e274d25c4f9afde663da81/ctime:1507680760
age
71934
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-pop
FRA6-C1
x-amz-cf-id
KVo5hKf3BZU9jcEtPr-M9nzu3x3YYgibzwQoCPwvS0zEH__OysAAOw==
via
1.1 2f0580a0593ad9d3fb82aee9226d8179.cloudfront.net (CloudFront)
in.js
platform-src.linkedin.com/
Redirect Chain
  • https://platform.linkedin.com/in.js
  • https://platform-src.linkedin.com/in.js
181 KB
55 KB
Script
General
Full URL
https://platform-src.linkedin.com/in.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2620:119:50e6:101::6cae:b08 , United States, ASN14413 (LINKEDIN, US),
Reverse DNS
Software
Play /
Resource Hash
efcdaddc38c2232d3364ef546e31c7a4d0942120f1c64af45a478cdcab103730

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
content-encoding
gzip
nel
{"report_to":"network-errors","max_age":1296000,"success_fraction":0.00066,"failure_fraction":1,"include_subdomains":true}
server
Play
vary
Accept-Encoding
report-to
{"group":"network-errors","max_age":2592000,"endpoints":[{"url":"https://www.linkedin.com/li/rep"}],"include_subdomains":true}
content-type
text/javascript; charset=UTF-8
status
200
cache-control
public, max-age=3600
x-li-pop
prod-ech2
x-li-proto
http/2
content-length
55595
x-li-uuid
nBhS8flmChZA8bKMsyoAAA==
x-li-fabric
prod-ltx1
expires
Wed, 29 Apr 2020 22:17:22 GMT

Redirect headers

X-LI-UUID
oz32QnCY6xVQwiK9RysAAA==
Date
Wed, 29 Apr 2020 21:17:21 GMT
X-CDN-CLIENT-IP-VERSION
IPV6
X-Li-Pop
prod-tln1
X-Li-Fabric
prod-lor1
Location
https://platform-src.linkedin.com/in.js
Akamai-Age-Ms
-1
X-LI-Proto
http/1.1
Connection
keep-alive
Content-Length
0
X-CDN
AKAM
Edgepromohorizontal.jpg
img.deusm.com/darkreading/MarilynCohodas/
12 KB
12 KB
Image
General
Full URL
https://img.deusm.com/darkreading/MarilynCohodas/Edgepromohorizontal.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7259b4d8e7ac33a579f3a8df3b0eb3fa9c0818ae203fb58b45564cf4d2057ca4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Tue, 27 Aug 2019 12:24:47 GMT
server
cloudflare
age
518
etag
"2f0f-591185baf21c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
58bc0ca41947177e-FRA
content-length
12047
cf-request-id
0269663a930000177e0bb71200000001
gpt.js
www.googletagservices.com/tag/js/
43 KB
15 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f6342216ca1c7f579fe3906d54147ad4128c9f66db3842224f2f550e10baf284
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"501 / 928 of 1000 / last-modified: 1588191961"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
14541
x-xss-protection
0
expires
Wed, 29 Apr 2020 21:17:21 GMT
pubads_impl_2020042302.js
securepubads.g.doubleclick.net/gpt/
237 KB
86 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
sffe /
Resource Hash
0b3678d81937a06cba82b9b8d1b69a6e60c1133246d9798e681bf3908aa390bc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 23 Apr 2020 17:07:14 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
87243
x-xss-protection
0
expires
Wed, 29 Apr 2020 21:17:21 GMT
integrator.sync.js
adservice.google.de/adsid/
113 B
843 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.sync.js?domain=www.darkreading.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ea03bfd7fdda1eac185ebc3e8e74b33065b04c8e0adc48cbbd4136748dbd2742
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
108
x-xss-protection
0
id
ubmtech.d3.sc.omtrdc.net/
2 B
321 B
XHR
General
Full URL
https://ubmtech.d3.sc.omtrdc.net/id?d_visid_ver=3.1.2&d_fieldgroup=A&mcorgid=77FB1CFE532B22840A490D45%40AdobeOrg&mid=62074350174199795621667579695987519590&ts=1588195041798
Requested by
Host: i.cmpnet.com
URL: https://i.cmpnet.com/s_code/VisitorAPI.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
15.188.105.205 Paris, France, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-15-188-105-205.eu-west-3.compute.amazonaws.com
Software
jag /
Resource Hash
44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

status
200
date
Wed, 29 Apr 2020 21:17:21 GMT
x-content-type-options
nosniff
server
jag
xserver
anedge-65fb49f79-rlghx
vary
Origin
x-c
master-1221.I0e927e.M0-376
p3p
CP="This is not a P3P policy"
access-control-allow-origin
https://www.darkreading.com
cache-control
no-cache, no-store, max-age=0, no-transform, private
access-control-allow-credentials
true
content-type
application/x-javascript;charset=utf-8
content-length
2
x-xss-protection
1; mode=block
ibs:dpid=411&dpuuid=Xqnu4QAAAgtjAi3-
dpm.demdex.net/
Redirect Chain
  • https://cm.everesttech.net/cm/dd?d_uuid=64015353523897809531862099748640673429
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=Xqnu4QAAAgtjAi3-
42 B
915 B
Image
General
Full URL
https://dpm.demdex.net/ibs:dpid=411&dpuuid=Xqnu4QAAAgtjAi3-
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.50.184.22 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-50-184-22.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

DCS
dcs-prod-irl1-v067-06772f4d1.edge-irl1.demdex.com 5.68.0.20200428121513 1ms (+0ms)
Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Content-Type-Options
nosniff
X-TID
jKW570a3Q5w=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT

Redirect headers

Date
Wed, 29 Apr 2020 21:17:21 GMT
Server
AMO-cookiemap/1.1
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Location
https://dpm.demdex.net/ibs:dpid=411&dpuuid=Xqnu4QAAAgtjAi3-
Cache-Control
no-cache
Connection
Keep-Alive
Keep-Alive
timeout=15,max=100
Content-Length
0
DR-user.jpg
img.deusm.com/darkreading/
2 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-user.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
d4b95126382745e9e07d76812e3bbc8d6de2cfa6356c586f930ece7d4acb8052

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Tue, 04 Mar 2014 15:58:18 GMT
server
cloudflare
age
524
etag
"97d-4f3c9f8faba80"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
58bc0ca41948177e-FRA
content-length
2429
cf-request-id
0269663a930000177e0bb72200000001
lightreading_cropped_635201064811931964.jpg
dsimg.ubm-us.net/user/15111803/86143/
14 KB
14 KB
Image
General
Full URL
https://dsimg.ubm-us.net/user/15111803/86143/lightreading_cropped_635201064811931964.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3035::6818:7875 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c23174343e12f3cc9db1f4e6c9ed2528206c45efec68825a90dff4719d966111

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Fri, 15 Nov 2013 15:01:21 GMT
server
cloudflare
age
518
etag
"3911-4eb38789b9240"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
cache-control
max-age=14400
accept-ranges
bytes
cf-ray
58bc0ca41cd10601-FRA
content-length
14609
cf-request-id
0269663a93000006010b021200000001
Sheridan-IWK-125x125.jpg
img.deusm.com/informationweek/
17 KB
17 KB
Image
General
Full URL
https://img.deusm.com/informationweek/Sheridan-IWK-125x125.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
88f6b155f6df559c17b78785558ec29de6429ef62232a26ad2ddbf8f8de07209

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Thu, 14 Aug 2014 20:09:58 GMT
server
cloudflare
age
4667
etag
"4206-5009c7d249180"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
58bc0ca4194a177e-FRA
content-length
16902
cf-request-id
0269663a930000177e0bb73200000001
Mike-Lloyd.png
img.deusm.com/darkreading/
32 KB
32 KB
Image
General
Full URL
https://img.deusm.com/darkreading/Mike-Lloyd.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
6c0c8acc294eefbe3a2151c55ab008b921c179ed901d6cd98b551f84709a83ce

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Tue, 04 Apr 2017 01:04:38 GMT
server
cloudflare
age
2231
etag
"7e99-54c4cdc221580"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca4194c177e-FRA
content-length
32409
cf-request-id
0269663a930000177e0bb74200000001
Robert-Lemos.png
img.deusm.com/darkreading/authors/
45 KB
46 KB
Image
General
Full URL
https://img.deusm.com/darkreading/authors/Robert-Lemos.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
87cdbacb358e421a482bc1a52dc9cfc04a9f6d8dfe86c7c6c66bcde013792850

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Wed, 12 Dec 2018 13:37:24 GMT
server
cloudflare
age
4668
etag
"b5d4-57cd34c52ed00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca4194d177e-FRA
content-length
46548
cf-request-id
0269663a930000177e0bb75200000001
NL-icon.png
img.deusm.com/informationweek/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/informationweek/NL-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
d8b7ea5cc75abc79d502a95c5ccac8f97aa82fd8c13acc74c84c754eb86cc4c3

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Fri, 08 Nov 2013 15:09:43 GMT
server
cloudflare
age
2231
etag
"a27-4eaabc5a3dbc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca4194e177e-FRA
content-length
2599
cf-request-id
0269663a930000177e0bb76200000001
video-arrow_left_off.gif
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/video-arrow_left_off.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
9f61400081191bf755c967c186a8fd356b02010fac3412f84cf83d5dfe10dd5d

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Fri, 14 Mar 2014 16:02:37 GMT
server
cloudflare
age
2231
etag
"53e-4f49332d48140"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
58bc0ca4194f177e-FRA
content-length
1342
cf-request-id
0269663a930000177e0bb77200000001
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/fa726b0a-898c-4556-9c4e-8513ab3eb45d/11ab51b4-e776-4639-97c3-07e5210bfd9d/160x90/match/
3 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/fa726b0a-898c-4556-9c4e-8513ab3eb45d/11ab51b4-e776-4639-97c3-07e5210bfd9d/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.212.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
fdb0066a030a45bd44f17d459c6369901b3fa648c94de3afa0f824d87dfd1527

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 05:50:23 GMT
Via
1.1 1cc446ef4692d8e752b16c07f2f58a59.cloudfront.net (CloudFront)
Age
55619
X-Powered-From
us-east-1c
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
X-Amz-Cf-Id
tCu_AAR5D482PPolkiyoEtNTV8UMyjGAUkgUp3MakRe3me1-SkEd4Q==
comment.png
img.deusm.com/informationweek/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/informationweek/comment.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
4f65ccd30d1c95588b51035a804dd49090d7fbe6c2829a576a31d1b6a3e0f86b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Wed, 20 Nov 2013 19:22:53 GMT
server
cloudflare
age
2231
etag
"446-4eba0b5215d40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca41950177e-FRA
content-length
1094
cf-request-id
0269663a930000177e0bb78200000001
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/2fe20654-2cfe-4555-8102-d79cc405847e/0e955e8e-0506-45e1-b715-3062ef29198b/160x90/match/
5 KB
5 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/2fe20654-2cfe-4555-8102-d79cc405847e/0e955e8e-0506-45e1-b715-3062ef29198b/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.212.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
6dd394ad8df7d5e2ed0f220ff18451f281ccc907cae0d25d233c51533ad8887f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 05:50:24 GMT
Via
1.1 1f5757b46371746e677236d4fc67d364.cloudfront.net (CloudFront)
Age
55618
X-Powered-From
us-east-1a
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
X-Amz-Cf-Id
wmxE79TCCpd0so9Z7Xs33HLVSgIQ38LuXrXMdQHf9HR0TxgXfrkDeg==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/c601c055-fcb3-4a63-98f8-d1882e680cbc/32d6c778-320c-47c4-91cf-4508cb0d5c40/160x90/match/
3 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/c601c055-fcb3-4a63-98f8-d1882e680cbc/32d6c778-320c-47c4-91cf-4508cb0d5c40/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.212.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
01b4ebef3b601f246d0adbff5259fabbe7c8e0311f1169b495f0bb2b862db981

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 06:19:31 GMT
Via
1.1 d16428714e022976873ccc980fdc1289.cloudfront.net (CloudFront)
Age
53871
X-Powered-From
us-east-1d
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
X-Amz-Cf-Id
gz_aFmtVlTryIgBRLybg9ssshRQMuLQ8JPd7DSX9FbudywA6Cf6nvA==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/a7f317ff-8706-4af7-9f0e-9e2417e9af2d/29fd1a56-9d84-4424-bebd-e25a67a974d3/160x90/match/
4 KB
5 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/a7f317ff-8706-4af7-9f0e-9e2417e9af2d/29fd1a56-9d84-4424-bebd-e25a67a974d3/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.212.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
eb12eaa9c690d06187a7099545a6bf52318a2364411fc9c4ec73e7fa4ecbb0f9

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 02:59:43 GMT
Via
1.1 0cbb1ca51bf146be48b40804581e4466.cloudfront.net (CloudFront)
Age
65859
X-Powered-From
us-east-1a
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
X-Amz-Cf-Id
VVP2tzDvPC3wW80tCnk2t1gczO-cnQjMqo9CWrdu0uOJrTu_hcHwDw==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/7d8fd3f5-736a-4751-9741-c63476a1c55f/9e10932e-22cf-4161-8f97-7ded08968b25/160x90/match/
4 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/7d8fd3f5-736a-4751-9741-c63476a1c55f/9e10932e-22cf-4161-8f97-7ded08968b25/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.212.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
2ec7b8d3c38a996f67dd4e580c975ece3e9d936d4267167d12604a59a5ff2c87

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 05:32:02 GMT
Via
1.1 8b5bc0831e6dab612582614c3009efa7.cloudfront.net (CloudFront)
Age
56720
X-Powered-From
us-east-1e
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
X-Amz-Cf-Id
nt-lnK6ULVE00EhU_XLFuHprgwATCWfVWbm4e_J5o570EjeUh_2-WA==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/3afccae7-9c97-4434-b702-84e95b2c9e9b/213e62f9-b1ab-4368-a58c-5bf046478bff/160x90/match/
4 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/3afccae7-9c97-4434-b702-84e95b2c9e9b/213e62f9-b1ab-4368-a58c-5bf046478bff/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.212.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
c670b28572ed7804386b274eb1ddafbc0253a1aff515b0d15805c57c26bcee64

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 05:22:10 GMT
Via
1.1 960a66a5b9d832814160983d391e997c.cloudfront.net (CloudFront)
Age
57312
X-Powered-From
us-east-1c
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
X-Amz-Cf-Id
6si21BpWRtxjH4qoHVxBz9JYEVNp3xIPU3J1roYUvBoNWkaGc4IKnA==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/1d764395-3566-4875-8962-a175d38af9e5/main/160x90/2m58s368ms/match/
5 KB
5 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/1d764395-3566-4875-8962-a175d38af9e5/main/160x90/2m58s368ms/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.212.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
f598a8748bf3e022bb3b431e6a0ad2b735d99b41288d56361dc9ce63b4e4d285

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 04:22:07 GMT
Via
1.1 1f5757b46371746e677236d4fc67d364.cloudfront.net (CloudFront)
Age
60915
X-Powered-From
us-east-1d
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
X-Amz-Cf-Id
89Hqr4_Z2_9IB6MxIoFbv_OxiCXpEuJ3wNf6ydxfCeuwrp-Koq_vUQ==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/96082f18-026e-44fb-abf1-f81e163dc2f2/cb35f38f-1826-419f-a5e0-7e1971f4c1c6/160x90/match/
4 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/96082f18-026e-44fb-abf1-f81e163dc2f2/cb35f38f-1826-419f-a5e0-7e1971f4c1c6/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.212.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
71c805ad1e5135a1d4dd9fccaa913bbdaf94cc3608d9619e5b546c1b865a2c16

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 09:08:56 GMT
Via
1.1 1cc446ef4692d8e752b16c07f2f58a59.cloudfront.net (CloudFront)
Age
43706
X-Powered-From
us-east-1c
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
X-Amz-Cf-Id
IrjMIzOVZpJ3FvEhT93O5atKbkHYRiH0Hlb51S9SvrnuHE1fGDDMxg==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/25c39f65-9707-4f3a-9f06-88fccdd69a43/main/160x90/4m39s829ms/match/
4 KB
5 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/25c39f65-9707-4f3a-9f06-88fccdd69a43/main/160x90/4m39s829ms/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.212.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
20cbcc1c3a0b7c92033adbeb8f6f8b0cb03067db48a19f7116b40e8f2fbf8b3a

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 04:22:07 GMT
Via
1.1 d16428714e022976873ccc980fdc1289.cloudfront.net (CloudFront)
Age
60915
X-Powered-From
us-east-1c
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
X-Amz-Cf-Id
hKUuQLqUcjGCuCquLjZwwj-QMtgzj7HtG6fT3FIbjaF1-9zYLMp0aw==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/d0e7fead-2e5a-4562-a430-556e3516311c/e5ff9746-37c2-40c4-bb2d-10e4ec8d3ad3/160x90/match/
4 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/d0e7fead-2e5a-4562-a430-556e3516311c/e5ff9746-37c2-40c4-bb2d-10e4ec8d3ad3/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.212.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
9bb134ceb966cd6cbccfec7ab7dcb2fede6b0a5705e991030c0c248670d99168

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 06:19:31 GMT
Via
1.1 0cbb1ca51bf146be48b40804581e4466.cloudfront.net (CloudFront)
Age
53871
X-Powered-From
us-east-1d
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
X-Amz-Cf-Id
YxSQ8Gdp0yAmnxvdKzqRpZn4yGy9JiMzFWeD9qLPoCVoxOAOsDgabQ==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/c0da3834-c2d6-4c82-bef6-4ccdef7da688/911a7f6c-fc39-413a-bb28-272f6702ab8e/160x90/match/
4 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/c0da3834-c2d6-4c82-bef6-4ccdef7da688/911a7f6c-fc39-413a-bb28-272f6702ab8e/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.212.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
731e7bf0e3b7c8fb1978a6c04ba3940b77ce5166bd55dcc2c710baa011c517c6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 03:16:50 GMT
Via
1.1 960a66a5b9d832814160983d391e997c.cloudfront.net (CloudFront)
Age
64832
X-Powered-From
us-east-1c
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
X-Amz-Cf-Id
f1w-79oEh40vk-CmTVQuCkHiRif13mhc96IbW6N_SI8_pFSwO-44_w==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/d28d35f7-16e0-4c08-9500-8257f224764a/0c968b04-c649-44ca-96b7-867f99c5e6b4/160x90/match/
4 KB
5 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/d28d35f7-16e0-4c08-9500-8257f224764a/0c968b04-c649-44ca-96b7-867f99c5e6b4/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.212.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
de309132f417ea1f43ee235841b11e40081e1ea204cbbf29b9c896dc3350dd64

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 10:17:46 GMT
Via
1.1 8b5bc0831e6dab612582614c3009efa7.cloudfront.net (CloudFront)
Age
39576
X-Powered-From
us-east-1a
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
X-Amz-Cf-Id
kgx4oyugxk0p-JRW0GfP69LHRFF7NI2jgk3BKOS7dx0lhr75i4Q-Dw==
video-arrow_right_on.gif
img.deusm.com/darkreading/
2 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/video-arrow_right_on.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c7d1ee4f5a608fa05b8f9c6cbd47e3eab7516facc3380d704b7332805877afff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Fri, 14 Mar 2014 15:55:19 GMT
server
cloudflare
age
2231
etag
"9f7-4f49318b927c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
58bc0ca42953177e-FRA
content-length
2551
cf-request-id
0269663a980000177e0bb79200000001
JK-April2020.jpg
img.deusm.com/darkreading/MarilynCohodas/
360 KB
360 KB
Image
General
Full URL
https://img.deusm.com/darkreading/MarilynCohodas/JK-April2020.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
52d413be589001844dd4be31e9c739726c0241cc3e3158e55913bfcfee1ed1d0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Mon, 20 Apr 2020 14:59:46 GMT
server
cloudflare
age
2231
etag
"59e39-5a3ba26567c80"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
58bc0ca42955177e-FRA
content-length
368185
cf-request-id
0269663a980000177e0bb7a200000001
DRTD_Cover_6EmgThrts.jpg
twimgs.com/custom_content/
18 KB
18 KB
Image
General
Full URL
https://twimgs.com/custom_content/DRTD_Cover_6EmgThrts.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::681c:1ce0 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c9886783680c77ed7e2778b4794cb6ba552c7722d66fc960415a95867094e4b8

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Fri, 13 Mar 2020 16:00:08 GMT
server
cloudflare
age
2784
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
cache-control
public, max-age=86400
accept-ranges
bytes
cf-ray
58bc0ca42e00c272-FRA
content-length
18136
cf-request-id
0269663a940000c272d012b200000001
survey_jspage.asp
www.darkreading.com/
7 KB
1 KB
Script
General
Full URL
https://www.darkreading.com/survey_jspage.asp?survey_id=130&cbust=111013
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7563 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
0db99da57d0d48e024bc0cb1aefaffdaff040afde0fc7d198db302d27896a8af
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
content-encoding
gzip
cf-cache-status
DYNAMIC
server
cloudflare
x-powered-by
ASP.NET
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/html
status
200
cache-control
private
strict-transport-security
max-age=63072000; includeSubDomains
cf-ray
58bc0ca41f4ebece-FRA
cf-request-id
0269663a930000becea9902200000001
Synopsys_DRReport_thumbnail.png
twimgs.com/custom_content/
1 MB
1 MB
Image
General
Full URL
https://twimgs.com/custom_content/Synopsys_DRReport_thumbnail.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::681c:1ce0 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
30b4b25de050ab34f9f92a686ef67cbdc2f8cb08e43c25213ae31613977ff106

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Fri, 13 Mar 2020 19:25:44 GMT
server
cloudflare
age
81862
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=86400
accept-ranges
bytes
cf-ray
58bc0ca42e01c272-FRA
content-length
1256681
cf-request-id
0269663a940000c272d012c200000001
DR-bug.png
img.deusm.com/darkreading/
1 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-bug.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
f30d5c0433d74c8224a2343a3c6c08468015909c22315b8693f9bdee33f48217

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:01 GMT
server
cloudflare
age
2231
etag
"5d2-4f2ebd1fb8240"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca42956177e-FRA
content-length
1490
cf-request-id
0269663a980000177e0bb7b200000001
Social-FB.png
img.deusm.com/darkreading/
2 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/Social-FB.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
fbb475f48d03815474a554d3c16599917c2fabf811e3fe2772aeabeee474aa8f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Fri, 11 Oct 2019 04:28:57 GMT
server
cloudflare
age
757
etag
"9a2-5949af4d49440"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca42959177e-FRA
content-length
2466
cf-request-id
0269663a980000177e0bb7c200000001
Social-Twitter.png
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/Social-Twitter.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0f762bf1a58c917c1ad50006bfcd192ab55b2d01a857b7c08b6c40e3af878695

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Fri, 11 Oct 2019 12:05:31 GMT
server
cloudflare
age
757
etag
"a2c-594a155a3d8c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca4295b177e-FRA
content-length
2604
cf-request-id
0269663a980000177e0bb7d200000001
Social-LI.png
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/Social-LI.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
4bbed2de83df27dc8130644101bce3dd9ddd1c178815e42bcb49118b4a73593c

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Fri, 11 Oct 2019 12:05:08 GMT
server
cloudflare
age
3803
etag
"a0b-594a15444e500"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca4295c177e-FRA
content-length
2571
cf-request-id
0269663a980000177e0bb7e200000001
Social-Flip.png
img.deusm.com/darkreading/
825 B
951 B
Image
General
Full URL
https://img.deusm.com/darkreading/Social-Flip.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
973ccce3f58b175a9e021c76978726083cc7e5cbed75cd0ff09ff83919934d15

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Wed, 16 Oct 2019 04:56:12 GMT
server
cloudflare
age
5815
etag
"339-594ffeb7d9300"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca4295e177e-FRA
content-length
825
cf-request-id
0269663a980000177e0bb7f200000001
Social-RSS.png
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/Social-RSS.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a0761aa1289035f3d20430d55e475043a8fa40deff221715e31068905d561753

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Fri, 11 Oct 2019 12:05:19 GMT
server
cloudflare
age
757
etag
"a73-594a154ecbdc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca42961177e-FRA
content-length
2675
cf-request-id
0269663a980000177e0bb80200000001
Whitelogo.png
twimgs.com/nojitter/img/
7 KB
7 KB
Image
General
Full URL
https://twimgs.com/nojitter/img/Whitelogo.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::681c:1ce0 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a8041ba3d02102bd99dcead4dcc9882c484902362927cfd598e389e930f68ceb

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Thu, 09 Jan 2020 05:04:54 GMT
server
cloudflare
age
35004
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=86400
accept-ranges
bytes
cf-ray
58bc0ca42e02c272-FRA
content-length
7304
cf-request-id
0269663a940000c272d012d200000001
ubm-tech-global-app-measurement.js
i.cmpnet.com/s_code/
56 KB
20 KB
Script
General
Full URL
https://i.cmpnet.com/s_code/ubm-tech-global-app-measurement.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681b:9074 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
924b3a471d549de6251aea0e74fe6eb136141d3f0a8bf001906fff933dec45d4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Sat, 14 Jul 2018 00:08:25 GMT
server
cloudflare
age
44886
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
58bc0ca418693260-FRA
cf-request-id
0269663a93000032607b832200000001
spacer.gif
img.deusm.com/images/
Redirect Chain
  • https://www.darkreading.com/client_pathlog.asp?p=%2Fdarkreading%2Fsection%2F314&f=%2Fdarkreading%2Fsection%2F314%2F1336729&rndserial=62241
  • https://img.deusm.com/images/spacer.gif
49 B
190 B
Image
General
Full URL
https://img.deusm.com/images/spacer.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3c5b83e390d046c3623c4b8e35b58aaf64a7481bb2372fb51ae2e0e7818f7407

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
cf-cache-status
HIT
last-modified
Fri, 13 Oct 2000 01:54:07 GMT
server
cloudflare
age
938
etag
"31-3737c29f20dc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
58bc0ca8ab86177e-FRA
content-length
49
cf-request-id
0269663d650000177e0bbac200000001

Redirect headers

date
Wed, 29 Apr 2020 21:17:22 GMT
cf-cache-status
DYNAMIC
server
cloudflare
status
302
x-powered-by
ASP.NET
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=63072000; includeSubDomains
content-type
text/html
location
https://img.deusm.com/images/spacer.gif
cache-control
private
cf-ray
58bc0ca41f4fbece-FRA
cf-request-id
0269663a930000becea9903200000001
lightreading_rating_dot_10x7.gif
img.deusm.com/lightreading/
49 B
177 B
Image
General
Full URL
https://img.deusm.com/lightreading/lightreading_rating_dot_10x7.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3c5b83e390d046c3623c4b8e35b58aaf64a7481bb2372fb51ae2e0e7818f7407

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Wed, 25 Sep 2013 21:21:36 GMT
server
cloudflare
age
6920
etag
"31-4e73bd694b800"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
58bc0ca42963177e-FRA
content-length
49
cf-request-id
0269663a980000177e0bb81200000001
twitter_intevol_18x18.gif
img.deusm.com/darkreading/
619 B
749 B
Image
General
Full URL
https://img.deusm.com/darkreading/twitter_intevol_18x18.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
ebe3a0272a317857bf566a0deec42181bf0e89d280bb3143bba14da1ae1ddb10

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Fri, 09 Feb 2018 10:56:35 GMT
server
cloudflare
age
5815
etag
"26b-564c561c21ec0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
58bc0ca42965177e-FRA
content-length
619
cf-request-id
0269663a980000177e0bb82200000001
beacon-min.js
ins.techweb.com/beacon/js/
6 KB
2 KB
Script
General
Full URL
https://ins.techweb.com/beacon/js/beacon-min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3034::6818:7ae4 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a290ede885635a3f7bb2b8e630bf795f15dde146fea32520b775bee1b2926ff3

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

cf-ray
58bc0ca46e4a1f25-FRA
date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 23 Mar 2017 17:04:42 GMT
server
cloudflare
age
2502
etag
W/"6108-1490288682000"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
p3p
CP='IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT'
status
200
cache-control
max-age=14400
content-type
application/javascript
cf-request-id
0269663abf00001f251fbd6200000001
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.124.133.20 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-124-133-20.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a256529bd5b1b8846f8d2536ce7581fb6cea4479992f222d01535903dff48d79

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 21:17:22 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
884
Expires
Thu, 30 Apr 2020 21:17:22 GMT
fbevents.js
connect.facebook.net/en_US/
131 KB
31 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
4cb61e44bf63a9e090e666898cd04d382e4c33b55b62cc5e9ff7dab055fbf787
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-27=":443"; ma=3600
content-length
31766
x-xss-protection
0
pragma
public
x-fb-debug
uQ+MK7CFxKcMAlVS/AfEJ84DJunTxt69G5uIXAKBI/CBPsHlYEvzz8EdYETFVL/ygRROYiR5H+X70qmXGg2d0g==
x-fb-trip-id
1850256238
x-frame-options
DENY
date
Wed, 29 Apr 2020 21:17:22 GMT, Wed, 29 Apr 2020 21:17:22 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
expires
Sat, 01 Jan 2000 00:00:00 GMT
log.js
u.heatmap.it/
27 KB
11 KB
Script
General
Full URL
https://u.heatmap.it/log.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
46.105.202.39 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
/
Resource Hash
f851a9c6eb2bc09da1f51b84e5d218efa514d76c6fa53e803f22ad7dca9f93cf

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 28 Apr 2020 20:39:51 GMT
content-encoding
br
last-modified
Thu, 16 Apr 2020 20:48:55 GMT
x-cdn-pop-ip
137.74.120.0/27
etag
W/"5e98c4b7-6b00"
x-cacheable
Matched cache
vary
Accept-Encoding
content-type
application/x-javascript; charset=UTF-8
status
200
cache-control
max-age=604800
x-cdn-pop
sbg
accept-ranges
bytes
content-length
10520
x-request-id
622594
expires
Tue, 28 Apr 2020 21:39:52 GMT
background-pattern.png
img.deusm.com/darkreading/
493 B
728 B
Image
General
Full URL
https://img.deusm.com/darkreading/background-pattern.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
98fb88ec226feae902fb7f98528a41db7abd7de155a6d7b65658c6ab7f2b95f4

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.27
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:01 GMT
server
cloudflare
age
2231
etag
"1ed-4f2ebd1fb8240"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca42968177e-FRA
content-length
493
cf-request-id
0269663a980000177e0bb83200000001
iribbon-logo.gif
twimgs.com/nojitter/gama/
2 KB
2 KB
Image
General
Full URL
https://twimgs.com/nojitter/gama/iribbon-logo.gif
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::681c:1ce0 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
f3bd482cd3ec17583f25ad0819d1ccbcd0cdcb0fe26f8d87b7f30fd61b3dc640

Request headers

Referer
https://img.deusm.com/darkreading/informa-iribbon.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
cf-cache-status
HIT
last-modified
Fri, 19 Apr 2019 06:59:19 GMT
server
cloudflare
age
35854
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
public, max-age=86400
accept-ranges
bytes
cf-ray
58bc0ca42e10c272-FRA
content-length
1931
cf-request-id
0269663a940000c272d012e200000001
ads
securepubads.g.doubleclick.net/gampad/
89 KB
20 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=1337160380706509&correlator=1594663714748498&output=ldjh&impl=fifs&adsid=NT&eid=21063046%2C21064366%2C21065782&vrg=2020042302&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200429&iu_parts=2441%2Cdarkreading%2Cattacks_breaches&enc_prev_ius=%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2&prev_iu_szs=2x2%2C5x5%2C300x250%7C336x280%7C300x600%7C336x850%2C6x6%2C1x2%2C728x90%7C970x250%2C336x27%2C300x250%7C336x280%7C300x600%7C336x850%2C300x60%2C3x3%2C4x4%2C8x2%2C8x4&prev_scp=pos%3Dwelcome%26testAd%3D%7Cpos%3DTAPunit%26testAd%3D%7Cpos%3Drec1%26testAd%3D%7Cpos%3Dpromo%26testAd%3D%7Cpos%3Dwallpaper%26testAd%3D%7Cpos%3Dtop%26testAd%3D%7Cpos%3Dlogo%26testAd%3D%7Cpos%3Drec2%26testAd%3D%7Cpos%3Deventpromo%26testAd%3D%7Cpos%3Dribbon%26testAd%3D%7Cpos%3Dvideo%26testAd%3D%7Cpos%3Dnative%26testAd%3D%7Cpos%3Dinsight%26testAd%3D&cust_params=kw%3DAdvanced_Threats%252CAttacks%252CAttacks-Breaches%252CBanking-Finance%252CBreaches%26aid%3D1336729&cookie_enabled=1&bc=31&abxe=1&lmt=1588195041&dt=1588195041947&dlt=1588195041558&idt=349&frm=20&biw=1600&bih=1200&oid=2&adxs=0%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9&adys=35%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9&adks=1417865500%2C2285942263%2C4220632109%2C4159207384%2C2332965166%2C2966194094%2C2269036440%2C4220632108%2C1032152201%2C885452677%2C693593060%2C929715771%2C3939335409&ucis=1%7C2%7C3%7C4%7C5%7C6%7C7%7C8%7C9%7Ca%7Cb%7Cc%7Cd&ifi=1&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&ref=http%3A%2F%2Fgo.pulsesecure.net%2FB700uS3Eq000g0zN0ZzNjTf&dssz=45&icsg=1030795299882&std=0&csl=80&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1600x1200%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1&msz=1600x2%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1&ga_vid=1778322720.1588195042&ga_sid=1588195042&ga_hid=1936501576&fws=0%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2&ohw=0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
cafe /
Resource Hash
e571db6368f280cf5bda7f853490bc15f370979f5f816206799cb7b575ef60ca
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
19747
x-xss-protection
0
google-lineitem-id
5290329792,5312334190,5312334190,-2,5312334190,5334439846,-2,5357140258,-2,-2,42403476,5310815425,5330621928
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138308164554,138306267349,138305888879,-2,138306266656,138307094492,-2,138309922451,-2,-2,138212589663,138304035464,138306796197
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.darkreading.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

