URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Submission: On October 19 via api from US

Summary

This website contacted 36 IPs in 7 countries across 33 domains to perform 141 HTTP transactions. The main IP is 35.173.160.135, located in Ashburn, United States and belongs to AMAZON-AES - Amazon.com, Inc., US. The main domain is threatpost.com.
TLS certificate: Issued by Thawte EV RSA CA 2018 on June 17th 2019. Valid for: a year.
This is the only time threatpost.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
18 35.173.160.135 14618 (AMAZON-AES)
6 2600:9000:21f... 16509 (AMAZON-02)
2 2606:4700::68... 13335 (CLOUDFLAR...)
11 2600:9000:21f... 16509 (AMAZON-02)
2 5 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
5 28 151.101.14.2 54113 (FASTLY)
1 2a00:1450:400... 15169 (GOOGLE)
1 3 2.19.43.224 20940 (AKAMAI-ASN1)
2 2a00:1450:400... 15169 (GOOGLE)
1 2a03:2880:f00... 32934 (FACEBOOK)
1 2a05:f500:10:... 14413 (LINKEDIN)
1 151.101.13.140 54113 (FASTLY)
2 4 2a00:1450:400... 15169 (GOOGLE)
1 91.228.74.165 27281 (QUANTCAST)
1 151.101.112.157 54113 (FASTLY)
3 2a00:1450:400... 15169 (GOOGLE)
9 172.217.16.194 15169 (GOOGLE)
2 2 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
1 2600:9000:200... 16509 (AMAZON-02)
1 104.244.42.69 13414 (TWITTER)
20 151.101.114.49 54113 (FASTLY)
2 2 18.185.163.33 16509 (AMAZON-02)
1 69.173.144.136 26667 (RUBICONPR...)
1 1 40.113.136.100 8075 (MICROSOFT...)
2 2 185.29.133.199 30419 (MEDIAMATH...)
2 185.33.223.221 29990 (ASN-APPNEXUS)
2 2 172.217.16.162 15169 (GOOGLE)
2 2 63.32.23.112 16509 (AMAZON-02)
1 1 100.20.21.65 16509 (AMAZON-02)
1 192.132.33.46 18568 (BIDTELLECT)
1 130.211.13.252 15169 (GOOGLE)
3 3 52.57.126.118 16509 (AMAZON-02)
2 2 18.197.235.0 16509 (AMAZON-02)
1 91.228.74.244 27281 (QUANTCAST)
1 151.101.114.2 54113 (FASTLY)
1 151.101.14.49 54113 (FASTLY)
4 2a00:1450:400... 15169 (GOOGLE)
1 104.244.42.195 13414 (TWITTER)
7 2a00:1450:400... 15169 (GOOGLE)
1 185.33.223.208 29990 (ASN-APPNEXUS)
3 185.64.189.111 62713 (AS-PUBMATIC)
2 185.33.223.206 29990 (ASN-APPNEXUS)
141 36
Apex Domain
Subdomains
Transfer
51 taboola.com
cdn.taboola.com
trc.taboola.com
15.taboola.com
match.taboola.com
cds.taboola.com
images.taboola.com
vidstat.taboola.com
imprammp.taboola.com
convammp.taboola.com
vidstatb.taboola.com
wf.taboola.com
opps.taboola.com
693 KB
34 threatpost.com
threatpost.com
assets.threatpost.com
media.threatpost.com
644 KB
13 doubleclick.net
securepubads.g.doubleclick.net
stats.g.doubleclick.net
cm.g.doubleclick.net
95 KB
7 ampproject.org
cdn.ampproject.org
332 KB
6 googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
435 KB
6 google.com
www.google.com
adservice.google.com
1 KB
5 adnxs.com
ib.adnxs.com
secure.adnxs.com
5 KB
4 google-analytics.com
www.google-analytics.com
35 KB
3 pubmatic.com
vid.pubmatic.com
2 KB
3 bidswitch.net
x.bidswitch.net
1 KB
3 google.de
adservice.google.de
www.google.de
389 B
3 scorecardresearch.com
sb.scorecardresearch.com
2 KB
2 creative-serving.com
ads.creative-serving.com
2 KB
2 adsrvr.org
match.adsrvr.org
893 B
2 mathtag.com
sync.mathtag.com
1 KB
2 mfadsrvr.com
rtb.mfadsrvr.com
1 KB
2 quantserve.com
secure.quantserve.com
pixel.quantserve.com
6 KB
2 googletagmanager.com
www.googletagmanager.com
52 KB
2 cloudflare.com
cdnjs.cloudflare.com
11 KB
1 twitter.com
analytics.twitter.com
266 B
1 bttrack.com
bttrack.com
380 B
1 storygize.net
www.storygize.net
450 B
1 powerlinks.com
px.powerlinks.com
402 B
1 rubiconproject.com
pixel.rubiconproject.com
239 B
1 t.co
t.co
171 B
1 quantcount.com
rules.quantcount.com
354 B
1 ads-twitter.com
static.ads-twitter.com
2 KB
1 reddit.com
www.reddit.com
851 B
1 linkedin.com
www.linkedin.com
1 facebook.com
graph.facebook.com
294 B
1 googletagservices.com
www.googletagservices.com
15 KB
1 gstatic.com
www.gstatic.com
90 KB
1 kasperskycontenthub.com
kasperskycontenthub.com
367 B
141 33
Domain Requested by
17 threatpost.com threatpost.com
11 match.taboola.com threatpost.com
vidstat.taboola.com
11 media.threatpost.com threatpost.com
9 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
threatpost.com
9 trc.taboola.com 5 redirects cdn.taboola.com
threatpost.com
8 vidstat.taboola.com cdn.taboola.com
vidstat.taboola.com
threatpost.com
7 cdn.ampproject.org securepubads.g.doubleclick.net
6 images.taboola.com threatpost.com
6 assets.threatpost.com threatpost.com
5 cdn.taboola.com assets.threatpost.com
cdn.taboola.com
threatpost.com
5 www.google.com 2 redirects threatpost.com
www.gstatic.com
4 tpc.googlesyndication.com securepubads.g.doubleclick.net
threatpost.com
4 www.google-analytics.com 2 redirects www.googletagmanager.com
3 vid.pubmatic.com vidstat.taboola.com
3 secure.adnxs.com vidstat.taboola.com
3 wf.taboola.com vidstat.taboola.com
3 convammp.taboola.com threatpost.com
3 x.bidswitch.net 3 redirects
3 sb.scorecardresearch.com 1 redirects cdn.taboola.com
threatpost.com
2 opps.taboola.com vidstat.taboola.com
2 pagead2.googlesyndication.com
2 ads.creative-serving.com 2 redirects
2 match.adsrvr.org 2 redirects
2 cm.g.doubleclick.net 2 redirects
2 ib.adnxs.com threatpost.com
2 sync.mathtag.com 2 redirects
2 rtb.mfadsrvr.com 2 redirects
2 www.google.de threatpost.com
2 stats.g.doubleclick.net 2 redirects
2 www.googletagmanager.com assets.threatpost.com
threatpost.com
2 cdnjs.cloudflare.com threatpost.com
assets.threatpost.com
1 analytics.twitter.com static.ads-twitter.com
1 vidstatb.taboola.com threatpost.com
1 pixel.quantserve.com threatpost.com
1 imprammp.taboola.com threatpost.com
1 cds.taboola.com threatpost.com
1 bttrack.com threatpost.com
1 www.storygize.net 1 redirects
1 px.powerlinks.com 1 redirects
1 pixel.rubiconproject.com threatpost.com
1 15.taboola.com cdn.taboola.com
1 t.co threatpost.com
1 rules.quantcount.com secure.quantserve.com
1 adservice.google.com www.googletagservices.com
1 adservice.google.de www.googletagservices.com
1 static.ads-twitter.com www.googletagmanager.com
1 secure.quantserve.com www.googletagmanager.com
1 www.reddit.com threatpost.com
1 www.linkedin.com threatpost.com
1 graph.facebook.com threatpost.com
1 www.googletagservices.com assets.threatpost.com
1 www.gstatic.com www.google.com
1 kasperskycontenthub.com threatpost.com
141 53
Subject Issuer Validity Valid
threatpost.com
Thawte EV RSA CA 2018
2019-06-17 -
2020-06-17
a year crt.sh
assets.threatpost.com
Amazon
2019-04-02 -
2020-05-02
a year crt.sh
ssl412106.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-08-10 -
2020-02-16
6 months crt.sh
kasperskycontenthub.com
Thawte RSA CA 2018
2019-06-14 -
2020-06-13
a year crt.sh
media.threatpost.com
Amazon
2019-04-02 -
2020-05-02
a year crt.sh
www.google.com
GTS CA 1O1
2019-10-03 -
2019-12-26
3 months crt.sh
*.google-analytics.com
GTS CA 1O1
2019-10-03 -
2019-12-26
3 months crt.sh
f2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-07-30 -
2020-07-25
a year crt.sh
*.google.com
GTS CA 1O1
2019-10-03 -
2019-12-26
3 months crt.sh
*.scorecardresearch.com
COMODO RSA Organization Validation Secure Server CA
2018-11-28 -
2019-12-26
a year crt.sh
*.g.doubleclick.net
GTS CA 1O1
2019-10-03 -
2019-12-26
3 months crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-09-22 -
2019-12-20
3 months crt.sh
www.linkedin.com
DigiCert SHA2 Secure Server CA
2018-05-30 -
2020-09-01
2 years crt.sh
*.reddit.com
DigiCert SHA2 Secure Server CA
2018-08-17 -
2020-09-02
2 years crt.sh
*.quantserve.com
DigiCert SHA2 High Assurance Server CA
2019-10-04 -
2020-10-07
a year crt.sh
ads-twitter.com
DigiCert SHA2 High Assurance Server CA
2019-08-14 -
2020-08-18
a year crt.sh
www.google.de
GTS CA 1O1
2019-10-03 -
2019-12-26
3 months crt.sh
t.co
DigiCert SHA2 High Assurance Server CA
2019-04-09 -
2020-04-01
a year crt.sh
g2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-05-03 -
2019-11-19
7 months crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2019-01-10 -
2021-01-14
2 years crt.sh
*.adnxs.com
DigiCert ECC Secure Server CA
2019-01-23 -
2021-03-08
2 years crt.sh
*.bttrack.com
Sectigo RSA Domain Validation Secure Server CA
2019-03-19 -
2021-04-13
2 years crt.sh
*.taboola.com
DigiCert ECC Secure Server CA
2019-09-03 -
2020-09-10
a year crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2019-10-03 -
2019-12-26
3 months crt.sh
*.twitter.com
DigiCert SHA2 High Assurance Server CA
2019-04-09 -
2020-04-01
a year crt.sh
misc-sni.google.com
GTS CA 1O1
2019-10-03 -
2019-12-26
3 months crt.sh
*.pubmatic.com
Sectigo RSA Organization Validation Secure Server CA
2019-02-22 -
2021-02-21
2 years crt.sh

This page contains 14 frames:

Primary Page: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Frame ID: 7E751E69BD7A12D0F22ADEB1E1E82D9D
Requests: 108 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=EQY1At-f1G9OIivZUYX73fK0&theme=standard&size=normal&cb=bcol2waffvmq
Frame ID: C35EAF59EDA4EB4E7F62C70B809D0380
Requests: 1 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/bframe?hl=en&v=EQY1At-f1G9OIivZUYX73fK0&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&cb=vmhl3ji4utm2
Frame ID: 299DD27E35AFD0CE828A38859D5F9B68
Requests: 1 HTTP requests in this frame

Frame: https://trc.taboola.com/sg/mediaforcebidder-network/1/rtb-h?taboola_hm=8022d0f9-d9c1-4e13-a45d-5102cea324d4
Frame ID: 6110A75334FF7AB3C7950F6C013F5518
Requests: 12 HTTP requests in this frame

Frame: https://imprammp.taboola.com/st?cipid=66301605&ttype=0&cirid=4914CDAE581581727041213028452&cicmp=2040445&cijs=1&dast=V7RgECFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHLRcjDYkBos1XKyGi91kN9gsR6vNZjRbDqbgMGWnyWU5qAWypsnld8MRmk6Hz3WvFx0tL4fp8Pec7hq_2692WP2Wt8JpOfwtp7faYfY9LC-3wnR6eLxuvemteXlcl6fp-VeMlpvNYC8HAAAAgAcAqPN8iB9AAIAIAAAAAAkAAAAAioCKfwuBCwAAAAAMgIPkcQ0AKA6Gc92tL7vR4fq87P4AAHgIAAEAGFAgASh4SCsByHDdOgEAAAAAAAAAYPn___-PGZh3LZUB-BDpuzHoAXjwAXgQAgAAyBoi-PfSxFQ5SSEqQCxiBAAAAADJ1OZxNKkTKosqAACCdCuAKwCAgDbyJ5KcLN1BibcwAAAAgbEFelj8frPDrvG7XQYAAAAAAAAAYPZ_9o8mRDTmlhbEUsCr9gsIALD2CwgAwKZuAABvAXBBR9CKwWB1ATE7AAAAgLv___9_PZCy2Da2mcvjWVh8i4XFN3JZLMONcTiZrQa7wXDkvfwjJWLHVJqOPocpO00uy0EtkDVNLr_9JmwxWk0mm-VwtlxMBsPRcDTan8CNBjhBw-FgsRssdovFcLKYjAbLwQIFYjDBCRmONpPVaLfaTZbDyWg020w2SNGq1Wy0GQxXs8lst1sNB8PlaIQUrVnMJpPFbLTcbQbLyWgwnAyHCAOL4XDlsk3WytFs4xYNJ661xDEYrlWTyXDjGI5MK9duLXp9TKeFaTnxuLwoGECzF8FFOhEdLS-H6fD3nN6io-XlMB3-ntNFLNGcLNKJ7LJvWWwb28zl8SwsvsXC4hu5LJbhxjiczFaD3WA48hcWw-HKZZuslaPZxi0aTlxriWMwXKsmk-HGMRyZVq7dWvT6mE4L03Licfkbq91itNyMVqN9Y7VbjJab0Wq079AZvqvP2Sitlksel2KjfcksM6dB4TJYvD-JaTHtzg6e3-_oVKkuGmND9k0ozAaPwaCIJYLTRToRvYyni1gieVqkE5XHODOOTBvjcuawrDaW4WKxWfk2C-dy4xutXM6JWKI0XaQTvdph9VveCqfl8Lec3mqH2fewvNwK0-nh8br1prfm5XFdnqbnXzFabjaDifqPDTEazXWzuWKwnGsGqwQAAAAAAAAAsIQ58yYAAAAAp8FsFrPJarkAEg_ju6Mm3QOhu3GuxY0fV9DR8nKYDn_P6S06Wl4O0-HvOV0ZQOJBHA!&excid=22&tst=1&docw=0&cs=false
Frame ID: 028993575DE5C972DCD4C053260EA5EB
Requests: 1 HTTP requests in this frame

