www-malwarebytes-com.cdn.ampproject.org
Open in
urlscan Pro
2a00:1450:4001:80f::2001
Public Scan
Submission: On August 07 via manual from ES — Scanned from ES
Summary
TLS certificate: Issued by GTS CA 1C3 on July 10th 2023. Valid for: 3 months.
This is the only time www-malwarebytes-com.cdn.ampproject.org was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 2a00:1450:400... 2a00:1450:4001:80f::2001 | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:810::2011 | 15169 (GOOGLE) (GOOGLE) | |
1 1 | 2a00:1450:400... 2a00:1450:4001:82b::200e | 15169 (GOOGLE) (GOOGLE) | |
1 1 | 2a00:1450:400... 2a00:1450:400c:c00::9c | 15169 (GOOGLE) (GOOGLE) | |
1 1 | 2a00:1450:400... 2a00:1450:4001:82a::2004 | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:813::2003 | 15169 (GOOGLE) (GOOGLE) | |
11 | 4 |
ASN15169 (GOOGLE, US)
www-malwarebytes-com.cdn.ampproject.org | |
cdn.ampproject.org |
ASN15169 (GOOGLE, US)
www.google-analytics.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
ampproject.org
www-malwarebytes-com.cdn.ampproject.org cdn.ampproject.org — Cisco Umbrella Rank: 418 |
158 KB |
1 |
google.es
www.google.es — Cisco Umbrella Rank: 21476 |
408 B |
1 |
google.com
1 redirects
www.google.com — Cisco Umbrella Rank: 3 |
532 B |
1 |
doubleclick.net
1 redirects
stats.g.doubleclick.net — Cisco Umbrella Rank: 115 |
427 B |
1 |
google-analytics.com
1 redirects
www.google-analytics.com — Cisco Umbrella Rank: 55 |
454 B |
1 |
withgoogle.com
csp.withgoogle.com — Cisco Umbrella Rank: 1098 |
|
0 |
malwarebytes.com
Failed
www.malwarebytes.com Failed |
|
11 | 7 |
Domain | Requested by | |
---|---|---|
5 | cdn.ampproject.org |
www-malwarebytes-com.cdn.ampproject.org
cdn.ampproject.org |
3 | www-malwarebytes-com.cdn.ampproject.org |
www-malwarebytes-com.cdn.ampproject.org
|
1 | www.google.es | |
1 | www.google.com | 1 redirects |
1 | stats.g.doubleclick.net | 1 redirects |
1 | www.google-analytics.com | 1 redirects |
1 | csp.withgoogle.com |
www-malwarebytes-com.cdn.ampproject.org
|
0 | www.malwarebytes.com Failed |
cdn.ampproject.org
|
11 | 8 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.malwarebytes.com |
www.microsoft.com |
support.malwarebytes.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
misc-sni.google.com GTS CA 1C3 |
2023-07-10 - 2023-10-02 |
3 months | crt.sh |
*.appspot.com GTS CA 1C3 |
2023-07-10 - 2023-10-02 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www-malwarebytes-com.cdn.ampproject.org/c/s/www.malwarebytes.com/blog/news/2023/08/microsoft-teams-used-in-phishing-campaign-to-bypass-multi-factor-authentication/amp
Frame ID: BEAC8BD2F084575108F74EB323FAEB2D
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
Microsoft Teams used in phishing campaign to bypass multi-factor authenticationDetected technologies
Google Analytics (Analytics) ExpandDetected patterns
- <amp-analytics [^>]*type=["']googleanalytics["']
Page Statistics
14 Outgoing links
These are links going to different origins than the main page.
Title: here
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: posted details about the perceived attacks
Search URL Search Domain Scan URL
Title: SolarWinds
Search URL Search Domain Scan URL
Title: Sunburst
Search URL Search Domain Scan URL
Title: related components
Search URL Search Domain Scan URL
Title: APT29/Cozy Bear
Search URL Search Domain Scan URL
Title: Support team
Search URL Search Domain Scan URL
Title: TRY NOW
Search URL Search Domain Scan URL
Title: COMMENTS
Search URL Search Domain Scan URL
Title: How to avoid potentially unwanted programs
Search URL Search Domain Scan URL
Title: Comments
Search URL Search Domain Scan URL
Title: How to stay secure from ransomware attacks during holidays and special events
Search URL Search Domain Scan URL
Title: Comments
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 11- https://www.google-analytics.com/r/collect?v=1&_v=a1&ds=AMP&aip&_s=1&dt=Microsoft%20Teams%20used%20in%20phishing%20campaign%20to%20bypass%20multi-factor%20authentication&sr=1600x1200&_utmht=1691424841126&cid=UmyCBg3u1nBZUlpTp5_-XKhHpJRT9-QEQ1B1xpL-e7Yvunks1zI5XoTfWOehoxly&tid=UA-3347303-10&dl=https%3A%2F%2Fwww.malwarebytes.com%2Fblog%2Fnews%2F2023%2F08%2Fmicrosoft-teams-used-in-phishing-campaign-to-bypass-multi-factor-authentication%2Famp&dr=&sd=24&ul=en-us&de=UTF-8&t=pageview&jid=0.10302428472200731&_r=1&a=8978&z=0.5159461232782909 HTTP 302
- https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-3347303-10&cid=UmyCBg3u1nBZUlpTp5_-XKhHpJRT9-QEQ1B1xpL-e7Yvunks1zI5XoTfWOehoxly&jid=0.10302428472200731&_v=a1&z=0.5159461232782909 HTTP 302