/
googleads.g.doubleclick.net/pagead/viewthroughconversion/1007530244/
3 KB
1 KB
Script
General
Full URL
https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1007530244/?random=1588195041967&cv=9&fst=1588195041967&num=1&guid=ON&resp=GooglemKTybQhCsO&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=120&u_java=false&u_nplug=0&u_nmime=0&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&ref=http%3A%2F%2Fgo.pulsesecure.net%2FB700uS3Eq000g0zN0ZzNjTf&tiba=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&hn=www.googleadservices.com&rfmt=3&fmt=4
Requested by
Host: www.googleadservices.com
URL: https://www.googleadservices.com/pagead/conversion.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
9e82256634ccc0707fd5c5120aaea7bf3c05d9eadc54f67d52cdcd8454716c5b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
no-cache, must-revalidate
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
alt-svc
h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
1317
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
bat.js
bat.bing.com/
25 KB
8 KB
Script
General
Full URL
https://bat.bing.com/bat.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:c11::200 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
079e218ad07f42523479d475b4973a6e386ba95209ee964c04c1a6eb6186bda3

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:21 GMT
content-encoding
gzip
last-modified
Mon, 13 Apr 2020 22:01:50 GMT
x-msedge-ref
Ref A: 6364284BFF324231987AE446FDFCC0E1 Ref B: FRAEDGE0407 Ref C: 2020-04-29T21:17:22Z
status
200
etag
"0db222df11d61:0"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
private,max-age=1800
accept-ranges
bytes
content-length
7610
all.js
connect.facebook.net/en_US/
3 KB
2 KB
Script
General
Full URL
https://connect.facebook.net/en_US/all.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
9ae239b9de42a7ecdf1604d3805a6eca006c3f09ac3166a6bbdc37ae68118944
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
gX0azZZfEf4BtAzyelCgkA==
status
200
alt-svc
h3-27=":443"; ma=3600
content-length
1779
etag
"4ad57520f2f954c004e991a03eebe054"
x-fb-debug
NstG9YLuHAy6hwHDzqGImsestk0WKZNufoNXSF0pwDDPQE+SQzKyj1dJlyqFv8NfbuCNF/qDquJTHs5rbj3RMA==
x-fb-trip-id
1850256238
x-fb-content-md5
9e95b9091c4f929f4ab6893fdc4f335a
x-frame-options
DENY
date
Wed, 29 Apr 2020 21:17:22 GMT, Wed, 29 Apr 2020 21:17:22 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-FB-Content-MD5
cache-control
public,max-age=1200,stale-while-revalidate=3600
timing-allow-origin
*
expires
Wed, 29 Apr 2020 21:25:33 GMT
Cookie set dest5.html
ubm.demdex.net/ Frame E225
0
0
Document
General
Full URL
https://ubm.demdex.net/dest5.html?d_nsid=0
Requested by
Host: i.cmpnet.com
URL: https://i.cmpnet.com/s_code/VisitorAPI.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.209.33.201 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-209-33-201.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Host
ubm.demdex.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
demdex=64015353523897809531862099748640673429
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9

Response headers

Accept-Ranges
bytes
Cache-Control
max-age=21600
Content-Encoding
gzip
Content-Type
text/html
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified
Wed, 29 Apr 2020 07:39:36 GMT
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Pragma
no-cache
Set-Cookie
demdex=64015353523897809531862099748640673429;Path=/;Domain=.demdex.net;Expires=Mon, 26-Oct-2020 21:17:22 GMT;Max-Age=15552000;Secure;SameSite=None
Strict-Transport-Security
max-age=31536000; includeSubDomains
Vary
Accept-Encoding, User-Agent
X-TID
m5MvLhmLRO8=
Content-Length
2785
Connection
keep-alive
rss-icon.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/rss-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7bb0d75d42e3ccf1a9d1a055bcddfbc23003ed3ab75bb0eb49c05ba747bce8c9

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
cf-cache-status
HIT
last-modified
Mon, 24 Feb 2014 16:00:47 GMT
server
cloudflare
age
2231
etag
"649-4f329132149c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca4daec177e-FRA
content-length
1609
cf-request-id
0269663b080000177e0bb8a200000001
tw-icon.png
img.deusm.com/darkreading/
1 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/tw-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
48d211ee8f54e0f314ee98a2b63e6e470b33fb1de29d326c742be16125bda71a

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
cf-cache-status
HIT
last-modified
Mon, 24 Feb 2014 16:00:47 GMT
server
cloudflare
age
2231
etag
"56e-4f329132149c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca4daef177e-FRA
content-length
1390
cf-request-id
0269663b090000177e0bb8b200000001
flipboard-icon.png
img.deusm.com/darkreading/
425 B
551 B
Image
General
Full URL
https://img.deusm.com/darkreading/flipboard-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
22c53eeed2c33c21657590793b89fed83648ee555686c0e9ff90b39c1dab406f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
cf-cache-status
HIT
last-modified
Fri, 30 Nov 2018 12:31:36 GMT
server
cloudflare
age
2231
etag
"1a9-57be0fae8ba00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca4daf0177e-FRA
content-length
425
cf-request-id
0269663b090000177e0bb8c200000001
facebook-icon.png
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/facebook-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
4e19e8f9902a8b9ec4840aaf54110d6f502c5fb500303dc605f8776c40f7fb67

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
cf-cache-status
HIT
last-modified
Mon, 24 Feb 2014 16:00:47 GMT
server
cloudflare
age
5813
etag
"4a9-4f329132149c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca4daf4177e-FRA
content-length
1193
cf-request-id
0269663b090000177e0bb8d200000001
li-icon.png
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/li-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
976aabc512994a6ecc5981a85c489d1bb242ba6734b746a964d69db615f72875

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
cf-cache-status
HIT
last-modified
Mon, 24 Feb 2014 16:00:47 GMT
server
cloudflare
age
2231
etag
"54b-4f329132149c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca4daf5177e-FRA
content-length
1355
cf-request-id
0269663b090000177e0bb8e200000001
reb-border.png
img.deusm.com/darkreading/
331 B
457 B
Image
General
Full URL
https://img.deusm.com/darkreading/reb-border.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
523296d1a2c9a67ee707b5e0bc582f488e5786ec9b343c7b3da58a0d162d643b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
cf-cache-status
HIT
last-modified
Thu, 03 Nov 2016 06:29:01 GMT
server
cloudflare
age
2231
etag
"14b-5405fac56e540"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca4daf6177e-FRA
content-length
331
cf-request-id
0269663b090000177e0bb8f200000001
nav-background.png
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/nav-background.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a6595372db2688a9dfb0991bc6cea16343042dd3caa33483b393d21a77d1c4be

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.27
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
cf-cache-status
HIT
last-modified
Sat, 22 Feb 2014 17:43:38 GMT
server
cloudflare
age
2231
etag
"af8-4f30247448680"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca4daf7177e-FRA
content-length
2808
cf-request-id
0269663b090000177e0bb90200000001
nav-background-edge.png
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/nav-background-edge.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
fd2f3015d1e62a6f24420652afa85f8dbce31636ea8ee86781dc794c243dec68

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.27
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
cf-cache-status
HIT
last-modified
Tue, 11 Jun 2019 06:13:41 GMT
server
cloudflare
age
2231
etag
"aeb-58b0632bf0f40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca4dafa177e-FRA
content-length
2795
cf-request-id
0269663b090000177e0bb91200000001
BngbUXZYTXPIvIBgJJSb6s3BzlRRfKOFbvjoa4Omb2RlV9Su1cai.woff
fonts.gstatic.com/s/robotoslab/v11/
15 KB
15 KB
Font
General
Full URL
https://fonts.gstatic.com/s/robotoslab/v11/BngbUXZYTXPIvIBgJJSb6s3BzlRRfKOFbvjoa4Omb2RlV9Su1cai.woff
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
0b6f5ef9a0c4b8bdc17d9f04174cf25472ee3e519abe18e5edfe46a736ec86bc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Roboto+Slab:700
Origin
https://www.darkreading.com

Response headers

date
Sat, 28 Mar 2020 04:15:04 GMT
x-content-type-options
nosniff
last-modified
Tue, 04 Feb 2020 23:35:54 GMT
server
sffe
age
2826138
status
200
content-type
font/woff
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
15360
x-xss-protection
0
expires
Sun, 28 Mar 2021 04:15:04 GMT
chartbeat.js
static.chartbeat.com/js/
36 KB
14 KB
Script
General
Full URL
https://static.chartbeat.com/js/chartbeat.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.1.26 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-86-1-26.fra6.r.cloudfront.net
Software
nginx /
Resource Hash
9233eac6e8f7adc20a334ce3854d5adbbed6dcc031a36ea1eee952894407951c

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 19:17:23 GMT
content-encoding
gzip
last-modified
Fri, 24 Apr 2020 01:13:41 GMT
server
nginx
age
7198
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/x-javascript
status
200
cache-control
max-age=7200
x-amz-cf-pop
FRA6-C1
x-amz-cf-id
xptlCtdx-ZX0NT4uYctFhR7b7_OLtaUSp41oer8HohuXqJOnonZ0mg==
via
1.1 d07eabeb1ed60c06da1457f35fb5c8c5.cloudfront.net (CloudFront)
expires
Wed, 29 Apr 2020 21:17:23 GMT
832000476880185
connect.facebook.net/signals/config/
475 KB
120 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/832000476880185?v=2.9.18&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
fe94896bcc93dde281fb24d6db89d883d25f46ee4bd7b5e4a7060f9d901a29db
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-27=":443"; ma=3600
content-length
122209
x-xss-protection
0
pragma
public
x-fb-debug
07qonE+8ViizOnr9IhNuOnnwS896lVPeQ9ApzUDrjptchOZF7em6DSHnzsZQ4FXhCiareivZVxmoNia7P1ph0Q==
x-fb-trip-id
1850256238
x-frame-options
DENY
date
Wed, 29 Apr 2020 21:17:22 GMT, Wed, 29 Apr 2020 21:17:22 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
__fpn.gif
fpn.flipboard.com/tr/
Redirect Chain
  • https://fpn.flipboard.com/pix/__fpn.gif?utm_source=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729...
  • https://fpn.flipboard.com/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fattacks-breaches%25252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-at...
35 B
360 B
Image
General
Full URL
https://fpn.flipboard.com/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fattacks-breaches%25252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%25252Fd%25252Fd-id%25252F1336729%25253Fmkt_tok%25253DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&rh=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%252Fd%252Fd-id%252F1336729%253Fmkt_tok%253DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2057:1a00:14:85db:2b40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 01:10:14 GMT
via
1.1 c26b8e74df43cd99786e716221463d0c.cloudfront.net (CloudFront)
last-modified
Thu, 12 Oct 2017 18:19:12 GMT
server
AmazonS3
age
72429
etag
"28d6814f309ea289f847c69cf91194c6"
x-cache
Hit from cloudfront
content-type
image/gif
status
200
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-length
35
x-amz-cf-id
t4jUhjQExoRj1nxCf6mRUPdJGyIfsGW-X8SwKz3HdgnHgRQ0bE56zQ==

Redirect headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:22 GMT
via
1.1 c26b8e74df43cd99786e716221463d0c.cloudfront.net (CloudFront)
server
CloudFront
x-amz-cf-pop
FRA6-C1
status
307
x-cache
LambdaGeneratedResponse from cloudfront
location
/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fattacks-breaches%25252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%25252Fd%25252Fd-id%25252F1336729%25253Fmkt_tok%25253DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&rh=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%252Fd%252Fd-id%252F1336729%253Fmkt_tok%253DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
cache-control
no-cache, no-store, must-revalidate
content-length
0
x-amz-cf-id
RI3ng3Tnt07eeKnQTTu93xRKUFmghqJMwWW8u6UB7H6bPddbsnxAGQ==
expires
Thu, 01 Dec 1994 16:00:00 GMT
dpm_8effee409c625e1a2d8f5033631840e6ce1dcb64.min.js
s.dpmsrv.com/
705 KB
82 KB
Script
General
Full URL
https://s.dpmsrv.com/dpm_8effee409c625e1a2d8f5033631840e6ce1dcb64.min.js
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.89.60 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-89-60.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
515b7d384883e58022895441583bedcf713edfdc5ad9221f5b1b3f5c2eb3480e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 04:04:08 GMT
Content-Encoding
gzip
Last-Modified
Fri, 24 Apr 2020 13:30:20 GMT
Server
AmazonS3
Age
129682
ETag
"5d4adf6372b3406ef3d7227ab2bfda40"
X-Cache
Hit from cloudfront
Content-Type
application/x-javascript
Via
1.1 055d899361491602a9ef1eb0cdc5e337.cloudfront.net (CloudFront)
Connection
keep-alive
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Content-Length
83226
X-Amz-Cf-Id
P2oTFuGtG2QHwpHlRN2MbV8Lms_2ZdhG-qAYaCEEHI2z7WhM9ANPqA==
view
securepubads.g.doubleclick.net/pcs/ Frame 872B
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstB-8GdFMt2kmINy414NKcWxbsJ11NYKTRU9kSMcH0d2InkR_dfGu97MmPfdgbRKlXJuWL5vuKXAXujvvghS7W99wlUEpOKWVQguNrA7nInnNgAKyiXvvUIBjK4NzV9JUpfzGtNf48a3rQHuVcl1fvY_nWKIB5L7-vm-olYStNPampSNbnaR7kZ3-jkRZkKRsJmsYaUpSkK_cAooCQqoz42mRgzyp5PSyzeCmZ0NxhR6MdlQdYVGxQ-PqIjUC0r-suoycCIVZeX4hkM0X2Bmfoj4E0cO_6g5crJEIs5AnmCguKI5WgZ9w&sai=AMfl-YRV02mAeBtl9ZwoD-eJ1RAC26dGZTx2mHVG_CxzqAqVG0vjbMFgrdnJyamo7wW7f93NxMVon7LYI_wuhJLB3fhStV_zNssfoiL1m16v&sig=Cg0ArKJSzAkWDMcXyklHEAE&urlfix=1&adurl=
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 29 Apr 2020 21:17:22 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Wed, 29 Apr 2020 21:17:22 GMT
jquery-1.11.0.min.js
code.jquery.com/ Frame 872B
94 KB
33 KB
Script
General
Full URL
https://code.jquery.com/jquery-1.11.0.min.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2001:4de0:ac19::1:b:3a , Netherlands, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
nginx /
Resource Hash
b294e973896f8f874e90a8eb1a8908ac790980d034c4c4bdf0fc3d37b8abf682

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 21:17:22 GMT
Content-Encoding
gzip
Last-Modified
Fri, 24 Oct 2014 00:16:07 GMT
Server
nginx
ETag
W/"54499a47-1787d"
Vary
Accept-Encoding
X-HW
1588195042.dop166.fr8.t,1588195042.cds136.fr8.shn,1588195042.cds136.fr8.c
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000, public
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
33357
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 872B
75 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
7bee3a5ad33b029f119b2245f33ba68b6e3aff305c17379b180545b4e50ad178
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1587986955147099"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28776
x-xss-protection
0
expires
Wed, 29 Apr 2020 21:17:22 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame 872B
289 KB
98 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
d890f5be079e24ed663b10e45f49eea14064763b5f00fb0b6eb45900de288cc4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
content-encoding
gzip
last-modified
Mon, 27 Apr 2020 17:47:28 GMT
server
AmazonS3
x-amz-request-id
B04D9067C0CDAA76
etag
"c7db757ff65046d06c00eee46eb41598"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=9323
accept-ranges
bytes
content-length
99792
x-amz-id-2
TJ9IrH8PU+tqD1tDISmHxlNEQF4kmGL5wgNQQZtrqRvpsFVPugHSCnb8VGmZ+Gx9ASsZLLVpmtk=
17295047894583974417
tpc.googlesyndication.com/simgad/ Frame 872B
Redirect Chain
  • https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstB-8GdFMt2kmINy414NKcWxbsJ11NYKTRU9kSMcH0d2InkR_dfGu97MmPfdgbRKlXJuWL5vuKXAXujvvghS7W99wlUEpOKWVQguNrA7nInnNgAKyiXvvUIBjK4NzV9JUpfzGtNf48a3...
  • https://tpc.googlesyndication.com/simgad/17295047894583974417
374 KB
375 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/17295047894583974417
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
03ac29d579a3a4ea9771027c2c53ee4fb117c8197f5f1604a7c5a166500c5aca
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 27 Apr 2020 07:12:33 GMT
x-content-type-options
nosniff
age
223489
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
383367
x-xss-protection
0
last-modified
Mon, 06 Apr 2020 14:04:04 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 27 Apr 2021 07:12:33 GMT

Redirect headers

timing-allow-origin
*
date
Wed, 29 Apr 2020 21:17:22 GMT
x-content-type-options
nosniff
server
cafe
status
302
location
https://tpc.googlesyndication.com/simgad/17295047894583974417
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
text/html; charset=UTF-8
alt-svc
h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
ad-overlay25.jpg
assets.informa.com/advert/ Frame 872B
12 KB
12 KB
Image
General
Full URL
https://assets.informa.com/advert/ad-overlay25.jpg
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
107.23.162.230 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-107-23-162-230.compute-1.amazonaws.com
Software
Apache/2.4.6 (CentOS) /
Resource Hash
a782f5c6312b15a57bc5cd6516c26c08bea8ebe5f27cf1062d08ed933c1e37a6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
last-modified
Fri, 25 Oct 2019 20:17:32 GMT
server
Apache/2.4.6 (CentOS)
etag
"2e7e-595c1d70f28f8"
content-type
image/jpeg
status
200
accept-ranges
bytes
content-length
11902
osd.js
www.googletagservices.com/activeview/js/current/
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
51c56935854bed13b06e04dd8a756cb635edca2f98d1f55b3608ecc200162426
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1587986955147099"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28343
x-xss-protection
0
expires
Wed, 29 Apr 2020 21:17:22 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 43A2
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvMcl6s4GwrImOH2M-pwEVkkxQWlHXHmmGOdIZiP0x87P22RlWV5Gs1B9KT15rbvpX5qe6jGWgj63yZEEAVyk_EUJRK7-qH-Mla6ARXsB95OxVpgstEvsbCZfMS1HLX-NI0Zl2Wiw6TGvQBpFNmdsZz-MKV-5_kBSaRKo5EF4oEZ5dOrtxgGX0gNVuFL_q4JzeyeQr8483B22Op_BBAWy6PjveGnGBpw5H0AhL-7MsXLdIBE3cbYp47qlddIOWvOK7Lw8L90vMP-HkrM7V4iTfWklUK_bfZBag7qEEH&sai=AMfl-YTd-npzrjvUir7uWUfgGmS9IKsIsGSanszJ9c9iH6mGctoOUMYKnMsZzP02XOttWKvWbkqHntJTcz9jpXM4j1nXsDECEA0xfdiL4I5n&sig=Cg0ArKJSzLnIYQurnGq2EAE&urlfix=1&adurl=
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 29 Apr 2020 21:17:22 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Wed, 29 Apr 2020 21:17:22 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 43A2
75 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
7bee3a5ad33b029f119b2245f33ba68b6e3aff305c17379b180545b4e50ad178
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1587986955147099"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28776
x-xss-protection
0
expires
Wed, 29 Apr 2020 21:17:22 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame 43A2
289 KB
98 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
d890f5be079e24ed663b10e45f49eea14064763b5f00fb0b6eb45900de288cc4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
content-encoding
gzip
last-modified
Mon, 27 Apr 2020 17:47:28 GMT
server
AmazonS3
x-amz-request-id
B04D9067C0CDAA76
etag
"c7db757ff65046d06c00eee46eb41598"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=9323
accept-ranges
bytes
content-length
99792
x-amz-id-2
TJ9IrH8PU+tqD1tDISmHxlNEQF4kmGL5wgNQQZtrqRvpsFVPugHSCnb8VGmZ+Gx9ASsZLLVpmtk=
view
securepubads.g.doubleclick.net/pcs/ Frame 814F
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuQtfAkQUsj93q7TbCTYyhCuAmdcBmDv7ZxF164UZCTQnvP1dnulVm6G14KddseJih1OPaCC1qZqUwpUeR_y4FvNTZIJdf-ErpdeYgnZqfJEVajkkDl5VTqfepx5zi8zjWwbE6KuSRApZMoi4Q3vMfjkm7YO1fxpR7UPOF3SZsk6TTdvRLZsWpRIyB8uoe329nPZu-eL2LxBGTpnHn_geEQnzwDqIKWun0Cmv0aWP-0wJQzdRUeHTM8x314gTYMcDY_Aqo-d_ceX8UKBCa-LTJpPrsBrmk&sai=AMfl-YQnsFCi53xSAruMzB6T8DHuyisHwAn1z6JgDd6LMA3xJ04trIuWs0U99hxm2KaATQxxKlPml6gCduxLGRvqLvtwaMk99Vea7x4tvAC4&sig=Cg0ArKJSzMNR6FF_31EzEAE&adurl=
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 29 Apr 2020 21:17:22 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Wed, 29 Apr 2020 21:17:22 GMT
window_focus_fy2019.js
tpc.googlesyndication.com/pagead/js/r20200427/r20110914/client/ Frame 814F
3 KB
2 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20200427/r20110914/client/window_focus_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
eee446c3b726a83c0792aba9bdbf4565e98ca46e5d5c6f3030f81f7418015923
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 18:17:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
10788
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
1641
x-xss-protection
0
server
cafe
etag
14618314463697963871
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 13 May 2020 18:17:34 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 814F
75 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
7bee3a5ad33b029f119b2245f33ba68b6e3aff305c17379b180545b4e50ad178
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1587986955147099"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28776
x-xss-protection
0
expires
Wed, 29 Apr 2020 21:17:22 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame 814F
289 KB
98 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
d890f5be079e24ed663b10e45f49eea14064763b5f00fb0b6eb45900de288cc4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
content-encoding
gzip
last-modified
Mon, 27 Apr 2020 17:47:28 GMT
server
AmazonS3
x-amz-request-id
B04D9067C0CDAA76
etag
"c7db757ff65046d06c00eee46eb41598"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=9323
accept-ranges
bytes
content-length
99792
x-amz-id-2
TJ9IrH8PU+tqD1tDISmHxlNEQF4kmGL5wgNQQZtrqRvpsFVPugHSCnb8VGmZ+Gx9ASsZLLVpmtk=
6966624480972085746
tpc.googlesyndication.com/simgad/ Frame 814F
58 KB
58 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/6966624480972085746
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a0cc57a2599f9f9f5f0b0bed5b530b0243a1cf586e4239194e2679161c890ccb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 04 Apr 2020 15:43:39 GMT
x-content-type-options
nosniff
age
2180023
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
59577
x-xss-protection
0
last-modified
Wed, 25 Mar 2020 14:33:30 GMT
server
sffe
content-type
image/gif
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 04 Apr 2021 15:43:39 GMT
/
www.google.com/pagead/1p-user-list/1007530244/
42 B
110 B
Image
General
Full URL
https://www.google.com/pagead/1p-user-list/1007530244/?random=1588195041967&cv=9&fst=1588194000000&num=1&guid=ON&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=120&u_java=false&u_nplug=0&u_nmime=0&sendb=1&frm=0&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&ref=http%3A%2F%2Fgo.pulsesecure.net%2FB700uS3Eq000g0zN0ZzNjTf&tiba=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&fmt=3&is_vtc=1&random=909747941&resp=GooglemKTybQhCsO&rmt_tld=0&ipr=y
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Content-Security-Policy script-src 'none'; object-src 'none'
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:22 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-security-policy
script-src 'none'; object-src 'none'
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
www.google.de/pagead/1p-user-list/1007530244/
42 B
110 B
Image
General
Full URL
https://www.google.de/pagead/1p-user-list/1007530244/?random=1588195041967&cv=9&fst=1588194000000&num=1&guid=ON&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=120&u_java=false&u_nplug=0&u_nmime=0&sendb=1&frm=0&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&ref=http%3A%2F%2Fgo.pulsesecure.net%2FB700uS3Eq000g0zN0ZzNjTf&tiba=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&fmt=3&is_vtc=1&random=909747941&resp=GooglemKTybQhCsO&rmt_tld=1&ipr=y
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Content-Security-Policy script-src 'none'; object-src 'none'
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:22 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-security-policy
script-src 'none'; object-src 'none'
content-type
image/gif
alt-svc
h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
all.js
connect.facebook.net/en_US/
387 KB
112 KB
Script
General
Full URL
https://connect.facebook.net/en_US/all.js?hash=9f9031999acbbff90c62c3a4ab885bc0&ua=modern_es6
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/all.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
b0b76a7da4c4b49a8eedcda3acc20f5e515d78490294d83eced4d02bea33655c
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Origin
https://www.darkreading.com

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
Pm6Hs2wenMWlPr2v+xt6yQ==
status
200
alt-svc
h3-27=":443"; ma=3600
content-length
114536
etag
"625fabf58f59d3d56d6d60d887ec3922"
x-fb-debug
L1wLwyurQbd57RY0u0eFvk7LAv6fYzpqgXzLwjARkpPnUOJXsEmqbcbT6G6V5xXQJOrF3HO7FeT2qy9/Q6R3CA==
x-fb-trip-id
1850256238
x-fb-content-md5
ae89ece29d4e31fae476ace3df450e06
x-frame-options
DENY
date
Wed, 29 Apr 2020 21:17:22 GMT, Wed, 29 Apr 2020 21:17:22 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-FB-Content-MD5
cache-control
public,max-age=31536000,stale-while-revalidate=3600,immutable
timing-allow-origin
*
expires
Thu, 29 Apr 2021 21:05:33 GMT
0
bat.bing.com/action/
0
94 B
Image
General
Full URL
https://bat.bing.com/action/0?ti=5476211&Ver=2&mid=3e158c0e-8202-a1e4-6af2-b25a14ecde80&sid=80a40fbd-fbd5-c102-f335-324277653b41&pi=0&lg=en-US&sw=1600&sh=1200&sc=24&tl=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&p=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&r=http%3A%2F%2Fgo.pulsesecure.net%2FB700uS3Eq000g0zN0ZzNjTf&evt=pageLoad&msclkid=N&sv=1&rn=560440
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:c11::200 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
204
pragma
no-cache
date
Wed, 29 Apr 2020 21:17:21 GMT
cache-control
no-cache, must-revalidate
x-msedge-ref
Ref A: 7FC8879CDF664DDFB9B6ED5E34F2557D Ref B: FRAEDGE0407 Ref C: 2020-04-29T21:17:22Z
access-control-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
www.darkreading.com.js
u.heatmap.it/conf/
0
210 B
Script
General
Full URL
https://u.heatmap.it/conf/www.darkreading.com.js
Requested by
Host: u.heatmap.it
URL: https://u.heatmap.it/log.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
46.105.202.39 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
x-cacheable
Cacheable
x-cdn-pop-ip
137.74.120.0/27
content-type
text/javascript;charset=UTF-8
status
204
cache-control
max-age=60
x-cdn-pop
sbg
x-request-id
15992281
expires
Wed, 29 Apr 2020 21:22:23 GMT
/
www.facebook.com/tr/
44 B
247 B
Image
General
Full URL
https://www.facebook.com/tr/?id=832000476880185&ev=PageView&dl=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&rl=http%3A%2F%2Fgo.pulsesecure.net%2FB700uS3Eq000g0zN0ZzNjTf&if=false&ts=1588195042220&sw=1600&sh=1200&v=2.9.18&r=stable&ec=0&o=30&fbp=fb.1.1588195042217.1344521364&it=1588195042088&coo=false&rqm=GET
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT, Wed, 29 Apr 2020 21:17:22 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
alt-svc
h3-27=":443"; ma=3600
content-length
44
expires
Wed, 29 Apr 2020 21:17:22 GMT
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=3005435&ns__t=1588195042232&ns_c=windows-1252&cv=3.5&c8=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&c7=https%3A%2F%2Fwww.d...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=3005435&ns__t=1588195042232&ns_c=windows-1252&cv=3.5&c8=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&c7=https%3A%2F%2Fwww....
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=3005435&ns__t=1588195042232&ns_c=windows-1252&cv=3.5&c8=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&c7=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&c9=http%3A%2F%2Fgo.pulsesecure.net%2FB700uS3Eq000g0zN0ZzNjTf
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.124.133.20 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-124-133-20.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 29 Apr 2020 21:17:22 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=3005435&ns__t=1588195042232&ns_c=windows-1252&cv=3.5&c8=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&c7=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&c9=http%3A%2F%2Fgo.pulsesecure.net%2FB700uS3Eq000g0zN0ZzNjTf
Pragma
no-cache
Date
Wed, 29 Apr 2020 21:17:22 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
truncated
/ Frame 872B
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7216cef4a31fcb901f09b46e6af99bcb119dff76a4946db36ce985fae25cc4f7

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame 43A2
213 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
8ffb9018b82b26f22d69367d3a3ccb72b783ff8a66f4368bc4920672b6eda410

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame 814F
220 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
8cf0c4330202c47fc7e64696e57ac9f14880c25ec533c4f7fecf975d813862e9

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
tag.aspx
ml314.com/ Frame 872B
26 KB
12 KB
Script
General
Full URL
https://ml314.com/tag.aspx?2932020
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/pentonmedia53440730609/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.16.75.38 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-16-75-38.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
9c6af299685617864c257472040f437ef951afec994720a24781931cc3527017

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 21:17:21 GMT
Content-Encoding
gzip
Last-Modified
Wed, 29 Apr 2020 06:35:52 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, max-age=33509
Connection
keep-alive
Content-Length
11933
Expires
Thu, 30 Apr 2020 06:35:52 GMT
n.js
geo.moatads.com/
114 B
288 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042328&de=777038559299&m=0&ar=31f9dba90d-clean&iw=e87dca3&q=2&cb=0&ym=0&cu=1588195042328&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=20049636%3A2660390051%3A5290329792%3A138308164554&zMoatPS=welcome&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&bo=27868836&bp=43863396&bd=welcome&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1840%3A1881%3A0%3A0&fs=180167&na=793212894&cs=0&callback=MoatDataJsonpRequest_24276432
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/pentonmedia53440730609/moatad.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.77.128.97 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-77-128-97.eu-west-1.compute.amazonaws.com
Software
TornadoServer/4.5.3 /
Resource Hash
b7fae5aef5944f8062da39d52381096d78bd04c6ebf8b627c3be40e417f54ede

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
server
TornadoServer/4.5.3
etag
"b712d3ce710f85bb3727dd3411bfa7f28b01db62"
content-type
text/html; charset=UTF-8
status
200
cache-control
max-age=900
timing-allow-origin
*
content-length
114
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042328&de=777038559299&m=0&ar=31f9dba90d-clean&iw=e87dca3&q=3&cb=0&ym=0&cu=1588195042328&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=20049636%3A2660390051%3A5290329792%3A138308164554&zMoatPS=welcome&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&bo=27868836&bp=43863396&bd=welcome&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1840%3A1881%3A0%3A0&fs=180167&na=799922379&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:22 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:22 GMT
index.php
a.dpmsrv.com/dpmpxl/
Redirect Chain
  • https://ib.adnxs.com/getuid?https://a.dpmsrv.com/dpmpxl/index.php?id=$UID&q%3DxImp%26v%3D1.x%26cl%3D55%26pixelIndex%3D0%26r%3D845532%26tzOffset%3D-120%26url%3Dhttps%253A%252F%252Fwww.darkreading.co...
  • https://ib.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Fa.dpmsrv.com%2Fdpmpxl%2Findex.php%3Fid%3D%24UID%26q%253DxImp%2526v%253D1.x%2526cl%253D55%2526pixelIndex%253D0%2526r%253D845532%2526tzOffset%253...
  • https://a.dpmsrv.com/dpmpxl/index.php?id=7108042600408666025&q=xImp&v=1.x&cl=55&pixelIndex=0&r=845532&tzOffset=-120&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-p...
242 B
994 B
Script
General
Full URL
https://a.dpmsrv.com/dpmpxl/index.php?id=7108042600408666025&q=xImp&v=1.x&cl=55&pixelIndex=0&r=845532&tzOffset=-120&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&_=1588195042425
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.227.165.230 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-3-227-165-230.compute-1.amazonaws.com
Software
/
Resource Hash
481ca58eeaa2c36d69f60a693621fceed93db138dafbad4fbd42b36804c663e6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
content-encoding
gzip
Access-Control-Max-Age
10
Access-Control-Allow-Methods
GET, POST, PUT, DELETE, OPTIONS
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
text/javascript
Access-Control-Allow-Headers
content-type, accept
Content-Length
215
Expires
0