Frame: https://match.taboola.com/sync?dast=V7RgECFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHLRcjDYkBos1XKyGi91kN9gsR6vNZjRbDqbgMGWnyWU5qAWypsnld8MRmk6Hz3WvFx0tL4fp8Pec7hq_2692WP2Wt8JpOfwtp7faYfY9LC-3wnR6eLxuvemteXlcl6fp-VeMlpvNYC8HAAAAgAcAqPN8iB9AAIAIAAAAAAkAAAAAioCKfwuBCwAAAAAMgIPkcQ0AKA6Gc92tL7vR4fq87P4AAHgIAAEAGFAgASh4SCsByHDdOgEAAAAAAAAAYPn___-PGZh3LZUB-BDpuzHoAXjwAXgQAgAAyBoi-PfSxFQ5SSEqQCxiBAAAAADJ1OZxNKkTKosqAACCdCuAKwCAgDbyJ5KcLN1BibcwAAAAgbEFelj8frPDrvG7XQYAAAAAAAAAYPZ_9o8mRDTmlhbEUsCr9gsIALD2CwgAwKZuAABvAXBBR9CKwWB1ATE7AAAAgLv___9_PZCy2Da2mcvjWVh8i4XFN3JZLMONcTiZrQa7wXDkvfwjJWLHVJqOPocpO00uy0EtkDVNLr_9JmwxWk0mm-VwtlxMBsPRcDTan8CNBjhBw-FgsRssdovFcLKYjAbLwQIFYjDBCRmONpPVaLfaTZbDyWg020w2SNGq1Wy0GQxXs8lst1sNB8PlaIQUrVnMJpPFbLTcbQbLyWgwnAyHCAOL4XDlsk3WytFs4xYNJ661xDEYrlWTyXDjGI5MK9duLXp9TKeFaTnxuLwoGECzF8FFOhEdLS-H6fD3nN6io-XlMB3-ntNFLNGcLNKJ7LJvWWwb28zl8SwsvsXC4hu5LJbhxjiczFaD3WA48hcWw-HKZZuslaPZxi0aTlxriWMwXKsmk-HGMRyZVq7dWvT6mE4L03Licfkbq91itNyMVqN9Y7VbjJab0Wq079AZvqvP2Sitlksel2KjfcksM6dB4TJYvD-JaTHtzg6e3-_oVKkuGmND9k0ozAaPwaCIJYLTRToRvYyni1gieVqkE5XHODOOTBvjcuawrDaW4WKxWfk2C-dy4xutXM6JWKI0XaQTvdph9VveCqfl8Lec3mqH2fewvNwK0-nh8br1prfm5XFdnqbnXzFabjaDifqPDTEazXWzuWKwnGsGqwQAAAAAAAAAsIQ58yYAAAAAp8FsFrPJarkAEg_ju6Mm3QOhu3GuxY0fV9DR8nKYDn_P6S06Wl4O0-HvOV0ZQOJBHA!&excid=22&docw=0&cijs=1
Frame ID: 94135D863C3B601E52B9836BBF202D31
Requests: 1 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/011910071804120/amp4ads-v0.js
Frame ID: 4DDCA886EB1D97A06600DA5FEC3F6E61
Requests: 6 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/011910071804120/amp4ads-v0.js
Frame ID: 1E77770E39BCA59C1D4E59B0A639273C
Requests: 6 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/011910071804120/amp4ads-v0.js
Frame ID: 896FD429A8CC52F71D8E496D4C19DF99
Requests: 5 HTTP requests in this frame

Frame: https://match.taboola.com/sync?dast=V7RgECFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHLRcjDYkBos1XKyGi91kN9gsR6vNZjRbDqbgMGWnyWU5qAWypsnld8MRmk6Hz3WvFx0tL4fp8Pec7hq_2692WP2Wt8JpOfwtp7faYfY9LC-3wnR6eLxuvemteXlcl6fp-VeMlpvNYC8HAAAAgAcAqPN8iB9AAIAIAAAAAAkAAAAAioCKfwuBCwAAAAAMgIPkcQ0AKA6Gc92tL7vR4fq87P4AAHgIAAEAGFAgASh4SCsByHDdOgEAAAAAAAAAYPn___-PGZh3LZUB-BDpuzHoAXjwAXgQAgAAyBoi-PfSxFQ5SSEqQCxiBAAAAADJ1OZxNKkTKosqAACCdCuAKwCAgDbyJ5KcLN1BibcwAAAAgbEFelj8frPDrvG7XQYAAAAAAAAAYPZ_9o8mRDTmlhbEUsCr9gsIALD2CwgAwKZuAABvAXBBR9CKwWB1ATE7AAAAgLv___9_PZCy2Da2mcvjWVh8i4XFN3JZLMONcTiZrQa7wXDkvfwjJWLHVJqOPocpO00uy0EtkDVNLr_9JmwxWk0mm-VwtlxMBsPRcDTan8CNBjhBw-FgsRssdovFcLKYjAbLwQIFYjDBCRmONpPVaLfaTZbDyWg020w2SNGq1Wy0GQxXs8lst1sNB8PlaIQUrVnMJpPFbLTcbQbLyWgwnAyHCAOL4XDlsk3WytFs4xYNJ661xDEYrlWTyXDjGI5MK9duLXp9TKeFaTnxuLwoGECzF8FFOhEdLS-H6fD3nN6io-XlMB3-ntNFLNGcLNKJ7LJvWWwb28zl8SwsvsXC4hu5LJbhxjiczFaD3WA48hcWw-HKZZuslaPZxi0aTlxriWMwXKsmk-HGMRyZVq7dWvT6mE4L03Licfkbq91itNyMVqN9Y7VbjJab0Wq079AZvqvP2Sitlksel2KjfcksM6dB4TJYvD-JaTHtzg6e3-_oVKkuGmND9k0ozAaPwaCIJYLTRToRvYyni1gieVqkE5XHODOOTBvjcuawrDaW4WKxWfk2C-dy4xutXM6JWKI0XaQTvdph9VveCqfl8Lec3mqH2fewvNwK0-nh8br1prfm5XFdnqbnXzFabjaDifqPDTEazXWzuWKwnGsGqwQAAAAAAAAAsIQ58yYAAAAAp8FsFrPJarkAEg_ju6Mm3QOhu3GuxY0fV9DR8nKYDn_P6S06Wl4O0-HvOV0ZQOJBHA!&excid=22&docw=0&cijs=1
Frame ID: FDE3DE4E71F58A6ED9D9ED76CD0B6255
Requests: 1 HTTP requests in this frame

Frame: https://match.taboola.com/sync?dast=V7RgECFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHLRcjDYkBos1XKyGi91kN9gsR6vNZjRbDqbgMGWnyWU5qAWypsnld8MRmk6Hz3WvFx0tL4fp8Pec7hq_2692WP2Wt8JpOfwtp7faYfY9LC-3wnR6eLxuvemteXlcl6fp-VeMlpvNYC8HAAAAgAcAqPN8iB9AAIAIAAAAAAkAAAAAioCKfwuBCwAAAAAMgIPkcQ0AKA6Gc92tL7vR4fq87P4AAHgIAAEAGFAgASh4SCsByHDdOgEAAAAAAAAAYPn___-PGZh3LZUB-BDpuzHoAXjwAXgQAgAAyBoi-PfSxFQ5SSEqQCxiBAAAAADJ1OZxNKkTKosqAACCdCuAKwCAgDbyJ5KcLN1BibcwAAAAgbEFelj8frPDrvG7XQYAAAAAAAAAYPZ_9o8mRDTmlhbEUsCr9gsIALD2CwgAwKZuAABvAXBBR9CKwWB1ATE7AAAAgLv___9_PZCy2Da2mcvjWVh8i4XFN3JZLMONcTiZrQa7wXDkvfwjJWLHVJqOPocpO00uy0EtkDVNLr_9JmwxWk0mm-VwtlxMBsPRcDTan8CNBjhBw-FgsRssdovFcLKYjAbLwQIFYjDBCRmONpPVaLfaTZbDyWg020w2SNGq1Wy0GQxXs8lst1sNB8PlaIQUrVnMJpPFbLTcbQbLyWgwnAyHCAOL4XDlsk3WytFs4xYNJ661xDEYrlWTyXDjGI5MK9duLXp9TKeFaTnxuLwoGECzF8FFOhEdLS-H6fD3nN6io-XlMB3-ntNFLNGcLNKJ7LJvWWwb28zl8SwsvsXC4hu5LJbhxjiczFaD3WA48hcWw-HKZZuslaPZxi0aTlxriWMwXKsmk-HGMRyZVq7dWvT6mE4L03Licfkbq91itNyMVqN9Y7VbjJab0Wq079AZvqvP2Sitlksel2KjfcksM6dB4TJYvD-JaTHtzg6e3-_oVKkuGmND9k0ozAaPwaCIJYLTRToRvYyni1gieVqkE5XHODOOTBvjcuawrDaW4WKxWfk2C-dy4xutXM6JWKI0XaQTvdph9VveCqfl8Lec3mqH2fewvNwK0-nh8br1prfm5XFdnqbnXzFabjaDifqPDTEazXWzuWKwnGsGqwQAAAAAAAAAsIQ58yYAAAAAp8FsFrPJarkAEg_ju6Mm3QOhu3GuxY0fV9DR8nKYDn_P6S06Wl4O0-HvOV0ZQOJBHA!&excid=22&docw=0&cijs=1
Frame ID: 90926FCC4D527126E062866F44A3E04A
Requests: 1 HTTP requests in this frame

Frame: https://match.taboola.com/sync?dast=V7RgECFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHLRcjDYkBos1XKyGi91kN9gsR6vNZjRbDqbgMGWnyWU5qAWypsnld8MRmk6Hz3WvFx0tL4fp8Pec7hq_2692WP2Wt8JpOfwtp7faYfY9LC-3wnR6eLxuvemteXlcl6fp-VeMlpvNYC8HAAAAgAcAqPN8iB9AAIAIAAAAAAkAAAAAioCKfwuBCwAAAAAMgIPkcQ0AKA6Gc92tL7vR4fq87P4AAHgIAAEAGFAgASh4SCsByHDdOgEAAAAAAAAAYPn___-PGZh3LZUB-BDpuzHoAXjwAXgQAgAAyBoi-PfSxFQ5SSEqQCxiBAAAAADJ1OZxNKkTKosqAACCdCuAKwCAgDbyJ5KcLN1BibcwAAAAgbEFelj8frPDrvG7XQYAAAAAAAAAYPZ_9o8mRDTmlhbEUsCr9gsIALD2CwgAwKZuAABvAXBBR9CKwWB1ATE7AAAAgLv___9_PZCy2Da2mcvjWVh8i4XFN3JZLMONcTiZrQa7wXDkvfwjJWLHVJqOPocpO00uy0EtkDVNLr_9JmwxWk0mm-VwtlxMBsPRcDTan8CNBjhBw-FgsRssdovFcLKYjAbLwQIFYjDBCRmONpPVaLfaTZbDyWg020w2SNGq1Wy0GQxXs8lst1sNB8PlaIQUrVnMJpPFbLTcbQbLyWgwnAyHCAOL4XDlsk3WytFs4xYNJ661xDEYrlWTyXDjGI5MK9duLXp9TKeFaTnxuLwoGECzF8FFOhEdLS-H6fD3nN6io-XlMB3-ntNFLNGcLNKJ7LJvWWwb28zl8SwsvsXC4hu5LJbhxjiczFaD3WA48hcWw-HKZZuslaPZxi0aTlxriWMwXKsmk-HGMRyZVq7dWvT6mE4L03Licfkbq91itNyMVqN9Y7VbjJab0Wq079AZvqvP2Sitlksel2KjfcksM6dB4TJYvD-JaTHtzg6e3-_oVKkuGmND9k0ozAaPwaCIJYLTRToRvYyni1gieVqkE5XHODOOTBvjcuawrDaW4WKxWfk2C-dy4xutXM6JWKI0XaQTvdph9VveCqfl8Lec3mqH2fewvNwK0-nh8br1prfm5XFdnqbnXzFabjaDifqPDTEazXWzuWKwnGsGqwQAAAAAAAAAsIQ58yYAAAAAp8FsFrPJarkAEg_ju6Mm3QOhu3GuxY0fV9DR8nKYDn_P6S06Wl4O0-HvOV0ZQOJBHA!&excid=22&docw=0&cijs=1
Frame ID: C6EBB91978EC9EE4A78830803665BD1A
Requests: 1 HTTP requests in this frame