- https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-3347303-10&cid=UmyCBg3u1nBZUlpTp5_-XKhHpJRT9-QEQ1B1xpL-e7Yvunks1zI5XoTfWOehoxly&jid=0.10302428472200731&_v=a1&z=0.5159461232782909 HTTP 302
- https://www.google.es/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-3347303-10&cid=UmyCBg3u1nBZUlpTp5_-XKhHpJRT9-QEQ1B1xpL-e7Yvunks1zI5XoTfWOehoxly&jid=0.10302428472200731&_v=a1&z=0.5159461232782909&slf_rd=1&random=2292777603
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
amp
www-malwarebytes-com.cdn.ampproject.org/c/s/www.malwarebytes.com/blog/news/2023/08/microsoft-teams-used-in-phishing-campaign-to-bypass-multi-factor-authentication/ |
36 KB 12 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
v0.mjs
cdn.ampproject.org/rtv/012307212240000/ |
222 KB 63 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
amp-analytics-0.1.mjs
cdn.ampproject.org/rtv/012307212240000/v0/ |
94 KB 28 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
amp-consent-0.1.mjs
cdn.ampproject.org/rtv/012307212240000/v0/ |
51 KB 15 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
amp
csp.withgoogle.com/csp/ |
0 0 |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
easset_upload_file11998_275819_e.png
www-malwarebytes-com.cdn.ampproject.org/ii/w820/s/www.malwarebytes.com/blog/news/2023/08/ |
21 KB 21 KB |
Image
image/avif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
629 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
84 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
easset_upload_file10639_275819_e.png
www-malwarebytes-com.cdn.ampproject.org/i/s/www.malwarebytes.com/blog/news/2023/08/ |
14 KB 15 KB |
Image
image/avif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
amp-auto-lightbox-0.1.mjs
cdn.ampproject.org/rtv/012307212240000/v0/ |
7 KB 3 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST |
get-consent.json
www.malwarebytes.com/js/amp/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
googleanalytics.json
cdn.ampproject.org/rtv/012307212240000/v0/analytics-vendors/ |
2 KB 886 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ga-audiences
www.google.es/ads/ Redirect Chain
|
42 B 408 B |
Ping
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.malwarebytes.com
- URL
- https://www.malwarebytes.com/js/amp/get-consent.json?__amp_source_origin=https%3A%2F%2Fwww.malwarebytes.com
Verdicts & Comments Add Verdict or Comment
12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| AMP object| AMP_CONFIG object| __AMP_LOG object| __AMP_ERRORS function| __AMP_REPORT_ERROR object| __AMP_TOP object| __AMP_SERVICES object| __AMP_MODE object| __AMP__EXPERIMENT_TOGGLES boolean| __AMP_TAG object| __AMP_EXTENDED_ELEMENTS function| __AMP_BASE_CE_CLASS0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | default-src * blob: data:; script-src 'sha256-0EzT5rjCdQIs7Zb99eHUlAOmKUanRXRrJoqJ+VYepto=' 'sha256-5CxqAdDXlHviOy7zxeRpMobzRK/JNpLvkS+k8Zj3L3A=' 'sha256-FIBGC/wl1Qfnh2Fb5NPFHmRty7BHJdDpWW1FZ8egppI=' 'sha256-UXYprBCAtnqoL5acf14iemip/+HI+gDFh92yyXkM3XI=' 'sha256-dKn2nAtwgzaaXC8ZM58hhldxNyeuu4qrzW4H9//9YMA=' 'sha256-i9nAf5M9USb+lB7ZtayKdAWymLU1MCklCTdsyXbMgCs=' 'sha256-wjUSvXYNfPUUTPZYrn4pOEcf2ecDdjd3N9Av3GDSwZw=' 'sha256-yAAlWuem9ue55JEvxkWhcWWA1Zu0p6cgbYtDWJjsdvs=' blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp |
Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
X-Content-Type-Options | nosniff |
X-Xss-Protection | 0 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.ampproject.org
csp.withgoogle.com
stats.g.doubleclick.net
www-malwarebytes-com.cdn.ampproject.org
www.google-analytics.com
www.google.com
www.google.es
www.malwarebytes.com
www.malwarebytes.com
2a00:1450:4001:80f::2001
2a00:1450:4001:810::2011
2a00:1450:4001:813::2003
2a00:1450:4001:82a::2004
2a00:1450:4001:82b::200e
2a00:1450:400c:c00::9c
3add3c085b1006f9be182f0a73934535aca0654891e2b60e18ad2438de31a7f2
3dbb6510f82bf5f6cc095c94a2cd36684fb3c9c6657adebeca4461f0315b8ff3
43c5484afad75c6b5edc3643f19a1dc661fcac4080acc6bd8ae8638dde52c570
654cefd1d4ac15b6db5d27278d20bd069819733a31ade71c2f7d6ed279be42c3
6c00736e58728d82754e3e5ced15af509097d091819b27a9b72129b91d8bff3b
82ab13fd8de794651cdf3ab9d1133577599665a044974736b0831ffbe6506c99
8edb65ff2c1245c3137cd810616405be4973183c6731ff27be916ec6e5ee0365
c5c83952a56d8e8088fdef97c9b0a7d78f276190b1109699b678e0d1dddcead0
cb7528009c86e4317bb71c61a003c47550633755f3564953e9d7140c624845dc
d38327273f3a3ebb890d6d3f6b6b22ce98fcf1725ccd598060f20c1902c08cc1
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629