Redirect headers

Pragma
no-cache
Date
Wed, 29 Apr 2020 21:17:24 GMT
X-Proxy-Origin
185.217.171.12; 185.217.171.12; 732.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.232:80
AN-X-Request-Uuid
78fb8d44-c58e-4b62-8c3f-6598aa38926f
Server
nginx/1.13.4
Access-Control-Allow-Origin
*
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Location
https://a.dpmsrv.com/dpmpxl/index.php?id=7108042600408666025&q=xImp&v=1.x&cl=55&pixelIndex=0&r=845532&tzOffset=-120&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&_=1588195042425
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
status
www.facebook.com/x/oauth/
0
0
Fetch
General
Full URL
https://www.facebook.com/x/oauth/status?client_id=640989409269461&input_token&origin=1&redirect_uri=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&sdk=joey&wants_cookie_data=false
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/all.js?hash=9f9031999acbbff90c62c3a4ab885bc0&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
x-fb-debug
Yr58oC9GOUo3G+qdBNYPwM41uj4j3tt0ngkfdzhUWkiRUu1TD6xRiQk6lmOybJz9otjslTZ/9jjds1mWGO7PiQ==
fb-s
unknown
status
200
date
Wed, 29 Apr 2020 21:17:22 GMT, Wed, 29 Apr 2020 21:17:22 GMT
strict-transport-security
max-age=15552000; preload
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.darkreading.com
access-control-expose-headers
fb-s
cache-control
private, no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
h3-27=":443"; ma=3600
content-length
0
x-content-type-options
nosniff
expires
Sat, 01 Jan 2000 00:00:00 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042465&de=258120387163&m=0&ar=31f9dba90d-clean&iw=e87dca3&q=7&cb=0&ym=0&cu=1588195042465&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=21887076%3A2680018979%3A5334439846%3A138307094492&zMoatPS=top&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&bo=27868836&bp=43863396&bd=top&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1840%3A1881%3A0%3A0&fs=180167&na=2120503810&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:22 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:22 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=0&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F6966624480972085746&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042465&de=258120387163&cu=1588195042465&m=17&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=1235&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=0&ag=4&an=0&gf=4&gg=0&ix=4&ic=4&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=4&bx=0&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=0&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=7&cd=0&ah=7&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=21887076%3A2680018979%3A5334439846%3A138307094492&bo=27868836&bp=43863396&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=1625338119&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:22 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:22 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042490&de=945161156400&m=0&ar=31f9dba90d-clean&iw=e87dca3&q=11&cb=0&ym=0&cu=1588195042490&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=101649396%3A2671382143%3A5312334190%3A138306266656&zMoatPS=wallpaper&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&bo=27868836&bp=43863396&bd=wallpaper&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1840%3A1881%3A0%3A0&fs=180167&na=1795407634&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:22 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:22 GMT
bullet.png
img.deusm.com/informationweek/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/informationweek/bullet.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
9e0e2ad3a93ec78d016efee0993b5856ba9b4acafcee3aa4d6f7162f039fcce4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
cf-cache-status
HIT
last-modified
Sat, 02 Nov 2013 00:57:26 GMT
server
cloudflare
age
518
etag
"41e-4ea272a96e980"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca8dbea177e-FRA
content-length
1054
cf-request-id
0269663d820000177e0bbb4200000001
view
securepubads.g.doubleclick.net/pcs/ Frame FBD0
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstMIIkmRIg_4AgFxthuIRo7i3Xc0bWLMpaF37X1VuITjoFuENLxNaQPx0_ez7CQlOTct8qHOMygqHvWb8BQgCzd3Xb1K7f1jxgYjfcnUrRWeG0yymslPkkeSQ45YuR73pNFVDI3Q61jw0qh0zQyZR2HT8yM6aqDshm_yPIVeDKMwOYDozlgefUPwr4Dmxm_-TTVsLRqZcv4yh76P8qqVt2nqv2eVo1Zp3dhMbsuwEGC2pOqIjr4SE97Exr09BpYDgFthOTRkjEVZXi9NgpH40amnxcFZRd6BGA&sai=AMfl-YQRVE6lRF-8K-TpJ6lgGG-7by0mgA8KqmusQAdZYRbov3yipFdipDM3wJXAlulUem9pFeQKkD8oq56b-WQnCujhr1zwhJgHvCtUtIl0&sig=Cg0ArKJSzF_4YK0zlUroEAE&urlfix=1&adurl=
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 29 Apr 2020 21:17:22 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame FBD0
75 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
7bee3a5ad33b029f119b2245f33ba68b6e3aff305c17379b180545b4e50ad178
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1587986955147099"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28776
x-xss-protection
0
expires
Wed, 29 Apr 2020 21:17:22 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame FBD0
289 KB
98 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
d890f5be079e24ed663b10e45f49eea14064763b5f00fb0b6eb45900de288cc4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
content-encoding
gzip
last-modified
Mon, 27 Apr 2020 17:47:28 GMT
server
AmazonS3
x-amz-request-id
B04D9067C0CDAA76
etag
"c7db757ff65046d06c00eee46eb41598"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=9323
accept-ranges
bytes
content-length
99792
x-amz-id-2
TJ9IrH8PU+tqD1tDISmHxlNEQF4kmGL5wgNQQZtrqRvpsFVPugHSCnb8VGmZ+Gx9ASsZLLVpmtk=
view
securepubads.g.doubleclick.net/pcs/ Frame 4771
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstIqsQxtMsm5yEpnZMCiQfnqQMu716v_U9PsNaDnzmAJn_fGDMXpUk2vAlwmFLl11823pU0IkTE2zzN_CTaRQgkyLQnCmekidMkNoMBDg_HKH-ZC1A2ygSsNmwH_gCFvV39B8mHoEL4BAC339HGenOiFhg1ojiynmHRV04l3gDz_v1-6s8HNiDgMfKllw7L6vbGFQy4iPVHx-2Aojbh7RT9E4AamDf9K9ET0PAABUrA09xin1e2YegCSI4Qbu6i-LQBu_RsKnH9h5g_EZcd2Yz2dUJ7AjI-XMc&sai=AMfl-YRALmWwXFv6wDnXnxAda6BxO4G2v_fX_KUiJvXe-km0CkEj0oyVasYoLoqKVkpUoNmi209lHynjT44207y2RStiOlBM3TyFU7NzvMhS&sig=Cg0ArKJSzJ3B5CUp5Xg2EAE&urlfix=1&adurl=
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 29 Apr 2020 21:17:22 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
rf-dl6ktX-0
www.youtube.com/embed/ Frame 634E
0
0
Document
General
Full URL
https://www.youtube.com/embed/rf-dl6ktX-0?rel=0&showinfo=0
Requested by
Host: i.ubm-us.net
URL: https://i.ubm-us.net/oas/nativead/js/dr_nativead.js?v3
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
YouTube Frontend Proxy /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www.youtube.com
:scheme
https
:path
/embed/rf-dl6ktX-0?rel=0&showinfo=0
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9

Response headers

status
200
x-content-type-options
nosniff
expires
Tue, 27 Apr 1971 19:44:06 GMT
content-type
text/html; charset=utf-8
cache-control
no-cache
content-encoding
br
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657?hl=en for more info."
strict-transport-security
max-age=31536000
date
Wed, 29 Apr 2020 21:17:22 GMT
server
YouTube Frontend Proxy
x-xss-protection
0
set-cookie
VISITOR_INFO1_LIVE=zo7Q_Ce1dsI; path=/; domain=.youtube.com; secure; expires=Mon, 26-Oct-2020 21:17:22 GMT; httponly; samesite=None VISITOR_INFO1_LIVE=zo7Q_Ce1dsI; path=/; domain=.youtube.com; secure; expires=Mon, 26-Oct-2020 21:17:22 GMT; httponly; samesite=None GPS=1; path=/; domain=.youtube.com; expires=Wed, 29-Apr-2020 21:47:22 GMT YSC=egZqfpb0OZo; path=/; domain=.youtube.com; secure; httponly; samesite=None
alt-svc
h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 4771
75 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
7bee3a5ad33b029f119b2245f33ba68b6e3aff305c17379b180545b4e50ad178
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1587986955147099"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28776
x-xss-protection
0
expires
Wed, 29 Apr 2020 21:17:22 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame 4771
289 KB
98 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
d890f5be079e24ed663b10e45f49eea14064763b5f00fb0b6eb45900de288cc4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
content-encoding
gzip
last-modified
Mon, 27 Apr 2020 17:47:28 GMT
server
AmazonS3
x-amz-request-id
B04D9067C0CDAA76
etag
"c7db757ff65046d06c00eee46eb41598"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=9323
accept-ranges
bytes
content-length
99792
x-amz-id-2
TJ9IrH8PU+tqD1tDISmHxlNEQF4kmGL5wgNQQZtrqRvpsFVPugHSCnb8VGmZ+Gx9ASsZLLVpmtk=
/
www.facebook.com/tr/
0
30 B
Other
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
multipart/form-data; boundary=----WebKitFormBoundary4AGnyfve2DCMIQqX

Response headers

strict-transport-security
max-age=31536000; includeSubDomains
server
proxygen-bolt
date
Wed, 29 Apr 2020 21:17:22 GMT
status
200
content-type
text/plain
access-control-allow-origin
https://www.darkreading.com
access-control-allow-credentials
true
alt-svc
h3-27=":443"; ma=3600
content-length
0
view
securepubads.g.doubleclick.net/pcs/ Frame 5C84
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstX5KGsXibjNHqGOE__9Vb6nyfo_rTjctHI9ZiC-YkxNkC1lqtwUXjUmH7_5A4Hk83vefZaxpFAWYO5H4GOL-8hMyq7aCd-OJaiihcZuqZKo_T2dHU4C8DHJx2y5lPRjHluyYnWl2xC6GCCJQ8XZWWHSBcFwNuQrJ4qujjixnVTwkox3GUAy0RRspgQTJisDeIVo93nR-l8DKE6DEOxR1ArBaC-z8cShJ9gwXSgpni_5dVJ5efDnSLBaIlWvVETFRvXnaGWTOtu7SZP5tbGBOcg0yDknMwwMBjT&sai=AMfl-YQBNpQYn5zbd-Ivo48OYv9j_yItJF_mGlMFMYId-iKLWdS91LyMMzBY0KTVuG4aY8sO5_M7fPnC7Ueo4-n8XqKeJ-rJdVLjt8pLQDJF&sig=Cg0ArKJSzK9_1voZvRdfEAE&urlfix=1&adurl=
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 29 Apr 2020 21:17:22 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 5C84
75 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
7bee3a5ad33b029f119b2245f33ba68b6e3aff305c17379b180545b4e50ad178
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1587986955147099"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28776
x-xss-protection
0
expires
Wed, 29 Apr 2020 21:17:22 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame 5C84
289 KB
98 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
d890f5be079e24ed663b10e45f49eea14064763b5f00fb0b6eb45900de288cc4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
content-encoding
gzip
last-modified
Mon, 27 Apr 2020 17:47:28 GMT
server
AmazonS3
x-amz-request-id
B04D9067C0CDAA76
etag
"c7db757ff65046d06c00eee46eb41598"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=9323
accept-ranges
bytes
content-length
99792
x-amz-id-2
TJ9IrH8PU+tqD1tDISmHxlNEQF4kmGL5wgNQQZtrqRvpsFVPugHSCnb8VGmZ+Gx9ASsZLLVpmtk=
view
securepubads.g.doubleclick.net/pcs/ Frame 8CED
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstj8CyJ6zfyUZxudN-jl3UNPsCb0Xpf-CyfxQs43daKhePrCtiLze4nYWOR4aLi5SlD4Mog3EfgG_tnzACP-jCrxTVxM39gy6AjNYH519IbeN-3vk1mn5-3BeU7ujACHrjSbqumrvTeOMFER69mqbym9fvnB7RARS-eLiB9NjAKgpL3WhmgS9kLXxOy-8gjwYf167qFIDUL7JDh8Hxl2ROtje0J9aQKmKT2-hhMiw3bUA9nVjg_32UCsuF9L5Am2QfPcmIgtl3xv5JUQjtatGZ1CR3smc3Gp5-K&sai=AMfl-YTaxRtwfIRHqn2f5559c_7s4ImLUqEUikgcxDK-Yua28KmKTnxY0kP36jqc41i4nVaiL-wFjHZjyGKkJb1AhNI2U5W3uBMgGqZ9zW_G&sig=Cg0ArKJSzAznBxIjCtZQEAE&adurl=
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 29 Apr 2020 21:17:22 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
window_focus_fy2019.js
tpc.googlesyndication.com/pagead/js/r20200427/r20110914/client/ Frame 8CED
3 KB
2 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20200427/r20110914/client/window_focus_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
eee446c3b726a83c0792aba9bdbf4565e98ca46e5d5c6f3030f81f7418015923
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 18:17:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
10788
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
1641
x-xss-protection
0
server
cafe
etag
14618314463697963871
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 13 May 2020 18:17:34 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 8CED
75 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
7bee3a5ad33b029f119b2245f33ba68b6e3aff305c17379b180545b4e50ad178
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1587986955147099"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28776
x-xss-protection
0
expires
Wed, 29 Apr 2020 21:17:22 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame 8CED
289 KB
98 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
d890f5be079e24ed663b10e45f49eea14064763b5f00fb0b6eb45900de288cc4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
content-encoding
gzip
last-modified
Mon, 27 Apr 2020 17:47:28 GMT
server
AmazonS3
x-amz-request-id
B04D9067C0CDAA76
etag
"c7db757ff65046d06c00eee46eb41598"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=9323
accept-ranges
bytes
content-length
99792
x-amz-id-2
TJ9IrH8PU+tqD1tDISmHxlNEQF4kmGL5wgNQQZtrqRvpsFVPugHSCnb8VGmZ+Gx9ASsZLLVpmtk=
8279229054736995948
tpc.googlesyndication.com/simgad/ Frame 8CED
136 KB
136 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/8279229054736995948
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
6340505df6082a2ce645d66bba3a7a7699bae184d4f35bc7b7fabcd1becd2218
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 07 Apr 2020 16:49:05 GMT
x-content-type-options
nosniff
age
1916897
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
138936
x-xss-protection
0
last-modified
Tue, 10 Mar 2020 21:11:00 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 07 Apr 2021 16:49:05 GMT
DR-hot-topics-comment.png
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-hot-topics-comment.png
Requested by
Host: code.jquery.com
URL: https://code.jquery.com/jquery-1.11.0.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
9182e8a1e20a5437d2f311b096b2a98a33d54e94d4d9d6d01c5db3861460d04e

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.27
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:02 GMT
server
cloudflare
age
2230
etag
"4a5-4f2ebd20ac480"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca99dbc177e-FRA
content-length
1189
cf-request-id
0269663dfc0000177e0bbbd200000001
web.js
ads.celtra.com/2aa214b5/ Frame 5C84
14 KB
5 KB
Script
General
Full URL
https://ads.celtra.com/2aa214b5/web.js?&clickUrl=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsvW3uFb5YINaUrp-WrFfW0K7Ig_lCTvJUY7t44GoqUZwmWRH6bbvRRPSG8-EUh8Hh6-YU0MvX_SFtDJ15RlVnvdfUI_jPcUkC-D4hl5QQzDnrEKpoutYyxw7YSUIZxLYHqulo7cRAEwL5SiIrpGpnrJcDVJp86aVnPoFVu5z_kX_WV3Oi1oXIrQwT3vzU5yeGJovEWieEnbC1TF_YRA7brGBT202cXa32Hq-EuGcKiMmJ41wCgfQP1CrwEr6X7daGEWrD489P0_3TDvSpNTnmx17rHCUDKL%26sai%3DAMfl-YSjz6vJd5au2PmcRbDXs8yPazhtOff6Oj2Kmh8SF1Y7i-4miezQLqaElHt0afRsVYzGh0331AaQi3wq52AGkvmikDgBdPlrEkEC_P-q%26sig%3DCg0ArKJSzJ4ujeu-gN9fEAE%26urlfix%3D1%26adurl%3D&expandDirection=undefined&clickEvent=advertiser&iosAdvId=&androidAdvId=&externalAdServer=DFPPremium&tagVersion=6&eas.JWVjaWQh=138306267349&externalCreativeId=138306267349&externalPlacementId=43863396&externalSiteId=27868836&externalSiteName=darkreading.com&externalLineItemId=5312334190&externalCampaignId=2671382143&externalAdvertiserId=101649396&scriptId=celtra-script-1&clientTimestamp=1588195042.836&clientTimeZoneOffsetInMinutes=-120&hostPageLoadId=3141692184104574
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.126.160.214 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-126-160-214.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
2c35e5432f1da62c7e3e9aedd50065ec674c4305d5f83a4358fe12682f930d63

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 29 Apr 2020 21:17:23 GMT
Content-Encoding
gzip
Content-Type
application/javascript; charset=UTF-8
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Length
4640
Expires
0
NL-button.png
img.deusm.com/informationweek/
2 KB
3 KB
Image
General
Full URL
https://img.deusm.com/informationweek/NL-button.png
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:93f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7b5688f8b168e06251901442c4f2f72b30c4477cb472833cde7979a8dca0a862

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.27
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
cf-cache-status
HIT
last-modified
Fri, 08 Nov 2013 15:09:43 GMT
server
cloudflare
age
2230
etag
"9c6-4eaabc5a3dbc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
58bc0ca9ce52177e-FRA
content-length
2502
cf-request-id
0269663e1e0000177e0bbc3200000001
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042861&de=757199316536&m=0&ar=31f9dba90d-clean&iw=e87dca3&q=15&cb=0&ym=0&cu=1588195042861&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=21887076%3A2611451730%3A5310815425%3A138304035464&zMoatPS=native&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&bo=27868836&bp=43863396&bd=native&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1840%3A1881%3A0%3A0&fs=180167&na=1192802977&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:22 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:22 GMT
truncated
/ Frame 4771
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
3fe5aeb00ed9839ecfd6623e0d157bad86240724f1d4ffba4850545e4a5cd1bc

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
view
securepubads.g.doubleclick.net/pcs/ Frame CBA4
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjst7GtDOJ2Z9t48UPZDtCDKI859bnO8lnPaANTBvO5aSx3CoMmX0BscQJ-qbIJJmqBXlCoOnNW48M8Q0gkJcps4n_H8w5u5gGV1ySvk3Ys7UdIpnAsea8fa0lGp-ukaisbXrxNvlEtQOcg4QGMLW1cGHLuyEjKP8sw5UurwCQMrGcyGeAQMYRIJ8TjGqVkU9SBw_8tQ4UzeKAFlH0f5CzRsSNls6MPb4Hhi7Bac4ocI_-zvZdKv60Tdz2_9KHLvOaLXvvySrBZW5f4C14vpkQ3e7V4zWXSxYfjor&sai=AMfl-YSi5gGiyfUgI8xu00EJFEpfew7sRv1aOH_FW0j944vaXIGEG7fbaXct9Mf3ilJHj96jZeBxSWwoAWFN8_Be0dM4fuPMztW0Yy7bHr05&sig=Cg0ArKJSzHiYbqyOYm0gEAE&adurl=
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 29 Apr 2020 21:17:22 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
window_focus_fy2019.js
tpc.googlesyndication.com/pagead/js/r20200427/r20110914/client/ Frame CBA4
3 KB
2 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20200427/r20110914/client/window_focus_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
eee446c3b726a83c0792aba9bdbf4565e98ca46e5d5c6f3030f81f7418015923
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 18:17:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
10788
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
1641
x-xss-protection
0
server
cafe
etag
14618314463697963871
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 13 May 2020 18:17:34 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame CBA4
75 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
7bee3a5ad33b029f119b2245f33ba68b6e3aff305c17379b180545b4e50ad178
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1587986955147099"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28776
x-xss-protection
0
expires
Wed, 29 Apr 2020 21:17:22 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame CBA4
289 KB
98 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
d890f5be079e24ed663b10e45f49eea14064763b5f00fb0b6eb45900de288cc4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
content-encoding
gzip
last-modified
Mon, 27 Apr 2020 17:47:28 GMT
server
AmazonS3
x-amz-request-id
B04D9067C0CDAA76
etag
"c7db757ff65046d06c00eee46eb41598"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=9323
accept-ranges
bytes
content-length
99792
x-amz-id-2
TJ9IrH8PU+tqD1tDISmHxlNEQF4kmGL5wgNQQZtrqRvpsFVPugHSCnb8VGmZ+Gx9ASsZLLVpmtk=
10774940007939859206
tpc.googlesyndication.com/simgad/ Frame CBA4
25 KB
25 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/10774940007939859206
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
e029605bbeec8ea745e4413b3c19d16759bfb82c196b951fc51c991ba36aca76
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 27 Apr 2020 20:48:30 GMT
x-content-type-options
nosniff
age
174532
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
25870
x-xss-protection
0
last-modified
Mon, 27 Apr 2020 20:42:16 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 27 Apr 2021 20:48:30 GMT
truncated
/ Frame 5C84
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
cedc53d9d0fa5bbd852ad50721bd0926942d7bee0cee01c861f2d6d042efd47c

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame 8CED
219 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
2056bf03e2af174dd441109f4e0de35dd41affa3dad83ad3600b4fa9e8fd0723

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042878&de=258078358738&m=0&ar=31f9dba90d-clean&iw=e87dca3&q=19&cb=0&ym=0&cu=1588195042878&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=92486676%3A2679400788%3A5330621928%3A138306796197&zMoatPS=insight&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&bo=27868836&bp=43863396&bd=insight&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1840%3A1881%3A0%3A0&fs=180167&na=562743221&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:23 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:23 GMT
spacer.gif
img.lightreading.com/images/
49 B
372 B
Image
General
Full URL
https://img.lightreading.com/images/spacer.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.194.18 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-194-18.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
3c5b83e390d046c3623c4b8e35b58aaf64a7481bb2372fb51ae2e0e7818f7407

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 01:05:02 GMT
via
1.1 37c215a6cf8b04439db2f97a633421e6.cloudfront.net (CloudFront)
last-modified
Fri, 20 Jun 2014 19:05:53 GMT
server
AmazonS3
age
72742
etag
"4909631c93ffa90e65247e3fd4454f2d"
x-cache
Hit from cloudfront
content-type
image/gif
status
200
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-length
49
x-amz-cf-id
11jDIqg9fm2pn2PasSxd27Lxs0BU3-WBNn8GkqIO1AY9zAae2XRY6A==
view
securepubads.g.doubleclick.net/pcs/ Frame 0896
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvWfHbxqGejAmLuvFAI-GlGsibpG5HNpCjXkXU340mG3Hvobygo2G6XXcVAkqpJ8GscEAyraDrCX3K1zH-UyD7yRZ0bSK0GOXqAJgNpwmMc9euodnne_x4XIw5tadyw5Hje-NGNu13gWbOfzQpxw5HUupbsHOyNFBS4-o4P-DgVSk1GsRKfPpwcCsJH53T--AeGWMG5JfOtZ-WwQ7x9FN-AwtxCS3aarrXfnk-bFbGXA4da1P-MT0xURaqMtLmRXVP5e5aI6e9O3gtPn4NYpQjhK3jdOw&sai=AMfl-YSer1CGbmtYguRgusPHtrGcQthJrN6UVz2YTz3g3JqpG_Y4XUz78_b_EKlDLELfeePHjUfqaasuYJpKfB5ky0R_LaeHsyHjFnONhSUF&sig=Cg0ArKJSzPrjMvpwJW7GEAE&urlfix=1&adurl=
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 29 Apr 2020 21:17:23 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
tag
a.teads.tv/page/11512/ Frame 0896
1 KB
935 B
Script
General
Full URL
https://a.teads.tv/page/11512/tag
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.232.7 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-232-7.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
06a65aae752e354adc66b935cb0fade25c9d8a058817ea4905777409ad6d4ba7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:23 GMT
content-encoding
gzip
status
200
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
akamai-age-ms
1588195043185
cache-control
private, must-revalidate, max-age=3600
access-control-allow-credentials
true
content-length
663
expires
Wed, 29 Apr 2020 22:17:23 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 0896
75 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
7bee3a5ad33b029f119b2245f33ba68b6e3aff305c17379b180545b4e50ad178
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:23 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1587986955147099"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28776
x-xss-protection
0
expires
Wed, 29 Apr 2020 21:17:23 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame 0896
289 KB
98 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
d890f5be079e24ed663b10e45f49eea14064763b5f00fb0b6eb45900de288cc4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:23 GMT
content-encoding
gzip
last-modified
Mon, 27 Apr 2020 17:47:28 GMT
server
AmazonS3
x-amz-request-id
B04D9067C0CDAA76
etag
"c7db757ff65046d06c00eee46eb41598"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=9322
accept-ranges
bytes
content-length
99792
x-amz-id-2
TJ9IrH8PU+tqD1tDISmHxlNEQF4kmGL5wgNQQZtrqRvpsFVPugHSCnb8VGmZ+Gx9ASsZLLVpmtk=
index.php
a.dpmsrv.com/dpmpxl/
Redirect Chain
  • https://cm.g.doubleclick.net/pixel?google_nid=datapoint_dmp&google_cm&ap_id=7108042600408666025&pixelIndex=0&_=1588195042426
  • https://a.dpmsrv.com/dpmpxl/index.php?q=dfp&ap_id=7108042600408666025&pixelIndex=0&_=1588195042426&google_gid=CAESEGOfLsWJJlXEGNNPLb1eelI&google_cver=1
0
598 B
Script
General
Full URL
https://a.dpmsrv.com/dpmpxl/index.php?q=dfp&ap_id=7108042600408666025&pixelIndex=0&_=1588195042426&google_gid=CAESEGOfLsWJJlXEGNNPLb1eelI&google_cver=1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.227.165.230 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-3-227-165-230.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Access-Control-Max-Age
10
Access-Control-Allow-Methods
GET, POST, PUT, DELETE, OPTIONS
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
text/javascript
Access-Control-Allow-Headers
content-type, accept
Content-Length
0
Expires
0

Redirect headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:23 GMT
server
HTTP server (unknown)
status
302
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
location
https://a.dpmsrv.com/dpmpxl/index.php?q=dfp&ap_id=7108042600408666025&pixelIndex=0&_=1588195042426&google_gid=CAESEGOfLsWJJlXEGNNPLb1eelI&google_cver=1
cache-control
no-cache, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
368
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
423396.gif
idsync.rlcdn.com/
0
40 B
Image
General
Full URL
https://idsync.rlcdn.com/423396.gif?partner_uid=7108042600408666025
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
35.241.8.149 , Ascension Island, ASN15169 (GOOGLE, US),
Reverse DNS
149.8.241.35.bc.googleusercontent.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
204
date
Wed, 29 Apr 2020 21:17:23 GMT
via
1.1 google
alt-svc
clear
s55021857620821
ubmtech.d3.sc.omtrdc.net/b/ss/cmpglobalvista/1/JS-2.8.2/
43 B
442 B
XHR
General
Full URL
https://ubmtech.d3.sc.omtrdc.net/b/ss/cmpglobalvista/1/JS-2.8.2/s55021857620821
Requested by
Host: i.cmpnet.com
URL: https://i.cmpnet.com/s_code/ubm-tech-global-app-measurement.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
15.188.105.205 Paris, France, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-15-188-105-205.eu-west-3.compute.amazonaws.com
Software
jag /
Resource Hash
55c9d2f019f9d7ddfd69b2ad0351c5617338a222362aebb02b3b98a4dbc18486
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Wed, 29 Apr 2020 21:17:22 GMT
x-content-type-options
nosniff
x-c
master-1221.I0e927e.M0-376
p3p
CP="This is not a P3P policy"
status
200
content-length
43
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Thu, 30 Apr 2020 21:17:23 GMT
server
jag
xserver
anedge-65fb49f79-fr8kp
etag
3410622884762451968-4614405297102546296
vary
*
content-type
image/gif;charset=utf-8
access-control-allow-origin
https://www.darkreading.com
cache-control
no-cache, no-store, max-age=0, no-transform, private
access-control-allow-credentials
true
expires
Tue, 28 Apr 2020 21:17:23 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042919&de=601615449738&m=0&ar=31f9dba90d-clean&iw=e87dca3&q=23&cb=0&ym=0&cu=1588195042919&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=101649396%3A2671382143%3A5312334190%3A138306267349&zMoatPS=TAPunit&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&bo=27868836&bp=43863396&bd=TAPunit&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1840%3A1881%3A0%3A0&fs=180167&na=245601787&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:23 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:23 GMT
truncated
/ Frame CBA4
218 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5790a8b69b8c319c7f0296bccb9ca238e78a09f7c5647c9ce761ee76a35ebb00

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
/
api.bibblio.org/v1/content-item-url-ingestions/
175 B
548 B
XHR
General
Full URL
https://api.bibblio.org/v1/content-item-url-ingestions/
Requested by
Host: cdn.bibblio.org
URL: https://cdn.bibblio.org/rcm/4.9/bib-related-content.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.202.7 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-202-7.fra53.r.cloudfront.net
Software
/
Resource Hash
6daa62ec3812d8c4cc65448351cefcbe9a190ecec9c63cc261d28a851632d5fa

Request headers

Authorization
Bearer cad9e1a0-1087-4b12-918a-6a2155eb25a3
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/json

Response headers

date
Wed, 29 Apr 2020 21:17:23 GMT
via
1.1 b16802a1e349d80b7688070778305ae2.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA53-C1
x-amzn-requestid
2df143a6-bb5f-40ff-a15e-d93542c6412a
status
422
x-cache
Error from cloudfront
content-type
application/json
access-control-allow-origin
*
x-amzn-trace-id
Root=1-5ea9eee3-699a927443f0ba605124686c;Sampled=0
x-amz-apigw-id
LxJDiFpGDoEFpJQ=
content-length
175
x-amz-cf-id
u0UbzyzQgMmKWHIfnGA73PWVeXToccOu3lTWSukHsc3A3lpE9xIW_g==
widget_iframe.c63890edc4243ee77048d507b181eeec.html
platform.twitter.com/widgets/ Frame C0BD
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/widget_iframe.c63890edc4243ee77048d507b181eeec.html?origin=https%3A%2F%2Fwww.darkreading.com
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/418A) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9

Response headers

Content-Encoding
gzip
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Age
170950
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Wed, 29 Apr 2020 21:17:23 GMT
Etag
"9fa476ae827f556d5b037fe43632370d+gzip"
Last-Modified
Mon, 27 Apr 2020 21:32:31 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/418A)
Vary
Accept-Encoding
X-Cache
HIT
Content-Length
5825
like.php
www.facebook.com/plugins/ Frame 0851
0
0
Document
General
Full URL
https://www.facebook.com/plugins/like.php?app_id=640989409269461&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D46%23cb%3Df32b80a387f3eb%26domain%3Dwww.darkreading.com%26origin%3Dhttps%253A%252F%252Fwww.darkreading.com%252Ff1895c10ff34fd8%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&layout=button&locale=en_US&sdk=joey&send=false&show_faces=false&width=87
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/all.js?hash=9f9031999acbbff90c62c3a4ab885bc0&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;block-all-mixed-content;upgrade-insecure-requests;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www.facebook.com
:scheme
https
:path
/plugins/like.php?app_id=640989409269461&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D46%23cb%3Df32b80a387f3eb%26domain%3Dwww.darkreading.com%26origin%3Dhttps%253A%252F%252Fwww.darkreading.com%252Ff1895c10ff34fd8%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&layout=button&locale=en_US&sdk=joey&send=false&show_faces=false&width=87
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
fr=0rslqgMyMMtyIABrY..Beqe7i...1.0.Beqe7i.
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9

Response headers

status
200
cache-control
private, no-cache, no-store, must-revalidate
pragma
no-cache
strict-transport-security
max-age=15552000; preload
content-encoding
br
timing-allow-origin
*
content-security-policy
default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;block-all-mixed-content;upgrade-insecure-requests;
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
expires
Sat, 01 Jan 2000 00:00:00 GMT
content-type
text/html; charset="utf-8"
x-fb-debug
JzvqmTe783ZV57WS3nvz9XZzdpIFmDg5N7YmgP4D6emJusT1Ti8MgBL49RRYWXDUQ1Ez8qwmx/exAT4T5i1WOA==
date
Wed, 29 Apr 2020 21:17:23 GMT Wed, 29 Apr 2020 21:17:23 GMT
alt-svc
h3-27=":443"; ma=3600
record.do
ins.techweb.com/beacon/ Frame 5CE2
0
0
Document
General
Full URL
https://ins.techweb.com/beacon/record.do?a=68841bbbf037b3bd9eda236cfd0edcb96932f665438d7b833aaa994d869277ac&u=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%252Fd%252Fd-id%252F1336729%253Fmkt_tok%253DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&t=P
Requested by
Host: ins.techweb.com
URL: https://ins.techweb.com/beacon/js/beacon-min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3034::6818:7ae4 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

:method
GET
:authority
ins.techweb.com
:scheme
https
:path
/beacon/record.do?a=68841bbbf037b3bd9eda236cfd0edcb96932f665438d7b833aaa994d869277ac&u=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%252Fd%252Fd-id%252F1336729%253Fmkt_tok%253DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&t=P
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9

Response headers

status
204
date
Wed, 29 Apr 2020 21:17:23 GMT
set-cookie
__cfduid=d1e94de306150d871f8bc5566e5273a8a1588195043; expires=Fri, 29-May-20 21:17:23 GMT; path=/; domain=.techweb.com; HttpOnly; SameSite=Lax Insights=25-f8693c3d-3f38-4599-9286-2cda0c667337; Domain=.techweb.com; Expires=Mon, 28-Apr-2025 21:17:23 GMT; Path=/
p3p
CP='IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT'
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
58bc0cabdfdf1f25-FRA
cf-request-id
0269663f6600001f251f830200000001
elqCfg.min.js
img.en25.com/i/
6 KB
3 KB
Script
General
Full URL
https://img.en25.com/i/elqCfg.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.76.46.10 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-76-46-10.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6b4ebd6049c806e3eef1bd770b2d8b4fdd75803861ead3584ee753e41988efae
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Last-Modified
Wed, 22 Jan 2020 17:21:27 GMT
ETag
"164336148d1d51:0"
Vary
Accept-Encoding
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Cache-Control
no-cache, no-store
Date
Wed, 29 Apr 2020 21:17:23 GMT
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
application/x-javascript
Content-Length
2115
Expires
Wed, 29 Apr 2020 21:17:23 GMT
moment~timeline~tweet.99ce5e0e4617985354c5c426d7e1b9f4.js
platform.twitter.com/js/
24 KB
8 KB
Script
General
Full URL
https://platform.twitter.com/js/moment~timeline~tweet.99ce5e0e4617985354c5c426d7e1b9f4.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40B6) /
Resource Hash
f13585ddb86f9ec0432f36eae40bcaabe3aad166eff8424b27082c2b8174a3a2

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 21:17:23 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Apr 2020 21:32:19 GMT
Server
ECS (fcn/40B6)
Age
170956
Etag
"e137faa829d69782b030b8ae591989d1+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
7864
timeline.d228dcf3573461f298b082c9a5c0a42c.js
platform.twitter.com/js/
21 KB
7 KB
Script
General
Full URL
https://platform.twitter.com/js/timeline.d228dcf3573461f298b082c9a5c0a42c.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40AE) /
Resource Hash
72945876902af2cd35e37c7dc27c9a1ece0e3f3185100c36f5e55e468182467a