Frame: https://match.taboola.com/sync?dast=V7RgECFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHLRcjDYkBos1XKyGi91kN9gsR6vNZjRbDqbgMGWnyWU5qAWypsnld8MRmk6Hz3WvFx0tL4fp8Pec7hq_2692WP2Wt8JpOfwtp7faYfY9LC-3wnR6eLxuvemteXlcl6fp-VeMlpvNYC8HAAAAgAcAqPN8iB9AAIAIAAAAAAkAAAAAioCKfwuBCwAAAAAMgIPkcQ0AKA6Gc92tL7vR4fq87P4AAHgIAAEAGFAgASh4SCsByHDdOgEAAAAAAAAAYPn___-PGZh3LZUB-BDpuzHoAXjwAXgQAgAAyBoi-PfSxFQ5SSEqQCxiBAAAAADJ1OZxNKkTKosqAACCdCuAKwCAgDbyJ5KcLN1BibcwAAAAgbEFelj8frPDrvG7XQYAAAAAAAAAYPZ_9o8mRDTmlhbEUsCr9gsIALD2CwgAwKZuAABvAXBBR9CKwWB1ATE7AAAAgLv___9_PZCy2Da2mcvjWVh8i4XFN3JZLMONcTiZrQa7wXDkvfwjJWLHVJqOPocpO00uy0EtkDVNLr_9JmwxWk0mm-VwtlxMBsPRcDTan8CNBjhBw-FgsRssdovFcLKYjAbLwQIFYjDBCRmONpPVaLfaTZbDyWg020w2SNGq1Wy0GQxXs8lst1sNB8PlaIQUrVnMJpPFbLTcbQbLyWgwnAyHCAOL4XDlsk3WytFs4xYNJ661xDEYrlWTyXDjGI5MK9duLXp9TKeFaTnxuLwoGECzF8FFOhEdLS-H6fD3nN6io-XlMB3-ntNFLNGcLNKJ7LJvWWwb28zl8SwsvsXC4hu5LJbhxjiczFaD3WA48hcWw-HKZZuslaPZxi0aTlxriWMwXKsmk-HGMRyZVq7dWvT6mE4L03Licfkbq91itNyMVqN9Y7VbjJab0Wq079AZvqvP2Sitlksel2KjfcksM6dB4TJYvD-JaTHtzg6e3-_oVKkuGmND9k0ozAaPwaCIJYLTRToRvYyni1gieVqkE5XHODOOTBvjcuawrDaW4WKxWfk2C-dy4xutXM6JWKI0XaQTvdph9VveCqfl8Lec3mqH2fewvNwK0-nh8br1prfm5XFdnqbnXzFabjaDifqPDTEazXWzuWKwnGsGqwQAAAAAAAAAsIQ58yYAAAAAp8FsFrPJarkAEg_ju6Mm3QOhu3GuxY0fV9DR8nKYDn_P6S06Wl4O0-HvOV0ZQOJBHA!&excid=22&docw=0&cijs=1
Frame ID: FDD1639B56D495EDD0F487BA79423F6D
Requests: 1 HTTP requests in this frame

Frame: https://match.taboola.com/sync?dast=V7RgECFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHLRcjDYkBos1XKyGi91kN9gsR6vNZjRbDqbgMGWnyWU5qAWypsnld8MRmk6Hz3WvFx0tL4fp8Pec7hq_2692WP2Wt8JpOfwtp7faYfY9LC-3wnR6eLxuvemteXlcl6fp-VeMlpvNYC8HAAAAgAcAqPN8iB9AAIAIAAAAAAkAAAAAioCKfwuBCwAAAAAMgIPkcQ0AKA6Gc92tL7vR4fq87P4AAHgIAAEAGFAgASh4SCsByHDdOgEAAAAAAAAAYPn___-PGZh3LZUB-BDpuzHoAXjwAXgQAgAAyBoi-PfSxFQ5SSEqQCxiBAAAAADJ1OZxNKkTKosqAACCdCuAKwCAgDbyJ5KcLN1BibcwAAAAgbEFelj8frPDrvG7XQYAAAAAAAAAYPZ_9o8mRDTmlhbEUsCr9gsIALD2CwgAwKZuAABvAXBBR9CKwWB1ATE7AAAAgLv___9_PZCy2Da2mcvjWVh8i4XFN3JZLMONcTiZrQa7wXDkvfwjJWLHVJqOPocpO00uy0EtkDVNLr_9JmwxWk0mm-VwtlxMBsPRcDTan8CNBjhBw-FgsRssdovFcLKYjAbLwQIFYjDBCRmONpPVaLfaTZbDyWg020w2SNGq1Wy0GQxXs8lst1sNB8PlaIQUrVnMJpPFbLTcbQbLyWgwnAyHCAOL4XDlsk3WytFs4xYNJ661xDEYrlWTyXDjGI5MK9duLXp9TKeFaTnxuLwoGECzF8FFOhEdLS-H6fD3nN6io-XlMB3-ntNFLNGcLNKJ7LJvWWwb28zl8SwsvsXC4hu5LJbhxjiczFaD3WA48hcWw-HKZZuslaPZxi0aTlxriWMwXKsmk-HGMRyZVq7dWvT6mE4L03Licfkbq91itNyMVqN9Y7VbjJab0Wq079AZvqvP2Sitlksel2KjfcksM6dB4TJYvD-JaTHtzg6e3-_oVKkuGmND9k0ozAaPwaCIJYLTRToRvYyni1gieVqkE5XHODOOTBvjcuawrDaW4WKxWfk2C-dy4xutXM6JWKI0XaQTvdph9VveCqfl8Lec3mqH2fewvNwK0-nh8br1prfm5XFdnqbnXzFabjaDifqPDTEazXWzuWKwnGsGqwQAAAAAAAAAsIQ58yYAAAAAp8FsFrPJarkAEg_ju6Mm3QOhu3GuxY0fV9DR8nKYDn_P6S06Wl4O0-HvOV0ZQOJBHA!&excid=22&docw=0&cijs=1
Frame ID: 941ACB772AB89CFD8038E6FBE028D6DB
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /googletagservices\.com\/tag\/js\/gpt(?:_mobile)?\.js/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • script /\.quantserve\.com\/quant\.js/i

Overall confidence: 100%
Detected patterns
  • html /<iframe[^>]* (?:id="comscore"|scr=[^>]+comscore)|\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • script /\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i

Overall confidence: 100%
Detected patterns
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

141
Requests

99 %
HTTPS

36 %
IPv6

33
Domains

53
Subdomains

36
IPs

7
Countries

2419 kB
Transfer

9154 kB
Size

3
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 49
  • https://sb.scorecardresearch.com/b?c1=7&c2=13739933&c3=20121515121&ns__t=1571493454537&ns_c=UTF-8&cv=3.1e&c8=Major%20Airport%20Malware%20Attack%20Shines%20a%20Light%20on%20OT%20Security%20%7C%20Threatpost&c7=https%3A%2F%2Fthreatpost.com%2Fmajor-airport-malware-attack-ot-security%2F149330%2F&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1571493454537&ns_c=UTF-8&cv=3.1e&c8=Major%20Airport%20Malware%20Attack%20Shines%20a%20Light%20on%20OT%20Security%20%7C%20Threatpost&c7=https%3A%2F%2Fthreatpost.com%2Fmajor-airport-malware-attack-ot-security%2F149330%2F&c9=
Request Chain 56
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&aip=1&a=1716329525&t=pageview&_s=1&dl=https%3A%2F%2Fthreatpost.com%2Fmajor-airport-malware-attack-ot-security%2F149330%2F&ul=en-us&de=UTF-8&dt=Major%20Airport%20Malware%20Attack%20Shines%20a%20Light%20on%20OT%20Security%20%7C%20Threatpost&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=YEBAAEAB~&jid=381308550&gjid=1090372960&cid=1086503215.1571493455&tid=UA-35676203-21&_gid=1032950352.1571493455&_r=1&gtm=2wgaa0PM29HLF&z=439365230 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-35676203-21&cid=1086503215.1571493455&jid=381308550&_gid=1032950352.1571493455&gjid=1090372960&_v=j79&z=439365230 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=1086503215.1571493455&jid=381308550&_v=j79&z=439365230 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=1086503215.1571493455&jid=381308550&_v=j79&z=439365230&slf_rd=1&random=1458572625
Request Chain 62
  • https://rtb.mfadsrvr.com/sync?ssp=taboola HTTP 302
  • https://rtb.mfadsrvr.com/ul_cb/sync?ssp=taboola HTTP 302
  • https://trc.taboola.com/sg/mediaforcebidder-network/1/rtb-h?taboola_hm=8022d0f9-d9c1-4e13-a45d-5102cea324d4
Request Chain 64
  • https://px.powerlinks.com/user/identify?sourceId=d4a7a706-ab0f-11e8-a038-127202fb7690&rurl=https%3A%2F%2Ftrc.taboola.com%2Fsg%2Fpowerlinksdsp-network%2F1%2Frtb-h%2F%3Ftaboola_hm%3D%24%7BUSER%7D HTTP 302
  • https://trc.taboola.com/sg/powerlinksdsp-network/1/rtb-h/?taboola_hm=7iTM4WLZpoLWWJHcLureg-qQflbf2hY6fqII-ujpjcY%3D
Request Chain 65
  • https://sync.mathtag.com/sync/img?mt_exid=92&redir=https://trc.taboola.com/sg/mediamath-ssp-network/1/rtb-h/?taboola_hm=[MM_UUID] HTTP 302
  • https://sync.mathtag.com/sync/img?mt_exid=92&redir=https://trc.taboola.com/sg/mediamath-ssp-network/1/rtb-h/?taboola_hm=[MM_UUID]&mm_bnc&mm_bct&UUID=83a75dab-09ac-4200-90ef-6f7981b80818 HTTP 302
  • https://trc.taboola.com/sg/mediamath-ssp-network/1/rtb-h/?taboola_hm=83a75dab-09ac-4200-90ef-6f7981b80818 HTTP 302
  • https://match.taboola.com/sg/mediamath-ssp-network/1/rtb-h?taboola_hm=83a75dab-09ac-4200-90ef-6f7981b80818&tbid=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce&query=taboola_hm%3D83a75dab-09ac-4200-90ef-6f7981b80818
Request Chain 67
  • https://cm.g.doubleclick.net/pixel?google_nid=taboola_dbm&google_cm&google_sc HTTP 302
  • https://cm.g.doubleclick.net/pixel?google_nid=taboola_dbm&google_cm=&google_sc=&google_tc= HTTP 302
  • https://trc.taboola.com/sg/google-network/1/rtb-h/?taboola_hm=CAESEPwdSv_-fYUYw5jg37t14hE&google_cver=1 HTTP 302
  • https://match.taboola.com/sg/google-network/1/rtb-h?taboola_hm=CAESEPwdSv_-fYUYw5jg37t14hE&tbid=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce&query=taboola_hm%3DCAESEPwdSv_-fYUYw5jg37t14hE%26google_cver%3D1
Request Chain 69
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=054f32o&ttd_tpi=1 HTTP 302
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=054f32o&ttd_tpi=1 HTTP 302
  • https://trc.taboola.com/sg/thetradedesk-network/1/rtb-h/?taboola_hm=ddbb137a-6d66-417e-adcb-e32f4ef70c6d HTTP 302
  • https://match.taboola.com/sg/thetradedesk-network/1/rtb-h?taboola_hm=ddbb137a-6d66-417e-adcb-e32f4ef70c6d&tbid=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce&query=taboola_hm%3Dddbb137a-6d66-417e-adcb-e32f4ef70c6d
Request Chain 70
  • https://www.storygize.net/ccm/4b560cdd-91f9-422b-adb7-e9dff26bc3ad?u=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce HTTP 302
  • https://trc.taboola.com/sg/storygize-network/1/rtb-h?taboola_hm=b513cbb1-bd05-4837-91d3-72312142bc7c HTTP 302
  • https://match.taboola.com/sg/storygize-network/1/rtb-h?taboola_hm=b513cbb1-bd05-4837-91d3-72312142bc7c&tbid=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce&query=taboola_hm%3Db513cbb1-bd05-4837-91d3-72312142bc7c
Request Chain 73
  • https://x.bidswitch.net/sync?ssp=taboola HTTP 302
  • https://x.bidswitch.net/ul_cb/sync?ssp=taboola HTTP 302
  • https://ads.creative-serving.com/bsw_sync?bidswitch_ssp_id=taboola&bsw_custom_parameter=ec717adc-467f-4294-95d7-873077a55f97 HTTP 302
  • https://ads.creative-serving.com/ul_cb/bsw_sync?bidswitch_ssp_id=taboola&bsw_custom_parameter=ec717adc-467f-4294-95d7-873077a55f97 HTTP 302
  • https://x.bidswitch.net/sync?dsp_id=4&user_id=72a57edf-e46a-47b0-99dd-260c810939ab&ssp=taboola&expires=30&user_group=5&bsw_param=ec717adc-467f-4294-95d7-873077a55f97 HTTP 302
  • https://trc.taboola.com/sg/bidswitch-network/1/rtb-h/?taboola_hm=ec717adc-467f-4294-95d7-873077a55f97 HTTP 302
  • https://match.taboola.com/sg/bidswitch-network/1/rtb-h?taboola_hm=ec717adc-467f-4294-95d7-873077a55f97&tbid=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce&query=taboola_hm%3Dec717adc-467f-4294-95d7-873077a55f97
Request Chain 110
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&a=1716329525&t=pageview&_s=1&dl=https%3A%2F%2Fthreatpost.com%2Fmajor-airport-malware-attack-ot-security%2F149330%2F&ul=en-us&de=UTF-8&dt=Major%20Airport%20Malware%20Attack%20Shines%20a%20Light%20on%20OT%20Security%20%7C%20Threatpost&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=aEhAAUAB~&jid=115668203&gjid=196739357&cid=2039105488.1571493456&tid=UA-109681207-2&_gid=227326998.1571493456&_r=1&gtm=2ouaa0&z=2074647833 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-109681207-2&cid=2039105488.1571493456&jid=115668203&_gid=227326998.1571493456&gjid=196739357&_v=j79&z=2074647833 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-109681207-2&cid=2039105488.1571493456&jid=115668203&_v=j79&z=2074647833 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-109681207-2&cid=2039105488.1571493456&jid=115668203&_v=j79&z=2074647833&slf_rd=1&random=979449891

141 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
threatpost.com/major-airport-malware-attack-ot-security/149330/
77 KB
20 KB
Document
General
Full URL
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
3599617230199f76a9a0a502f9526c03cca35b35fa7fe147420f71a34deb83b7
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Host
threatpost.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
none
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1

Response headers

Server
nginx
Date
Sat, 19 Oct 2019 13:57:33 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
close
X-Frame-Options
SAMEORIGIN SAMEORIGIN
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Link
<https://threatpost.com/wp-json/>; rel="https://api.w.org/" <https://threatpost.com/?p=149330>; rel=shortlink
x-cache-hit
HIT
Content-Encoding
gzip
main.css
threatpost.com/wp-content/themes/threatpost-2018/assets/css/
217 KB
34 KB
Stylesheet
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1571385382
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
d7ba44e03247efd9fab0368aa77fd4cc25bfd55d5b172327c48a371a12890673