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 21:17:23 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Apr 2020 21:32:19 GMT
Server
ECS (fcn/40AE)
Age
170953
Etag
"cd03198280cd4775cf9715d3c461a225+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
6656
button.93a0c25c2d2f3081c705c98c2d9dec0e.js
platform.twitter.com/js/
7 KB
3 KB
Script
General
Full URL
https://platform.twitter.com/js/button.93a0c25c2d2f3081c705c98c2d9dec0e.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40AE) /
Resource Hash
cef013ba053c40f6bfa36baf6b11dca3426b1697bb52bec0902a4746f5f7d169

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 21:17:23 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Apr 2020 21:32:18 GMT
Server
ECS (fcn/40AE)
Age
170953
Etag
"0745fc0bb127ba13d716d66761b4628d+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
2298
analytics.js
www.google-analytics.com/
44 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-WJ9RHF7
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
eaf1b128b927ac2868755cb7366d35554255c8af362235afe270f9614f8c806d
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 06 Feb 2020 00:21:02 GMT
server
Golfe2
age
1263
date
Wed, 29 Apr 2020 20:56:20 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18174
expires
Wed, 29 Apr 2020 22:56:20 GMT
Cookie set login.jsp
ng.techweb.com/authds/login/ Frame 53D3
0
0
Document
General
Full URL
https://ng.techweb.com/authds/login/login.jsp?type=iframe&cdsocket_client=https://www.darkreading.com/cdsocket_proxy.html
Requested by
Host: img.deusm.com
URL: https://img.deusm.com/darkreading/JQuery_Library/Jquery_3.4.1.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2620:103::192:155:48:119 , United States, ASN19994 (RACKSPACE, US),
Reverse DNS
Software
NG /
Resource Hash

Request headers

Host
ng.techweb.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9

Response headers

Set-Cookie
JSESSIONID=B951D91A55794A85603E4438BA55A4EB; Path=/; Secure; HttpOnly
vary
accept-encoding
Content-Type
text/html;charset=ISO-8859-1
Content-Length
755
Date
Wed, 29 Apr 2020 21:17:22 GMT
Server
NG
Content-Encoding
gzip
Connection
Keep-Alive
ping
ping.chartbeat.net/
43 B
168 B
Image
General
Full URL
https://ping.chartbeat.net/ping?h=darkreading.com&p=%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&u=BjqYQiDBpoWeDceek-&d=darkreading.com&g=53678&g0=News&g1=Jai%20Vijayan&n=1&f=00001&c=0&x=0&m=0&y=5114&o=1585&w=1200&j=45&R=1&W=0&I=0&E=0&e=0&r=http%3A%2F%2Fgo.pulsesecure.net%2FB700uS3Eq000g0zN0ZzNjTf&b=3059&t=BWnbzVC37jIdB7T9esC1ZACwB7cxTT&V=120&i=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&tz=-120&sn=1&sv=CexeCWHAQzPDNLyOrlXCMjB5QCBU&sr=http%3A%2F%2Fgo.pulsesecure.net%2FB700uS3Eq000g0zN0ZzNjTf&sd=1&im=067b0eff&_
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.21.45.91 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-21-45-91.compute-1.amazonaws.com
Software
/
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
pragma
no-cache
date
Wed, 29 Apr 2020 21:17:23 GMT
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
content-length
43
expires
0
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&vb=13&kq=1&lo=1&uk=null&pk=0&wk=0&rk=1&tk=1&ak=https%3A%2F%2Fsecurepubads.g.doubleclick.net%2Fpcs%2Fview%3Fxai%3DAKAOjstB-8GdFMt2kmINy414NKcWxbsJ11NYKTRU9kSMcH0d2InkR_dfGu97MmPfdgbRKlXJuWL5vuKXAXujvvghS7W99wlUEpOKWVQguNrA7nInnNgAKyiXvvUIBjK4NzV9JUpfzGtNf48a3rQHuVcl1fvY_nWKIB5L7-vm-olYStNPampSNbnaR7kZ3-jkRZkKRsJmsYaUpSkK_cAooCQqoz42mRgzyp5PSyzeCmZ0NxhR6MdlQdYVGxQ-PqIjUC0r-suoycCIVZeX4hkM0X2Bmfoj4E0cO_6g5crJEIs5AnmCguKI5WgZ9w%26sai%3DAMfl-YRV02mAeBtl9ZwoD-eJ1RAC26dGZTx2mHVG_CxzqAqVG0vjbMFgrdnJyamo7wW7f93NxMVon7LYI_wuhJLB3fhStV_zNssfoiL1m16v%26sig%3DCg0ArKJSzAkWDMcXyklHEAE%26urlfix%3D1%26adurl%3Dhttps%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F17295047894583974417&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=480&w=640&fy=472.5&gp=358&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042328&de=777038559299&cu=1588195042328&m=638&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=358&lb=4088&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=0&ag=86&an=0&gf=86&gg=0&ix=86&ic=86&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=86&bx=0&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=172&cd=0&ah=172&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=20049636%3A2660390051%3A5290329792%3A138308164554&bo=27868836&bp=43863396&bd=welcome&zMoatPS=welcome&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=345975227&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:23 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:23 GMT
truncated
/ Frame 0896
219 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
07786cc58542578fc9d971507485b7602c5d0ded98d01623b51390edd4e8434a

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
web.js
cache-ssl.celtra.com/api/creatives/683f1864/compiled/ Frame 5C84
709 KB
162 KB
Script
General
Full URL
https://cache-ssl.celtra.com/api/creatives/683f1864/compiled/web.js?v=15-e7375ad4a2&secure=1&cachedVariantChoices=W10-&eventMetadataExperiment=newMeta&inmobi=0&adx-in-banner-video=1
Requested by
Host: ads.celtra.com
URL: https://ads.celtra.com/2aa214b5/web.js?&clickUrl=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsvW3uFb5YINaUrp-WrFfW0K7Ig_lCTvJUY7t44GoqUZwmWRH6bbvRRPSG8-EUh8Hh6-YU0MvX_SFtDJ15RlVnvdfUI_jPcUkC-D4hl5QQzDnrEKpoutYyxw7YSUIZxLYHqulo7cRAEwL5SiIrpGpnrJcDVJp86aVnPoFVu5z_kX_WV3Oi1oXIrQwT3vzU5yeGJovEWieEnbC1TF_YRA7brGBT202cXa32Hq-EuGcKiMmJ41wCgfQP1CrwEr6X7daGEWrD489P0_3TDvSpNTnmx17rHCUDKL%26sai%3DAMfl-YSjz6vJd5au2PmcRbDXs8yPazhtOff6Oj2Kmh8SF1Y7i-4miezQLqaElHt0afRsVYzGh0331AaQi3wq52AGkvmikDgBdPlrEkEC_P-q%26sig%3DCg0ArKJSzJ4ujeu-gN9fEAE%26urlfix%3D1%26adurl%3D&expandDirection=undefined&clickEvent=advertiser&iosAdvId=&androidAdvId=&externalAdServer=DFPPremium&tagVersion=6&eas.JWVjaWQh=138306267349&externalCreativeId=138306267349&externalPlacementId=43863396&externalSiteId=27868836&externalSiteName=darkreading.com&externalLineItemId=5312334190&externalCampaignId=2671382143&externalAdvertiserId=101649396&scriptId=celtra-script-1&clientTimestamp=1588195042.836&clientTimeZoneOffsetInMinutes=-120&hostPageLoadId=3141692184104574
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
28b3d9c5f92fa56acbb5609f928fdd9268945472f5f8ba146759e419c793c96b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 08:42:23 GMT
content-encoding
gzip
age
477300
x-cache
Hit from cloudfront
status
200
content-length
165283
access-control-allow-origin
*
server
Apache
etag
"88eaf1ae8dba9a015f0c4402ed68431fa6cbd04548d510979bd7eb5e0ec1a8d1"
vary
Accept-Encoding
x-varnish
2064595 492307
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
o25fS75NU7V53IiPW3Ry4ZbL_YkUQCwYsz7baCWi7U90hOJkQgSu4A==
truncated
/ Frame 5C84
167 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d26432e661658ef9d3d538b1f71b1478193f6c141f1cd7dfed03e5b677d178c2

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
27d3c1c5-8dce-4f5d-bd55-4ee804703e33
https://www.darkreading.com/ Frame 5C84
167 B
0
Image
General
Full URL
blob:https://www.darkreading.com/27d3c1c5-8dce-4f5d-bd55-4ee804703e33
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d26432e661658ef9d3d538b1f71b1478193f6c141f1cd7dfed03e5b677d178c2

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
167
Content-Type
image/png
profile
cdn.syndication.twimg.com/timeline/
166 KB
12 KB
Script
General
Full URL
https://cdn.syndication.twimg.com/timeline/profile?callback=__twttr.callbacks.tl_i0_profile_DarkReading_old&dnt=true&domain=www.darkreading.com&lang=en&screen_name=DarkReading&suppress_response_codes=true&t=1764661&tz=GMT%2B0200&with_replies=false
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (lcy/1D75) /
Resource Hash
1d1e7a0b825a0f5731ea0a5bfb9e1535dc2d14c484b059d9b03ec45da05145f2
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:23 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
136
x-cache
HIT
status
200
content-disposition
attachment; filename=jsonp.jsonp
vary
Accept-Encoding
content-length
11411
x-xss-protection
0
x-response-time
176
last-modified
Wed, 29 Apr 2020 21:15:07 GMT
server
ECS (lcy/1D75)
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=631138519
access-control-allow-methods
GET
content-type
application/javascript;charset=utf-8
expires
Wed, 29 Apr 2020 21:22:23 GMT
cache-control
must-revalidate, max-age=300
x-connection-hash
958131990af66822e234c3adf3364885
accept-ranges
bytes
timing-allow-origin
*
x-transaction
002953c300e93e0c
access-contol-allow-origin
platform.twitter.com
syndication
syndication.twitter.com/i/jot/
43 B
338 B
Image
General
Full URL
https://syndication.twitter.com/i/jot/syndication?dnt=1&l=%7B%22_category_%22%3A%22syndicated_impression%22%2C%22triggered_on%22%3A1588195043308%2C%22dnt%22%3Atrue%2C%22event_namespace%22%3A%7B%22client%22%3A%22tfw%22%2C%22page%22%3A%22timeline%22%2C%22action%22%3A%22impression%22%7D%7D
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.136 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:23 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
content-length
65
x-xss-protection
0
x-response-time
117
pragma
no-cache
last-modified
Wed, 29 Apr 2020 21:17:23 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=631138519
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
eb26f689f84038da5eb03eeacbf129a7
x-transaction
006f432a00f69e68
expires
Tue, 31 Mar 1981 05:00:00 GMT
teads-format.min.js
a.teads.tv/media/format/v3/
664 KB
140 KB
Script
General
Full URL
https://a.teads.tv/media/format/v3/teads-format.min.js
Requested by
Host: a.teads.tv
URL: https://a.teads.tv/page/11512/tag
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.232.7 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-232-7.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
fd675fcec2fdf7c92e5a9f27ec065049817754c0a8f2eff33d0eaca516a60935

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:23 GMT
content-encoding
br
last-modified
Tue, 28 Apr 2020 15:53:26 GMT
x-amz-request-id
CA400CA675CCF510
etag
"7f4706cedc3f699b9d1b7bf324930e77"
vary
Accept-Encoding
content-type
text/javascript;charset=utf-8
status
200
cache-control
private, must-revalidate, max-age=1800, no-transform
x-bucket
6
content-length
142992
accept-ranges
bytes
akamai-age-ms
1588089214213
x-amz-id-2
UXCY3EEz6K1R3B/UaXFDpJNQjLWajnDit5BGyxVtospc2aakmFF9gac//NMU6JEVfkuOl+3fpew=
expires
Wed, 29 Apr 2020 21:47:23 GMT
collect
stats.g.doubleclick.net/r/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j81&a=1936501576&t=pageview&_s=1&dl=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-rans...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-135180592-2&cid=1778322720.1588195042&jid=1087840019&_gid=1398873549.1588195043&gjid=1973065679&_v=j81&z=273431369
35 B
113 B
Image
General
Full URL
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-135180592-2&cid=1778322720.1588195042&jid=1087840019&_gid=1398873549.1588195043&gjid=1973065679&_v=j81&z=273431369
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:400c:c08::9a Brussels, Belgium, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
strict-transport-security
max-age=10886400; includeSubDomains; preload
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
date
Wed, 29 Apr 2020 21:17:23 GMT
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:23 GMT
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
302
location
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-135180592-2&cid=1778322720.1588195042&jid=1087840019&_gid=1398873549.1588195043&gjid=1973065679&_v=j81&z=273431369
content-type
text/html; charset=UTF-8
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
420
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042981&de=269745253467&m=0&ar=31f9dba90d-clean&iw=e87dca3&q=27&cb=0&ym=0&cu=1588195042981&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=101649396%3A2671382143%3A5312334190%3A138305888879&zMoatPS=rec1&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&bo=27868836&bp=43863396&bd=rec1&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1840%3A1881%3A0%3A0&fs=180167&na=496567955&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:23 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:23 GMT
tweet_button.c63890edc4243ee77048d507b181eeec.en.html
platform.twitter.com/widgets/ Frame EB5B
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/tweet_button.c63890edc4243ee77048d507b181eeec.en.html
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40AE) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9

Response headers

Content-Encoding
gzip
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Age
170951
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Wed, 29 Apr 2020 21:17:23 GMT
Etag
"5ac01e4f00ee8393c3dc8821ae708c78+gzip"
Last-Modified
Mon, 27 Apr 2020 21:32:28 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/40AE)
Vary
Accept-Encoding
X-Cache
HIT
Content-Length
12395
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F8279229054736995948&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042981&de=269745253467&cu=1588195042981&m=9&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=4088&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=0&ag=2&an=0&gf=2&gg=0&ix=2&ic=2&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=2&bx=0&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=0&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4&cd=0&ah=4&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=101649396%3A2671382143%3A5312334190%3A138305888879&bo=27868836&bp=43863396&bd=rec1&zMoatPS=rec1&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=997467436&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:23 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:23 GMT
svrGP.aspx
s657486201.t.eloqua.com/visitor/v200/
Redirect Chain
  • https://s657486201.t.eloqua.com/visitor/v200/svrGP?pps=50&siteid=657486201&DLKey=7435f16d0b5c4189a89d0d109d2517f5&DLLookup=&ms=414&firstPartyCookieDomain=trk.darkreading.com
  • https://s657486201.t.eloqua.com/visitor/v200/svrGP.aspx?pps=50&siteid=657486201&DLKey=7435f16d0b5c4189a89d0d109d2517f5&DLLookup=&ms=414&firstPartyCookieDomain=trk.darkreading.com&elqCookie=1
0
404 B
Script
General
Full URL
https://s657486201.t.eloqua.com/visitor/v200/svrGP.aspx?pps=50&siteid=657486201&DLKey=7435f16d0b5c4189a89d0d109d2517f5&DLLookup=&ms=414&firstPartyCookieDomain=trk.darkreading.com&elqCookie=1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
142.0.160.13 Ashburn, United States, ASN7160 (NETDYNAMICS, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000;
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Date
Wed, 29 Apr 2020 21:17:23 GMT
Vary
Accept-Encoding
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Cache-Control
private,no-cache, no-store
Content-Type
application/javascript
Content-Length
20
Expires
-1

Redirect headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
X-Content-Type-Options
nosniff
Date
Wed, 29 Apr 2020 21:17:23 GMT
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Location
//s657486201.t.eloqua.com/visitor/v200/svrGP.aspx?pps=50&siteid=657486201&DLKey=7435f16d0b5c4189a89d0d109d2517f5&DLLookup=&ms=414&firstPartyCookieDomain=trk.darkreading.com&elqCookie=1
Cache-Control
private,no-cache, no-store
Content-Type
text/html; charset=utf-8
Content-Length
325
Expires
-1
svrGP.aspx
trk.darkreading.com/visitor/v200/
Redirect Chain
  • https://s2150.t.eloqua.com/visitor/v200/svrGP?pps=3&siteid=2150&ref2=http%3A%2F%2Fgo.pulsesecure.net%2FB700uS3Eq000g0zN0ZzNjTf&tzo=-60&ms=414&optin=disabled&firstPartyCookieDomain=trk.darkreading.com
  • https://trk.darkreading.com/visitor/v200/svrGP.aspx?pps=3&siteid=2150&ref2=http:%2F%2Fgo.pulsesecure.net%2FB700uS3Eq000g0zN0ZzNjTf&tzo=-60&ms=414&optin=disabled&elq1pcGUID=A9B12BF13E0D4F9CAD6E72416...
49 B
502 B
Image
General
Full URL
https://trk.darkreading.com/visitor/v200/svrGP.aspx?pps=3&siteid=2150&ref2=http:%2F%2Fgo.pulsesecure.net%2FB700uS3Eq000g0zN0ZzNjTf&tzo=-60&ms=414&optin=disabled&elq1pcGUID=A9B12BF13E0D4F9CAD6E72416C42FA4A
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
142.0.173.134 , United States, ASN7160 (NETDYNAMICS, US),
Reverse DNS
Software
/
Resource Hash
f1ccea6b7204d9f7913ab45e1afa51d79f83bd4f0319de937b0132e6e02b1aab
Security Headers
Name Value
Strict-Transport-Security max-age=31536000;
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
X-Content-Type-Options
nosniff
Date
Wed, 29 Apr 2020 21:17:26 GMT
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Cache-Control
private,no-cache, no-store
Content-Type
image/gif
Content-Length
49
Expires
-1

Redirect headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
X-Content-Type-Options
nosniff
Date
Wed, 29 Apr 2020 21:17:25 GMT
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Location
https://trk.darkreading.com/visitor/v200/svrGP.aspx?pps=3&siteid=2150&ref2=http:%2F%2Fgo.pulsesecure.net%2FB700uS3Eq000g0zN0ZzNjTf&tzo=-60&ms=414&optin=disabled&elq1pcGUID=A9B12BF13E0D4F9CAD6E72416C42FA4A
Cache-Control
private,no-cache, no-store
Content-Type
text/html; charset=utf-8
Content-Length
345
Expires
-1
e9_1_uuD
pbs.twimg.com/card_img/1255579641403723777/ Frame F4E5
6 KB
6 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1255579641403723777/e9_1_uuD?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/418E) /
Resource Hash
76050cfeb435efdf6e5c9476bf07999a658fed19a96dd2b263edc983e12d7693
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:23 GMT
x-content-type-options
nosniff
age
3347
x-cache
HIT
status
200
content-length
6313
x-response-time
144
surrogate-key
card_img card_img/bucket/1 card_img/1255579641403723777
last-modified
Wed, 29 Apr 2020 19:26:08 GMT
server
ECS (fcn/418E)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
c4771d698aef23fc1ac75bb038eb39f5
accept-ranges
bytes
iLicKi6w
pbs.twimg.com/card_img/1253021906011328512/ Frame F4E5
3 KB
3 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1253021906011328512/iLicKi6w?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40E8) /
Resource Hash
6c25d255bbdd0759d0016c0a59eb1dbfe221e551185acb14d24aca0479194df8
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:23 GMT
x-content-type-options
nosniff
age
495885
x-cache
HIT
status
200
content-length
2987
x-response-time
135
surrogate-key
card_img card_img/bucket/8 card_img/1253021906011328512
last-modified
Wed, 22 Apr 2020 18:02:37 GMT
server
ECS (fcn/40E8)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
2ab71d7dfdccde05ca79607fe7b53add
accept-ranges
bytes
wCEvN7r_
pbs.twimg.com/card_img/1255256794311675904/ Frame F4E5
7 KB
7 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1255256794311675904/wCEvN7r_?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/418C) /
Resource Hash
cfd8e56800831344eb7a4b74a281cd520b7c6b5a404b5fdb5703b6656bd9ae24
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:23 GMT
x-content-type-options
nosniff
age
83376
x-cache
HIT
status
200
content-length
7442
x-response-time
149
surrogate-key
card_img card_img/bucket/4 card_img/1255256794311675904
last-modified
Tue, 28 Apr 2020 22:03:15 GMT
server
ECS (fcn/418C)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
a9d3b8f5cab9016a28a46fa8aac18fce
accept-ranges
bytes
P4UgA07h
pbs.twimg.com/card_img/1254796349163409408/ Frame F4E5
69 KB
69 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1254796349163409408/P4UgA07h?format=jpg&name=600x314
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40D4) /
Resource Hash
27539a88302f65c121ba11abc434f68a787a772139c870d33a8289ef6d1d0f53
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:23 GMT
x-content-type-options
nosniff
age
124731
x-cache
HIT
status
200
content-length
70775
x-response-time
146
surrogate-key
card_img card_img/bucket/5 card_img/1254796349163409408
last-modified
Mon, 27 Apr 2020 15:33:37 GMT
server
ECS (fcn/40D4)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
4452b3a1c599393500c309b3fcf47ed6
accept-ranges
bytes
track
t.teads.tv/
23 B
143 B
Image
General
Full URL
https://t.teads.tv/track?action=placementCall&ts=1588195043508&pageId=11512&pid=21882&env=js-web&pfid=[pfid]&f=1&auctid=d0706c7a-7657-4215-be58-ee137736b8fe&fv=341&referer=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.248.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-248-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
328e90a318268aea96180cc31666ae6d6f79d90d078c123bc3d98ee08a192fb7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Wed, 29 Apr 2020 21:17:23 GMT
cache-control
max-age=0, no-cache, no-store
content-type
image/gif
content-length
23
expires
Sat, 26 Jul 1997 05:00:00 GMT
track
t.teads.tv/
23 B
143 B
Image
General
Full URL
https://t.teads.tv/track?action=slotAvailable&ts=1588195043509&pageId=11512&pid=21882&env=js-web&pfid=[pfid]&f=1&slot=native&auctid=d0706c7a-7657-4215-be58-ee137736b8fe&fv=341&referer=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.248.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-248-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
328e90a318268aea96180cc31666ae6d6f79d90d078c123bc3d98ee08a192fb7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Wed, 29 Apr 2020 21:17:23 GMT
cache-control
max-age=0, no-cache, no-store
content-type
image/gif
content-length
23
expires
Sat, 26 Jul 1997 05:00:00 GMT
ad
a.teads.tv/page/11512/
485 B
662 B
XHR
General
Full URL
https://a.teads.tv/page/11512/ad?windowWidth=1600&windowHeight=1200&windowDepth=1&pageReferrerUrl=http%3A%2F%2Fgo.pulsesecure.net&windowReferrerUrl=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&page=%7B%22id%22%3A11512%2C%22placements%22%3A%5B%7B%22id%22%3A21882%2C%22validity%22%3A%7B%22status%22%3Atrue%2C%22reasons%22%3A%5B%5D%7D%2C%22player%22%3A%7B%22width%22%3A489%2C%22height%22%3A275%7D%2C%22slotType%22%3A%22native%22%7D%5D%2C%22gdpr_iab%22%3A%7B%22status%22%3A22%2C%22consent%22%3A%22%22%2C%22reason%22%3A220%7D%7D&auctid=d0706c7a-7657-4215-be58-ee137736b8fe&formatVersion=2.22.61&env=js-web&netBw=10&ttfb=1369
Requested by
Host: a.teads.tv
URL: https://a.teads.tv/media/format/v3/teads-format.min.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.232.7 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-232-7.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b90fff0ae3df0f01c89917842d21561695cb6952bef1484a6c29444c86080e72

Request headers

Accept
application/json; charset=UTF-8
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:23 GMT
content-encoding
gzip
status
200
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
https://www.darkreading.com
cache-control
max-age=0, no-cache, no-store
access-control-allow-credentials
true
content-length
337
expires
Wed, 29 Apr 2020 21:17:23 GMT
p
sb.scorecardresearch.com/
43 B
309 B
Image
General
Full URL
https://sb.scorecardresearch.com/p?c1=2&c2=17198971&ns_ap_sv=2.1511.10&ns_type=hidden&ns_st_it=a&ns_st_sv=4.0.0&ns_st_ad=1&ns_st_sq=1&ns_st_id=1588195043531&ns_st_ec=1&ns_st_cn=1&ns_st_ev=play&ns_st_ct=va00&ns_st_cl=0&ns_st_pt=0&c3=*null&c4=*null&c6=*null&ns_ts=91537861&cs_ucfr=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.124.133.20 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-124-133-20.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 29 Apr 2020 21:17:23 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Mon, 01 Jan 1990 00:00:00 GMT
timeline.d41c1d7e4bac44f4658ca45d09564e79.light.ltr.css
platform.twitter.com/css/ Frame F4E5
52 KB
12 KB
Stylesheet
General
Full URL
https://platform.twitter.com/css/timeline.d41c1d7e4bac44f4658ca45d09564e79.light.ltr.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/419E) /
Resource Hash
12bf529a0f4d0a3f10d003a07d5b91e40579a3da18022a9896a9ccd9e5dc1b33

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 21:17:23 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Apr 2020 21:32:15 GMT
Server
ECS (fcn/419E)
Age
170956
Etag
"0100ec69a2c00683a1ae89e074b822c1+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
text/css; charset=utf-8
Content-Length
12155
timeline.d41c1d7e4bac44f4658ca45d09564e79.light.ltr.css
platform.twitter.com/css/
52 KB
52 KB
Image
General
Full URL
https://platform.twitter.com/css/timeline.d41c1d7e4bac44f4658ca45d09564e79.light.ltr.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/419E) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 21:17:23 GMT
Content-Encoding
gzip
Last-Modified
Mon, 27 Apr 2020 21:32:15 GMT
Server
ECS (fcn/419E)
Age
170956
Etag
"0100ec69a2c00683a1ae89e074b822c1+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
text/css; charset=utf-8
Content-Length
12155
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195043116&de=351510546087&m=0&ar=31f9dba90d-clean&iw=e87dca3&q=31&cb=0&ym=0&cu=1588195043116&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=88835556%3A2687897921%3A5357140258%3A138309922451&zMoatPS=rec2&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&bo=27868836&bp=43863396&bd=rec2&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1840%3A1881%3A0%3A0&fs=180167&na=1537507292&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:23 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:23 GMT
e9_1_uuD
pbs.twimg.com/card_img/1255579641403723777/ Frame F4E5
6 KB
6 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1255579641403723777/e9_1_uuD?format=jpg&name=144x144_2
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/js/moment~timeline~tweet.99ce5e0e4617985354c5c426d7e1b9f4.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/418E) /
Resource Hash
76050cfeb435efdf6e5c9476bf07999a658fed19a96dd2b263edc983e12d7693
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:23 GMT
x-content-type-options
nosniff
age
3347
x-cache
HIT
status
200
content-length
6313
x-response-time
144
surrogate-key
card_img card_img/bucket/1 card_img/1255579641403723777
last-modified
Wed, 29 Apr 2020 19:26:08 GMT
server
ECS (fcn/418E)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
c4771d698aef23fc1ac75bb038eb39f5
accept-ranges
bytes
iLicKi6w
pbs.twimg.com/card_img/1253021906011328512/ Frame F4E5
3 KB
3 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1253021906011328512/iLicKi6w?format=jpg&name=144x144_2
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/js/moment~timeline~tweet.99ce5e0e4617985354c5c426d7e1b9f4.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40E8) /
Resource Hash
6c25d255bbdd0759d0016c0a59eb1dbfe221e551185acb14d24aca0479194df8
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:23 GMT
x-content-type-options
nosniff
age
495885
x-cache
HIT
status
200
content-length
2987
x-response-time
135
surrogate-key
card_img card_img/bucket/8 card_img/1253021906011328512
last-modified
Wed, 22 Apr 2020 18:02:37 GMT
server
ECS (fcn/40E8)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
2ab71d7dfdccde05ca79607fe7b53add
accept-ranges
bytes
wCEvN7r_
pbs.twimg.com/card_img/1255256794311675904/ Frame F4E5
7 KB
7 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1255256794311675904/wCEvN7r_?format=jpg&name=144x144_2
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/js/moment~timeline~tweet.99ce5e0e4617985354c5c426d7e1b9f4.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/418C) /
Resource Hash
cfd8e56800831344eb7a4b74a281cd520b7c6b5a404b5fdb5703b6656bd9ae24
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:23 GMT
x-content-type-options
nosniff
age
83376
x-cache
HIT
status
200
content-length
7442
x-response-time
149
surrogate-key
card_img card_img/bucket/4 card_img/1255256794311675904
last-modified
Tue, 28 Apr 2020 22:03:15 GMT
server
ECS (fcn/418C)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
a9d3b8f5cab9016a28a46fa8aac18fce
accept-ranges
bytes
P4UgA07h
pbs.twimg.com/card_img/1254796349163409408/ Frame F4E5
69 KB
69 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1254796349163409408/P4UgA07h?format=jpg&name=600x314
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/js/moment~timeline~tweet.99ce5e0e4617985354c5c426d7e1b9f4.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40D4) /
Resource Hash
27539a88302f65c121ba11abc434f68a787a772139c870d33a8289ef6d1d0f53
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:23 GMT
x-content-type-options
nosniff
age
124731
x-cache
HIT
status
200
content-length
70775
x-response-time
146
surrogate-key
card_img card_img/bucket/5 card_img/1254796349163409408
last-modified
Mon, 27 Apr 2020 15:33:37 GMT
server
ECS (fcn/40D4)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
4452b3a1c599393500c309b3fcf47ed6
accept-ranges
bytes
A4mG0U5P_normal.jpg
pbs.twimg.com/profile_images/885169621795565573/ Frame F4E5
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/885169621795565573/A4mG0U5P_normal.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40B4) /
Resource Hash
25b438de3e944547e69c6de98e403f46a9aa4fb98e6d1bb34954fd30ebc19b56
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:23 GMT
x-content-type-options
nosniff
age
56571
x-cache
HIT
status
200
content-length
1883
x-response-time
119
surrogate-key
profile_images profile_images/bucket/8 profile_images/885169621795565573
last-modified
Wed, 12 Jul 2017 16:08:58 GMT
server
ECS (fcn/40B4)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
1953257547baf2cce752eebb7d06930f
accept-ranges
bytes
f4syDXWc_normal.jpg
pbs.twimg.com/profile_images/799356284688470016/ Frame F4E5
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/799356284688470016/f4syDXWc_normal.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/4188) /
Resource Hash
497fbdd1e530a78143b5ebb1cc50eab16fd8bd7a858ab04674ac56952085d657
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:23 GMT
x-content-type-options
nosniff
age
138479
x-cache
HIT
status
200
content-length
2187
x-response-time
119
surrogate-key
profile_images profile_images/bucket/3 profile_images/799356284688470016
last-modified
Thu, 17 Nov 2016 20:57:24 GMT
server
ECS (fcn/4188)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
b3cfe999c6bfa38bbcdb4616bd5e47cc
accept-ranges
bytes
5ODE_Ih7_normal.jpg
pbs.twimg.com/profile_images/1247557912605712385/ Frame F4E5
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/1247557912605712385/5ODE_Ih7_normal.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41AD) /
Resource Hash
c8ad4407a726577fed2c70aa4f8bf6d3270c4fcce8541aa874f60279b01043cc
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:23 GMT
x-content-type-options
nosniff
age
101867
x-cache
HIT
status
200
content-length
1959
x-response-time
127
surrogate-key
profile_images profile_images/bucket/0 profile_images/1247557912605712385
last-modified
Tue, 07 Apr 2020 16:10:39 GMT
server
ECS (fcn/41AD)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
cd96e5a865de58d0acae42106575e7a6
accept-ranges
bytes
EWthTWbWkAMAPdf
pbs.twimg.com/media/ Frame F4E5
26 KB
26 KB
Image
General
Full URL
https://pbs.twimg.com/media/EWthTWbWkAMAPdf?format=jpg&name=360x360
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41A8) /
Resource Hash
578ec3a40c24ed6f20dc6f0f25573930cafbc2e1de863c4646c236ac385927ad
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:23 GMT
x-content-type-options
nosniff
age
96135
x-cache
HIT
status
200
content-length
26203
x-response-time
160
surrogate-key
media media/bucket/4 media/1255203906218528771
last-modified
Tue, 28 Apr 2020 18:33:06 GMT
server
ECS (fcn/41A8)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
ed92ed01a073274a3618ca7e3030d21d
accept-ranges
bytes
syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
ton.twimg.com/tfw/css/ Frame F4E5
44 KB
7 KB
Stylesheet
General
Full URL
https://ton.twimg.com/tfw/css/syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/418C) /
Resource Hash
a549034009f79ead18a2154a8b730d8acb61e2f36c0434c0f9cff0f73df5d8cf
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:23 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
407241
x-ton-expected-size
45170
x-cache
HIT
status
200
vary
Accept-Encoding
content-length
6839
x-response-time
11
surrogate-key
tfw
last-modified
Tue, 14 May 2019 18:53:54 GMT
server
ECS (fcn/418C)
etag
"4mhImCFS9rptiUICNnLD1g=="
strict-transport-security
max-age=631138519
content-type
text/css
access-control-allow-origin
*
x-connection-hash
43a01730e19bf63b7e4b177f526d0651
accept-ranges
bytes
expires
Wed, 06 May 2020 21:17:23 GMT
syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
ton.twimg.com/tfw/css/
44 KB
44 KB
Image
General
Full URL
https://ton.twimg.com/tfw/css/syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/418C) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:23 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
407241
x-ton-expected-size
45170
x-cache
HIT
status
200
vary
Accept-Encoding
content-length
6839
x-response-time
11
surrogate-key
tfw
last-modified
Tue, 14 May 2019 18:53:54 GMT
server
ECS (fcn/418C)
etag
"4mhImCFS9rptiUICNnLD1g=="
strict-transport-security
max-age=631138519
content-type
text/css
access-control-allow-origin
*
x-connection-hash
43a01730e19bf63b7e4b177f526d0651
accept-ranges
bytes
expires
Wed, 06 May 2020 21:17:23 GMT
truncated
/ Frame F4E5
825 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
45055babdbc02ea34c7baa53f33fc68389c4c5f73afe0bfafd6c9bc5733399bc

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/ Frame F4E5
572 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
abd2a457215e60ab60b2a6b4f25a17583c5d80e13935f76e097236f729c5dcd6