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Sat, 19 Oct 2019 13:57:34 GMT
Content-Encoding
gzip
Last-Modified
Fri, 18 Oct 2019 07:56:21 GMT
Server
nginx
ETag
W/"5da97025-362da"
Transfer-Encoding
chunked
Content-Type
text/css
Cache-Control
max-age=604800, public
Connection
close
Expires
Sat, 26 Oct 2019 13:57:34 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
66 KB
15 KB
Stylesheet
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-includes/css/dist/block-library/style.min.css,wp-content/plugins/wds-kaspersky-widgets/css/trending-authors.css,wp-content/plugins/wds-rss-builder/includes/css/select2.min.css,wp-content/plugins/wds-rss-builder/includes/css/wds-rss.css,wp-content/plugins/honeypot-comments/public/assets/css/public.css,wp-content/plugins/kspr_twitter_pullquote/css/style.css,wp-content/plugins/pullquote-shortcode/css/pullquote-shortcode.css,wp-content/plugins/kaspersky-social-sharing/assets/css/style.css,wp-content/plugins/kaspersky-social-sharing/assets/css/custom.css&ver=a952533b
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:1c00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
44ef9b8be9758f4944226128bcbd68f44fca4b8a4d272ad3288427bbd96accb8
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 08:08:24 GMT
content-encoding
gzip
vary
Accept-Encoding
age
20949
x-cache
Hit from cloudfront
status
200
content-length
15126
last-modified
Fri, 18 Oct 2019 07:56:20 GMT
server
nginx
cache-control
max-age=86400
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
via
1.1 52f0756596448c36265861853c0a44a4.cloudfront.net (CloudFront)
x-cache-hit
MISS
x-amz-cf-pop
FRA2-C2
x-amz-cf-id
TMtmwGm-Vn-Bow5DpD7K5CA121tnyKQwUigboCYD4YE82H2CyPA2ng==
expires
Sat, 19 Oct 2019 07:56:45 GMT
postscribe.min.js
cdnjs.cloudflare.com/ajax/libs/postscribe/2.0.8/
17 KB
6 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/postscribe/2.0.8/postscribe.min.js?ver=5.2.4
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:c497 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
c4e20f53f5ef0ed44b783437aa3f4638a9a56cc4aa29ae83ed9212eb2807052a
Security Headers
Name Value
Strict-Transport-Security max-age=15780000; includeSubDomains

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:33 GMT
content-encoding
br
vary
Accept-Encoding
cf-cache-status
HIT
age
16127390
status
200
served-in-seconds
0.078
timing-allow-origin
*
last-modified
Thu, 17 May 2018 09:26:22 GMT
server
cloudflare
etag
W/"5afd4abe-45f4"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15780000; includeSubDomains
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=30672000
cf-ray
528343064d19cb98-VIE
expires
Thu, 08 Oct 2020 13:57:33 GMT
jquery.js
threatpost.com/wp-includes/js/jquery/
95 KB
37 KB
Script
General
Full URL
https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
1db21d816296e6939ba1f42962496e4134ae2b0081e26970864c40c6d02bb1df

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Sat, 19 Oct 2019 13:57:34 GMT
Content-Encoding
gzip
Last-Modified
Mon, 14 Oct 2019 20:47:26 GMT
Server
nginx
ETag
W/"5da4dede-17a69"
Transfer-Encoding
chunked
Content-Type
application/x-javascript
Cache-Control
max-age=604800, public
Connection
close
Expires
Sat, 26 Oct 2019 13:57:34 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
133 KB
35 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/adrupt-options/dist/js/adrupt.ads.min.js,wp-content/plugins/kaspersky-cookies-notification/scripts/alert_text.js,wp-content/plugins/kaspersky-cookies-notification/scripts/alert.js,wp-content/plugins/kaspersky-taboola-ads/assets/js/start.js,wp-content/plugins/honeypot-comments/public/assets/js/public.js,wp-content/plugins/kspr_twitter_pullquote/js/kaspersky-twitter-pullquote.js,wp-content/themes/threatpost-2018/assets/js/main.js,wp-content/themes/threatpost-2018/assets/js/loadmore.js,wp-content/plugins/kaspersky-social-sharing/assets/js/social-share.js&ver=a952533b
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:1c00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
60f7c04e003009ea44b161f7a8c4c76f14ae490a3937ceaaf1be52e1a7e8aa60
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 18 Oct 2019 07:59:18 GMT
content-encoding
gzip
vary
Accept-Encoding
age
20788
x-cache
Hit from cloudfront
status
200
content-length
35435
last-modified
Fri, 18 Oct 2019 07:56:22 GMT
server
nginx
x-cache-hit
HIT
x-frame-options
SAMEORIGIN
content-type
application/x-javascript; charset=utf-8
via
1.1 52f0756596448c36265861853c0a44a4.cloudfront.net (CloudFront)
cache-control
max-age=86400
x-amz-cf-pop
FRA2-C2
x-amz-cf-id
Qb7QDDD_ZI-2kxZ2HCLnlWfPlK5x-UFdhctB0yZDeTA2HNDCUANOag==
expires
Sat, 19 Oct 2019 07:57:20 GMT
/
kasperskycontenthub.com/
0
367 B
Script
General
Full URL
https://kasperskycontenthub.com/?dm=ed1f9e435dc885292eab65620c51f3fb&action=load&blogid=103&siteid=1&t=40392301&back=https%3A%2F%2Fthreatpost.com%2Fmajor-airport-malware-attack-ot-security%2F149330%2F
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN, SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sat, 19 Oct 2019 13:57:34 GMT
X-Content-Type-Options
nosniff
Server
nginx
X-Frame-Options
SAMEORIGIN, SAMEORIGIN
Connection
close
Content-Type
application/javascript
x-cache-hit
HIT
Transfer-Encoding
chunked
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-XSS-Protection
1; mode=block
adrupt_style.css
threatpost.com/wp-content/plugins/adrupt-options/dist/css/
0
331 B
Stylesheet
General
Full URL
https://threatpost.com/wp-content/plugins/adrupt-options/dist/css/adrupt_style.css
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Sat, 19 Oct 2019 13:57:34 GMT
Last-Modified
Fri, 18 Oct 2019 07:56:19 GMT
Server
nginx
ETag
"5da97023-0"
Content-Type
text/css
Cache-Control
max-age=604800, public
Connection
close
Accept-Ranges
bytes
Content-Length
0
Expires
Sat, 26 Oct 2019 13:57:34 GMT
airline-data.jpeg
media.threatpost.com/wp-content/uploads/sites/103/2019/02/07101809/
78 KB
79 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/02/07101809/airline-data.jpeg
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:5e00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
4bff46db2e8c01bf28ea601885b224c49cc7d4050867941b1d166eafbfafc77c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 18 Oct 2019 14:34:03 GMT
via
1.1 57d93b321db68494cc6755a0d3fb29cd.cloudfront.net (CloudFront), 1.1 ec9e3bc729d9c6d55ed32446408ad62f.cloudfront.net (CloudFront)
last-modified
Thu, 07 Feb 2019 15:18:10 GMT
server
AmazonS3
age
78983
etag
"91aa045c0d9f33ab261864fa1e2db7f4"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA2-C2, FRA2-C2
accept-ranges
bytes
content-length
80315
x-amz-cf-id
79w__ZuN_lg2rzmAxgq5pDz_ni4gzO16c_gwg5wG6lG3conWOZTG7w==
expires
Fri, 07 Feb 2020 15:18:09 GMT
Tara-headshot.jpg
media.threatpost.com/wp-content/uploads/sites/103/2018/08/15114841/
13 KB
13 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2018/08/15114841/Tara-headshot.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:5e00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
89ce08431545cd3c6d42419d99ee0152027a68c1d0c7c82838cc9a51d9d52451

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 22 Sep 2019 06:30:57 GMT
via
1.1 560d8d35213ac925f8d05c5730db1582.cloudfront.net (CloudFront), 1.1 ec9e3bc729d9c6d55ed32446408ad62f.cloudfront.net (CloudFront)
last-modified
Fri, 17 Aug 2018 16:22:08 GMT
server
AmazonS3
age
481218
etag
"dee18dfeea6de13bec60c1e5237eb723"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA6-C1, FRA2-C2
accept-ranges
bytes
content-length
13097
x-amz-cf-id
Elmf1bo96YsmREfhU6ks7PWYCc_zUiThJgjGldAMJORmfQgFhr58mQ==
expires
Sat, 17 Aug 2019 16:22:07 GMT
subscribe2.jpg
media.threatpost.com/wp-content/uploads/sites/103/2019/02/19151457/
8 KB
9 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/02/19151457/subscribe2.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:5e00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
aa64fa30a3263fa3105736228a6feaaa4f7d32d8ef96b12e56f6fb95511b66a7

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 08 Sep 2019 02:37:10 GMT
via
1.1 f0dda47e8f83bee88cb60d3d2e3fa5e5.cloudfront.net (CloudFront), 1.1 ec9e3bc729d9c6d55ed32446408ad62f.cloudfront.net (CloudFront)
last-modified
Tue, 19 Feb 2019 20:14:58 GMT
server
AmazonS3
age
3583224
etag
"5ba45563f793f39ef6baf02645651654"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA2-C2, FRA2-C2
accept-ranges
bytes
content-length
8281
x-amz-cf-id
wZ1xg8x_VscVbhj298o_4ZlxzOGAAOmQbdVaU8xydCRfoPKyXrU4Zg==
expires
Wed, 19 Feb 2020 20:14:57 GMT
insider-threat-2-540x270.jpg
media.threatpost.com/wp-content/uploads/sites/103/2019/10/17164730/
17 KB
17 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/10/17164730/insider-threat-2-540x270.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:5e00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
56c77bc36bb3d7a3b762d944e4ed12ae8709e902baeda833987bf269add79780

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 18 Oct 2019 14:05:56 GMT
via
1.1 f7bf326347bdd7f275a38a22b5b83724.cloudfront.net (CloudFront), 1.1 ec9e3bc729d9c6d55ed32446408ad62f.cloudfront.net (CloudFront)
last-modified
Thu, 17 Oct 2019 20:47:33 GMT
server
AmazonS3
age
85594
etag
"b07423430d244066ac3c4d4ec25beaee"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA2-C1, FRA2-C2
accept-ranges
bytes
content-length
17342
x-amz-cf-id
TEkaf6FKnGmGIq1UtXWWZUGSaKe8TS_asm5hjFXSMIbXoAieLQuC6A==
expires
Fri, 16 Oct 2020 20:47:30 GMT
phishing-podcast-1-1-540x270.png
media.threatpost.com/wp-content/uploads/sites/103/2019/09/10174508/
40 KB
40 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/09/10174508/phishing-podcast-1-1-540x270.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:5e00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
3dabc908ae8d938725d07f543b58524d5b731fc9d949ab29465d5852ad92e000

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:55:58 GMT
via
1.1 172e63b20fb363ed969de28ae3937e21.cloudfront.net (CloudFront), 1.1 ec9e3bc729d9c6d55ed32446408ad62f.cloudfront.net (CloudFront)
last-modified
Tue, 10 Sep 2019 21:45:11 GMT
server
AmazonS3
age
243774
etag
"380d85961c9107d379374fd8883edab2"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA2-C1, FRA2-C2
accept-ranges
bytes
content-length
40547
x-amz-cf-id
11ShlMvl-1ZOrSPYHZQl2Cz8nLWhBYC3O_yJEp-ULWnc-7T_JTeYgw==
expires
Wed, 09 Sep 2020 21:45:08 GMT
Docker-Image-Container-540x270.png
media.threatpost.com/wp-content/uploads/sites/103/2019/05/09121557/
20 KB
20 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/05/09121557/Docker-Image-Container-540x270.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:5e00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
cb56ea2ae728835d47ab509703160b9066e16636a8092bf35a2a48f232595418

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 15:29:30 GMT
via
1.1 a10d58b5ce965502cc34c5b27682fe23.cloudfront.net (CloudFront), 1.1 ec9e3bc729d9c6d55ed32446408ad62f.cloudfront.net (CloudFront)
last-modified
Thu, 09 May 2019 16:16:00 GMT
server
AmazonS3
age
46632
etag
"b31d73ebd1c0f66f54a9ceb854b09bf4"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA2-C2, FRA2-C2
accept-ranges
bytes
content-length
20233
x-amz-cf-id
WebwWbwYCMxz2TFo-KsrX_iwXt0l7NvsR7qjMCXKZ_ASvn8MBKDQUQ==
expires
Fri, 08 May 2020 16:15:57 GMT
api.js
www.google.com/recaptcha/
729 B
556 B
Script
General
Full URL
https://www.google.com/recaptcha/api.js?hl=en
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
GSE /
Resource Hash
75511c5bc749c610b2c9aa02564cf2b0aa109417410622ae8eb8e112f7c689b8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
GSE
x-frame-options
SAMEORIGIN
content-type
text/javascript; charset=UTF-8
status
200
cache-control
private, max-age=300
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
467
x-xss-protection
1; mode=block
expires
Sat, 19 Oct 2019 13:57:33 GMT
ransomware_tag_cloud_key-64x64.jpg
media.threatpost.com/wp-content/uploads/sites/103/2019/01/14115123/
1 KB
2 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/01/14115123/ransomware_tag_cloud_key-64x64.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:5e00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
a25d6b15370e06383386c57fb5278ef22bc15d3151a8059303744f0388e8bbe3

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 20:21:27 GMT
via
1.1 debe291145dc27044f50d04bac101cd9.cloudfront.net (CloudFront), 1.1 ec9e3bc729d9c6d55ed32446408ad62f.cloudfront.net (CloudFront)
last-modified
Mon, 14 Jan 2019 16:51:25 GMT
server
AmazonS3
age
235910
etag
"25d6fb0ea662faf4a812406387e86c13"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA2-C2, FRA2-C2
accept-ranges
bytes
content-length
1272
x-amz-cf-id
DYZ2k46TIndqm-Z7kWTkWaDeWIhpzHgaO5Kv6_HRK-mmaqYFj4-vfw==
expires
Tue, 14 Jan 2020 16:51:23 GMT
threat-intelligence-64x64.png
media.threatpost.com/wp-content/uploads/sites/103/2019/09/25182707/
4 KB
4 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/09/25182707/threat-intelligence-64x64.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:5e00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1d877b654697728723f01959ffbf74d70842fe9cf331f721be5701b61c217638