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/ Frame F4E5
644 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a87f4fd815fc95288f2da6efc536c950ef940bd9eb52176fd9e8e56107cc65e2

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/ Frame F4E5
739 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4ed07f590bdfa9aa775dbfdef617d98e1e972d102d4289c7a68d3bd9118c280b

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F10774940007939859206&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195043116&de=351510546087&cu=1588195043116&m=14&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5114&le=1&gm=1&io=1&vv=1&vw=1%3A3%3A0&vp=0&vx=0%3A-%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&em=0&en=0&st=0&su=1&of=1&oz=0&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5&cd=0&ah=5&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=88835556%3A2687897921%3A5357140258%3A138309922451&bo=27868836&bp=43863396&bd=rec2&zMoatPS=rec2&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=943532725&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:23 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:23 GMT
iframe
sync.teads.tv/ Frame 8BB0
0
0
Document
General
Full URL
https://sync.teads.tv/iframe?pid=21882&gdprIab={%22status%22:22,%22consent%22:%22%22,%22reason%22:220}&fromFormat=true&env=js-web&vid=29e59dbb-f4ea-4c4f-8b5e-347e66278550&1588195043691
Requested by
Host: a.teads.tv
URL: https://a.teads.tv/media/format/v3/teads-format.min.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.248.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-248-12.deploy.static.akamaitechnologies.com
Software
akka-http/10.1.9 /
Resource Hash

Request headers

:method
GET
:authority
sync.teads.tv
:scheme
https
:path
/iframe?pid=21882&gdprIab={%22status%22:22,%22consent%22:%22%22,%22reason%22:220}&fromFormat=true&env=js-web&vid=29e59dbb-f4ea-4c4f-8b5e-347e66278550&1588195043691
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
cs=1; tt_viewer=29e59dbb-f4ea-4c4f-8b5e-347e66278550
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9

Response headers

status
200
content-type
text/html; charset=UTF-8
server
akka-http/10.1.9
vary
Accept-Encoding
content-encoding
gzip
expires
Wed, 29 Apr 2020 21:17:23 GMT
cache-control
max-age=0, no-cache, no-store
pragma
no-cache
date
Wed, 29 Apr 2020 21:17:23 GMT
content-length
622
set-cookie
tt_bluekai=; Expires=Thu, 30 Apr 2020 21:17:23 GMT; Max-Age=86400; Domain=.teads.tv; Path=/; Secure; SameSite=None tt_exelate=; Expires=Thu, 30 Apr 2020 21:17:23 GMT; Max-Age=86400; Domain=.teads.tv; Path=/; Secure; SameSite=None tt_emetriq=; Expires=Thu, 30 Apr 2020 21:17:23 GMT; Max-Age=86400; Domain=.teads.tv; Path=/; Secure; SameSite=None tt_liveramp=; Expires=Thu, 30 Apr 2020 21:17:23 GMT; Max-Age=86400; Domain=.teads.tv; Path=/; Secure; SameSite=None tt_neustar=; Expires=Thu, 30 Apr 2020 21:17:23 GMT; Max-Age=86400; Domain=.teads.tv; Path=/; Secure; SameSite=None tt_salesforce=; Expires=Thu, 30 Apr 2020 21:17:23 GMT; Max-Age=86400; Domain=.teads.tv; Path=/; Secure; SameSite=None tt_dar=; Expires=Thu, 30 Apr 2020 21:17:23 GMT; Max-Age=86400; Domain=.teads.tv; Path=/; Secure; SameSite=None tt_skp=; Expires=Thu, 30 Apr 2020 21:17:23 GMT; Max-Age=86400; Domain=.teads.tv; Path=/; Secure; SameSite=None tt_retargetly=; Expires=Thu, 30 Apr 2020 21:17:23 GMT; Max-Age=86400; Domain=.teads.tv; Path=/; Secure; SameSite=None
11420912116074682671
tpc.googlesyndication.com/simgad/
240 KB
240 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/11420912116074682671
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c072d9bdd801e2e4c6b9540d8edfd95a31dead5aa3a4639cb2311df7502cb019
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 27 Apr 2020 10:48:42 GMT
x-content-type-options
nosniff
age
210521
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
245942
x-xss-protection
0
last-modified
Tue, 10 Mar 2020 21:14:08 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 27 Apr 2021 10:48:42 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg4MTk1MDQzeGVmNDUwYWU3OWY5NzFkeDM5NzYzMDE4IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1MDkwNDk5NjgyNDg3NDQ2IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg4MTk1MDQzeGVmNDUwYWU3OWY5NzFkeDM5NzYzMDE4IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1MDkwNDk5NjgyNDg3NDQ2IiwiaW5kZXgiOjAsImNsaWVudFRpbWVzdGFtcCI6MTU4ODE5NTA0My42ODgsIm5hbWUiOiJjb250YWluZXJCZWNhbWVWaWV3YWJsZSJ9XX0=?crc32c=2653148397
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.126.42.246 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-126-42-246.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 29 Apr 2020 21:17:23 GMT
Cache-Control
no-cache, no-store, must-revalidate
Expires
0
Connection
keep-alive
Content-Length
35
Content-Type
image/gif
activeview
pagead2.googlesyndication.com/pcs/ Frame 872B
42 B
783 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsu4pb1h-DMIjWbnRh8b66LXkky1ZVVigb6QWqim43EfSVRO6q_4W_dZSK2dXTAUMaMgbuvEcZDXJxiqruvgYKKX7hRazUkiAVFqGjS3NiQ&sig=Cg0ArKJSzE_HVkOPVq17EAE&adk=1417865500&tt=-1&bs=1585%2C1200&mtos=1094,1094,1094,1094,1094&tos=1094,0,0,0,0&p=0,0,1200,1585&mcvt=1094&rs=0&ht=0&tfs=256&tls=1472&mc=1&lte=1&bas=0&bac=0&met=ce&la=1&avms=nio&exg=1&md=2&btr=0&lm=2&rst=1588195042163&dlt&rpt=342&isd=0&msd=0&ext&xdi=0&ps=1585%2C5114&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-9-4-8-8-0-0-0&tvt=1469&is=1585%2C1200&iframe_loc=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&r=v&id=osdim&vs=4&uc=9&upc=1&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=0x0&itpl=19&v=20200427
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:23 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 814F
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjssYhf1yd1OvlstC4K9nOeHOD6UZep-e07atwJ_q7E1IRYeIw34vfjR4gzUZLMAYx7CffLrw6l7ztEawqO6o0a47uRD_g6JNIfk4KaG-J10&sig=Cg0ArKJSzEx2uC3ZLizDEAE&adk=2966194094&tt=-1&bs=1585%2C1200&mtos=1088,1088,1088,1088,1088&tos=1088,0,0,0,0&p=96,428,186,1156&mcvt=1088&rs=0&ht=0&tfs=323&tls=1466&mc=1&lte=0&bas=0&bac=0&met=mue&avms=nio&exg=1&md=2&btr=0&lm=2&rst=1588195042179&dlt&rpt=305&isd=0&msd=0&ext&xdi=0&ps=1585%2C5114&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-10-2-9-9-0-0-0&tvt=1465&is=728%2C90&invis=1&iframe_loc=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&r=v&id=osdim&vs=4&uc=10&upc=1&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=728x90&itpl=3&v=20200427
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:23 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 43A2
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsu5jyuk7dNyTpZLdPh-KZxYVcFP4UUe3ewU0erMYNA7QGNfxxdbP_a0XZnbm6N6a2BChZc86EN6t8PuEU5KX91RK0QBRA0aV8s_MlJYbvo&sig=Cg0ArKJSzIwTBKpiYPjbEAE&adk=2332965166&tt=-1&bs=1585%2C1200&mtos=0,0,1088,1088,1088&tos=0,0,1088,0,0&p=358,293,360,294&mcvt=1088&rs=0&ht=0&tfs=315&tls=1459&mc=0.5&lte=0&bas=0&bac=0&met=ce&avms=nio&exg=1&md=2&btr=0&lm=2&rst=1588195042174&dlt&rpt=323&isd=0&msd=0&ext&xdi=0&ps=1585%2C5114&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-10-3-9-9-0-0-0&tvt=1457&is=1%2C2&invis=1&iframe_loc=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&r=v&id=osdim&vs=4&uc=10&upc=1&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=0x0&itpl=19&v=20200427
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:23 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
6595362031599957112
tpc.googlesyndication.com/simgad/
15 KB
15 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/6595362031599957112
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
adcbce13ee12d1a6ff836f9044031d2b0ee942289218c05b047da95b91bedef2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 27 Apr 2020 20:48:31 GMT
x-content-type-options
nosniff
age
174532
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
15152
x-xss-protection
0
last-modified
Mon, 24 Feb 2020 14:22:31 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 27 Apr 2021 20:48:31 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195043274&de=422389596458&m=0&ar=31f9dba90d-clean&iw=e87dca3&q=35&cb=0&ym=0&cu=1588195043274&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=17527716%3A193997916%3A42403476%3A138212589663&zMoatPS=video&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&bo=27868836&bp=43863396&bd=video&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1840%3A1881%3A0%3A2968&fs=180167&na=47472601&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:23 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:23 GMT
e9_1_uuD
pbs.twimg.com/card_img/1255579641403723777/ Frame F4E5
6 KB
6 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1255579641403723777/e9_1_uuD?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/418E) /
Resource Hash
76050cfeb435efdf6e5c9476bf07999a658fed19a96dd2b263edc983e12d7693
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:23 GMT
x-content-type-options
nosniff
age
3347
x-cache
HIT
status
200
content-length
6313
x-response-time
144
surrogate-key
card_img card_img/bucket/1 card_img/1255579641403723777
last-modified
Wed, 29 Apr 2020 19:26:08 GMT
server
ECS (fcn/418E)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
c4771d698aef23fc1ac75bb038eb39f5
accept-ranges
bytes
news_stroke_v1_78ce5b21fb24a7c7e528d22fc25bd9f9df7f24e2.svg
ton.twimg.com/tfw/assets/ Frame F4E5
829 B
577 B
Image
General
Full URL
https://ton.twimg.com/tfw/assets/news_stroke_v1_78ce5b21fb24a7c7e528d22fc25bd9f9df7f24e2.svg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41AC) /
Resource Hash
5c0f79d0286f1fd3db48e1b689358017b302c0f4babde540329e8c644cf119c7
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://ton.twimg.com/tfw/css/syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:23 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
578163
x-ton-expected-size
829
x-cache
HIT
status
200
vary
Accept-Encoding
content-length
395
x-response-time
11
surrogate-key
tfw
last-modified
Tue, 14 May 2019 18:53:55 GMT
server
ECS (fcn/41AC)
etag
"CTUg6L9PuY+d9h5xpE0zmw=="
strict-transport-security
max-age=631138519
warning
110 - "Response is stale"
content-type
image/svg+xml
access-control-allow-origin
*
x-connection-hash
c568e54138a1883f61a2b0cbf5f18ff5
accept-ranges
bytes
expires
Wed, 06 May 2020 21:17:23 GMT
css
fonts.googleapis.com/ Frame 9827
265 B
359 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Lato:400&text=%20CDEIMORSUVadeor
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
dcd584bbb5949d7a35333a2251450d9cd52be052b368f3ea72bacff07e6ce729
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
x-xss-protection
0
last-modified
Wed, 29 Apr 2020 21:17:23 GMT
server
ESF
date
Wed, 29 Apr 2020 21:17:23 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Wed, 29 Apr 2020 21:17:23 GMT
Global%20Application%20%26%20Network%20Security%20Report.png
cache-ssl.celtra.com/api/blobs/ccab70f7d7be33a9864303bcb4d97883bebbffe5a7ff544ce2ea661416542958/ Frame 9827
5 KB
6 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/ccab70f7d7be33a9864303bcb4d97883bebbffe5a7ff544ce2ea661416542958/Global%20Application%20%26%20Network%20Security%20Report.png?transform=crush&quality=256
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
adf78fe37d390b02bdefb08c8ac194756752808a5318b95a86bb15d168e4b210

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 25 Mar 2020 04:49:50 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
3083253
x-cache
Hit from cloudfront
status
200
content-length
5546
server
Apache
etag
"adf78fe37d390b02bdefb08c8ac194756752808a5318b95a86bb15d168e4b210"
x-varnish
2375116
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
L4TeOo0zrAeyKYnCW5yXwBzGf4TIBrcRFktFkdiFiKGk7LbNL_kUgg==
Hacker's%20Almanac.png
cache-ssl.celtra.com/api/blobs/4749564c92ddddec53143d05567fc282d4ba75ccd6de82bfe6e8bc80d22f502a/ Frame 9827
6 KB
6 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/4749564c92ddddec53143d05567fc282d4ba75ccd6de82bfe6e8bc80d22f502a/Hacker's%20Almanac.png?transform=crush&quality=256
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
c1dec299102a8d2ef859a552a55c476ee4e2d5636a6726d071a85720ca20dec5

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 09 Apr 2020 17:01:33 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
1743350
x-cache
Hit from cloudfront
status
200
content-length
6010
server
Apache
etag
"c1dec299102a8d2ef859a552a55c476ee4e2d5636a6726d071a85720ca20dec5"
x-varnish
12530
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
2Wb43nB-ao_Esxpsd5iKdHSg9Y_aNaDLmwnG-2haC2-j7aFH94GOzQ==
Anatomy%20of%20a%20Cloud-Native%20Data%20Breach.png
cache-ssl.celtra.com/api/blobs/55e5974f4b8fdae97c05ce341e8c1533cb29c0e6e36c9097bc9b4ca016f10016/ Frame 9827
5 KB
5 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/55e5974f4b8fdae97c05ce341e8c1533cb29c0e6e36c9097bc9b4ca016f10016/Anatomy%20of%20a%20Cloud-Native%20Data%20Breach.png?transform=crush&quality=256
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
e8d4ef2ebabf281a7363c038f2b89970bbddc984797da7e4a082aa2e1fbd9f6f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 25 Mar 2020 04:49:50 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
3083253
x-cache
Hit from cloudfront
status
200
content-length
4772
server
Apache
etag
"e8d4ef2ebabf281a7363c038f2b89970bbddc984797da7e4a082aa2e1fbd9f6f"
x-varnish
4232279
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
a3YS1wmZi9mJGpp4hEyJ8O1wCZtc_5S5gjlGWrv3OfFaQ1NNB1q2HQ==
iLicKi6w
pbs.twimg.com/card_img/1253021906011328512/ Frame F4E5
3 KB
3 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1253021906011328512/iLicKi6w?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40E8) /
Resource Hash
6c25d255bbdd0759d0016c0a59eb1dbfe221e551185acb14d24aca0479194df8
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:23 GMT
x-content-type-options
nosniff
age
495885
x-cache
HIT
status
200
content-length
2987
x-response-time
135
surrogate-key
card_img card_img/bucket/8 card_img/1253021906011328512
last-modified
Wed, 22 Apr 2020 18:02:37 GMT
server
ECS (fcn/40E8)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
2ab71d7dfdccde05ca79607fe7b53add
accept-ranges
bytes
The%20Top%20Automated%20Bot%20Threats%20and%20How%20to%20Stop%20Them.png
cache-ssl.celtra.com/api/blobs/95316dc2d21e877b268d781446a1e1f91a248193ca9ba2d9233565ada472a5d1/ Frame 9827
4 KB
5 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/95316dc2d21e877b268d781446a1e1f91a248193ca9ba2d9233565ada472a5d1/The%20Top%20Automated%20Bot%20Threats%20and%20How%20to%20Stop%20Them.png?transform=crush&quality=256
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
9070811ef3274f78e938b0138878ac60ead2932ca0a9d844967db157dbebabb3

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 26 Mar 2020 07:33:44 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
2987019
x-cache
Hit from cloudfront
status
200
content-length
4584
server
Apache
etag
"9070811ef3274f78e938b0138878ac60ead2932ca0a9d844967db157dbebabb3"
x-varnish
5220016
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
yrjRm2gKhEY5morXdDq44bv6zgDGr-G3ULvgvJ37gpmi3t0YiNop6A==
Top%209%20DDoS%20Threats%20Your%20Organization%20Must%20Be%20Prepared%20For.png
cache-ssl.celtra.com/api/blobs/5e40e992b528b10c3173aee2966d6bbed3676a2fb2bc6fd837ab7a6aab976ece/ Frame 9827
5 KB
6 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/5e40e992b528b10c3173aee2966d6bbed3676a2fb2bc6fd837ab7a6aab976ece/Top%209%20DDoS%20Threats%20Your%20Organization%20Must%20Be%20Prepared%20For.png?transform=crush&quality=256
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
f09a847229ff7a866326e316a3b2e91d5ba3930f234d0a82c1a4d44178912ed6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 09 Apr 2020 17:01:33 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
1743350
x-cache
Hit from cloudfront
status
200
content-length
5340
server
Apache
etag
"f09a847229ff7a866326e316a3b2e91d5ba3930f234d0a82c1a4d44178912ed6"
x-varnish
1953843
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
kJs_f9anUe_Ul7efNbiQEv_V7Sy8fQJYyKtzwYOwfFpdbbrtTg4rWQ==
yt_hover.png
cache-ssl.celtra.com/api/blobs/05c871534a66ba01deefbc75b6ed2f9281993581e903223785a6f6a7ff82bebb/ Frame 9827
918 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/05c871534a66ba01deefbc75b6ed2f9281993581e903223785a6f6a7ff82bebb/yt_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
6e504d72d0b8fe63b71774d746594a7d13607ee5313241cc546a1bcd47909677

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 18 Mar 2020 06:04:20 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
3683582
x-cache
Hit from cloudfront
status
200
content-length
918
server
Apache
etag
"6e504d72d0b8fe63b71774d746594a7d13607ee5313241cc546a1bcd47909677"
x-varnish
3527742
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
_-p9vdIELaWz7I0fcqx9KlmEB63_XQ3_7xwzqpG2fQ9Wa6ud0TESdw==
yt.png
cache-ssl.celtra.com/api/blobs/13d77e3befd746d58356da2f0b0d1d20af11ba13ea0ca8cd7b73871ef1d40edd/ Frame 9827
914 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/13d77e3befd746d58356da2f0b0d1d20af11ba13ea0ca8cd7b73871ef1d40edd/yt.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
8c792dc2527753d5f758a812c5de2225dba619ecd83b05713ce68b0db858fa28

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 25 Jan 2020 00:08:03 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
8284160
x-cache
Hit from cloudfront
status
200
content-length
914
server
Apache
etag
"8c792dc2527753d5f758a812c5de2225dba619ecd83b05713ce68b0db858fa28"
x-varnish
6724994
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
AngvPRjXXI6XJKIhjMOROa2Dvdc-qqQ8xY5bLgb_8WtjNjNoDOlAKg==
fb_hover.png
cache-ssl.celtra.com/api/blobs/652ab50d0e331e4269bb4d847fcc5a5a4e3def07bb1ebca4d2d6fda889e52604/ Frame 9827
348 B
853 B
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/652ab50d0e331e4269bb4d847fcc5a5a4e3def07bb1ebca4d2d6fda889e52604/fb_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
9250f0b586e89674ec647d8dfb6fe7aedcb588be13ebb6aeb1286efa9d3cfb39

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 15 Feb 2020 04:24:32 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
6454371
x-cache
Hit from cloudfront
status
200
content-length
348
server
Apache
etag
"9250f0b586e89674ec647d8dfb6fe7aedcb588be13ebb6aeb1286efa9d3cfb39"
x-varnish
83703
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
mn08POCd57QLDw4t0Xa2h1Nv0Fs3A72ebvniCLyajpCcU7oz26iMCg==
fb.png
cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/ Frame 9827
348 B
862 B
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/fb.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 17 Feb 2020 05:44:27 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
6276775
x-cache
Hit from cloudfront
status
200
content-length
348
server
Apache
etag
"e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395"
x-varnish
2528039 5524949
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
yCpELoMMpGg2HLtAiiZJRR_3YiAqiPPkv-uw4YO21KmESbYW-Lkt_g==
tw.png
cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/ Frame 9827
781 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/tw.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Sep 2019 00:25:46 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
19342296
x-cache
Hit from cloudfront
status
200
content-length
781
server
Apache
etag
"308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96"
x-varnish
5902826
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
xPEUCWaB2t-xmE247U-XmaX0VgFlZg5OXX9-51jicHq9ioY6gyz8gw==
tw_hover.png
cache-ssl.celtra.com/api/blobs/f0cccd681d168932db801410643c93f0df03370d5c638ab3e4a16e92b80b3aa0/ Frame 9827
777 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/f0cccd681d168932db801410643c93f0df03370d5c638ab3e4a16e92b80b3aa0/tw_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
1ace1b17e77ec3828eda87eb3fea3671ce2a0f706426fbd158873546c4f9366e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 20 Feb 2020 01:29:44 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
6032859
x-cache
Hit from cloudfront
status
200
content-length
777
server
Apache
etag
"1ace1b17e77ec3828eda87eb3fea3671ce2a0f706426fbd158873546c4f9366e"
x-varnish
8852695
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
2WIyp0TlDMCktjL8nFU1vHmKmBtovVWYkfY2g0SYtIQQ3a_JkTO9Lw==
font
fonts.gstatic.com/l/ Frame 9827
2 KB
2 KB
Font
General
Full URL
https://fonts.gstatic.com/l/font?kit=S6uyw4BMUTPHvxw6WQevLjfIrplwp7kXhJ2QWu7JXTta&skey=2d58b92a99e1c086&v=v16
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
eb77edb4fdea5d4b50cc0c41ef4563929a4f150f9323c7cf4e9de12ac1d78d03
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Lato:400&text=%20CDEIMORSUVadeor
Origin
https://www.darkreading.com

Response headers

date
Wed, 29 Apr 2020 21:08:45 GMT
x-content-type-options
nosniff
age
518
status
200
content-disposition
attachment; filename="font.woff2"; filename*=UTF-8''font.woff2
alt-svc
h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2036
x-xss-protection
0
last-modified
Tue, 23 Jul 2019 17:22:44 GMT
server
ESF
x-frame-options
SAMEORIGIN
content-type
font/woff2
access-control-allow-origin
*
cache-control
private, max-age=86400
timing-allow-origin
*
expires
Wed, 29 Apr 2020 21:08:45 GMT
li.png
cache-ssl.celtra.com/api/blobs/2e1d1ae5940fbdaa5f95c1c17393175faf02b27a8c6b37dca2419c70113760ab/ Frame 9827
585 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/2e1d1ae5940fbdaa5f95c1c17393175faf02b27a8c6b37dca2419c70113760ab/li.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
d10a2d03c9fb4943f449b97d333b8d22990200afa70d13d5c1c23ad4d783200c

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Feb 2020 03:13:51 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
7236212
x-cache
Hit from cloudfront
status
200
content-length
585
server
Apache
etag
"d10a2d03c9fb4943f449b97d333b8d22990200afa70d13d5c1c23ad4d783200c"
x-varnish
2986965
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
eD7ED1w4kY5_R7OBCO5FzndcmI6nqkCkPwYvMR38kz_mkIcUHRlDyg==
li_hover.png
cache-ssl.celtra.com/api/blobs/e3228348fc17573d7db7d135ba5cf60985157f70dae6643939d3a6686b2aa699/ Frame 9827
591 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/e3228348fc17573d7db7d135ba5cf60985157f70dae6643939d3a6686b2aa699/li_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
c19345a03fed44d267abbe2f427bdcd261aa86a447320f15f3eef8e121690794

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 17 Sep 2019 05:16:44 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
19497638
x-cache
Hit from cloudfront
status
200
content-length
591
server
Apache
etag
"c19345a03fed44d267abbe2f427bdcd261aa86a447320f15f3eef8e121690794"
x-varnish
1020839
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
ua9YvdVjegK5FiDzWsIMczf2Ps-eUoOlBuU0FJuHTRABJpnx7wXZ4Q==
blogger-logo-transparent.png
cache-ssl.celtra.com/api/blobs/6b1d2c51fb5ba304c8ac74dd6616cd4ff9500ed7784711d76e121912f4149882/ Frame 9827
2 KB
2 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/6b1d2c51fb5ba304c8ac74dd6616cd4ff9500ed7784711d76e121912f4149882/blogger-logo-transparent.png?transform=crush&quality=256
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
8a111ae200eb1915b9155716baf2c4556f46336e0d32ee71f8f2c77aefbf008f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Mar 2020 03:30:10 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
3606433
x-cache
Hit from cloudfront
status
200
content-length
1819
server
Apache
etag
"8a111ae200eb1915b9155716baf2c4556f46336e0d32ee71f8f2c77aefbf008f"
x-varnish
7123894
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
CL3H4EPm6veJN4YeJJ9JwECFbHp8oKoH8pGVkPazjhbi8QpnTd5CuA==
blogger_hover.png
cache-ssl.celtra.com/api/blobs/1f4640591d1345ceaeb90f8c11af7ccf4e25448d2e796f05dee7a018dd2c2f2d/ Frame 9827
790 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/1f4640591d1345ceaeb90f8c11af7ccf4e25448d2e796f05dee7a018dd2c2f2d/blogger_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
b9a83984bfc54b6515de11d7f365042e4d87f71aa7a0f17dcadb2b2ce308db1d

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 07 Apr 2020 23:06:56 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
1894226
x-cache
Hit from cloudfront
status
200
content-length
790
server
Apache
etag
"b9a83984bfc54b6515de11d7f365042e4d87f71aa7a0f17dcadb2b2ce308db1d"
x-varnish
4868121 5118983
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
_p-dApeuK6aROyZF0u2ehfZpiqJ8FgHiaIzgVEQ9_WtpU_Toddej6g==
Radware_Logo_Color_No_Tag_on_White%20(002).png
cache-ssl.celtra.com/api/blobs/490e6d610b9f0cbf356e8aa9f1ae4d559d62c51f58919b3f2e28ea04a19a8fc0/ Frame 9827
2 KB
3 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/490e6d610b9f0cbf356e8aa9f1ae4d559d62c51f58919b3f2e28ea04a19a8fc0/Radware_Logo_Color_No_Tag_on_White%20(002).png?transform=crush&quality=256
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
008984d350b7f0accea56ddbe23ea2c34b5ec05e3309cb88bc02ff8fba4bca33

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 18 Mar 2020 01:11:02 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
3701181
x-cache
Hit from cloudfront
status
200
content-length
2185
server
Apache
etag
"008984d350b7f0accea56ddbe23ea2c34b5ec05e3309cb88bc02ff8fba4bca33"
x-varnish
7995629 3026160
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
-lb3OqOEhQrKAnB9gbCOcgIdl3JTsGVcIy91A6-LJptNWLC00WwSSg==
iLicKi6w
pbs.twimg.com/card_img/1253021906011328512/ Frame F4E5
3 KB
3 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1253021906011328512/iLicKi6w?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40E8) /
Resource Hash
6c25d255bbdd0759d0016c0a59eb1dbfe221e551185acb14d24aca0479194df8
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:23 GMT
x-content-type-options
nosniff
age
495885
x-cache
HIT
status
200
content-length
2987
x-response-time
135
surrogate-key
card_img card_img/bucket/8 card_img/1253021906011328512
last-modified
Wed, 22 Apr 2020 18:02:37 GMT
server
ECS (fcn/40E8)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
2ab71d7dfdccde05ca79607fe7b53add
accept-ranges
bytes
wCEvN7r_
pbs.twimg.com/card_img/1255256794311675904/ Frame F4E5
7 KB
7 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1255256794311675904/wCEvN7r_?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/418C) /
Resource Hash
cfd8e56800831344eb7a4b74a281cd520b7c6b5a404b5fdb5703b6656bd9ae24
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:24 GMT
x-content-type-options
nosniff
age
83377
x-cache
HIT
status
200
content-length
7442
x-response-time
149
surrogate-key
card_img card_img/bucket/4 card_img/1255256794311675904
last-modified
Tue, 28 Apr 2020 22:03:15 GMT
server
ECS (fcn/418C)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
a9d3b8f5cab9016a28a46fa8aac18fce
accept-ranges
bytes
iLicKi6w
pbs.twimg.com/card_img/1253021906011328512/ Frame F4E5
3 KB
3 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1253021906011328512/iLicKi6w?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40E8) /
Resource Hash
6c25d255bbdd0759d0016c0a59eb1dbfe221e551185acb14d24aca0479194df8
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:24 GMT
x-content-type-options
nosniff
age
495886
x-cache
HIT
status
200
content-length
2987
x-response-time
135
surrogate-key
card_img card_img/bucket/8 card_img/1253021906011328512
last-modified
Wed, 22 Apr 2020 18:02:37 GMT
server
ECS (fcn/40E8)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
2ab71d7dfdccde05ca79607fe7b53add
accept-ranges
bytes
Radware_Logo_Color_No_Tag_on_White%20(002).png
cache-ssl.celtra.com/api/blobs/490e6d610b9f0cbf356e8aa9f1ae4d559d62c51f58919b3f2e28ea04a19a8fc0/ Frame 9827
2 KB
3 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/490e6d610b9f0cbf356e8aa9f1ae4d559d62c51f58919b3f2e28ea04a19a8fc0/Radware_Logo_Color_No_Tag_on_White%20(002).png?transform=crush&quality=256
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
008984d350b7f0accea56ddbe23ea2c34b5ec05e3309cb88bc02ff8fba4bca33

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 18 Mar 2020 01:11:02 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
3701182
x-cache
Hit from cloudfront
status
200
content-length
2185
server
Apache
etag
"008984d350b7f0accea56ddbe23ea2c34b5ec05e3309cb88bc02ff8fba4bca33"
x-varnish
7995629 3026160
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
724tIs9yNOvQla_lZmzRT3Pl4oRR3BUnW5hcjKyJc_Zr8WsQrU-f6g==
Global%20Application%20%26%20Network%20Security%20Report.png
cache-ssl.celtra.com/api/blobs/ccab70f7d7be33a9864303bcb4d97883bebbffe5a7ff544ce2ea661416542958/ Frame 9827
5 KB
6 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/ccab70f7d7be33a9864303bcb4d97883bebbffe5a7ff544ce2ea661416542958/Global%20Application%20%26%20Network%20Security%20Report.png?transform=crush&quality=256
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
adf78fe37d390b02bdefb08c8ac194756752808a5318b95a86bb15d168e4b210

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 25 Mar 2020 04:49:50 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
3083254
x-cache
Hit from cloudfront
status
200
content-length
5546
server
Apache
etag
"adf78fe37d390b02bdefb08c8ac194756752808a5318b95a86bb15d168e4b210"
x-varnish
2375116
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
Nu_0Skr72GM2bVSOGsKuo46bVFpRC13NQ3IPXcZ3MEOu1oAY2-HTZw==
Hacker-s%20Almanac.png
cache-ssl.celtra.com/api/blobs/4749564c92ddddec53143d05567fc282d4ba75ccd6de82bfe6e8bc80d22f502a/ Frame 9827
6 KB
6 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/4749564c92ddddec53143d05567fc282d4ba75ccd6de82bfe6e8bc80d22f502a/Hacker-s%20Almanac.png?transform=crush&quality=256
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
c1dec299102a8d2ef859a552a55c476ee4e2d5636a6726d071a85720ca20dec5

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 16 Mar 2020 16:57:28 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
3817195
x-cache
Hit from cloudfront
status
200
content-length
6010
server
Apache
etag
"c1dec299102a8d2ef859a552a55c476ee4e2d5636a6726d071a85720ca20dec5"
x-varnish
5715714
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
5vYLZeZw6kB2HmSRQAUSo76K0iMftHu7ExpS4X8txndSw66s5salPw==
Anatomy%20of%20a%20Cloud-Native%20Data%20Breach.png
cache-ssl.celtra.com/api/blobs/55e5974f4b8fdae97c05ce341e8c1533cb29c0e6e36c9097bc9b4ca016f10016/ Frame 9827
5 KB
5 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/55e5974f4b8fdae97c05ce341e8c1533cb29c0e6e36c9097bc9b4ca016f10016/Anatomy%20of%20a%20Cloud-Native%20Data%20Breach.png?transform=crush&quality=256
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
e8d4ef2ebabf281a7363c038f2b89970bbddc984797da7e4a082aa2e1fbd9f6f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 25 Mar 2020 04:49:50 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
3083254
x-cache
Hit from cloudfront
status
200
content-length
4772
server
Apache
etag
"e8d4ef2ebabf281a7363c038f2b89970bbddc984797da7e4a082aa2e1fbd9f6f"
x-varnish
4232279
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
_aNLMQIoncwLoRM9EFMJf6TKrDF8rrrDzG67r174bb7QMOkpl0h9-Q==
The%20Top%20Automated%20Bot%20Threats%20and%20How%20to%20Stop%20Them.png
cache-ssl.celtra.com/api/blobs/95316dc2d21e877b268d781446a1e1f91a248193ca9ba2d9233565ada472a5d1/ Frame 9827
4 KB
5 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/95316dc2d21e877b268d781446a1e1f91a248193ca9ba2d9233565ada472a5d1/The%20Top%20Automated%20Bot%20Threats%20and%20How%20to%20Stop%20Them.png?transform=crush&quality=256
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
9070811ef3274f78e938b0138878ac60ead2932ca0a9d844967db157dbebabb3