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 26 Sep 2019 12:02:17 GMT
via
1.1 f7b7cf90592cf6a380fd34cc45e9c4b5.cloudfront.net (CloudFront), 1.1 ec9e3bc729d9c6d55ed32446408ad62f.cloudfront.net (CloudFront)
last-modified
Wed, 25 Sep 2019 22:27:10 GMT
server
AmazonS3
age
1994117
etag
"f55ce318620c1cf746202293c984dac2"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA50-C1, FRA2-C2
accept-ranges
bytes
content-length
4070
x-amz-cf-id
5CCSPSRYnGzQsLdjqQ5EDBUy5ElhpsyeCvqDoJf3E3zR1rX5-Jnljg==
expires
Thu, 24 Sep 2020 22:27:07 GMT
social_engineering-1-64x64.jpg
media.threatpost.com/wp-content/uploads/sites/103/2019/09/18142900/
2 KB
3 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/09/18142900/social_engineering-1-64x64.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:5e00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
51b7a583b42d20f16fa2755abe0e8fd716b3ec9378ec42500b0d894927598326

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 18 Sep 2019 18:31:13 GMT
via
1.1 ac0e9b19969df989a920e6d1b834d009.cloudfront.net (CloudFront), 1.1 ec9e3bc729d9c6d55ed32446408ad62f.cloudfront.net (CloudFront)
last-modified
Wed, 18 Sep 2019 18:29:03 GMT
server
AmazonS3
age
2661981
etag
"a68c4b60ee4a35aab5ae3ce6df6a5d55"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA2-C2, FRA2-C2
accept-ranges
bytes
content-length
2120
x-amz-cf-id
nKTCmYA1sWmxhUPt4DI3UxQMf-RVQl92b08U0E7VneDmtyOVd1lj4Q==
expires
Thu, 17 Sep 2020 18:29:00 GMT
insider-threat-64x64.jpg
media.threatpost.com/wp-content/uploads/sites/103/2019/09/10155113/
1 KB
2 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/09/10155113/insider-threat-64x64.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:5e00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
535f401ad4d0562612b8bcadc5edb6c194cb6a275f3915511f9d023cfc69fe2a

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 10 Sep 2019 20:14:28 GMT
via
1.1 16dc09493f48bbc1fd2cdd6e175a94f7.cloudfront.net (CloudFront), 1.1 ec9e3bc729d9c6d55ed32446408ad62f.cloudfront.net (CloudFront)
last-modified
Tue, 10 Sep 2019 19:51:16 GMT
server
AmazonS3
age
3346986
etag
"ec77dc87aa47f7ebe4f8e56810e98baa"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1, FRA2-C2
accept-ranges
bytes
content-length
1256
x-amz-cf-id
_wkAlZfwqSS4oukKSMk_3oGWqxShU9Q7-zihylwIPcVtVV26xDit4g==
expires
Wed, 09 Sep 2020 19:51:13 GMT
gamification2-64x64.jpg
media.threatpost.com/wp-content/uploads/sites/103/2019/08/30125154/
1016 B
1 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/08/30125154/gamification2-64x64.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:5e00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
93ebb1d614fa1e33c91a00ee803c268fcf812be0282ac38660f29a192109dc86

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 06 Sep 2019 20:00:48 GMT
via
1.1 63db28734e1b9429c04087abd41a1692.cloudfront.net (CloudFront), 1.1 ec9e3bc729d9c6d55ed32446408ad62f.cloudfront.net (CloudFront)
last-modified
Fri, 30 Aug 2019 16:52:12 GMT
server
AmazonS3
age
3693406
etag
"6d043114652213eb6ff41200f8d61f22"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA56, FRA2-C2
accept-ranges
bytes
content-length
1016
x-amz-cf-id
mlsdq9LQEYbICL3szd1MrIaRj2axrf2LdaRck7bA3pXxaz0ltUONAQ==
expires
Sat, 29 Aug 2020 16:52:09 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
2 KB
1 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/gravityforms/js/jquery.json.min.js&ver=a952533b
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:1c00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
a9f6c03ce6f4d1654f29f2136651e883198d509cb2e26af1c24b1f87b6ccae13
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 18 Oct 2019 07:56:45 GMT
content-encoding
gzip
vary
Accept-Encoding
x-amz-cf-pop
FRA2-C2
x-cache
Hit from cloudfront
status
200
content-length
935
last-modified
Fri, 18 Oct 2019 07:56:18 GMT
server
nginx
x-cache-hit
MISS
x-frame-options
SAMEORIGIN
content-type
application/x-javascript; charset=utf-8
via
1.1 52f0756596448c36265861853c0a44a4.cloudfront.net (CloudFront)
cache-control
max-age=86400
x-amz-cf-id
ztzSw7CB5nA12hsKz-dSCPRZpjD3QscCG57exS2ck4wH9KP1224S_g==
expires
Sat, 19 Oct 2019 07:56:45 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
26 KB
9 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/gravityforms/js/gravityforms.min.js&ver=a952533b
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:1c00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
a783d2ad42c380bc896219c080fa845d1e9f2e77483558103aeb296b95b85701
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 08:08:24 GMT
content-encoding
gzip
vary
Accept-Encoding
age
20949
x-cache
Hit from cloudfront
status
200
content-length
8382
last-modified
Fri, 18 Oct 2019 07:56:20 GMT
server
nginx
cache-control
max-age=86400
x-frame-options
SAMEORIGIN
content-type
application/x-javascript; charset=utf-8
via
1.1 52f0756596448c36265861853c0a44a4.cloudfront.net (CloudFront)
x-cache-hit
MISS
x-amz-cf-pop
FRA2-C2
x-amz-cf-id
PpJhk8MPq2ImxDpp6xGb-FPPRN60hmw-axpDR5pIsxaNHm0hwnSkFA==
expires
Sat, 19 Oct 2019 07:56:45 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
13 KB
5 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/kaspersky-taboola-ads/assets/js/end.js,wp-includes/js/wp-embed.min.js,wp-content/plugins/gravityforms/js/conditional_logic.min.js,wp-content/plugins/gravityforms/js/placeholders.jquery.min.js,wp-content/plugins/akismet/_inc/form.js&ver=a952533b
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:1c00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
e697ae92648ccad15ada450ecbd959853b72bb5b977112896334a50ddfc1c0b4
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 08:08:24 GMT
content-encoding
gzip
vary
Accept-Encoding
age
20949
x-cache
Hit from cloudfront
status
200
content-length
4760
last-modified
Fri, 18 Oct 2019 07:56:20 GMT
server
nginx
cache-control
max-age=86400
x-frame-options
SAMEORIGIN
content-type
application/x-javascript; charset=utf-8
via
1.1 52f0756596448c36265861853c0a44a4.cloudfront.net (CloudFront)
x-cache-hit
MISS
x-amz-cf-pop
FRA2-C2
x-amz-cf-id
uoLux5o_-3omNd1NCukL9Pv6v471VmeDzpFWgUyxdx3fCPWRb65M9w==
expires
Sat, 19 Oct 2019 08:01:04 GMT
postscribe.min.js
cdnjs.cloudflare.com/ajax/libs/postscribe/2.0.8/
17 KB
6 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/postscribe/2.0.8/postscribe.min.js?adrupt.js
Requested by
Host: assets.threatpost.com
URL: https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/adrupt-options/dist/js/adrupt.ads.min.js,wp-content/plugins/kaspersky-cookies-notification/scripts/alert_text.js,wp-content/plugins/kaspersky-cookies-notification/scripts/alert.js,wp-content/plugins/kaspersky-taboola-ads/assets/js/start.js,wp-content/plugins/honeypot-comments/public/assets/js/public.js,wp-content/plugins/kspr_twitter_pullquote/js/kaspersky-twitter-pullquote.js,wp-content/themes/threatpost-2018/assets/js/main.js,wp-content/themes/threatpost-2018/assets/js/loadmore.js,wp-content/plugins/kaspersky-social-sharing/assets/js/social-share.js&ver=a952533b
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:c497 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
c4e20f53f5ef0ed44b783437aa3f4638a9a56cc4aa29ae83ed9212eb2807052a
Security Headers
Name Value
Strict-Transport-Security max-age=15780000; includeSubDomains

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:34 GMT
content-encoding
br
vary
Accept-Encoding
cf-cache-status
HIT
age
16127391
status
200
served-in-seconds
0.078
timing-allow-origin
*
last-modified
Thu, 17 May 2018 09:26:22 GMT
server
cloudflare
etag
W/"5afd4abe-45f4"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15780000; includeSubDomains
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=30672000
cf-ray
52834308de26cb98-VIE
expires
Thu, 08 Oct 2020 13:57:34 GMT
js
www.googletagmanager.com/gtag/
74 KB
28 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=UA-109681207-2
Requested by
Host: assets.threatpost.com
URL: https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/adrupt-options/dist/js/adrupt.ads.min.js,wp-content/plugins/kaspersky-cookies-notification/scripts/alert_text.js,wp-content/plugins/kaspersky-cookies-notification/scripts/alert.js,wp-content/plugins/kaspersky-taboola-ads/assets/js/start.js,wp-content/plugins/honeypot-comments/public/assets/js/public.js,wp-content/plugins/kspr_twitter_pullquote/js/kaspersky-twitter-pullquote.js,wp-content/themes/threatpost-2018/assets/js/main.js,wp-content/themes/threatpost-2018/assets/js/loadmore.js,wp-content/plugins/kaspersky-social-sharing/assets/js/social-share.js&ver=a952533b
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
289c8e32d36b011efd4608909ab0a6d76041e7a5e1ce712da2c795501773facc
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:34 GMT
content-encoding
br
last-modified
Sat, 19 Oct 2019 12:00:00 GMT
server
Google Tag Manager
access-control-allow-headers
Cache-Control
status
200
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
http://www.googletagmanager.com
cache-control
private, max-age=900
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28469
x-xss-protection
0
expires
Sat, 19 Oct 2019 13:57:34 GMT
loader.js
cdn.taboola.com/libtrc/threatpost--network/
94 KB
19 KB
Script
General
Full URL
https://cdn.taboola.com/libtrc/threatpost--network/loader.js
Requested by
Host: assets.threatpost.com
URL: https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/adrupt-options/dist/js/adrupt.ads.min.js,wp-content/plugins/kaspersky-cookies-notification/scripts/alert_text.js,wp-content/plugins/kaspersky-cookies-notification/scripts/alert.js,wp-content/plugins/kaspersky-taboola-ads/assets/js/start.js,wp-content/plugins/honeypot-comments/public/assets/js/public.js,wp-content/plugins/kspr_twitter_pullquote/js/kaspersky-twitter-pullquote.js,wp-content/themes/threatpost-2018/assets/js/main.js,wp-content/themes/threatpost-2018/assets/js/loadmore.js,wp-content/plugins/kaspersky-social-sharing/assets/js/social-share.js&ver=a952533b
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
f6f8998bab5899dddcfa007fbfbebdef5751765aa61c2ff574fd614c33b1f68b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
jyGFGPm3uSqxZpQ014RMlCaSuWvm4OeB
content-encoding
gzip
etag
"567003796e5a62a0592a3a4a22cb8bfd"
age
41
x-cache
HIT
status
200
content-length
19366
x-amz-id-2
OFO2W9tMOGsgomQa78+YBC7m7C+iwbXFRFNd+qWdBW1/cEvq/iL8dK0PNF0NUTQT93fh4TfDf8o=
x-served-by
cache-fra19129-FRA
last-modified
Fri, 18 Oct 2019 08:14:02 GMT
server
AmazonS3
x-timer
S1571493454.217201,VS0,VE0
date
Sat, 19 Oct 2019 13:57:34 GMT
vary
Accept-Encoding
x-amz-request-id
BE1A61D5D041E413
via
1.1 varnish
cache-control
private,max-age=14401
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
abp
94
x-cache-hits
2
gtm.js
www.googletagmanager.com/
72 KB
24 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-PM29HLF
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
18d6c3cd87c2e73ec0772807d0c89af5393fbf030a618ad24467dcdc1fdc784a
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:34 GMT
content-encoding
br
last-modified
Sat, 19 Oct 2019 12:00:00 GMT
server
Google Tag Manager
access-control-allow-headers
Cache-Control
status
200
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
http://www.googletagmanager.com
cache-control
private, max-age=900
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
24476
x-xss-protection
0
expires
Sat, 19 Oct 2019 13:57:34 GMT
icons.svg
threatpost.com/wp-content/themes/threatpost-2018//assets/sprite/
11 KB
4 KB
Other
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018//assets/sprite/icons.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
76ba07e059d9e2113f9c940f1a31efc95bd9d5badd68bbc3637177e892a08099

Request headers

Sec-Fetch-Mode
same-origin
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Sat, 19 Oct 2019 13:57:34 GMT
Content-Encoding
gzip
Last-Modified
Fri, 18 Oct 2019 07:56:22 GMT
Server
nginx
ETag
W/"5da97026-2b9f"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Sat, 26 Oct 2019 13:57:34 GMT
icons.svg
threatpost.com/wp-content/themes/threatpost-2018/assets/sprite/
11 KB
4 KB
Other
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/sprite/icons.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
76ba07e059d9e2113f9c940f1a31efc95bd9d5badd68bbc3637177e892a08099

Request headers

Sec-Fetch-Mode
same-origin
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Sat, 19 Oct 2019 13:57:34 GMT
Content-Encoding
gzip
Last-Modified
Fri, 18 Oct 2019 07:56:22 GMT
Server
nginx
ETag
W/"5da97026-2b9f"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Sat, 26 Oct 2019 13:57:34 GMT
recaptcha__en.js
www.gstatic.com/recaptcha/releases/EQY1At-f1G9OIivZUYX73fK0/
253 KB
90 KB
Script
General
Full URL
https://www.gstatic.com/recaptcha/releases/EQY1At-f1G9OIivZUYX73fK0/recaptcha__en.js
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api.js?hl=en
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
4bcb051edd52ea0e431cd13fba90fbe8e1be661ff78171d51025c7e4c1c23723
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 14 Oct 2019 16:22:05 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 14 Oct 2019 04:05:17 GMT
server
sffe
age
423329
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
92260
x-xss-protection
0
expires
Tue, 13 Oct 2020 16:22:05 GMT
impl.20191016-8-RELEASE.js
cdn.taboola.com/libtrc/
393 KB
112 KB
Script
General
Full URL
https://cdn.taboola.com/libtrc/impl.20191016-8-RELEASE.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/threatpost--network/loader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
e8d98c9b6e89759e0df4f47e53b267d161c6096e0252641223fac82919e29fe7

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
4CPTIedgkNrSY7tPuBXpj_lfQ1gEkGa_
content-encoding
gzip
etag
"889158a8e2d898f1d5ae5aa0e047addd"
age
50
x-cache
HIT
status
200
x-amz-replication-status
COMPLETED
content-length
113951
x-amz-id-2
GAOwbpqLPrtmSz6ET3rJ9p1DWp0XQCdJZpBqmT1SpyClA1TJRm7aOmV/1x0kg7/GXPcp5d2IndU=
x-served-by
cache-fra19129-FRA
last-modified
Wed, 16 Oct 2019 12:01:17 GMT
server
AmazonS3
x-timer
S1571493454.234358,VS0,VE0
date
Sat, 19 Oct 2019 13:57:34 GMT
vary
Accept-Encoding
x-amz-request-id
B5F8BD24D97460D3
via
1.1 varnish
cache-control
private,max-age=31536000
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
abp
49
x-cache-hits
259
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/threatpost--network/loader.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.19.43.224 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-43-224.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
76c393f564f53c19e795307e622edc8657a603f7a816c2646385697286d11313

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sat, 19 Oct 2019 13:57:34 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
902
Expires
Sun, 20 Oct 2019 13:57:34 GMT
logo.png
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
19 KB
19 KB
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/logo.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
39af7c1116fb967a330e8770f775e6b5ee871add01ed45c98a1634911cebfb0a

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1571385382
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Sat, 19 Oct 2019 13:57:34 GMT
Last-Modified
Fri, 18 Oct 2019 07:56:20 GMT
Server
nginx
ETag
"5da97024-4a32"
Content-Type
image/png
Cache-Control
max-age=604800, public
Connection
close
Accept-Ranges
bytes
Content-Length
18994
Expires
Sat, 26 Oct 2019 13:57:34 GMT
museosans-300-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-300-webfont.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
45ddc09b0ad6ab916bd9a0282070b161045e186fc025303f4aa1aa821fc45ac7

Request headers

Sec-Fetch-Mode
cors
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1571385382
Origin
https://threatpost.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Sat, 19 Oct 2019 13:57:34 GMT
Last-Modified
Fri, 18 Oct 2019 07:56:22 GMT
Server
nginx
ETag
"5da97026-51b8"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
20920
Expires
Sun, 18 Oct 2020 13:57:34 GMT
mail-plane-light.svg
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
828 B
722 B
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/mail-plane-light.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
5a7ed822968963e31d88424c96387ad9f4fd4f4b5a5b581a33f65e3784d162cf

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1571385382
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Sat, 19 Oct 2019 13:57:34 GMT
Content-Encoding
gzip
Last-Modified
Fri, 18 Oct 2019 07:56:20 GMT
Server
nginx
ETag
W/"5da97024-33c"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Sat, 26 Oct 2019 13:57:34 GMT
twitter-blue.svg
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
868 B
847 B
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/twitter-blue.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
420508fc523520f35de5c851905543294123d7676b5a5668744691f2abe9e730

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1571385382
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Sat, 19 Oct 2019 13:57:34 GMT
Content-Encoding
gzip
Last-Modified
Fri, 18 Oct 2019 07:56:22 GMT
Server
nginx
ETag
W/"5da97026-364"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Sat, 26 Oct 2019 13:57:34 GMT
mail-plane-large-dark.svg
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
812 B
722 B
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/mail-plane-large-dark.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
a9d2b2df99c1a115d5394c70a898d8801092208dc582f8bd6fb01b35c30d6b22

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1571385382
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Sat, 19 Oct 2019 13:57:34 GMT
Content-Encoding
gzip
Last-Modified
Fri, 18 Oct 2019 07:56:20 GMT
Server
nginx
ETag
W/"5da97024-32c"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Sat, 26 Oct 2019 13:57:34 GMT
logo-white.png
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
10 KB
10 KB
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/logo-white.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
e4058d4ee9da1ceaddfa91ddb63650ba67285f1bbfee487d9dfe648bced669a0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1571385382
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Sat, 19 Oct 2019 13:57:34 GMT
Last-Modified
Fri, 18 Oct 2019 07:56:22 GMT
Server
nginx
ETag
"5da97026-260a"
Content-Type
image/png
Cache-Control
max-age=604800, public
Connection
close
Accept-Ranges
bytes
Content-Length
9738
Expires
Sat, 26 Oct 2019 13:57:34 GMT
museosans-700-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-700-webfont.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
ae00ae9c862bc8b8923efd1d9a18befa912678a869d4dd01179a59ed3de731be

Request headers

Sec-Fetch-Mode
cors
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1571385382
Origin
https://threatpost.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Sat, 19 Oct 2019 13:57:34 GMT
Last-Modified
Fri, 18 Oct 2019 07:56:20 GMT
Server
nginx
ETag
"5da97024-51a4"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
20900
Expires
Sun, 18 Oct 2020 13:57:34 GMT
museosans-100-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-100-webfont.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
06fc565587b8b700936a1677218cb269a6cc31ca5f701eb45461e86a3d54d5c7

Request headers

Sec-Fetch-Mode
cors
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1571385382
Origin
https://threatpost.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Sat, 19 Oct 2019 13:57:34 GMT
Last-Modified
Fri, 18 Oct 2019 07:56:20 GMT
Server
nginx
ETag
"5da97024-50c8"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
20680
Expires
Sun, 18 Oct 2020 13:57:34 GMT
museosans-500-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-500-webfont.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
2de77164bb9924542e1dea4ee4a0ff27d40b51a3d7939dac7db11a95045c9b7d

Request headers

Sec-Fetch-Mode
cors
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1571385382
Origin
https://threatpost.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Sat, 19 Oct 2019 13:57:34 GMT
Last-Modified
Fri, 18 Oct 2019 07:56:20 GMT
Server
nginx
ETag
"5da97024-5194"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
20884
Expires
Sun, 18 Oct 2020 13:57:34 GMT
museosans-700italic-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
15 KB
16 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-700italic-webfont.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
859faa9b9ed0990288b2f393a102b1fe2668ac79088b113b6f0beaee521221eb

Request headers

Sec-Fetch-Mode
cors
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1571385382
Origin
https://threatpost.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Sat, 19 Oct 2019 13:57:34 GMT
Last-Modified
Fri, 18 Oct 2019 07:56:22 GMT
Server
nginx
ETag
"5da97026-3dcc"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
15820
Expires
Sun, 18 Oct 2020 13:57:34 GMT
gpt.js
www.googletagservices.com/tag/js/
46 KB
15 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: assets.threatpost.com
URL: https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/adrupt-options/dist/js/adrupt.ads.min.js,wp-content/plugins/kaspersky-cookies-notification/scripts/alert_text.js,wp-content/plugins/kaspersky-cookies-notification/scripts/alert.js,wp-content/plugins/kaspersky-taboola-ads/assets/js/start.js,wp-content/plugins/honeypot-comments/public/assets/js/public.js,wp-content/plugins/kspr_twitter_pullquote/js/kaspersky-twitter-pullquote.js,wp-content/themes/threatpost-2018/assets/js/main.js,wp-content/themes/threatpost-2018/assets/js/loadmore.js,wp-content/plugins/kaspersky-social-sharing/assets/js/social-share.js&ver=a952533b
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
f89fcb038aae8bf3e1723e73c705348add5a889d87ac1cc6be57377ccde8b96f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"311 / 224 of 1000 / last-modified: 1571414597"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
14723
x-xss-protection
0
expires
Sat, 19 Oct 2019 13:57:34 GMT
fontawesome-webfont.woff2
assets.threatpost.com/wp-content/plugins/kaspersky-social-sharing/assets/fonts/
75 KB
76 KB
Font
General
Full URL
https://assets.threatpost.com/wp-content/plugins/kaspersky-social-sharing/assets/fonts/fontawesome-webfont.woff2?v=4.7.0
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:1c00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe

Request headers

Sec-Fetch-Mode
cors
Referer
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-includes/css/dist/block-library/style.min.css,wp-content/plugins/wds-kaspersky-widgets/css/trending-authors.css,wp-content/plugins/wds-rss-builder/includes/css/select2.min.css,wp-content/plugins/wds-rss-builder/includes/css/wds-rss.css,wp-content/plugins/honeypot-comments/public/assets/css/public.css,wp-content/plugins/kspr_twitter_pullquote/css/style.css,wp-content/plugins/pullquote-shortcode/css/pullquote-shortcode.css,wp-content/plugins/kaspersky-social-sharing/assets/css/style.css,wp-content/plugins/kaspersky-social-sharing/assets/css/custom.css&ver=a952533b
Origin
https://threatpost.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 25 Aug 2019 00:22:42 GMT
via
1.1 d9bf8acc1da383db4531789bbb03ac07.cloudfront.net (CloudFront)
age
4800891
x-cache
Hit from cloudfront
status
200
content-length
77160
pragma
public
last-modified
Fri, 23 Aug 2019 05:16:18 GMT
server
nginx
etag
"5d5f76a2-12d68"
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000, public
x-amz-cf-pop
FRA2-C2
accept-ranges
bytes
x-amz-cf-id
XMueZgdT6i_m6iXoWYgO3Paak2jWDP0bBjJ1rKoZ5CZMkpk07f8pHg==
expires
Mon, 24 Aug 2020 00:22:42 GMT
photo-newsletter.jpg
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
83 KB
83 KB
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/photo-newsletter.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
940e0c3385928422aae38e1a74f1d84b462d8ce1a056c686fde505a0bf3162bb

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Sat, 19 Oct 2019 13:57:35 GMT
Last-Modified
Fri, 18 Oct 2019 07:56:21 GMT
Server
nginx
ETag
"5da97025-14c88"
Content-Type
image/jpeg
Cache-Control
max-age=604800, public
Connection
close
Accept-Ranges
bytes
Content-Length
85128
Expires
Sat, 26 Oct 2019 13:57:35 GMT
/
graph.facebook.com/
86 B
294 B
XHR
General
Full URL
https://graph.facebook.com/?id=https%3A%2F%2Fthreatpost.com%2Fmajor-airport-malware-attack-ot-security%2F149330%2F
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f007:1:face:b00c:0:1 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
812c9247a657987dd5dbbff123715b52c79f539be71903b7c05be24f0c96be3d
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; preload

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

strict-transport-security
max-age=15552000; preload
etag
"d7b7b2398ad342a3b17002d2171acc40d17953a9"
x-app-usage
{"call_count":0,"total_cputime":0,"total_time":0}
status
200
x-fb-rev
1001317885
alt-svc
h3-23=":443"; ma=3600
content-length
86
pragma
no-cache
x-fb-debug
+azQVpf7nHlie2xcRQY42ElsYCTsxWesX1zUimn2oXpVEGX1DZ2squZB7cFsY4uvM/gizGtXz/qxCUnReyvj+g==
x-fb-trace-id
HQ+vBPb1SkW
date
Sat, 19 Oct 2019 13:57:34 GMT
content-type
application/json
access-control-allow-origin
*
x-fb-request-id
Ai-PNoZilqTufs8E_KJQjqs
cache-control
private, no-cache, no-store, must-revalidate
facebook-api-version
v2.10
expires
Sat, 01 Jan 2000 00:00:00 GMT
share
www.linkedin.com/countserv/count/
0
0
Script
General
Full URL
https://www.linkedin.com/countserv/count/share?url=https%3A%2F%2Fthreatpost.com%2Fmajor-airport-malware-attack-ot-security%2F149330%2F&format=jsonp&callback=jQuery112407951629585633109_1571493454204&_=1571493454205
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:f500:10:101::b93f:9101 , Ireland, ASN14413 (LINKEDIN - LinkedIn Corporation, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

info.json
www.reddit.com/api/
102 B
851 B
XHR
General
Full URL
https://www.reddit.com/api/info.json?url=https%3A%2F%2Fthreatpost.com%2Fmajor-airport-malware-attack-ot-security%2F149330%2F
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.13.140 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
snooserv /
Resource Hash
f4f2c0a4763f01ee2b13b4f8189e6fd5f32bd704d71fed8d0f11883de9724198
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Sat, 19 Oct 2019 13:57:34 GMT
via
1.1 varnish
x-content-type-options
nosniff
x-cache
MISS
status
200
content-length
102
x-xss-protection
1; mode=block
x-served-by
cache-fra19162-FRA
x-moose
majestic
expires
-1
server
snooserv
x-timer
S1571493454.434453,VS0,VE126
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
application/json; charset=UTF-8
access-control-allow-origin
*
access-control-expose-headers
X-Moose
cache-control
private, s-maxage=0, max-age=0, must-revalidate, max-age=0, must-revalidate
x-ua-compatible
IE=edge
accept-ranges
bytes
x-cache-hits
0
anchor
www.google.com/recaptcha/api2/ Frame C35E
0
0
Document
General
Full URL
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=EQY1At-f1G9OIivZUYX73fK0&theme=standard&size=normal&cb=bcol2waffvmq
Requested by
Host: www.gstatic.com
URL: https://www.gstatic.com/recaptcha/releases/EQY1At-f1G9OIivZUYX73fK0/recaptcha__en.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
GSE /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-8crebFanDXc3o91ulLzHPA' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.google.com
:scheme
https
:path
/recaptcha/api2/anchor?ar=1&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=EQY1At-f1G9OIivZUYX73fK0&theme=standard&size=normal&cb=bcol2waffvmq
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/