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 26 Mar 2020 07:33:44 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
2987020
x-cache
Hit from cloudfront
status
200
content-length
4584
server
Apache
etag
"9070811ef3274f78e938b0138878ac60ead2932ca0a9d844967db157dbebabb3"
x-varnish
5220016
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
e5d2p_htSdexummBt6aZjhBRSub6gGjv13YkT0ajnQ2ZWA32XrokBA==
Top%209%20DDoS%20Threats%20Your%20Organization%20Must%20Be%20Prepared%20For.png
cache-ssl.celtra.com/api/blobs/5e40e992b528b10c3173aee2966d6bbed3676a2fb2bc6fd837ab7a6aab976ece/ Frame 9827
5 KB
6 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/5e40e992b528b10c3173aee2966d6bbed3676a2fb2bc6fd837ab7a6aab976ece/Top%209%20DDoS%20Threats%20Your%20Organization%20Must%20Be%20Prepared%20For.png?transform=crush&quality=256
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
f09a847229ff7a866326e316a3b2e91d5ba3930f234d0a82c1a4d44178912ed6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 09 Apr 2020 17:01:33 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
1743351
x-cache
Hit from cloudfront
status
200
content-length
5340
server
Apache
etag
"f09a847229ff7a866326e316a3b2e91d5ba3930f234d0a82c1a4d44178912ed6"
x-varnish
1953843
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
boreVHidf-D01amEu_Wjuq42oOjDUjjKHBj-gWYG17fELXe9dPuTsg==
yt.png
cache-ssl.celtra.com/api/blobs/13d77e3befd746d58356da2f0b0d1d20af11ba13ea0ca8cd7b73871ef1d40edd/ Frame 9827
914 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/13d77e3befd746d58356da2f0b0d1d20af11ba13ea0ca8cd7b73871ef1d40edd/yt.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
8c792dc2527753d5f758a812c5de2225dba619ecd83b05713ce68b0db858fa28

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 08 Apr 2020 21:11:39 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
1814745
x-cache
Hit from cloudfront
status
200
content-length
914
server
Apache
etag
"8c792dc2527753d5f758a812c5de2225dba619ecd83b05713ce68b0db858fa28"
x-varnish
407791 3547155
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
xZ9Jn5ff42EzEbv6HVklkEakjswpR83SXNHDDrhyh8IHnZCrwZa1Rw==
fb.png
cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/ Frame 9827
348 B
861 B
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/fb.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 10 Apr 2020 18:40:53 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
1650991
x-cache
Hit from cloudfront
status
200
content-length
348
server
Apache
etag
"e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395"
x-varnish
7117980 8557899
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
9dBl8f27ymuYdNze1oIw8SAsqv040gm-8ybTJkRw_Ek5M-NkLkp3MQ==
tw.png
cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/ Frame 9827
781 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/tw.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 14 Feb 2020 13:44:21 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
6507182
x-cache
Hit from cloudfront
status
200
content-length
781
server
Apache
etag
"308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96"
x-varnish
6036561 3973619
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
zEEgPQJLKn8H-7q5RoOjMsAJiRP2vepoiuIaU8vnKXlIijbC4vSa2g==
li.png
cache-ssl.celtra.com/api/blobs/2e1d1ae5940fbdaa5f95c1c17393175faf02b27a8c6b37dca2419c70113760ab/ Frame 9827
585 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/2e1d1ae5940fbdaa5f95c1c17393175faf02b27a8c6b37dca2419c70113760ab/li.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
d10a2d03c9fb4943f449b97d333b8d22990200afa70d13d5c1c23ad4d783200c

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 15 Feb 2020 04:21:19 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
6454565
x-cache
Hit from cloudfront
status
200
content-length
585
server
Apache
etag
"d10a2d03c9fb4943f449b97d333b8d22990200afa70d13d5c1c23ad4d783200c"
x-varnish
2244622
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
CdWfai6r_YOFBcGBPFBJODpNB2DXcYqev3GTAFemtkhYHp4qyGFhpQ==
blogger-logo-transparent.png
cache-ssl.celtra.com/api/blobs/6b1d2c51fb5ba304c8ac74dd6616cd4ff9500ed7784711d76e121912f4149882/ Frame 9827
2 KB
2 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/6b1d2c51fb5ba304c8ac74dd6616cd4ff9500ed7784711d76e121912f4149882/blogger-logo-transparent.png?transform=crush&quality=256
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
8a111ae200eb1915b9155716baf2c4556f46336e0d32ee71f8f2c77aefbf008f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Mar 2020 03:30:10 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
3606434
x-cache
Hit from cloudfront
status
200
content-length
1819
server
Apache
etag
"8a111ae200eb1915b9155716baf2c4556f46336e0d32ee71f8f2c77aefbf008f"
x-varnish
7123894
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
1YEGZ5ZEsZbsnpBFebA5IwGHS0dpmg9YDLlDE4ji_wGio24Is8opgA==
yt_hover.png
cache-ssl.celtra.com/api/blobs/05c871534a66ba01deefbc75b6ed2f9281993581e903223785a6f6a7ff82bebb/ Frame 9827
918 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/05c871534a66ba01deefbc75b6ed2f9281993581e903223785a6f6a7ff82bebb/yt_hover.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
6e504d72d0b8fe63b71774d746594a7d13607ee5313241cc546a1bcd47909677

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 11 Apr 2020 02:24:45 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
1623159
x-cache
Hit from cloudfront
status
200
content-length
918
server
Apache
etag
"6e504d72d0b8fe63b71774d746594a7d13607ee5313241cc546a1bcd47909677"
x-varnish
7280452
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
neycdRgsygXgdhCg4Gt9gheHuIOgyBNw0Xtz9I8MbaW4VFxr8uDFMA==
P4UgA07h
pbs.twimg.com/card_img/1254796349163409408/ Frame F4E5
69 KB
69 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1254796349163409408/P4UgA07h?format=jpg&name=600x314
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40D4) /
Resource Hash
27539a88302f65c121ba11abc434f68a787a772139c870d33a8289ef6d1d0f53
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:24 GMT
x-content-type-options
nosniff
age
124732
x-cache
HIT
status
200
content-length
70775
x-response-time
146
surrogate-key
card_img card_img/bucket/5 card_img/1254796349163409408
last-modified
Mon, 27 Apr 2020 15:33:37 GMT
server
ECS (fcn/40D4)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
4452b3a1c599393500c309b3fcf47ed6
accept-ranges
bytes
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg4MTk1MDQzeGVmNDUwYWU3OWY5NzFkeDM5NzYzMDE4IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1MDkwNDk5NjgyNDg3NDQ2IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg4MTk1MDQzeGVmNDUwYWU3OWY5NzFkeDM5NzYzMDE4IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1MDkwNDk5NjgyNDg3NDQ2IiwiaW5kZXgiOjEsImNsaWVudFRpbWVzdGFtcCI6MTU4ODE5NTA0My43NDQsInNjb3BlIjoiZ2xvYmFsIiwidXNlckFnZW50IjoiTW96aWxsYS81LjAgKE1hY2ludG9zaDsgSW50ZWwgTWFjIE9TIFggMTBfMTRfNSkgQXBwbGVXZWJLaXQvNTM3LjM2IChLSFRNTCwgbGlrZSBHZWNrbykgQ2hyb21lLzc0LjAuMzcyOS4xNjkgU2FmYXJpLzUzNy4zNiIsIm9yaWVudGF0aW9uIjowLCJ0b3Btb3N0UmVhY2hhYmxlV2luZG93Ijp7IndpZHRoIjoxNjAwLCJoZWlnaHQiOjEyMDB9LCJob3N0V2luZG93Ijp7IndpZHRoIjo1LCJoZWlnaHQiOjV9LCJuZXN0aW5nIjp7ImlmcmFtZSI6dHJ1ZSwiZnJpZW5kbHlJZnJhbWUiOnRydWUsImlhYkZyaWVuZGx5SWZyYW1lIjp0cnVlLCJob3N0aWxlSWZyYW1lIjpmYWxzZSwiaWZyYW1lRGVwdGgiOjF9LCJwYWdlVmlzaWJpbGl0eUFwaSI6dHJ1ZSwicmVxdWVzdEFuaW1hdGlvbkZyYW1lIjp0cnVlLCJ0b3BXaW5kb3dOYXRpdmVSQUZTdXBwb3J0ZWQiOnRydWUsImFsbG93Tm9uTmF0aXZlUkFGRm9yVmlld2FibGVUaW1lVXNlZCI6ZmFsc2UsImNsaWVudFRpbWVab25lT2Zmc2V0SW5NaW51dGVzIjotMTIwLCJzdXBwb3J0c0NvbnRhaW5lclZpZXdhYmlsaXR5Ijp0cnVlLCJzdXBwb3J0c0NvbnRhaW5lckluaXRpYWxWaWV3YWJpbGl0eSI6dHJ1ZSwidGFnUGFyZW50V2lkdGgiOjAsInRhZ1BhcmVudEhlaWdodCI6MCwiYW1wRGV0ZWN0ZWQiOmZhbHNlLCJhbXBOZXN0aW5nTGV2ZWwiOiIiLCJzYWZlRnJhbWVEZXRlY3RlZCI6ZmFsc2UsImZldGNoU3VwcG9ydGVkIjp0cnVlLCJhc2FwRW5hYmxlZCI6bnVsbCwibmF0aXZlUHJvbWlzZXNTdXBwb3J0ZWQiOnRydWUsImJlYWNvblN1cHBvcnRlZCI6dHJ1ZSwiSW50ZXJzZWN0aW9uT2JzZXJ2ZXJTdXBwb3J0ZWQiOnRydWUsImlzTXV0YXRpb25PYnNlcnZlclN1cHBvcnRlZCI6dHJ1ZSwid2ViVmlldyI6bnVsbCwiaXNXaW5kb3dPcGVuTmF0aXZlIjp0cnVlLCJwcm90b0xvYWRpbmciOnsiZGF0YUxvYWRTdGF0dXMiOiJzdXBwb3J0ZWQiLCJibG9iTG9hZFN0YXR1cyI6InN1cHBvcnRlZCJ9LCJ0b3BXaW5kb3dMb2NhdGlvbiI6Imh0dHBzOi8vd3d3LmRhcmtyZWFkaW5nLmNvbSIsInRvcFdpbmRvd0xvY2F0aW9uTGVuZ3RoIjoyNywibmFtZSI6ImVudmlyb25tZW50SW5mbyJ9LHsic2Vzc2lvbklkIjoiczE1ODgxOTUwNDN4ZWY0NTBhZTc5Zjk3MWR4Mzk3NjMwMTgiLCJhY2NvdW50SWQiOiI0NGI3NGIzNSIsInN0cmVhbSI6ImFkRXZlbnRzIiwiaW5zdGFudGlhdGlvbiI6IjUwOTA0OTk2ODI0ODc0NDYiLCJpbmRleCI6MiwiY2xpZW50VGltZXN0YW1wIjoxNTg4MTk1MDQ0LjAxOCwibmFtZSI6ImNyZWF0aXZlTG9hZGVkIiwidmlld2FiaWxpdHkwME1lYXN1cmFibGUiOnRydWUsInZpZXdhYmlsaXR5NTAxTWVhc3VyYWJsZSI6dHJ1ZSwidmlld2FibGVUaW1lTWVhc3VyYWJsZSI6dHJ1ZSwiY2RuVmFyaWFudCI6Im5vbmUifSx7InNlc3Npb25JZCI6InMxNTg4MTk1MDQzeGVmNDUwYWU3OWY5NzFkeDM5NzYzMDE4IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1MDkwNDk5NjgyNDg3NDQ2IiwiaW5kZXgiOjMsImNsaWVudFRpbWVzdGFtcCI6MTU4ODE5NTA0NC4wMzksIm5hbWUiOiJ2aWV3cG9ydFBsYWNlbWVudEdlb21ldHJ5IiwicGFnZURpbWVuc2lvbnMiOnsiaGVpZ2h0Ijo2MTA5LCJ3aWR0aCI6MTU4NX0sInZpZXdwb3J0UG9zaXRpb25SZWN0Ijp7IndpZHRoIjoxNjAwLCJoZWlnaHQiOjEyMDAsImxlZnQiOjAsInRvcCI6MH0sImZpcnN0UGxhY2VtZW50UG9zaXRpb25SZWN0Ijp7ImxlZnQiOjkzNC41LCJ0b3AiOjQzMy45MjE4NzUsIndpZHRoIjozMzYsImhlaWdodCI6NjAwfX0seyJzZXNzaW9uSWQiOiJzMTU4ODE5NTA0M3hlZjQ1MGFlNzlmOTcxZHgzOTc2MzAxOCIsImFjY291bnRJZCI6IjQ0Yjc0YjM1Iiwic3RyZWFtIjoiYWRFdmVudHMiLCJpbnN0YW50aWF0aW9uIjoiNTA5MDQ5OTY4MjQ4NzQ0NiIsImluZGV4Ijo0LCJjbGllbnRUaW1lc3RhbXAiOjE1ODgxOTUwNDQuMDQ1LCJuYW1lIjoidmlld2FibGUwMCIsImNyaXRlcmlvbiI6eyJuYW1lIjoiQ29yZSIsInJhdGlvIjowLCJ0aW1lIjowfX0seyJzZXNzaW9uSWQiOiJzMTU4ODE5NTA0M3hlZjQ1MGFlNzlmOTcxZHgzOTc2MzAxOCIsImFjY291bnRJZCI6IjQ0Yjc0YjM1Iiwic3RyZWFtIjoiYWRFdmVudHMiLCJpbnN0YW50aWF0aW9uIjoiNTA5MDQ5OTY4MjQ4NzQ0NiIsImluZGV4Ijo1LCJjbGllbnRUaW1lc3RhbXAiOjE1ODgxOTUwNDQuMDU2LCJ1bml0TmFtZSI6ImJhbm5lciIsInVuaXRWYXJpYW50TG9jYWxJZCI6bnVsbCwic2NyZWVuTG9jYWxJZCI6MTM2OCwic2NyZWVuVGl0bGUiOiJSZXNvdXJjZXMiLCJzY3JlZW5Jc01hc3RlciI6ZmFsc2UsIm9iamVjdExvY2FsSWQiOm51bGwsIm9iamVjdE5hbWUiOm51bGwsIm9iamVjdENsYXp6IjpudWxsLCJpbml0aWF0aW9uVGltZXN0YW1wIjoxNTg4MTk1MDQ0LjA1NiwibmFtZSI6InNjcmVlblNob3duIn0seyJzZXNzaW9uSWQiOiJzMTU4ODE5NTA0M3hlZjQ1MGFlNzlmOTcxZHgzOTc2MzAxOCIsImFjY291bnRJZCI6IjQ0Yjc0YjM1Iiwic3RyZWFtIjoiYWRFdmVudHMiLCJpbnN0YW50aWF0aW9uIjoiNTA5MDQ5OTY4MjQ4NzQ0NiIsImluZGV4Ijo2LCJjbGllbnRUaW1lc3RhbXAiOjE1ODgxOTUwNDQuMDU3LCJuYW1lIjoiY3JlYXRpdmVSZW5kZXJlZCJ9XX0=?crc32c=1378965680
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.126.42.246 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-126-42-246.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 29 Apr 2020 21:17:24 GMT
Cache-Control
no-cache, no-store, must-revalidate
Expires
0
Connection
keep-alive
Content-Length
35
Content-Type
image/gif
iLicKi6w
pbs.twimg.com/card_img/1253021906011328512/ Frame F4E5
3 KB
3 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1253021906011328512/iLicKi6w?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40E8) /
Resource Hash
6c25d255bbdd0759d0016c0a59eb1dbfe221e551185acb14d24aca0479194df8
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:24 GMT
x-content-type-options
nosniff
age
495886
x-cache
HIT
status
200
content-length
2987
x-response-time
135
surrogate-key
card_img card_img/bucket/8 card_img/1253021906011328512
last-modified
Wed, 22 Apr 2020 18:02:37 GMT
server
ECS (fcn/40E8)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
2ab71d7dfdccde05ca79607fe7b53add
accept-ranges
bytes
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg4MTk1MDQzeGVmNDUwYWU3OWY5NzFkeDM5NzYzMDE4IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1MDkwNDk5NjgyNDg3NDQ2IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg4MTk1MDQzeGVmNDUwYWU3OWY5NzFkeDM5NzYzMDE4IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1MDkwNDk5NjgyNDg3NDQ2IiwiaW5kZXgiOjcsImNsaWVudFRpbWVzdGFtcCI6MTU4ODE5NTA0NC4wODcsIm5hbWUiOiJ2aWV3YWJsZVRpbWUiLCJmcm9tIjoxNTg4MTk1MDQ0LjA0NiwidG8iOjE1ODgxOTUwNDQuMDQ2fV19?crc32c=2405314607
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.126.42.246 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-126-42-246.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 29 Apr 2020 21:17:24 GMT
Cache-Control
no-cache, no-store, must-revalidate
Expires
0
Connection
keep-alive
Content-Length
35
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=0&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042465&de=258120387163&cu=1588195042465&m=1083&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5114&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=1&ag=1076&an=4&gi=1&gf=1076&gg=4&ix=1076&ic=1076&ez=1&ck=1076&kw=796&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1076&bx=4&ci=1076&jz=796&dj=1&aa=0&ad=926&cn=0&gk=926&gl=0&ik=926&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=796&cd=7&ah=796&am=7&rf=0&re=1&ft=926&fv=0&fw=926&wb=1&cl=0&at=0&d=21887076%3A2680018979%3A5334439846%3A138307094492&bo=27868836&bp=43863396&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=754256647&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:24 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:24 GMT
yt_hover.png
cache-ssl.celtra.com/api/blobs/05c871534a66ba01deefbc75b6ed2f9281993581e903223785a6f6a7ff82bebb/ Frame 9827
918 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/05c871534a66ba01deefbc75b6ed2f9281993581e903223785a6f6a7ff82bebb/yt_hover.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
6e504d72d0b8fe63b71774d746594a7d13607ee5313241cc546a1bcd47909677

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 11 Apr 2020 02:24:45 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
1623159
x-cache
Hit from cloudfront
status
200
content-length
918
server
Apache
etag
"6e504d72d0b8fe63b71774d746594a7d13607ee5313241cc546a1bcd47909677"
x-varnish
7280452
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
nZ1o1uaCFbIFTROPWK8uuwr0F9UjpuxsqasLy97KQkMiNgPSF3OcYQ==
yt.png
cache-ssl.celtra.com/api/blobs/13d77e3befd746d58356da2f0b0d1d20af11ba13ea0ca8cd7b73871ef1d40edd/ Frame 9827
914 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/13d77e3befd746d58356da2f0b0d1d20af11ba13ea0ca8cd7b73871ef1d40edd/yt.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
8c792dc2527753d5f758a812c5de2225dba619ecd83b05713ce68b0db858fa28

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 08 Apr 2020 21:11:39 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
1814745
x-cache
Hit from cloudfront
status
200
content-length
914
server
Apache
etag
"8c792dc2527753d5f758a812c5de2225dba619ecd83b05713ce68b0db858fa28"
x-varnish
407791 3547155
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
ADFVLxa28smXjLR_V4KvKuolIRORB9tgBXP0p1Sqo1_f_RqQpurlSQ==
fb_hover.png
cache-ssl.celtra.com/api/blobs/652ab50d0e331e4269bb4d847fcc5a5a4e3def07bb1ebca4d2d6fda889e52604/ Frame 9827
348 B
861 B
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/652ab50d0e331e4269bb4d847fcc5a5a4e3def07bb1ebca4d2d6fda889e52604/fb_hover.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
9250f0b586e89674ec647d8dfb6fe7aedcb588be13ebb6aeb1286efa9d3cfb39

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 18 Mar 2020 02:53:05 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
3695059
x-cache
Hit from cloudfront
status
200
content-length
348
server
Apache
etag
"9250f0b586e89674ec647d8dfb6fe7aedcb588be13ebb6aeb1286efa9d3cfb39"
x-varnish
4582843 5789065
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
rgQS95tn6GbMo4fOB7rZ5gebgGYuarg7IS7sgPs3e-cRCNBRrxwoBA==
fb.png
cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/ Frame 9827
348 B
862 B
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/fb.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 10 Apr 2020 18:40:53 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
1650991
x-cache
Hit from cloudfront
status
200
content-length
348
server
Apache
etag
"e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395"
x-varnish
7117980 8557899
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
807ncxDgAnrqBgKH5HN9vKgfQPNrxp-X3-fjjMFdqD_x6r6RGGrqEQ==
tw.png
cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/ Frame 9827
781 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/tw.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 14 Feb 2020 13:44:21 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
6507182
x-cache
Hit from cloudfront
status
200
content-length
781
server
Apache
etag
"308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96"
x-varnish
6036561 3973619
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
YPMq8IxVHfRUvDONQ3bpQfaluyI0-gxbXn5tJd4mP7fi_53pouCo_A==
iLicKi6w
pbs.twimg.com/card_img/1253021906011328512/ Frame F4E5
3 KB
3 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1253021906011328512/iLicKi6w?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40E8) /
Resource Hash
6c25d255bbdd0759d0016c0a59eb1dbfe221e551185acb14d24aca0479194df8
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:24 GMT
x-content-type-options
nosniff
age
495886
x-cache
HIT
status
200
content-length
2987
x-response-time
135
surrogate-key
card_img card_img/bucket/8 card_img/1253021906011328512
last-modified
Wed, 22 Apr 2020 18:02:37 GMT
server
ECS (fcn/40E8)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
2ab71d7dfdccde05ca79607fe7b53add
accept-ranges
bytes
tw_hover.png
cache-ssl.celtra.com/api/blobs/f0cccd681d168932db801410643c93f0df03370d5c638ab3e4a16e92b80b3aa0/ Frame 9827
777 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/f0cccd681d168932db801410643c93f0df03370d5c638ab3e4a16e92b80b3aa0/tw_hover.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
1ace1b17e77ec3828eda87eb3fea3671ce2a0f706426fbd158873546c4f9366e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 04 Apr 2020 03:53:20 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
2222644
x-cache
Hit from cloudfront
status
200
content-length
777
server
Apache
etag
"1ace1b17e77ec3828eda87eb3fea3671ce2a0f706426fbd158873546c4f9366e"
x-varnish
216351
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
bjxPgCbrD0fHD3WisDi1FXIlcad4-8Nn_venZwm4P0tfcSTGd39sEA==
li.png
cache-ssl.celtra.com/api/blobs/2e1d1ae5940fbdaa5f95c1c17393175faf02b27a8c6b37dca2419c70113760ab/ Frame 9827
585 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/2e1d1ae5940fbdaa5f95c1c17393175faf02b27a8c6b37dca2419c70113760ab/li.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
d10a2d03c9fb4943f449b97d333b8d22990200afa70d13d5c1c23ad4d783200c

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 15 Feb 2020 04:21:19 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
6454565
x-cache
Hit from cloudfront
status
200
content-length
585
server
Apache
etag
"d10a2d03c9fb4943f449b97d333b8d22990200afa70d13d5c1c23ad4d783200c"
x-varnish
2244622
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
-UP7bde-MNrxjmkSdb1B6QAkWldGJlYWXR6WVNxH4fdSjtyNxvNMKQ==
li_hover.png
cache-ssl.celtra.com/api/blobs/e3228348fc17573d7db7d135ba5cf60985157f70dae6643939d3a6686b2aa699/ Frame 9827
591 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/e3228348fc17573d7db7d135ba5cf60985157f70dae6643939d3a6686b2aa699/li_hover.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
c19345a03fed44d267abbe2f427bdcd261aa86a447320f15f3eef8e121690794

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 18 Mar 2020 02:53:05 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
3695060
x-cache
Hit from cloudfront
status
200
content-length
591
server
Apache
etag
"c19345a03fed44d267abbe2f427bdcd261aa86a447320f15f3eef8e121690794"
x-varnish
897494 1237375
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
_3COXZBlzMWTx_xByDImGMriXdgV-LByzDHZWXkGm1w835TU8nM4zA==
blogger-logo-transparent.png
cache-ssl.celtra.com/api/blobs/6b1d2c51fb5ba304c8ac74dd6616cd4ff9500ed7784711d76e121912f4149882/ Frame 9827
2 KB
2 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/6b1d2c51fb5ba304c8ac74dd6616cd4ff9500ed7784711d76e121912f4149882/blogger-logo-transparent.png?transform=crush&quality=256
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
8a111ae200eb1915b9155716baf2c4556f46336e0d32ee71f8f2c77aefbf008f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Mar 2020 03:30:10 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
3606434
x-cache
Hit from cloudfront
status
200
content-length
1819
server
Apache
etag
"8a111ae200eb1915b9155716baf2c4556f46336e0d32ee71f8f2c77aefbf008f"
x-varnish
7123894
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
5UQ-bo_WUDrTRVx-m15MCxK7JdZsXLFu4SU1NuwWfZs2Mz9N-wRRNA==
blogger_hover.png
cache-ssl.celtra.com/api/blobs/1f4640591d1345ceaeb90f8c11af7ccf4e25448d2e796f05dee7a018dd2c2f2d/ Frame 9827
790 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/1f4640591d1345ceaeb90f8c11af7ccf4e25448d2e796f05dee7a018dd2c2f2d/blogger_hover.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
b9a83984bfc54b6515de11d7f365042e4d87f71aa7a0f17dcadb2b2ce308db1d

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 07 Apr 2020 23:06:56 GMT
via
1.1 varnish (Varnish/5.0), 1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
age
1894227
x-cache
Hit from cloudfront
status
200
content-length
790
server
Apache
etag
"b9a83984bfc54b6515de11d7f365042e4d87f71aa7a0f17dcadb2b2ce308db1d"
x-varnish
4868121 5118983
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
kqO_xgKQ_-35QNLYBZXkpH25YSrVGzq9SOfFsZUi7J8LYFZYZwcr3Q==
0d520a1deb56b356a304109732f3cdbd9120aa3c584046bbbfff1b51e1599cb6
cache-ssl.celtra.com/api/videoThumb/ Frame 9827
17 KB
17 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/videoThumb/0d520a1deb56b356a304109732f3cdbd9120aa3c584046bbbfff1b51e1599cb6?transform=thumbnail&width=null&height=200&position=50
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-124.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
f1a9dbac4079542350f18d11f1524d95ac24446fb89258e5ff2e352c8ab95341

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Origin
https://www.darkreading.com

Response headers

date
Mon, 16 Mar 2020 16:03:48 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1b412557b82dda96e078541f9ee8dfb2.cloudfront.net (CloudFront)
age
3820415
x-cache
Hit from cloudfront
status
200
content-length
17178
server
Apache
etag
"f1a9dbac4079542350f18d11f1524d95ac24446fb89258e5ff2e352c8ab95341"
x-varnish
1067249 3596976
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
PGs0NiExRrkmqyDvnai7Q-1skRVLEgT5KEK8TMN26Omx0v22TpupKw==
iLicKi6w
pbs.twimg.com/card_img/1253021906011328512/ Frame F4E5
3 KB
3 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1253021906011328512/iLicKi6w?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40E8) /
Resource Hash
6c25d255bbdd0759d0016c0a59eb1dbfe221e551185acb14d24aca0479194df8
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:24 GMT
x-content-type-options
nosniff
age
495886
x-cache
HIT
status
200
content-length
2987
x-response-time
135
surrogate-key
card_img card_img/bucket/8 card_img/1253021906011328512
last-modified
Wed, 22 Apr 2020 18:02:37 GMT
server
ECS (fcn/40E8)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
2ab71d7dfdccde05ca79607fe7b53add
accept-ranges
bytes
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=0&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042465&de=258120387163&cu=1588195042465&m=1084&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5114&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=1&ag=1076&an=1076&gi=1&gf=1076&gg=1076&ix=1076&ic=1076&ez=1&ck=1076&kw=796&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1076&bx=1076&ci=1076&jz=796&dj=1&aa=0&ad=926&cn=926&gk=926&gl=926&ik=926&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=796&cd=796&ah=796&am=796&rf=0&re=1&ft=926&fv=926&fw=926&wb=1&cl=0&at=0&d=21887076%3A2680018979%3A5334439846%3A138307094492&bo=27868836&bp=43863396&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=770976779&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:24 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:24 GMT
iLicKi6w
pbs.twimg.com/card_img/1253021906011328512/ Frame F4E5
3 KB
3 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1253021906011328512/iLicKi6w?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40E8) /
Resource Hash
6c25d255bbdd0759d0016c0a59eb1dbfe221e551185acb14d24aca0479194df8
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:24 GMT
x-content-type-options
nosniff
age
495886
x-cache
HIT
status
200
content-length
2987
x-response-time
135
surrogate-key
card_img card_img/bucket/8 card_img/1253021906011328512
last-modified
Wed, 22 Apr 2020 18:02:37 GMT
server
ECS (fcn/40E8)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
2ab71d7dfdccde05ca79607fe7b53add
accept-ranges
bytes
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=0&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&bq=0&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042465&de=258120387163&cu=1588195042465&m=1085&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5114&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=1&ag=1076&an=1076&gi=1&gf=1076&gg=1076&ix=1076&ic=1076&ez=1&ck=1076&kw=796&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1076&bx=1076&ci=1076&jz=796&dj=1&aa=0&ad=926&cn=926&gk=926&gl=926&ik=926&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=796&cd=796&ah=796&am=796&rf=0&re=1&ft=926&fv=926&fw=926&wb=1&cl=0&at=0&d=21887076%3A2680018979%3A5334439846%3A138307094492&bo=27868836&bp=43863396&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=1820241325&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:24 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:24 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=1&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=0&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042465&de=258120387163&cu=1588195042465&m=1364&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5109&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=1&ag=1357&an=1076&gi=1&gf=1357&gg=1076&ix=1357&ic=1357&ez=1&ck=1076&kw=796&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1357&bx=1076&ci=1076&jz=796&dj=1&aa=1&ad=1207&cn=926&gn=1&gk=1207&gl=926&ik=1207&co=1207&cp=1079&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1079&cd=796&ah=1079&am=796&rf=0&re=1&ft=1207&fv=926&fw=926&wb=1&cl=0&at=0&d=21887076%3A2680018979%3A5334439846%3A138307094492&bo=27868836&bp=43863396&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=1181260242&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:24 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:24 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 8CED
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjss9AKAOsUVq6bBQa80YaVImdh82ADJl1-xzmiJIG5AttrF7DTMRfrqAhh6W-scJxHEdUGB2la6IR2130iWhfFxGXxM3A07aqSy1ZVYYte4&sig=Cg0ArKJSzM48NNDER-HfEAE&adk=4220632109&tt=-1&bs=1585%2C1200&mtos=1117,1117,1117,1117,1117&tos=1117,0,0,0,0&p=1054,953,1304,1253&mcvt=1117&rs=0&ht=0&tfs=131&tls=1254&mc=1&lte=0&bas=0&bac=0&met=mue&avms=nio&exg=1&md=2&btr=0&lm=2&rst=1588195042807&dlt&rpt=185&isd=0&msd=0&ext&xdi=0&ps=1585%2C6109&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-10-2-9-9-0-0-0&tvt=1253&is=300%2C250&invis=1&iframe_loc=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&r=v&id=osdim&vs=4&uc=10&upc=1&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=300x250&itpl=3&v=20200427
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:24 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042981&de=269745253467&cu=1588195042981&m=1059&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6109&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=58&vx=58%3A100%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=1&ag=1053&an=2&gf=942&gg=2&ix=942&ic=942&ez=1&ck=1053&kw=832&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1053&bx=2&ci=1053&jz=832&dj=1&aa=0&ad=928&cn=0&gk=928&gl=0&ik=928&cq=1&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=832&cd=4&ah=832&am=4&rf=0&re=1&ft=928&fv=0&fw=928&wb=1&cl=0&at=0&d=101649396%3A2671382143%3A5312334190%3A138305888879&bo=27868836&bp=43863396&bd=rec1&zMoatPS=rec1&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=1193136811&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:24 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:24 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&vb=13&kq=1&lo=1&uk=null&pk=0&wk=0&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=480&w=640&fy=472.5&gp=358&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042328&de=777038559299&cu=1588195042328&m=1745&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=358&lb=6109&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=1&ag=1196&an=86&gi=1&gf=1196&gg=86&ix=1196&ic=1196&ez=1&ck=1196&kw=1040&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1196&bx=86&ci=1196&jz=1040&dj=1&aa=1&ad=1083&cn=0&gn=1&gk=1083&gl=0&ik=1083&co=1083&cp=1040&cq=1&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1040&cd=172&ah=1040&am=172&rf=0&re=1&ft=1083&fv=0&fw=1083&wb=1&cl=0&at=0&d=20049636%3A2660390051%3A5290329792%3A138308164554&bo=27868836&bp=43863396&bd=welcome&zMoatPS=welcome&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=438242828&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:24 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:24 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&vb=13&kq=1&lo=1&uk=null&pk=0&wk=0&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=480&w=640&fy=472.5&gp=358&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042328&de=777038559299&cu=1588195042328&m=1746&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=358&lb=6109&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=1&ag=1196&an=1196&gi=1&gf=1196&gg=1196&ix=1196&ic=1196&ez=1&ck=1196&kw=1040&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1196&bx=1196&ci=1196&jz=1040&dj=1&aa=1&ad=1083&cn=1083&gn=1&gk=1083&gl=1083&ik=1083&co=1083&cp=1040&cq=1&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1040&cd=1040&ah=1040&am=1040&rf=0&re=1&ft=1083&fv=1083&fw=1083&wb=1&cl=0&at=0&d=20049636%3A2660390051%3A5290329792%3A138308164554&bo=27868836&bp=43863396&bd=welcome&zMoatPS=welcome&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=983731354&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:24 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:24 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&vb=13&kq=1&lo=1&uk=null&pk=0&wk=0&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=480&w=640&fy=472.5&gp=358&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042328&de=777038559299&cu=1588195042328&m=1747&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=358&lb=6109&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=1&ag=1196&an=1196&gi=1&gf=1196&gg=1196&ix=1196&ic=1196&ez=1&ck=1196&kw=1040&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1196&bx=1196&ci=1196&jz=1040&dj=1&aa=1&ad=1083&cn=1083&gn=1&gk=1083&gl=1083&ik=1083&co=1083&cp=1040&cq=1&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1040&cd=1040&ah=1040&am=1040&rf=0&re=1&ft=1083&fv=1083&fw=1083&wb=1&cl=0&at=0&d=20049636%3A2660390051%3A5290329792%3A138308164554&bo=27868836&bp=43863396&bd=welcome&zMoatPS=welcome&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=2092136858&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:24 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:24 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&vb=13&kq=1&lo=3&uk=null&pk=0&wk=1&rk=1&tk=1&ak=https%3A%2F%2Fwww.darkreading.com%2F%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042919&de=601615449738&cu=1588195042919&m=1163&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6109&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=0&ag=5&an=0&gf=5&gg=0&ix=5&ic=5&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=5&bx=0&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=0&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=9&cd=0&ah=9&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=101649396%3A2671382143%3A5312334190%3A138306267349&bo=27868836&bp=43863396&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=558974100&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:24 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:24 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=1&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042981&de=269745253467&cu=1588195042981&m=1261&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6109&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=58&vx=58%3A58%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=1&ag=1255&an=1053&gf=942&gg=942&ix=942&ic=942&ez=1&ck=1053&kw=832&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1255&bx=1053&ci=1053&jz=832&dj=1&aa=1&ad=1130&cn=928&gn=1&gk=1029&gl=928&ik=1029&co=1130&cp=1055&cq=1&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1055&cd=832&ah=1055&am=832&rf=0&re=1&ft=1130&fv=928&fw=928&wb=1&cl=0&at=0&d=101649396%3A2671382143%3A5312334190%3A138305888879&bo=27868836&bp=43863396&bd=rec1&zMoatPS=rec1&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=1134611505&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:24 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:24 GMT
jot.html
platform.twitter.com/ Frame F7F8
Redirect Chain
  • https://syndication.twitter.com/i/jot
  • https://platform.twitter.com/jot.html
0
0
Document
General
Full URL
https://platform.twitter.com/jot.html
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40E8) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
Origin
https://www.darkreading.com
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Accept-Ranges
bytes
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Age
170956
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Wed, 29 Apr 2020 21:17:24 GMT
Etag
"d9592a6c704736fa4da218d4357976dd"
Last-Modified
Mon, 27 Apr 2020 21:45:55 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/40E8)
X-Cache
HIT
Content-Length
80