Response headers

status
200
content-type
text/html; charset=utf-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Sat, 19 Oct 2019 13:57:34 GMT
content-security-policy
script-src 'report-sample' 'nonce-8crebFanDXc3o91ulLzHPA' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
9117
server
GSE
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
json
trc.taboola.com/threatpost-threatpost/trc/3/
11 KB
5 KB
Script
General
Full URL
https://trc.taboola.com/threatpost-threatpost/trc/3/json?tim=15%3A57%3A34.522&lti=deflated&data=%7B%22id%22%3A241%2C%22ii%22%3A%22%2Fmajor-airport-malware-attack-ot-security%2F149330%22%2C%22it%22%3A%22text%22%2C%22sd%22%3Anull%2C%22ui%22%3Anull%2C%22uifp%22%3Anull%2C%22vi%22%3A1571493454502%2C%22cv%22%3A%2220191016-8-RELEASE%22%2C%22uiv%22%3A%22default%22%2C%22u%22%3A%22https%3A%2F%2Fthreatpost.com%2Fmajor-airport-malware-attack-ot-security%2F149330%2F%22%2C%22bv%22%3A%220%22%2C%22ul%22%3A%5B%22en-US%22%5D%2C%22cmps%22%3A3%2C%22btv%22%3A%220%22%2C%22cos%22%3A%224g%22%2C%22bad%22%3A-1%2C%22sw%22%3A1600%2C%22sh%22%3A1200%2C%22bw%22%3A1600%2C%22sde%22%3A%221.000%22%2C%22bh%22%3A1200%2C%22dw%22%3A1585%2C%22dh%22%3A4500%2C%22nsid%22%3A%22threatpost--network%22%2C%22r%22%3A%5B%7B%22li%22%3A%22rbox-t2m%22%2C%22s%22%3A6%2C%22uim%22%3A%22thumbnails-a%3Apub%3Dthreatpost--network%3Aabp%3D0%22%2C%22uip%22%3A%22Below%20Article%20Thumbnails%22%2C%22orig_uip%22%3A%22Below%20Article%20Thumbnails%22%2C%22cd%22%3A3007.71875%2C%22mw%22%3A700%7D%5D%2C%22cb%22%3A%22TRC.callbacks.recommendations_1%22%2C%22lt%22%3A%22deflated%22%7D
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.20191016-8-RELEASE.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
87dedc5bb03d7a48f3cb4265c280ac4eb9a0cbaf98ffcdbcdcac4382d07d8580

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:34 GMT
content-encoding
gzip
server
nginx
x-timer
S1571493455.529057,VS0,VE119
status
200
x-served-by
cache-fra19129-FRA
vary
Accept-Encoding
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
access-control-allow-origin
*
access-control-allow-credentials
true
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
via
1.1 varnish
x-cache-hits
0
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=7&c2=13739933&c3=20121515121&ns__t=1571493454537&ns_c=UTF-8&cv=3.1e&c8=Major%20Airport%20Malware%20Attack%20Shines%20a%20Light%20on%20OT%20Security%20%7C%20Thr...
  • https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1571493454537&ns_c=UTF-8&cv=3.1e&c8=Major%20Airport%20Malware%20Attack%20Shines%20a%20Light%20on%20OT%20Security%20%7C%20Th...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1571493454537&ns_c=UTF-8&cv=3.1e&c8=Major%20Airport%20Malware%20Attack%20Shines%20a%20Light%20on%20OT%20Security%20%7C%20Threatpost&c7=https%3A%2F%2Fthreatpost.com%2Fmajor-airport-malware-attack-ot-security%2F149330%2F&c9=
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.19.43.224 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-43-224.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 19 Oct 2019 13:57:34 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1571493454537&ns_c=UTF-8&cv=3.1e&c8=Major%20Airport%20Malware%20Attack%20Shines%20a%20Light%20on%20OT%20Security%20%7C%20Threatpost&c7=https%3A%2F%2Fthreatpost.com%2Fmajor-airport-malware-attack-ot-security%2F149330%2F&c9=
Pragma
no-cache
Date
Sat, 19 Oct 2019 13:57:34 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-PM29HLF
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
dbb67c620eaabf6679a314db18d3ae43037aef71ab27422e6feec08ee987cc0a
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 19 Aug 2019 17:22:41 GMT
server
Golfe2
age
205
date
Sat, 19 Oct 2019 13:54:09 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
17803
expires
Sat, 19 Oct 2019 15:54:09 GMT
quant.js
secure.quantserve.com/
12 KB
6 KB
Script
General
Full URL
https://secure.quantserve.com/quant.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-PM29HLF
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.165 , United Kingdom, ASN27281 (QUANTCAST - Quantcast Corporation, US),
Reverse DNS
Software
QS /
Resource Hash
404a9b0ffbcc813e8ddbb8d8510a24a69c09079282f8083ee94f4adc5d627176

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sat, 19 Oct 2019 13:57:34 GMT
Content-Encoding
gzip
Last-Modified
Sat, 19-Oct-2019 13:57:34 GMT
Server
QS
ETag
M0-e2b9884a
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=604800
Connection
keep-alive
Content-Length
5456
Expires
Sat, 26 Oct 2019 13:57:34 GMT
uwt.js
static.ads-twitter.com/
5 KB
2 KB
Script
General
Full URL
https://static.ads-twitter.com/uwt.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-PM29HLF
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.157 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
319949c8c08b86e9c35ea542c0dc0c30cedaa9b8d3d3c3327a36c91aefbd8af5

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:34 GMT
content-encoding
gzip
age
20682
x-cache
HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
1954
x-served-by
cache-hhn4066-HHN
last-modified
Tue, 23 Jan 2018 20:09:00 GMT
x-timer
S1571493455.547190,VS0,VE0
etag
"b7b33882a4f3ffd5cbf07434f3137166+gzip"
vary
Accept-Encoding,Host
content-type
application/javascript; charset=utf-8
via
1.1 varnish
cache-control
no-cache
accept-ranges
bytes
integrator.js
adservice.google.de/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=threatpost.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 19 Oct 2019 13:57:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=threatpost.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 19 Oct 2019 13:57:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
pubads_impl_modern_2019101401.js
securepubads.g.doubleclick.net/gpt/
144 KB
55 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_2019101401.js?21064809
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
sffe /
Resource Hash
40e3b322c31a55d2cb376d7ae0f85c82fdc4d008bd101e9d7ee1399c0897567f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 14 Oct 2019 13:08:16 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
56265
x-xss-protection
0
expires
Sat, 19 Oct 2019 13:57:34 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&aip=1&a=1716329525&t=pageview&_s=1&dl=https%3A%2F%2Fthreatpost.com%2Fmajor-airport-malware-attack-ot-security%2F149330%2F&ul=en-us&de=UTF-8&dt=...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-35676203-21&cid=1086503215.1571493455&jid=381308550&_gid=1032950352.1571493455&gjid=1090372960&_v=j79&z=439365230
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=1086503215.1571493455&jid=381308550&_v=j79&z=439365230
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=1086503215.1571493455&jid=381308550&_v=j79&z=439365230&slf_rd=1&random=1458572625
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=1086503215.1571493455&jid=381308550&_v=j79&z=439365230&slf_rd=1&random=1458572625
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 19 Oct 2019 13:57:34 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sat, 19 Oct 2019 13:57:34 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=1086503215.1571493455&jid=381308550&_v=j79&z=439365230&slf_rd=1&random=1458572625
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
rules-p-_7kVx0t9Jqj90.js
rules.quantcount.com/
3 B
354 B
Script
General
Full URL
https://rules.quantcount.com/rules-p-_7kVx0t9Jqj90.js
Requested by
Host: secure.quantserve.com
URL: https://secure.quantserve.com/quant.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:200d:5800:6:44e3:f8c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:53:12 GMT
via
1.1 7922e01ab53e8f36477272573223ab35.cloudfront.net (CloudFront)
last-modified
Fri, 03 Mar 2017 23:52:35 GMT
server
AmazonS3
age
283
etag
"8a80554c91d9fca8acb82f023de02f11"
x-cache
Error from cloudfront
content-type
application/x-javascript
status
200
cache-control
max-age=300
x-amz-cf-pop
FRA50
accept-ranges
bytes
content-length
3
x-amz-cf-id
T2U33VOI7jqi84LiaDeozvdkX6r84VIb4irG9xg-KhNjdCbLvI5GkA==
bframe
www.google.com/recaptcha/api2/ Frame 299D
0
0
Document
General
Full URL
https://www.google.com/recaptcha/api2/bframe?hl=en&v=EQY1At-f1G9OIivZUYX73fK0&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&cb=vmhl3ji4utm2
Requested by
Host: www.gstatic.com
URL: https://www.gstatic.com/recaptcha/releases/EQY1At-f1G9OIivZUYX73fK0/recaptcha__en.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
GSE /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-XbzAdp8S+C70TJDfeWTHrg' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.google.com
:scheme
https
:path
/recaptcha/api2/bframe?hl=en&v=EQY1At-f1G9OIivZUYX73fK0&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&cb=vmhl3ji4utm2
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/

Response headers

status
200
content-type
text/html; charset=utf-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Sat, 19 Oct 2019 13:57:34 GMT
content-security-policy
script-src 'report-sample' 'nonce-XbzAdp8S+C70TJDfeWTHrg' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
1134
server
GSE
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
adsct
t.co/i/
43 B
171 B
Image
General
Full URL
https://t.co/i/adsct?p_id=Twitter&p_user_id=0&txn_id=ntt0j&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.69 , United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=0
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
content-length
65
x-xss-protection
0
x-response-time
115
pragma
no-cache
last-modified
Sat, 19 Oct 2019 13:57:34 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=0
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
835947257f8277957e66796ccdab3253
x-transaction
00db95cf0058554b
expires
Tue, 31 Mar 1981 05:00:00 GMT
tb
15.taboola.com/
19 KB
19 KB
Script
General
Full URL
https://15.taboola.com/tb?oid=15&pubnm=threatpost-threatpost&unitType=59&tbloc=&pageType=text&pstn=Slider%20-%20Video&uuip=&cisrf=&cirf=https%3A%2F%2Fthreatpost.com%2Fmajor-airport-malware-attack-ot-security%2F149330%2F&encoded=1&uid=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce&variant=-100|1&callback=TRC.videoTagCallbacks.videoCallback1&cb=1571493454888&tagid=&cntry=DE&platform=1&sesid=eb6c6fec3ab71ab7deb28c882650708d&itemid=/major-airport-malware-attack-ot-security/149330&viewid=1571493454502&geolat=&geoing=&deviceifa=&appid=&sd=v2_eb6c6fec3ab71ab7deb28c882650708d_0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce_1571493454_1571493454_CNawjgYQ459IGKbFvKLeLSABKAEwODib4wlAgooQSJjEF1Cl7BBYAGAA&ri=ec8f8d4c89fa25c28113e73a99c74ee9&appname=&cdb=&gdprApplies=&rid=&sii=-6690417188744236626
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.20191016-8-RELEASE.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
1e734d1f539df6a25f2c0fea7c759da6840ab0babeedd482d660a1c6df7c310d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 19 Oct 2019 13:57:34 GMT
via
1.1 varnish
server
nginx/1.13.12
x-timer
S1571493455.901079,VS0,VE12
machineid
1416
x-cache
MISS
content-type
text/html;charset=ISO-8859-1
status
200
expires
Sat, 26 Jul 1997 05:00:00 GMT
cache-control
no-cache,must-revalidate,no-store,max-age=0,s-maxage=0
x-cache-hits
0
accept-ranges
bytes
x-served-by
cache-hhn4070-HHN
userx.20191016-8-RELEASE.es6.js
cdn.taboola.com/libtrc/
22 KB
8 KB
Script
General
Full URL
https://cdn.taboola.com/libtrc/userx.20191016-8-RELEASE.es6.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/threatpost--network/loader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
306b51051ebea8416357b56cdce1ec444b4e9c5892dd8001b9d921c48cf75818

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
BzODgiCc1vJqtgZc.7GO_svGJCrjubS_
content-encoding
gzip
etag
"cf8913b66c7e5c7fabf5d712ff832037"
age
90
x-cache
HIT
status
200
x-amz-replication-status
COMPLETED
content-length
7736
x-amz-id-2
JJUkbxadpebRRm7Afgz7VcbGsb5ha7jbcj/n7ka9EeadxlWpTPrjRb5OMIpkUYNwA457gMpwhSM=
x-served-by
cache-fra19129-FRA
last-modified
Wed, 16 Oct 2019 12:01:44 GMT
server
AmazonS3
x-timer
S1571493455.905752,VS0,VE0
date
Sat, 19 Oct 2019 13:57:34 GMT
vary
Accept-Encoding
x-amz-request-id
252F558C652AD66E
via
1.1 varnish
cache-control
private,max-age=14400
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
abp
10
x-cache-hits
152
rtb-h
trc.taboola.com/sg/mediaforcebidder-network/1/ Frame 6110
Redirect Chain
  • https://rtb.mfadsrvr.com/sync?ssp=taboola
  • https://rtb.mfadsrvr.com/ul_cb/sync?ssp=taboola
  • https://trc.taboola.com/sg/mediaforcebidder-network/1/rtb-h?taboola_hm=8022d0f9-d9c1-4e13-a45d-5102cea324d4
0
56 B
Image
General
Full URL
https://trc.taboola.com/sg/mediaforcebidder-network/1/rtb-h?taboola_hm=8022d0f9-d9c1-4e13-a45d-5102cea324d4
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:34 GMT
via
1.1 varnish
server
nginx
x-timer
S1571493455.950396,VS0,VE8
x-cache
MISS
status
204
x-cache-hits
0
accept-ranges
bytes
x-served-by
cache-fra19129-FRA