Redirect headers

status
302 302 Found
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
content-length
0
content-type
text/html;charset=utf-8
date
Wed, 29 Apr 2020 21:17:24 GMT
expires
Tue, 31 Mar 1981 05:00:00 GMT
last-modified
Wed, 29 Apr 2020 21:17:24 GMT
location
https://platform.twitter.com/jot.html
pragma
no-cache
server
tsa_o
strict-transport-security
max-age=631138519
x-connection-hash
eb26f689f84038da5eb03eeacbf129a7
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-response-time
131
x-transaction
009150bd00903dea
x-tsa-request-body-time
13
x-twitter-response-tags
BouncerCompliant
x-xss-protection
0
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&vb=13&kq=1&lo=3&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042919&de=601615449738&cu=1588195042919&m=2195&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6094&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=1&ag=1036&an=5&gi=1&gf=1036&gg=5&ix=1036&ic=1036&ez=1&ck=1036&kw=809&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1036&bx=5&ci=1036&jz=809&dj=1&aa=0&ad=936&cn=0&gk=936&gl=0&ik=936&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=809&cd=9&ah=809&am=9&rf=0&re=0&wb=1&cl=0&at=0&d=101649396%3A2671382143%3A5312334190%3A138306267349&bo=27868836&bp=43863396&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Exps%3A%20Celtra%20Banner%2FVideo%20%7C%20Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=521561370&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:25 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:25 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg4MTk1MDQzeGVmNDUwYWU3OWY5NzFkeDM5NzYzMDE4IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1MDkwNDk5NjgyNDg3NDQ2IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg4MTk1MDQzeGVmNDUwYWU3OWY5NzFkeDM5NzYzMDE4IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1MDkwNDk5NjgyNDg3NDQ2IiwiaW5kZXgiOjgsImNsaWVudFRpbWVzdGFtcCI6MTU4ODE5NTA0NS4wODEsIm5hbWUiOiJ2aWV3YWJsZTUwMSIsImNyaXRlcmlvbiI6eyJuYW1lIjoiNTAvMSIsInJhdGlvIjowLjUsInRpbWUiOjEwMDB9fV19?crc32c=3695833480
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.126.42.246 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-126-42-246.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 29 Apr 2020 21:17:25 GMT
Cache-Control
no-cache, no-store, must-revalidate
Expires
0
Connection
keep-alive
Content-Length
35
Content-Type
image/gif
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg4MTk1MDQzeGVmNDUwYWU3OWY5NzFkeDM5NzYzMDE4IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1MDkwNDk5NjgyNDg3NDQ2IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg4MTk1MDQzeGVmNDUwYWU3OWY5NzFkeDM5NzYzMDE4IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1MDkwNDk5NjgyNDg3NDQ2IiwiaW5kZXgiOjksImNsaWVudFRpbWVzdGFtcCI6MTU4ODE5NTA0NS4xNiwibmFtZSI6InZpZXdhYmxlVGltZSIsImZyb20iOjE1ODgxOTUwNDQuMDQ2LCJ0byI6MTU4ODE5NTA0NS4xNDF9XX0=?crc32c=1944159247
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.126.42.246 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-126-42-246.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 29 Apr 2020 21:17:25 GMT
Cache-Control
no-cache, no-store, must-revalidate
Expires
0
Connection
keep-alive
Content-Length
35
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&vb=13&kq=1&lo=3&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042919&de=601615449738&cu=1588195042919&m=2200&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6094&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=1&ag=1036&an=1036&gi=1&gf=1036&gg=1036&ix=1036&ic=1036&ez=1&ck=1036&kw=809&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1036&bx=1036&ci=1036&jz=809&dj=1&aa=0&ad=936&cn=936&gk=936&gl=936&ik=936&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=809&cd=809&ah=809&am=809&rf=0&re=0&wb=1&cl=0&at=0&d=101649396%3A2671382143%3A5312334190%3A138306267349&bo=27868836&bp=43863396&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Exps%3A%20Celtra%20Banner%2FVideo%20%7C%20Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=1269198858&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:25 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:25 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&vb=13&kq=1&lo=3&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042919&de=601615449738&cu=1588195042919&m=2204&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6094&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=1&ag=1036&an=1036&gi=1&gf=1036&gg=1036&ix=1036&ic=1036&ez=1&ck=1036&kw=809&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1036&bx=1036&ci=1036&jz=809&dj=1&aa=0&ad=936&cn=936&gk=936&gl=936&ik=936&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=809&cd=809&ah=809&am=809&rf=0&re=0&wb=1&cl=0&at=0&d=101649396%3A2671382143%3A5312334190%3A138306267349&bo=27868836&bp=43863396&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Exps%3A%20Celtra%20Banner%2FVideo%20%7C%20Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=1692516613&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:25 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:25 GMT
roundtrip.js
s.adroll.com/j/
34 KB
11 KB
Script
General
Full URL
https://s.adroll.com/j/roundtrip.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.248.216 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-248-216.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
5c2dcc7280f9f75b2123f8512238e0fb4598e19f1d4da2206d37e613696b50f2

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
8rrc9TDMV5ezSD47OAU1r1L8E3IeGbdH
Content-Encoding
gzip
ETag
"27092f648763d7e7050dcf9fd3e938ba"
x-amz-request-id
0A7A8C13DBCBAEAD
x-amz-server-side-encryption
AES256
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
10927
x-amz-id-2
ksLXpHw9gp4a7w1p+Fkm7I/jB2eTI8Q5HvK6RVBx708+iRhWKik2oZnMfcJMRgu0DK5BGm3tlN0=
Last-Modified
Wed, 22 Apr 2020 16:19:10 GMT
Server
AmazonS3
Date
Wed, 29 Apr 2020 21:17:25 GMT
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=3600, must-revalidate
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
ng_initgatewaycheck.asp
www.darkreading.com/ Frame 2C1C
Redirect Chain
  • https://www.darkreading.com/ng_initgatewaycheck.asp
  • https://ng.techweb.com/authds/gateway?gateway=true&return=https%3A%2F%2Fwww%2Edarkreading%2Ecom%2Fng%5Finitgatewaycheck%2Easp%3Finit%5Fgateway%3Dtrue%26httpscheck%3Dtrue
  • https://www.darkreading.com/ng_initgatewaycheck.asp?init_gateway=true&httpscheck=true
0
293 B
Document
General
Full URL
https://www.darkreading.com/ng_initgatewaycheck.asp?init_gateway=true&httpscheck=true
Requested by
Host: img.deusm.com
URL: https://img.deusm.com/darkreading/JQuery_Library/Jquery_3.4.1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7563 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains

Request headers

:method
GET
:authority
www.darkreading.com
:scheme
https
:path
/ng_initgatewaycheck.asp?init_gateway=true&httpscheck=true
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9

Response headers

status
200
date
Wed, 29 Apr 2020 21:17:25 GMT
content-type
text/html
set-cookie
__cfduid=df6d1ae16fc0faa4e9e9968adbca0b5bf1588195045; expires=Fri, 29-May-20 21:17:25 GMT; path=/; domain=.darkreading.com; HttpOnly; SameSite=Lax darkreading_lastvisit=4/29/2020 5:17:25 PM; expires=Sun, 29-Apr-2035 21:17:25 GMT; path=/; HttpOnly gatewayChecked=true; HttpOnly darkreading%5Fvisits=1; expires=Sun, 29-Apr-2035 04:00:00 GMT; path=/
cache-control
no-store, no-cache, must-revalidate,private
pragma
no-store
expires
Tue, 28 Apr 2020 21:17:24 GMT
x-powered-by
ASP.NET
strict-transport-security
max-age=63072000; includeSubDomains
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
58bc0cbb2dc8bece-FRA
content-encoding
gzip
cf-request-id
02696648fc0000becea9a10200000001

Redirect headers

P3P
CP='IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT'
Location
https://www.darkreading.com/ng_initgatewaycheck.asp?init_gateway=true&httpscheck=true
Content-Length
0
Date
Wed, 29 Apr 2020 21:17:24 GMT
Server
NG
sodar
pagead2.googlesyndication.com/getconfig/
7 KB
6 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gpt&tv=2020042302&st=env
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
811a26cb222d945edbb2244f706038266600f84cabb411e51033a1a70d63f8a4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 29 Apr 2020 21:17:25 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
5523
x-xss-protection
0
sodar2.js
tpc.googlesyndication.com/sodar/
14 KB
5 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a47f17d6ebbf4621d8fe87ab790d8d8fb5c3086629194d9ff2d64faaa6e46ab6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 29 Apr 2020 21:17:25 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1582746470043195"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5456
x-xss-protection
0
expires
Wed, 29 Apr 2020 21:17:25 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=1&hp=1&wf=1&vb=13&kq=1&lo=3&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042919&de=601615449738&cu=1588195042919&m=2454&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6094&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=1&ag=1297&an=1036&gi=1&gf=1297&gg=1036&ix=1297&ic=1297&ez=1&ck=1036&kw=809&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1297&bx=1036&ci=1036&jz=809&dj=1&aa=1&ad=1197&cn=936&gn=1&gk=1197&gl=936&ik=1197&co=1197&cp=1040&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1040&cd=809&ah=1040&am=809&rf=0&re=0&wb=1&cl=0&at=0&d=101649396%3A2671382143%3A5312334190%3A138306267349&bo=27868836&bp=43863396&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Exps%3A%20Celtra%20Banner%2FVideo%20%7C%20Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=1187301951&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:25 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:25 GMT
index.js
s.adroll.com/j/exp/
Redirect Chain
  • https://s.adroll.com/j/exp/TQSV74R4GVCSJITSZC2MCP/index.js
  • https://s.adroll.com/j/exp/index.js
28 B
747 B
Script
General
Full URL
https://s.adroll.com/j/exp/index.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.248.216 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-248-216.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
f59e5f34a941183aacaed25322ac0856628493c2cfd936ded3fddc0a49510e52

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
TbABQrb9C2ZQcnkgOp65Rq.ryGqffoW3
Content-Encoding
gzip
ETag
"5816cced8568d223aa09d889f300692b"
x-amz-request-id
F0D3F53B83577A63
x-amz-server-side-encryption
AES256
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
48
x-amz-id-2
dBcrX7xjwgnDzgXkPUm3rHg2mMMocXxcokAWjyRITsph5UvPEKbf6dG5++HMmHUDHiP3WRDwALA=
Last-Modified
Mon, 27 Apr 2020 22:39:37 GMT
Server
AmazonS3
Date
Wed, 29 Apr 2020 21:17:25 GMT
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Content-Type
application/javascript
Access-Control-Allow-Origin
*
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*

Redirect headers

Date
Wed, 29 Apr 2020 21:17:25 GMT
Server
AkamaiGHost
Location
https://s.adroll.com/j/exp/index.js
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Access-Control-Allow-Credentials
false
Connection
keep-alive
Access-Control-Allow-Headers
*
Content-Length
0
index.js
s.adroll.com/j/pre/TQSV74R4GVCSJITSZC2MCP/ACPJ7LN56VBITNNAUDPDMG/
1 KB
1 KB
Script
General
Full URL
https://s.adroll.com/j/pre/TQSV74R4GVCSJITSZC2MCP/ACPJ7LN56VBITNNAUDPDMG/index.js
Requested by
Host: s.adroll.com
URL: https://s.adroll.com/j/roundtrip.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.248.216 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-248-216.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
cbce85e96b7752208ce15a09ea4d5a58b792edc9e77f1c5ccf46c01935970f9d

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
BqFUTJjV.HcnPXQGrvsgn0ppYPc5pIjI
Content-Encoding
gzip
ETag
"3996d65282dd996ee0d7d4c90c139158"
x-amz-request-id
22568BCE36157B1C
x-amz-server-side-encryption
AES256
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
635
x-amz-id-2
ThkGkIyTiKOMi4USyLOXxTlPmFJW6jRqLtDqUllQQC3JAomS9x2ntbpSe1KpGW2BlIgXuk3cwGo=
Last-Modified
Wed, 29 Apr 2020 14:02:09 GMT
Server
AmazonS3
Date
Wed, 29 Apr 2020 21:17:25 GMT
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Content-Type
text/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=3600, must-revalidate
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
/
d.adroll.com/consent/check/TQSV74R4GVCSJITSZC2MCP/
Redirect Chain
  • https://d.adroll.mgr.consensu.org/consent/iabcheck/TQSV74R4GVCSJITSZC2MCP?_s=14d8f680a748e80fa4422b094c816fbe&_b=2
  • https://d.adroll.com/consent/check/TQSV74R4GVCSJITSZC2MCP/?_s=14d8f680a748e80fa4422b094c816fbe&_b=2
106 B
198 B
Script
General
Full URL
https://d.adroll.com/consent/check/TQSV74R4GVCSJITSZC2MCP/?_s=14d8f680a748e80fa4422b094c816fbe&_b=2
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.248.28.111 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-248-28-111.eu-west-1.compute.amazonaws.com
Software
nginx/1.16.1 /
Resource Hash
d38821db570b42b1a3dfd69b69b2883d6a0e7fbc4c4021416670597e6af75bd3

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Wed, 29 Apr 2020 21:17:25 GMT
server
nginx/1.16.1
content-length
106
content-type
application/javascript

Redirect headers

status
302
date
Wed, 29 Apr 2020 21:17:25 GMT
server
nginx/1.16.1
content-length
105
location
https://d.adroll.com/consent/check/TQSV74R4GVCSJITSZC2MCP/?_s=14d8f680a748e80fa4422b094c816fbe&_b=2
runner.html
tpc.googlesyndication.com/sodar/sodar2/209/ Frame A5A6
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/209/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
5727
date
Wed, 29 Apr 2020 20:38:54 GMT
expires
Thu, 29 Apr 2021 20:38:54 GMT
last-modified
Tue, 25 Feb 2020 17:32:01 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
2311
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
gen_204
pagead2.googlesyndication.com/pagead/
0
60 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=209&t=2&li=gpt_2020042302&jk=1337160380706509&bg=!4-Cl4PhYEFrgUHvo9E0CAAAAQVIAAAALmQF7JJdfPcjUIxvJEXwYfkJzrRSooChcwdZ14usbEVYfOkEgPx6o5nGwVQvXJAzz9u2Fr4DmRa0MzjJc64xe6QgiEId-hrOOecf96bGNETwwoGJALrG5ESUmg61qd_c-43e5_ACrU2WkbOlBKo07cak9VC_4BYPwfnCAdj3NCFPFPXWATL2zPYyyvfdqohV7WOTBVkV10I8lv_NzdVAeQvyzIY34sFqjtHJaXj4qU3j1OYYDZUlH4lvZpQIRBf-7sBzTHoBgNaoNWiqe2-5yGB-EqRJ3k3rtm5O8Sq0t1hNsEWh0w311Z3SC2shrbUY7XJm9drTgHjn5Zp58prHymZEVn3LnFe_kb1ITxZvv-Vg5YklDQvnDfe11mcj0dOt0ujtI6zWwQFjCKBGWa8ZweZHsiQe3bGlagM6noB4GESoceTEEUCoeecbA2sNLvjukCcfDFsJEtLh7wS1_OIJaiwUJWRpp38JxG8QPfOg-UQ53HvyI8O0srKS5MHZE0g
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:25 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
utsync.ashx
ml314.com/ Frame 872B
644 B
2 KB
Script
General
Full URL
https://ml314.com/utsync.ashx?pub=&adv=&et=0&eid=62439&ct=js&pi=&fp=&clid=&if=1&ps=&cl=&mlt=&data=&&cp=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&pv=1588195042526_sji5uick0&bl=en-us&cb=2861399&return=&ht=&d=&dc=&si=1588195042526_sji5uick0&cid=&s=1600x1200&rp=
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?2932020
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.16.75.38 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-16-75-38.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
e8da43dfb32caab6d98c57a9c3062ba3924fb58bc2ec9efd5c5c0698a4ea75a8

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 29 Apr 2020 21:17:24 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
p3P
CP="NON DSP COR ADMo PSAo DEVo BUS COM UNI NAV DEM STA"
Cache-Control
private
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Content-Length
468
Expires
0
ud.ashx
in.ml314.com/ Frame 872B
20 B
481 B
Script
General
Full URL
https://in.ml314.com/ud.ashx?topiclimit=&cb=2932020
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?2932020
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.84.119.213 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-54-84-119-213.compute-1.amazonaws.com
Software
Microsoft-IIS/8.5 / ASP.NET
Resource Hash
d0e4a6372d6fb5ffe9505dbe9e94aee8f1b9b96ec8e5e20684cce8b4c5a88fa7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 21:17:25 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/8.5
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public
Connection
keep-alive
Content-Length
138
Expires
Thu, 30 Apr 2020 21:17:25 GMT
ibs:dpid=22052&dpuuid=3609927701626880044&redir=
dpm.demdex.net/ Frame 872B
42 B
915 B
Image
General
Full URL
https://dpm.demdex.net/ibs:dpid=22052&dpuuid=3609927701626880044&redir=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.50.184.22 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-50-184-22.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

DCS
dcs-prod-irl1-v067-02bfde400.edge-irl1.demdex.com 5.68.0.20200428121513 1ms (+1ms)
Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Content-Type-Options
nosniff
X-TID
KfazimQ9T2E=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT
csync.ashx
ml314.com/ Frame 872B
Redirect Chain
  • https://idsync.rlcdn.com/395886.gif?partner_uid=3609927701626880044
  • https://ml314.com/csync.ashx?fp=fd82fb426601693a5f6cad1fa849945f35c595c7eb5558d09fccec7ded94ef8df4cb09cee1a4f8eb&person_id=3609927701626880044&eid=50082
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=fd82fb426601693a5f6cad1fa849945f35c595c7eb5558d09fccec7ded94ef8df4cb09cee1a4f8eb&person_id=3609927701626880044&eid=50082
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.16.75.38 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-16-75-38.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 21:17:24 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Thu, 30 Apr 2020 17:17:25 GMT

Redirect headers

date
Wed, 29 Apr 2020 21:17:25 GMT
via
1.1 google
status
307
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
location
https://ml314.com/csync.ashx?fp=fd82fb426601693a5f6cad1fa849945f35c595c7eb5558d09fccec7ded94ef8df4cb09cee1a4f8eb&person_id=3609927701626880044&eid=50082
cache-control
no-cache, no-store
timing-allow-origin
*
alt-svc
clear
content-length
0
utsync.ashx
ml314.com/ Frame 872B
Redirect Chain
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=d0tro1j&ttd_tpi=1
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=d0tro1j&ttd_tpi=1
  • https://ml314.com/utsync.ashx?eid=53819&et=0&fp=7bca4d88-b2bc-402f-a27a-9bcab2637b53
43 B
1 KB
Image
General
Full URL
https://ml314.com/utsync.ashx?eid=53819&et=0&fp=7bca4d88-b2bc-402f-a27a-9bcab2637b53
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.16.75.38 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-16-75-38.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 29 Apr 2020 21:17:24 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
p3P
CP="NON DSP COR ADMo PSAo DEVo BUS COM UNI NAV DEM STA"
Cache-Control
private
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
0,Thu, 30 Apr 2020 17:17:25 GMT

Redirect headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:25 GMT
x-aspnet-version
4.0.30319
status
302
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"
location
https://ml314.com/utsync.ashx?eid=53819&et=0&fp=7bca4d88-b2bc-402f-a27a-9bcab2637b53
cache-control
private,no-cache, must-revalidate
content-type
text/html
content-length
199
csync.ashx
ml314.com/ Frame 872B
Redirect Chain
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3609927701626880044
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3609927701626880044
  • https://ml314.com/csync.ashx?fp=f6d1eb689a5fdd1caef7ff49329e3715&eid=50146&person_id=3609927701626880044
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=f6d1eb689a5fdd1caef7ff49329e3715&eid=50146&person_id=3609927701626880044
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.16.75.38 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-16-75-38.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 21:17:24 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Thu, 30 Apr 2020 17:17:25 GMT

Redirect headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:25 GMT
status
302
p3p
CP=NOI DSP COR NID PSAa PSDa OUR UNI COM NAV
location
https://ml314.com/csync.ashx?fp=f6d1eb689a5fdd1caef7ff49329e3715&eid=50146&person_id=3609927701626880044
cache-control
no-cache
x-server
10.45.12.170
content-length
0
expires
0
pixel
ps.eyeota.net/ Frame 872B
0
344 B
Image
General
Full URL
https://ps.eyeota.net/pixel?pid=r8hrb20&t=gif
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
3.120.214.218 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-120-214-218.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 Apr 2020 21:17:25 GMT
Content-Length
0
P3P
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR SAMo BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR", policyref="http://ps.eyeota.net/w3c/p3p.xml"
consent.js
s.adroll.com/j/
243 KB
33 KB
Script
General
Full URL
https://s.adroll.com/j/consent.js
Requested by
Host: s.adroll.com
URL: https://s.adroll.com/j/roundtrip.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.248.216 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-248-216.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
f82c9f099656346f543c66ba009bd5f18010c7b41ad43d47a7f762121ad4496d

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
W7pJTDq0578OcjyRZxtRH_BjDuWCGgRc
Content-Encoding
gzip
ETag
"2f9f76c2d377be42af05cdf34c632618"
x-amz-request-id
C5CB11FA2891D5FB
x-amz-server-side-encryption
AES256
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
33195
x-amz-id-2
xvDuzhmafYXOulMfcltPByepfW69qHQWdG5Ym3MZlL+9sl8jZLq//WEZRkSp6xPBek9wYUVR3VI=
Last-Modified
Tue, 19 Nov 2019 20:42:26 GMT
Server
AmazonS3
Date
Wed, 29 Apr 2020 21:17:25 GMT
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Content-Type
application/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=300, must-revalidate
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
hod
d.adroll.com/consent/
42 B
180 B
Image
General
Full URL
https://d.adroll.com/consent/hod?_e=view_banner&_s=14d8f680a748e80fa4422b094c816fbe&_b=2.1&_a=TQSV74R4GVCSJITSZC2MCP
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.248.28.111 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-248-28-111.eu-west-1.compute.amazonaws.com
Software
nginx/1.16.1 /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Wed, 29 Apr 2020 21:17:25 GMT
cache-control
no-transform,public,max-age=300,s-maxage=900
server
nginx/1.16.1
content-length
42
vary
Cookie
content-type
image/gif
svrGP
s2150.t.eloqua.com/visitor/v200/
0
404 B
Script
General
Full URL
https://s2150.t.eloqua.com/visitor/v200/svrGP?pps=50&siteid=2150&DLKey=f09b5473ef7642a085c28ad29c30c1d2&DLLookup=&ms=414&firstPartyCookieDomain=trk.darkreading.com
Requested by
Host: img.en25.com
URL: https://img.en25.com/i/elqCfg.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
209.167.231.17 , United States, ASN7160 (NETDYNAMICS, US),
Reverse DNS
e017.en25.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000;
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Date
Wed, 29 Apr 2020 21:17:27 GMT
Vary
Accept-Encoding
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Cache-Control
private,no-cache, no-store
Content-Type
application/javascript
Content-Length
20
Expires
-1
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg4MTk1MDQzeGVmNDUwYWU3OWY5NzFkeDM5NzYzMDE4IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1MDkwNDk5NjgyNDg3NDQ2IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg4MTk1MDQzeGVmNDUwYWU3OWY5NzFkeDM5NzYzMDE4IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1MDkwNDk5NjgyNDg3NDQ2IiwiaW5kZXgiOjEwLCJjbGllbnRUaW1lc3RhbXAiOjE1ODgxOTUwNDYuMTcyLCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU4ODE5NTA0NS4xNDEsInRvIjoxNTg4MTk1MDQ2LjE2fV19?crc32c=2364507992
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.126.42.246 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-126-42-246.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 29 Apr 2020 21:17:26 GMT
Cache-Control
no-cache, no-store, must-revalidate
Expires
0
Connection
keep-alive
Content-Length
35
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042981&de=269745253467&cu=1588195042981&m=4178&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6094&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=58&vx=58%3A58%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=1&ag=4172&an=1255&gf=942&gg=942&ix=942&ic=942&ez=1&ck=1053&kw=832&aj=1&pg=100&pf=100&ib=0&cc=1&bw=4172&bx=1255&ci=1053&jz=832&dj=1&aa=1&ad=4047&cn=1130&gn=1&gk=1029&gl=1029&ik=1029&co=1130&cp=1055&cq=1&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4174&cd=1055&ah=4174&am=1055&rf=0&re=1&ft=4047&fv=1130&fw=928&wb=1&cl=0&at=0&d=101649396%3A2671382143%3A5312334190%3A138305888879&bo=27868836&bp=43863396&bd=rec1&zMoatPS=rec1&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=1041773146&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:27 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:27 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg4MTk1MDQzeGVmNDUwYWU3OWY5NzFkeDM5NzYzMDE4IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1MDkwNDk5NjgyNDg3NDQ2IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg4MTk1MDQzeGVmNDUwYWU3OWY5NzFkeDM5NzYzMDE4IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1MDkwNDk5NjgyNDg3NDQ2IiwiaW5kZXgiOjExLCJjbGllbnRUaW1lc3RhbXAiOjE1ODgxOTUwNDcuMTg1LCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU4ODE5NTA0Ni4xNiwidG8iOjE1ODgxOTUwNDcuMTc2fV19?crc32c=1607682439
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.126.42.246 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-126-42-246.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 29 Apr 2020 21:17:27 GMT
Cache-Control
no-cache, no-store, must-revalidate
Expires
0
Connection
keep-alive
Content-Length
35
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&vb=13&kq=1&lo=3&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042919&de=601615449738&cu=1588195042919&m=4263&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6094&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=1&ag=3107&an=1297&gi=1&gf=3107&gg=1297&ix=3107&ic=3107&ez=1&ck=1036&kw=809&aj=1&pg=100&pf=100&ib=0&cc=1&bw=3107&bx=1297&ci=1036&jz=809&dj=1&aa=1&ad=3007&cn=1197&gn=1&gk=3007&gl=1197&ik=3007&co=1197&cp=1040&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=3111&cd=1040&ah=3111&am=1040&rf=0&re=0&wb=2&cl=0&at=0&d=101649396%3A2671382143%3A5312334190%3A138306267349&bo=27868836&bp=43863396&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Exps%3A%20Celtra%20Banner%2FVideo%20%7C%20Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=1137277198&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:27 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:27 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195043116&de=351510546087&cu=1588195043116&m=4262&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6094&le=1&gm=1&io=1&vv=1&vw=1%3A3%3A0&vp=0&vx=0%3A0%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&aj=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&dj=0&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&cq=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4257&cd=5&ah=4257&am=5&rf=0&re=1&wb=1&cl=0&at=0&d=88835556%3A2687897921%3A5357140258%3A138309922451&bo=27868836&bp=43863396&bd=rec2&zMoatPS=rec2&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=150013067&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:27 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:27 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=0&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042465&de=258120387163&cu=1588195042465&m=5111&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6094&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=1&ag=5104&an=1357&gi=1&gf=5104&gg=1357&ix=5104&ic=5104&ez=1&ck=1076&kw=796&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5104&bx=1357&ci=1076&jz=796&dj=1&aa=1&ad=4954&cn=1207&gn=1&gk=4954&gl=1207&ik=4954&co=1207&cp=1079&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4906&cd=1079&ah=4906&am=1079&rf=0&re=1&ft=4854&fv=1207&fw=926&wb=2&cl=0&at=0&d=21887076%3A2680018979%3A5334439846%3A138307094492&bo=27868836&bp=43863396&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=7589469&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:27 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:27 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=0&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=6&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042465&de=258120387163&cu=1588195042465&m=5312&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6094&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=1&ag=5306&an=5104&gi=1&gf=5306&gg=5104&ix=5306&ic=5306&ez=1&ck=1076&kw=796&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5306&bx=5104&ci=1076&jz=796&dj=1&aa=1&ad=5156&cn=4954&gn=1&gk=5156&gl=4954&ik=5156&co=1207&cp=1079&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5309&cd=4906&ah=5309&am=4906&rf=0&re=1&ft=4854&fv=4854&fw=926&wb=2&cl=0&at=0&d=21887076%3A2680018979%3A5334439846%3A138307094492&bo=27868836&bp=43863396&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=585150503&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:27 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:27 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&vb=13&kq=1&lo=1&uk=null&pk=0&wk=0&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=480&w=640&fy=472.5&gp=358&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042328&de=777038559299&cu=1588195042328&m=5673&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=358&lb=6094&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=1&ag=5124&an=1196&gi=1&gf=5124&gg=1196&ix=5124&ic=5124&ez=1&ck=1196&kw=1040&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5124&bx=1196&ci=1196&jz=1040&dj=1&aa=1&ad=5011&cn=1083&gn=1&gk=5011&gl=1083&ik=5011&co=1083&cp=1040&cq=1&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5005&cd=1040&ah=5005&am=1040&rf=0&re=1&ft=4909&fv=1083&fw=1083&wb=2&cl=0&at=0&d=20049636%3A2660390051%3A5290329792%3A138308164554&bo=27868836&bp=43863396&bd=welcome&zMoatPS=welcome&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=543290757&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:28 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:28 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042981&de=269745253467&cu=1588195042981&m=5185&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6094&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=58&vx=58%3A58%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=1&ag=5179&an=4172&gf=942&gg=942&ix=942&ic=942&ez=1&ck=1053&kw=832&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5179&bx=4172&ci=1053&jz=832&dj=1&aa=1&ad=5054&cn=4047&gn=1&gk=1029&gl=1029&ik=1029&co=1130&cp=1055&cq=1&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4979&cd=4174&ah=4979&am=4174&rf=0&re=1&ft=4953&fv=4047&fw=928&wb=1&cl=0&at=0&d=101649396%3A2671382143%3A5312334190%3A138305888879&bo=27868836&bp=43863396&bd=rec1&zMoatPS=rec1&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=1270174508&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:28 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:28 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&vb=13&kq=1&lo=1&uk=null&pk=0&wk=0&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=480&w=640&fy=472.5&gp=358&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042328&de=777038559299&cu=1588195042328&m=5881&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=358&lb=6094&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=1&ag=5333&an=5124&gi=1&gf=5333&gg=5124&ix=5333&ic=5333&ez=1&ck=1196&kw=1040&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5333&bx=5124&ci=1196&jz=1040&dj=1&aa=1&ad=5220&cn=5011&gn=1&gk=5220&gl=5011&ik=5220&co=1083&cp=1040&cq=1&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5210&cd=5005&ah=5210&am=5005&rf=0&re=1&ft=4909&fv=4909&fw=1083&wb=2&cl=0&at=0&d=20049636%3A2660390051%3A5290329792%3A138308164554&bo=27868836&bp=43863396&bd=welcome&zMoatPS=welcome&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=1965441823&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:28 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:28 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195043116&de=351510546087&cu=1588195043116&m=5273&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6094&le=1&gm=1&io=1&vv=1&vw=1%3A3%3A0&vp=0&vx=0%3A0%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&aj=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&dj=0&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&cq=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5065&cd=4257&ah=5065&am=4257&rf=0&re=1&wb=1&cl=0&at=0&d=88835556%3A2687897921%3A5357140258%3A138309922451&bo=27868836&bp=43863396&bd=rec2&zMoatPS=rec2&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=905778916&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:28 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:28 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&vb=13&kq=1&lo=3&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=6&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042919&de=601615449738&cu=1588195042919&m=6282&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6094&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=1&ag=5125&an=3107&gi=1&gf=5125&gg=3107&ix=5125&ic=5125&ez=1&ck=1036&kw=809&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5125&bx=3107&ci=1036&jz=809&dj=1&aa=1&ad=5025&cn=3007&gn=1&gk=5025&gl=3007&ik=5025&co=1197&cp=1040&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4928&cd=3111&ah=4928&am=3111&rf=0&re=0&wb=2&cl=0&at=0&d=101649396%3A2671382143%3A5312334190%3A138306267349&bo=27868836&bp=43863396&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Exps%3A%20Celtra%20Banner%2FVideo%20%7C%20Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=87271467&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:29 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:29 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg4MTk1MDQzeGVmNDUwYWU3OWY5NzFkeDM5NzYzMDE4IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1MDkwNDk5NjgyNDg3NDQ2IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg4MTk1MDQzeGVmNDUwYWU3OWY5NzFkeDM5NzYzMDE4IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1MDkwNDk5NjgyNDg3NDQ2IiwiaW5kZXgiOjEyLCJjbGllbnRUaW1lc3RhbXAiOjE1ODgxOTUwNDkuMjAyLCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU4ODE5NTA0Ny4xNzYsInRvIjoxNTg4MTk1MDQ5LjE4NX1dfQ==?crc32c=3261170051
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.126.42.246 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-126-42-246.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 29 Apr 2020 21:17:29 GMT
Cache-Control
no-cache, no-store, must-revalidate
Expires
0
Connection
keep-alive
Content-Length
35
Content-Type
image/gif
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg4MTk1MDQzeGVmNDUwYWU3OWY5NzFkeDM5NzYzMDE4IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1MDkwNDk5NjgyNDg3NDQ2IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg4MTk1MDQzeGVmNDUwYWU3OWY5NzFkeDM5NzYzMDE4IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1MDkwNDk5NjgyNDg3NDQ2IiwiaW5kZXgiOjEzLCJjbGllbnRUaW1lc3RhbXAiOjE1ODgxOTUwNTEuMjE5LCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU4ODE5NTA0OS4xODUsInRvIjoxNTg4MTk1MDUxLjIwM31dfQ==?crc32c=234903237
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.126.42.246 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-126-42-246.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 29 Apr 2020 21:17:31 GMT
Cache-Control
no-cache, no-store, must-revalidate
Expires
0
Connection
keep-alive
Content-Length
35
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=11&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&k=&bq=0&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042490&de=945161156400&m=0&ar=31f9dba90d-clean&iw=e87dca3&q=36&cb=0&ym=0&cu=1588195042490&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=101649396%3A2671382143%3A5312334190%3A138306266656&zMoatPS=wallpaper&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&bo=27868836&bp=43863396&bd=wallpaper&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1840%3A1881%3A0%3A0&fs=180167&na=1795040885&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:32 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:32 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=25&q=2&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=0&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F6966624480972085746&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=7&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net%2FB700uS3Eq000g0zN0ZzNjTf&t=1588195042465&de=258120387163&cu=1588195042465&m=10173&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6094&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=1&ag=10167&an=5306&gi=1&gf=10167&gg=5306&ix=10167&ic=10167&ez=1&ck=1076&kw=796&aj=1&pg=100&pf=100&ib=0&cc=1&bw=10167&bx=5306&ci=1076&jz=796&dj=1&aa=1&ad=10017&cn=5156&gn=1&gk=10017&gl=5156&ik=10017&co=1207&cp=1079&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=9969&cd=5309&ah=9969&am=5309&rf=0&re=1&ft=4854&fv=4854&fw=926&wb=2&cl=0&at=0&d=21887076%3A2680018979%3A5334439846%3A138307094492&bo=27868836&bp=43863396&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=429797206&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:32 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:32 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=11&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&k=&bq=0&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042861&de=757199316536&m=0&ar=31f9dba90d-clean&iw=e87dca3&q=37&cb=0&ym=0&cu=1588195042861&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=21887076%3A2611451730%3A5310815425%3A138304035464&zMoatPS=native&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&bo=27868836&bp=43863396&bd=native&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1840%3A1881%3A0%3A0&fs=180167&na=652428087&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:32 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:32 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=11&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&k=&bq=0&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195042878&de=258078358738&m=0&ar=31f9dba90d-clean&iw=e87dca3&q=38&cb=0&ym=0&cu=1588195042878&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=92486676%3A2679400788%3A5330621928%3A138306796197&zMoatPS=insight&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&bo=27868836&bp=43863396&bd=insight&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1840%3A1881%3A0%3A0&fs=180167&na=647877538&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:32 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:32 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=25&q=2&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F8279229054736995948&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net%2FB700uS3Eq000g0zN0ZzNjTf&t=1588195042981&de=269745253467&cu=1588195042981&m=10058&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6094&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=58&vx=58%3A58%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=1&ag=10052&an=5179&gf=942&gg=942&ix=942&ic=942&ez=1&ck=1053&kw=832&aj=1&pg=100&pf=100&ib=0&cc=1&bw=10052&bx=5179&ci=1053&jz=832&dj=1&aa=1&ad=9927&cn=5054&gn=1&gk=1029&gl=1029&ik=1029&co=1130&cp=1055&cq=1&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=9853&cd=4979&ah=9853&am=4979&rf=0&re=1&ft=4953&fv=4953&fw=928&wb=1&cl=0&at=0&d=101649396%3A2671382143%3A5312334190%3A138305888879&bo=27868836&bp=43863396&bd=rec1&zMoatPS=rec1&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=27177339&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:33 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:33 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=25&q=2&hp=1&wf=1&vb=13&kq=1&lo=1&uk=null&pk=0&wk=0&rk=1&tk=1&ak=https%3A%2F%2Fsecurepubads.g.doubleclick.net%2Fpcs%2Fview%3Fxai%3DAKAOjstB-8GdFMt2kmINy414NKcWxbsJ11NYKTRU9kSMcH0d2InkR_dfGu97MmPfdgbRKlXJuWL5vuKXAXujvvghS7W99wlUEpOKWVQguNrA7nInnNgAKyiXvvUIBjK4NzV9JUpfzGtNf48a3rQHuVcl1fvY_nWKIB5L7-vm-olYStNPampSNbnaR7kZ3-jkRZkKRsJmsYaUpSkK_cAooCQqoz42mRgzyp5PSyzeCmZ0NxhR6MdlQdYVGxQ-PqIjUC0r-suoycCIVZeX4hkM0X2Bmfoj4E0cO_6g5crJEIs5AnmCguKI5WgZ9w%26sai%3DAMfl-YRV02mAeBtl9ZwoD-eJ1RAC26dGZTx2mHVG_CxzqAqVG0vjbMFgrdnJyamo7wW7f93NxMVon7LYI_wuhJLB3fhStV_zNssfoiL1m16v%26sig%3DCg0ArKJSzAkWDMcXyklHEAE%26urlfix%3D1%26adurl%3Dhttps%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F17295047894583974417&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=6&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=480&w=640&fy=472.5&gp=358&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net%2FB700uS3Eq000g0zN0ZzNjTf&t=1588195042328&de=777038559299&cu=1588195042328&m=10736&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=358&lb=6094&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=1&ag=10188&an=5333&gi=1&gf=10188&gg=5333&ix=10188&ic=10188&ez=1&ck=1196&kw=1040&aj=1&pg=100&pf=100&ib=0&cc=1&bw=10188&bx=5333&ci=1196&jz=1040&dj=1&aa=1&ad=10075&cn=5220&gn=1&gk=10075&gl=5220&ik=10075&co=1083&cp=1040&cq=1&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=10073&cd=5210&ah=10073&am=5210&rf=0&re=1&ft=4909&fv=4909&fw=1083&wb=2&cl=0&at=0&d=20049636%3A2660390051%3A5290329792%3A138308164554&bo=27868836&bp=43863396&bd=welcome&zMoatPS=welcome&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&zxai=AKAOjstB-8GdFMt2kmINy414NKcWxbsJ11NYKTRU9kSMcH0d2InkR_dfGu97MmPfdgbRKlXJuWL5vuKXAXujvvghS7W99wlUEpOKWVQguNrA7nInnNgAKyiXvvUIBjK4NzV9JUpfzGtNf48a3rQHuVcl1fvY_nWKIB5L7-vm-olYStNPampSNbnaR7kZ3-jkRZkKRsJmsYaUpSkK_cAooCQqoz42mRgzyp5PSyzeCmZ0NxhR6MdlQdYVGxQ-PqIjUC0r-suoycCIVZeX4hkM0X2Bmfoj4E0cO_6g5crJEIs5AnmCguKI5WgZ9w&zsai=AMfl-YRV02mAeBtl9ZwoD-eJ1RAC26dGZTx2mHVG_CxzqAqVG0vjbMFgrdnJyamo7wW7f93NxMVon7LYI_wuhJLB3fhStV_zNssfoiL1m16v&zsig=Cg0ArKJSzAkWDMcXyklHEAE&zurlfix=1&zadurl=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F17295047894583974417&na=882449688&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:33 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:33 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg4MTk1MDQzeGVmNDUwYWU3OWY5NzFkeDM5NzYzMDE4IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1MDkwNDk5NjgyNDg3NDQ2IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg4MTk1MDQzeGVmNDUwYWU3OWY5NzFkeDM5NzYzMDE4IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1MDkwNDk5NjgyNDg3NDQ2IiwiaW5kZXgiOjE0LCJjbGllbnRUaW1lc3RhbXAiOjE1ODgxOTUwNTMuMjM1LCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU4ODE5NTA1MS4yMDMsInRvIjoxNTg4MTk1MDUzLjIyMn1dfQ==?crc32c=3391193377
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.126.42.246 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-126-42-246.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 29 Apr 2020 21:17:33 GMT
Cache-Control
no-cache, no-store, must-revalidate
Expires
0
Connection
keep-alive
Content-Length
35
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=11&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&k=&bq=0&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1588195043274&de=422389596458&m=0&ar=31f9dba90d-clean&iw=e87dca3&q=39&cb=0&ym=0&cu=1588195043274&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=17527716%3A193997916%3A42403476%3A138212589663&zMoatPS=video&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&bo=27868836&bp=43863396&bd=video&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1840%3A1881%3A0%3A2968&fs=180167&na=790170547&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:33 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:33 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=25&q=2&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F10774940007939859206&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net%2FB700uS3Eq000g0zN0ZzNjTf&t=1588195043116&de=351510546087&cu=1588195043116&m=10351&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6094&le=1&gm=1&io=1&vv=1&vw=1%3A3%3A0&vp=0&vx=0%3A0%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&aj=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&dj=0&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&cq=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=10146&cd=5065&ah=10146&am=5065&rf=0&re=1&wb=1&cl=0&at=0&d=88835556%3A2687897921%3A5357140258%3A138309922451&bo=27868836&bp=43863396&bd=rec2&zMoatPS=rec2&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=682798327&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:33 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:33 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=25&q=2&hp=1&wf=1&vb=13&kq=1&lo=3&uk=null&pk=0&wk=1&rk=1&tk=1&ak=https%3A%2F%2Fwww.darkreading.com%2F%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=7&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net%2FB700uS3Eq000g0zN0ZzNjTf&t=1588195042919&de=601615449738&cu=1588195042919&m=11341&ar=31f9dba90d-clean&iw=e87dca3&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6094&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1840%3A1881%3A0%3A0&as=1&ag=10185&an=5125&gi=1&gf=10185&gg=5125&ix=10185&ic=10185&ez=1&ck=1036&kw=809&aj=1&pg=100&pf=100&ib=0&cc=1&bw=10185&bx=5125&ci=1036&jz=809&dj=1&aa=1&ad=10085&cn=5025&gn=1&gk=10085&gl=5025&ik=10085&co=1197&cp=1040&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=9981&cd=4928&ah=9981&am=4928&rf=0&re=0&wb=2&cl=0&at=0&d=101649396%3A2671382143%3A5312334190%3A138306267349&bo=27868836&bp=43863396&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Exps%3A%20Celtra%20Banner%2FVideo%20%7C%20Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=180167&na=1752906628&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 29 Apr 2020 21:17:34 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Wed, 29 Apr 2020 21:17:34 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg4MTk1MDQzeGVmNDUwYWU3OWY5NzFkeDM5NzYzMDE4IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1MDkwNDk5NjgyNDg3NDQ2IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg4MTk1MDQzeGVmNDUwYWU3OWY5NzFkeDM5NzYzMDE4IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1MDkwNDk5NjgyNDg3NDQ2IiwiaW5kZXgiOjE1LCJjbGllbnRUaW1lc3RhbXAiOjE1ODgxOTUwNTUuMjUxLCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU4ODE5NTA1My4yMjIsInRvIjoxNTg4MTk1MDU1LjIzNX1dfQ==?crc32c=2377394388
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.126.42.246 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-126-42-246.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 29 Apr 2020 21:17:35 GMT
Cache-Control
no-cache, no-store, must-revalidate
Expires
0
Connection
keep-alive
Content-Length
35
Content-Type
image/gif

Verdicts & Comments Add Verdict or Comment

437 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| dataLayer function| displayDefaultNativeAd function| displayNativeAd function| displayLandingPageNativeAd function| displaySecondLandingPageNativeAd function| displayArticleNativeAd function| displayInsightAd function| displaySASInsightAd object| respond string| theSiteDomain string| theMsgChatQueueInclude string| theChatStatusInclude boolean| doHideShowDivOpacityFade function| MM_swapImgRestore function| MM_preloadImages function| MM_findObj function| MM_swapImage function| MM_openBrWindow function| SwitchColor function| MakeDark function| MakeLight string| pop_collection string| pop_styleObj function| GetObject function| SwitchHTML function| SwitchDivs function| HideDiv function| ShowDiv function| URLEncodeString object| opacitySliderTimeouts function| SlideObjOpacity function| ChangeObjOpacity object| heightSliderTimeouts function| SlideObjHeight function| ChangeObjHeight function| ClearTimeoutArray function| AttachEventFunctionToObject function| RemoveEventFunctionFromObject function| SetCookie function| GetCookie function| AlignObject function| MoveObject function| MoveDivToColTop function| AddEventListenerToObj function| ContentNotifyPrefsShortSubmit function| ContentNotifyPrefsShortGenerateAndDisplayRSSFeed function| RedirectConfirm function| blend function| returnPosYofObj function| returnPosXofObj function| returnCurrentWindowYOffset function| returnCurrentWindowXOffset object| menuMoverTimeouts number| menuMoverTimeoutCounter number| menuMaxOpacity function| ShowMenu function| ChangeObjectLeft function| ChangeObjectTop function| NumStepsToMove function| AddPopMenuEventListener boolean| lockPoppedMenu string| lockedPoppedMenuObjName function| PopMenu object| closeMenuTimeouts number| closeMenuTimeoutCounter function| PopMenuOff number| globalPopXDiff number| globalPopYDiff function| createSubmenu function| LRSliderHandler string| active_pop_collection string| active_pop_styleObj function| GetActiveObject function| PrintActiveContent function| LoadScript function| RemoveScript string| theRateLink function| ShowRateMenu function| ShowSaveInfo function| HideSaveInfo function| HideRateMenu function| RateThis function| ChangeRateMenuFormParam function| BuildAndLoadRateMenuScript function| ClearRateMenuForm function| ClearRateLink function| ContentConsumptionLoggedSuccess function| ContentSignUpLoggedSuccess function| ObjectFader function| PageEffectPopUp function| returnWidthofObj function| cookiesEnabled boolean| pop_ns4 boolean| pop_dom boolean| active_pop_ns4 boolean| active_pop_dom function| $ function| jQuery function| displayWhatsThisBox function| displayPartnerPerspectivesBox function| displayMalwareBytesPartnerPerspectivesBox function| displayEvidentioPartnerPerspectivesBox function| displayF5PartnerPerspectivesBox function| displayBitdefenderPartnerPerspectivesBox function| displayGeneralDynamicsFidelisPartnerPerspectivesBox function| displayPartnerPerspectivesBoxArticle function| displayMalwareBytesPartnerPerspectivesBoxArticle function| displayGigamonPartnerPerspectivesBoxArticle function| displayAuthorInfoBox function| highlightTopStory function| showMobileIconOverlay function| closeMobileOverlayMenu function| goToByScroll function| ToggleNavButtonMenu function| ToggleNavButton object| designlinesSliderHandler string| designlinesLeftArrowButtonMouseoutImgSrc string| designlinesRightArrowButtonMouseoutImgSrc number| oneScrollHeight number| currentTickerItem number| numberOfTickerItems boolean| tickerIsPopulated undefined| tickerTimeout boolean| tickerStopped function| InitializeNewsTicker function| RotateNewsTicker function| StartNewsTicker function| StopNewsTicker boolean| superNavEventsMenuOpen function| ToggleSuperNavEventsMenu function| swipeleftHandler function| swiperightHandler function| tapholdHandler function| tapholdOutHandler function| sizeAnyBrightcoveObjects function| sizeDocImageClass object| visitor function| Visitor object| s_c_il number| s_c_in object| adobe function| mboxCreate function| mboxDefine function| mboxUpdate function| getCookie function| setCookie string| thePageTitle string| ngenv string| ngserv string| omn_regtrackproduct string| omn_nltrackproduct function| CSBJs_Core function| CSBJs_OOP function| CSBJs_Resources function| CSBJs_ServiceRequest function| CSBJs_Exception function| CSBJs_Ajax function| CSBJs_Decorator function| CSBJs_Decorator_HtmlNode function| CSBJs_App function| CSBJs_App_Window function| CSBJs_App_Window_Modal function| CSBJs_App_Window_Alert function| CSBJs_App_Button function| CSBJs_App_Html function| CSBJs_App_Field function| CSBJs_App_Field_File function| CSBJs_App_Field_TextArea function| CSBJs_Timer function| CSBJs_Form function| CSBJs_Form_Group function| CSBJs_Form_Step function| CSBJs_Form_Element function| CSBJs_Form_Element_Html function| CSBJs_Form_Element_Image function| CSBJs_Form_Element_TextField function| CSBJs_Form_Element_OtherTextField function| CSBJs_Form_Element_Submit function| CSBJs_Form_Element_NextStep function| CSBJs_Form_Element_PreviousStep function| CSBJs_Form_Element_Reset function| CSBJs_Form_Element_Multi function| CSBJs_Form_Element_Select function| CSBJs_Form_Element_Password function| CSBJs_Form_Element_Dynamic function| CSBJs_Form_Element_Hidden function| CSBJs_Form_Element_Checkbox function| CSBJs_Form_Element_Checkboxes function| CSBJs_Form_Element_Radio function| CSBJs_Form_Element_TextArea function| CSBJs_Form_Validation function| CSBJs_Form_Validation_Regex function| CSBJs_Form_Validation_CompareEqual function| CSBJs_Form_Validation_Required function| CSBJs_Form_Validation_JsFunction function| CSBJs_Form_Validation_Ajax function| CSBJs_Form_Validation_JsonP function| CSBJs_Form_Observer function| CSBJs_Form_Observer_Action function| CSBJs_Form_Observer_Action_Hide function| CSBJs_Form_Observer_Action_ChangeDynamic function| CSBJs_Form_Filter function| CSBJs_Form_Filter_Replace function| UBM function| rcCallback string| siteLogo string| privacyLogo string| privacyText string| loginRedirectURL string| loginNextAction string| securityJobAction boolean| reloadOnClose object| ngconfig string| regHeaderContent string| regAction string| ngRegAsset object| loginWidget object| registrationWidget object| updateWidget object| optoutWidget object| newsletterWidget object| newsletterSignupWidget object| externalAuthSuppWidget function| openRegisterThanks function| login function| verifyToken function| securityJobsFromUpdate function| securityJobs function| loginWithMessage function| changePassword function| openForm function| updateForm function| newsletterForm function| newsletterSignupForm function| extAuthSuppForm function| ngLogoutUser function| ngCreateCookie function| ngRreadCookie function| ngEraseCookie function| trackShortRegistrationOpen function| trackSocialMediaBasicRegistration function| trackLongRegistrationOpen function| trackLoginOpen function| trackLoginSuccess function| trackPasswordResetOpen function| trackNewsletterPrefsOpen function| trackNewsletterPrefsConfirm function| trackShortRegistrationConfirm function| trackRegistrationThankYou object| welcomeLinks object| google_tag_manager object| ___grecaptcha_cfg object| grecaptcha boolean| __google_recaptcha_client number| loginCheck string| loginHTML string| loginHTMLMobile function| initGatewayCheck function| setNGReg function| SubmitInPageSurvey number| _doubleclickRand function| jobalert object| _AdsNativeOpts object| googletag object| gptadslots object| recaptcha object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleTokenSync object| ube number| google_srt function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter undefined| google_measure_js_timing object| _comscore function| fbq function| _fbq number| __google_ad_urls_id number| google_unique_id object| gaGlobal object| google_conversion_id object| google_custom_params object| google_remarketing_only function| GooglemKTybQhCsO object| google_conversion_date object| google_conversion_time number| google_conversion_snippets number| google_conversion_first_time object| google_conversion_js_version object| google_conversion_format object| google_enable_display_cookie_match object| google_conversion_type object| google_conversion_order_id object| google_conversion_language object| google_conversion_value object| google_conversion_evaluemrc object| google_conversion_currency object| google_conversion_domain object| google_conversion_label object| google_conversion_color object| google_disable_viewthrough object| google_gtag_event_data object| google_conversion_linker object| google_tag_for_child_directed_treatment object| google_tag_for_under_age_of_consent object| google_allow_ad_personalization_signals object| google_restricted_data_processing object| google_conversion_items object| google_conversion_merchant_id object| google_user_id object| onload_callback object| opt_image_generator object| google_gtm_url_processor object| google_conversion_page_url object| google_conversion_referrer_url object| google_gtm object| google_gcl_cookie_prefix object| google_read_gcl_cookie_opt_out object| google_basket_feed_country object| google_basket_feed_language object| google_basket_discount object| google_basket_transaction_type object| google_disable_merchant_reported_conversions object| google_additional_conversion_params object| google_transport_url object| uetq object| ab string| isblocked function| unhideMainContent object| _elqQ object| _sf_async_config object| Bibblio object| BibblioActivity object| BibblioUtils object| BibblioEvents object| BibblioTemplates object| __twttrll object| twttr object| __twttr function| FlipboardWidgets object| ampInaboxIframes object| ampInaboxPendingMessages object| __google_ad_urls boolean| google_osd_loaded boolean| google_onload_fired object| FB function| UET object| heatmap function| udm_ object| ns_p object| COMSCORE object| pSUPERFLY_mab object| _cbq object| pSUPERFLY function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| Moat#G26 boolean| Moat#EVA object| MoatSuperV26 boolean| attachedML object| MoatDataJsonpRequest_24276432 function| Dpxl object| dpmPixels object| jQuery111104215449170187948 object| Sslac object| IN function| Togglehottopicseditorschoice function| Toggleliveeventswebinarslive object| video_reportsSliderHandler string| video_reportsLeftArrowButtonMouseoutImgSrc string| video_reportsRightArrowButtonMouseoutImgSrc string| s_account object| s string| SCCodeVersion function| s_doPlugins function| getHier function| s_getLoadTime function| AppMeasurement_Module_ActivityMap function| AppMeasurement function| s_gi function| s_pgicq number| s_objectID number| s_giq undefined| s_code string| s_hour string| s_day string| s_timepart number| s_loadT string| x number| y number| d object| eo string| f0 object| s_i_cmpglobalvista string| thispage_sharelink object| beacon object| GetElqContentPersonalizationValue string| adroll_adv_id string| adroll_pix_id string| adroll_segments object| _cb_shared boolean| recaptchaReady string| GoogleAnalyticsObject function| ga object| teadsscript object| google_tag_data object| gaplugins object| gaData object| elqCookieValue object| _elq object| teads object| __CELTRA boolean| __adroll_loaded object| GoogleGcLKhOms string| adroll_sid object| __adroll boolean| adroll_optout object| adroll_ext_network object| adroll_callbacks function| adroll_tpc_callback function| __cmp object| __adroll_consent boolean| __adroll_consent_is_gdpr object| __adroll_consent_data string| __adroll_consent_user_country string| __adroll_consent_adv_country object| google_image_requests object| adroll_exp_list object| $jscomp string| BANNER_VERSION object| __adroll_consent_banner

48 Cookies

Domain/Path Name / Value
.teads.tv/ Name: tt_salesforce
Value:
.facebook.com/ Name: fr
Value: 0rslqgMyMMtyIABrY..Beqe7i...1.0.Beqe7i.
.teads.tv/ Name: tt_emetriq
Value:
.teads.tv/ Name: tt_bluekai
Value:
.teads.tv/ Name: tt_viewer
Value: 29e59dbb-f4ea-4c4f-8b5e-347e66278550
.demdex.net/ Name: demdex
Value: 64015353523897809531862099748640673429
.techweb.com/ Name: Insights
Value: 25-f8693c3d-3f38-4599-9286-2cda0c667337
ng.techweb.com/ Name: JSESSIONID
Value: B951D91A55794A85603E4438BA55A4EB
.youtube.com/ Name: GPS
Value: 1
.youtube.com/ Name: VISITOR_INFO1_LIVE
Value: zo7Q_Ce1dsI
www.darkreading.com/ Name: dpm_time_site
Value: 2.012
.darkreading.com/ Name: _ga
Value: GA1.2.1778322720.1588195042
www.darkreading.com/ Name: gdpr_cookie_darkreading
Value: 1
www.darkreading.com/ Name: _cb_svref
Value: http%3A%2F%2Fgo.pulsesecure.net%2FB700uS3Eq000g0zN0ZzNjTf
.darkreading.com/ Name: undefined_s
Value: First%20Visit
.darkreading.com/ Name: s_cc
Value: true
.darkreading.com/ Name: __gads
Value: ID=53de4bdff24e6d0f:T=1588195042:S=ALNI_MZOj4aHKGDY0JxMwrjaDi1gCARcdg
www.darkreading.com/ Name: piddlNGPageReferer
Value: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
.youtube.com/ Name: YSC
Value: egZqfpb0OZo
.darkreading.com/ Name: s_nr
Value: 1588195043088-New
www.darkreading.com/ Name: dpm_url_count
Value: 1
www.darkreading.com/ Name: _cb_ls
Value: 1
.darkreading.com/ Name: _uetsid
Value: _uet80a40fbd-fbd5-c102-f335-324277653b41
.darkreading.com/ Name: _gid
Value: GA1.2.1398873549.1588195043
www.darkreading.com/ Name: darkreading_lastvisit
Value: 4/29/2020 5:17:22 PM
.teads.tv/ Name: tt_liveramp
Value:
.teads.tv/ Name: tt_exelate
Value:
www.darkreading.com/ Name: piddlNGSiteReferer
Value: http://go.pulsesecure.net/B700uS3Eq000g0zN0ZzNjTf
.darkreading.com/ Name: ELOQUA
Value: GUID=A9B12BF13E0D4F9CAD6E72416C42FA4A
www.darkreading.com/ Name: gatewayChecked
Value:
www.darkreading.com/ Name: _cb
Value: BjqYQiDBpoWeDceek-
.teads.tv/ Name: tt_retargetly
Value:
.darkreading.com/ Name: _fbp
Value: fb.1.1588195042217.1344521364
.teads.tv/ Name: tt_dar
Value:
.teads.tv/ Name: cs
Value: 1
.darkreading.com/ Name: _gat_UA-135180592-2
Value: 1
www.darkreading.com/ Name: darkreading%2Dmeter
Value: 1336729
.darkreading.com/ Name: __cfduid
Value: daa9f347e511668a29d873da95d07f98b1588195040
.darkreading.com/ Name: s_vnum
Value: 1588284000089%26vn%3D1
.teads.tv/ Name: tt_skp
Value:
www.darkreading.com/ Name: cplChannelTagID
Value:
.darkreading.com/ Name: AMCVS_77FB1CFE532B22840A490D45%40AdobeOrg
Value: 1
www.darkreading.com/ Name: _chartbeat2
Value: .1588195043140.1588195043140.1.CexeCWHAQzPDNLyOrlXCMjB5QCBU.1
www.darkreading.com/ Name: darkreading%5Fvisits
Value: 3
.darkreading.com/ Name: AMCV_77FB1CFE532B22840A490D45%40AdobeOrg
Value: -330454231%7CMCIDTS%7C18382%7CMCMID%7C62074350174199795621667579695987519590%7CMCAAMLH-1588799841%7C6%7CMCAAMB-1588799841%7C6G1ynYcLPuiQxYZrsz_pkqfLG9yMXBpb2zX5dvJdYQJzPXImdj0y%7CMCOPTOUT-1588202241s%7CNONE%7CMCAID%7CNONE%7CMCSYNCSOP%7C411-18389%7CvVersion%7C3.1.2
.teads.tv/ Name: tt_neustar
Value:
.darkreading.com/ Name: s_invisit
Value: true
www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id Name: hasLiveRampMatch
Value: true

16 Console Messages

Source Level URL
Text
console-api warning URL: https://i.cmpnet.com/s_code/at.js(Line 9)
Message:
AT: Adobe Target content delivery is disabled. Update your DOCTYPE to support Standards mode.
console-api log URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9(Line 502)
Message:
lpage==>notblocked
console-api log (Line 2)
Message:
step 1
console-api log (Line 4)
Message:
step 2
console-api log (Line 6)
Message:
step 3
console-api log (Line 8)
Message:
step 4
console-api log (Line 10)
Message:
step 5
console-api log (Line 12)
Message:
step 6
console-api log (Line 14)
Message:
step 7
console-api log URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9(Line 510)
Message:
interstitial unit found
console-api log URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9(Line 515)
Message:
not empty Interstitial
console-api log URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9(Line 91)
Message:
in welcomeAD img
console-api info URL: https://platform.twitter.com/widgets.js(Line 1)
Message:
You may have been affected by an update to settings in embedded timelines. See https://twittercommunity.com/t/deprecating-widget-settings/102295. [object HTMLAnchorElement]
console-api info URL: https://cdn.bibblio.org/rcm/4.9/bib-related-content.min.js(Line 1)
Message:
Bibblio: This page has been queued for ingestion. Please note that a 404 response to GET /recommendations is normal. This tells us that the item does not exist and should be ingested. The 422 on POST /url-ingestions is also normal. It tells us that the item has already been queued for ingestion by a prior page load.
console-api log URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9(Line 505)
Message:
5 second timeout
console-api log URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiT0RJMk5USTBaakpoTkRCaSIsInQiOiJKYVhidlBkbm0wZHR4VlI2bW9NN1ViVzB6Qitoeks4WnA3c0dQTlpXaTVmYzQrTml2VkJlRTZlUm9ROUdxRWhzYUNaY0VNdTVaWWw0SVZ4aW5kRGtDSzBIZytnczMzS0xGSytvU2Ixdjdzb2JWTjE3MzhvdmszeXdmejhDeVR4TiJ9(Line 524)
Message:
unhide main content

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

6600d6d98e534115970f9529a45f3195.js.ubembed.com
a.dpmsrv.com
a.teads.tv
ads.celtra.com
adservice.google.de
api.bibblio.org
assets.informa.com
assets.ubembed.com
bat.bing.com
cache-ssl.celtra.com
cdn.bibblio.org
cdn.flipboard.com
cdn.syndication.twimg.com
cf-images.us-east-1.prod.boltdns.net
cm.everesttech.net
cm.g.doubleclick.net
code.jquery.com
connect.facebook.net
d.adroll.com
d.adroll.mgr.consensu.org
dpm.demdex.net
dsimg.ubm-us.net
fonts.googleapis.com
fonts.gstatic.com
fpn.flipboard.com
geo.moatads.com
go.pulsesecure.net
googleads.g.doubleclick.net
i.cmpnet.com
i.ubm-us.net
ib.adnxs.com
idsync.rlcdn.com
img.deusm.com
img.en25.com
img.lightreading.com
in.ml314.com
ins.techweb.com
match.adsrvr.org
maxcdn.bootstrapcdn.com
ml314.com
ng.techweb.com
pagead2.googlesyndication.com
pbs.twimg.com
ping.chartbeat.net
platform-src.linkedin.com
platform.linkedin.com
platform.twitter.com
ps.eyeota.net
px.moatads.com
s.adroll.com
s.dpmsrv.com
s2150.t.eloqua.com
s657486201.t.eloqua.com
sb.scorecardresearch.com
securepubads.g.doubleclick.net
static.chartbeat.com
stats.g.doubleclick.net
sync.crwdcntrl.net
sync.teads.tv
syndication.twitter.com
t.teads.tv
ton.twimg.com
tpc.googlesyndication.com
track.celtra.com
trk.darkreading.com
twimgs.com
u.heatmap.it
ubm.demdex.net
ubmtech.d3.sc.omtrdc.net
www.darkreading.com
www.facebook.com
www.google-analytics.com
www.google.com
www.google.de
www.googleadservices.com
www.googletagmanager.com
www.googletagservices.com
www.gstatic.com
www.youtube.com
z.moatads.com
104.124.133.20
104.244.42.136
104.76.46.10
107.23.162.230
13.224.194.18
13.35.253.124
13.35.253.126
142.0.160.13
142.0.173.134
143.204.202.59
143.204.202.7
143.204.212.151
143.204.89.60
15.188.105.205
151.101.113.131
172.217.16.130
185.33.220.241
199.15.215.8
2.18.232.7
2001:4de0:ac19::1:b:3a
2001:4de0:ac19::1:b:3b
209.167.231.17
216.58.206.2
216.58.212.130
23.210.248.12
23.210.248.216
23.210.250.213
2600:9000:2057:1a00:14:85db:2b40:93a1
2600:9000:2057:b800:e:5a70:ca47:86e1
2606:2800:134:1a0d:1429:742:782:b6
2606:2800:134:fa2:1627:1fe:edb:1665
2606:2800:234:59:254c:406:2366:268c
2606:4700:3032::681b:93f7
2606:4700:3033::6818:7975
2606:4700:3034::6818:7ae4
2606:4700:3035::6818:7875
2606:4700:3036::681b:9074
2606:4700:3037::681c:1ce0
2606:4700::6811:7563
2620:103::192:155:48:119
2620:119:50e6:101::6cae:b08
2620:1ec:c11::200
2a00:1450:4001:800::2008
2a00:1450:4001:801::2003
2a00:1450:4001:809::2002
2a00:1450:4001:815::2001
2a00:1450:4001:816::2003
2a00:1450:4001:81b::2002
2a00:1450:4001:81b::200e
2a00:1450:4001:81e::2003
2a00:1450:4001:81f::2004
2a00:1450:4001:821::200a
2a00:1450:4001:824::2002
2a00:1450:400c:c08::9a
2a02:26f0:10c:39a::25eb
2a03:2880:f02d:12:face:b00c:0:3
2a03:2880:f12d:83:face:b00c:0:25de
3.120.214.218
3.126.160.214
3.126.42.246
3.227.165.230
3.248.28.111
34.246.123.201
35.241.8.149
46.105.202.39
52.16.75.38
52.209.33.201
52.21.45.91
52.49.190.28
52.50.184.22
54.77.128.97
54.84.119.213
63.32.63.32
66.117.28.86
99.86.1.26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