Redirect headers

Location
//trc.taboola.com/sg/mediaforcebidder-network/1/rtb-h?taboola_hm=8022d0f9-d9c1-4e13-a45d-5102cea324d4
Date
Sat, 19 Oct 2019 13:57:34 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Length
0
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
sync.php
pixel.rubiconproject.com/exchange/ Frame 6110
0
239 B
Image
General
Full URL
https://pixel.rubiconproject.com/exchange/sync.php?p=16698
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
69.173.144.136 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Expires
0
Cache-Control
no-cache,no-store,must-revalidate
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
X-RPHost
78e3bdce5107450057bade54d54a0a7e
Content-Type
image/gif
/
trc.taboola.com/sg/powerlinksdsp-network/1/rtb-h/ Frame 6110
Redirect Chain
  • https://px.powerlinks.com/user/identify?sourceId=d4a7a706-ab0f-11e8-a038-127202fb7690&rurl=https%3A%2F%2Ftrc.taboola.com%2Fsg%2Fpowerlinksdsp-network%2F1%2Frtb-h%2F%3Ftaboola_hm%3D%24%7BUSER%7D
  • https://trc.taboola.com/sg/powerlinksdsp-network/1/rtb-h/?taboola_hm=7iTM4WLZpoLWWJHcLureg-qQflbf2hY6fqII-ujpjcY%3D
45 B
214 B
Image
General
Full URL
https://trc.taboola.com/sg/powerlinksdsp-network/1/rtb-h/?taboola_hm=7iTM4WLZpoLWWJHcLureg-qQflbf2hY6fqII-ujpjcY%3D
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
dc111a70984a9eda00752b06277113029ef288f1125c31eff2477413e15e8aa4

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 varnish
server
nginx
x-timer
S1571493455.006547,VS0,VE18
x-cache
MISS
status
200
x-cache-hits
0
accept-ranges
bytes
x-served-by
cache-fra19129-FRA

Redirect headers

Location
https://trc.taboola.com/sg/powerlinksdsp-network/1/rtb-h/?taboola_hm=7iTM4WLZpoLWWJHcLureg-qQflbf2hY6fqII-ujpjcY%3D
Date
Sat, 19 Oct 2019 13:57:34 GMT
Server
nginx
Connection
close
Etag
"7iTM4WLZpoLWWJHcLureg-qQflbf2hY6fqII-ujpjcY="
Content-Length
0
rtb-h
match.taboola.com/sg/mediamath-ssp-network/1/ Frame 6110
Redirect Chain
  • https://sync.mathtag.com/sync/img?mt_exid=92&redir=https://trc.taboola.com/sg/mediamath-ssp-network/1/rtb-h/?taboola_hm=[MM_UUID]
  • https://sync.mathtag.com/sync/img?mt_exid=92&redir=https://trc.taboola.com/sg/mediamath-ssp-network/1/rtb-h/?taboola_hm=[MM_UUID]&mm_bnc&mm_bct&UUID=83a75dab-09ac-4200-90ef-6f7981b80818
  • https://trc.taboola.com/sg/mediamath-ssp-network/1/rtb-h/?taboola_hm=83a75dab-09ac-4200-90ef-6f7981b80818
  • https://match.taboola.com/sg/mediamath-ssp-network/1/rtb-h?taboola_hm=83a75dab-09ac-4200-90ef-6f7981b80818&tbid=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce&query=taboola_hm%3D83a75dab-09ac-420...
0
76 B
Image
General
Full URL
https://match.taboola.com/sg/mediamath-ssp-network/1/rtb-h?taboola_hm=83a75dab-09ac-4200-90ef-6f7981b80818&tbid=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce&query=taboola_hm%3D83a75dab-09ac-4200-90ef-6f7981b80818
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 varnish
server
nginx/1.13.12
x-timer
S1571493455.007879,VS0,VE8
x-cache
MISS
status
200
x-cache-hits
0
accept-ranges
bytes
content-length
0
x-served-by
cache-hhn4070-HHN

Redirect headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 varnish
server
nginx
x-timer
S1571493455.990861,VS0,VE11
x-served-by
cache-fra19129-FRA
status
302
x-cache
MISS
location
https://match.taboola.com/sg/mediamath-ssp-network/1/rtb-h?taboola_hm=83a75dab-09ac-4200-90ef-6f7981b80818&tbid=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce&query=taboola_hm%3D83a75dab-09ac-4200-90ef-6f7981b80818
accept-ranges
bytes
content-length
0
x-cache-hits
0
getuidnb
ib.adnxs.com/ Frame 6110
43 B
690 B
Image
General
Full URL
https://ib.adnxs.com/getuidnb?https://trc.taboola.com/sg/appnexus-network/1/rtb-h/?taboola_hm=$UID
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.221 , Netherlands, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
316.bm-nginx-loadbalancer.mgmt.ams1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
4b5b6b15c6255109e06720cce42a06d3aead8b7874423d9c52cb0303212c25ef
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 19 Oct 2019 13:57:36 GMT
X-Proxy-Origin
144.76.109.30; 144.76.109.30; 316.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.21:80
AN-X-Request-Uuid
395aacf6-ed31-453a-bce6-9c6111a5aaed
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
*
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
rtb-h
match.taboola.com/sg/google-network/1/ Frame 6110
Redirect Chain
  • https://cm.g.doubleclick.net/pixel?google_nid=taboola_dbm&google_cm&google_sc
  • https://cm.g.doubleclick.net/pixel?google_nid=taboola_dbm&google_cm=&google_sc=&google_tc=
  • https://trc.taboola.com/sg/google-network/1/rtb-h/?taboola_hm=CAESEPwdSv_-fYUYw5jg37t14hE&google_cver=1
  • https://match.taboola.com/sg/google-network/1/rtb-h?taboola_hm=CAESEPwdSv_-fYUYw5jg37t14hE&tbid=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce&query=taboola_hm%3DCAESEPwdSv_-fYUYw5jg37t14hE%26goo...
0
52 B
Image
General
Full URL
https://match.taboola.com/sg/google-network/1/rtb-h?taboola_hm=CAESEPwdSv_-fYUYw5jg37t14hE&tbid=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce&query=taboola_hm%3DCAESEPwdSv_-fYUYw5jg37t14hE%26google_cver%3D1
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 varnish
server
nginx/1.13.12
x-timer
S1571493455.014532,VS0,VE9
x-cache
MISS
status
200
x-cache-hits
0
accept-ranges
bytes
content-length
0
x-served-by
cache-hhn4070-HHN

Redirect headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 varnish
server
nginx
x-timer
S1571493455.990855,VS0,VE18
x-served-by
cache-fra19129-FRA
status
302
x-cache
MISS
location
https://match.taboola.com/sg/google-network/1/rtb-h?taboola_hm=CAESEPwdSv_-fYUYw5jg37t14hE&tbid=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce&query=taboola_hm%3DCAESEPwdSv_-fYUYw5jg37t14hE%26google_cver%3D1
accept-ranges
bytes
content-length
0
x-cache-hits
0
getuidnb
ib.adnxs.com/ Frame 6110
43 B
690 B
Image
General
Full URL
https://ib.adnxs.com/getuidnb?https://trc.taboola.com/sg/nca-appnexus-network/1/rtb-h/?taboola_hm=$UID
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.221 , Netherlands, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
316.bm-nginx-loadbalancer.mgmt.ams1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
4b5b6b15c6255109e06720cce42a06d3aead8b7874423d9c52cb0303212c25ef
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 19 Oct 2019 13:57:36 GMT
X-Proxy-Origin
144.76.109.30; 144.76.109.30; 316.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.52:80
AN-X-Request-Uuid
ca4f0ef9-58f2-452d-9a98-ab592c5667e1
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
*
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
rtb-h
match.taboola.com/sg/thetradedesk-network/1/ Frame 6110
Redirect Chain
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=054f32o&ttd_tpi=1
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=054f32o&ttd_tpi=1
  • https://trc.taboola.com/sg/thetradedesk-network/1/rtb-h/?taboola_hm=ddbb137a-6d66-417e-adcb-e32f4ef70c6d
  • https://match.taboola.com/sg/thetradedesk-network/1/rtb-h?taboola_hm=ddbb137a-6d66-417e-adcb-e32f4ef70c6d&tbid=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce&query=taboola_hm%3Dddbb137a-6d66-417e...
0
52 B
Image
General
Full URL
https://match.taboola.com/sg/thetradedesk-network/1/rtb-h?taboola_hm=ddbb137a-6d66-417e-adcb-e32f4ef70c6d&tbid=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce&query=taboola_hm%3Dddbb137a-6d66-417e-adcb-e32f4ef70c6d
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 varnish
server
nginx/1.13.12
x-timer
S1571493455.038930,VS0,VE9
x-cache
MISS
status
200
x-cache-hits
0
accept-ranges
bytes
content-length
0
x-served-by
cache-hhn4070-HHN

Redirect headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 varnish
server
nginx
x-timer
S1571493455.023880,VS0,VE9
x-served-by
cache-fra19129-FRA
status
302
x-cache
MISS
location
https://match.taboola.com/sg/thetradedesk-network/1/rtb-h?taboola_hm=ddbb137a-6d66-417e-adcb-e32f4ef70c6d&tbid=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce&query=taboola_hm%3Dddbb137a-6d66-417e-adcb-e32f4ef70c6d
accept-ranges
bytes
content-length
0
x-cache-hits
0
rtb-h
match.taboola.com/sg/storygize-network/1/ Frame 6110
Redirect Chain
  • https://www.storygize.net/ccm/4b560cdd-91f9-422b-adb7-e9dff26bc3ad?u=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce
  • https://trc.taboola.com/sg/storygize-network/1/rtb-h?taboola_hm=b513cbb1-bd05-4837-91d3-72312142bc7c
  • https://match.taboola.com/sg/storygize-network/1/rtb-h?taboola_hm=b513cbb1-bd05-4837-91d3-72312142bc7c&tbid=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce&query=taboola_hm%3Db513cbb1-bd05-4837-91...
0
52 B
Image
General
Full URL
https://match.taboola.com/sg/storygize-network/1/rtb-h?taboola_hm=b513cbb1-bd05-4837-91d3-72312142bc7c&tbid=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce&query=taboola_hm%3Db513cbb1-bd05-4837-91d3-72312142bc7c
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 varnish
server
nginx/1.13.12
x-timer
S1571493455.313404,VS0,VE9
x-cache
MISS
status
200
x-cache-hits
0
accept-ranges
bytes
content-length
0
x-served-by
cache-hhn4070-HHN

Redirect headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 varnish
server
nginx
x-timer
S1571493455.268966,VS0,VE11
x-served-by
cache-fra19129-FRA
status
302
x-cache
MISS
location
https://match.taboola.com/sg/storygize-network/1/rtb-h?taboola_hm=b513cbb1-bd05-4837-91d3-72312142bc7c&tbid=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce&query=taboola_hm%3Db513cbb1-bd05-4837-91d3-72312142bc7c
accept-ranges
bytes
content-length
0
x-cache-hits
0
cookiesync
bttrack.com/pixel/ Frame 6110
35 B
380 B
Image
General
Full URL
https://bttrack.com/pixel/cookiesync?source=14b8c562-d12b-418b-b680-ad517d5839ec
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
192.132.33.46 , United States, ASN18568 (BIDTELLECT - Bidtellect Inc., US),
Reverse DNS
46.bidtellect.com
Software
Microsoft-IIS/8.5 /
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

X-ServerName
Track004-dc3
Pragma
no-cache
Date
Sat, 19 Oct 2019 13:57:33 GMT
X-AspNetMvc-Version
5.2
Server
Microsoft-IIS/8.5
X-AspNet-Version
4.0.30319
P3P
CP="CAO DSP COR ADMo DEVo PSAo PSDo HISo IVAo IVDo OUR IND OTC"
Cache-Control
private,no-cache
Content-Type
image/gif
Content-Length
35
Expires
-1
/
cds.taboola.com/ Frame 6110
0
314 B
Image
General
Full URL
https://cds.taboola.com/?uid=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce&_r=6423188
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
130.211.13.252 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
252.13.211.130.bc.googleusercontent.com
Software
nginx/1.12.2 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sat, 19 Oct 2019 13:57:42 GMT
Via
1.1 varnish
Fastly-Restarts
1
Server
nginx/1.12.2
X-Timer
S1571493455.205541,VS0,VE7197
X-Served-By
cache-bwi5041-BWI
X-Cache
MISS
x-envoy-upstream-service-time
0
Connection
close
Accept-Ranges
bytes
Content-Length
0
X-Cache-Hits
0
rtb-h
match.taboola.com/sg/bidswitch-network/1/ Frame 6110
Redirect Chain
  • https://x.bidswitch.net/sync?ssp=taboola
  • https://x.bidswitch.net/ul_cb/sync?ssp=taboola
  • https://ads.creative-serving.com/bsw_sync?bidswitch_ssp_id=taboola&bsw_custom_parameter=ec717adc-467f-4294-95d7-873077a55f97
  • https://ads.creative-serving.com/ul_cb/bsw_sync?bidswitch_ssp_id=taboola&bsw_custom_parameter=ec717adc-467f-4294-95d7-873077a55f97
  • https://x.bidswitch.net/sync?dsp_id=4&user_id=72a57edf-e46a-47b0-99dd-260c810939ab&ssp=taboola&expires=30&user_group=5&bsw_param=ec717adc-467f-4294-95d7-873077a55f97
  • https://trc.taboola.com/sg/bidswitch-network/1/rtb-h/?taboola_hm=ec717adc-467f-4294-95d7-873077a55f97
  • https://match.taboola.com/sg/bidswitch-network/1/rtb-h?taboola_hm=ec717adc-467f-4294-95d7-873077a55f97&tbid=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce&query=taboola_hm%3Dec717adc-467f-4294-95...
0
52 B
Image
General
Full URL
https://match.taboola.com/sg/bidswitch-network/1/rtb-h?taboola_hm=ec717adc-467f-4294-95d7-873077a55f97&tbid=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce&query=taboola_hm%3Dec717adc-467f-4294-95d7-873077a55f97
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 varnish
server
nginx/1.13.12
x-timer
S1571493455.313313,VS0,VE8
x-cache
MISS
status
200
x-cache-hits
0
accept-ranges
bytes
content-length
0
x-served-by
cache-hhn4070-HHN

Redirect headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 varnish
server
nginx
x-timer
S1571493455.269001,VS0,VE8
x-served-by
cache-fra19129-FRA
status
302
x-cache
MISS
location
https://match.taboola.com/sg/bidswitch-network/1/rtb-h?taboola_hm=ec717adc-467f-4294-95d7-873077a55f97&tbid=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce&query=taboola_hm%3Dec717adc-467f-4294-95d7-873077a55f97
accept-ranges
bytes
content-length
0
x-cache-hits
0
b99ee30c25d6a970fc24028c61f22b99.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_234%2Cw_280%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
14 KB
15 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_234%2Cw_280%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/b99ee30c25d6a970fc24028c61f22b99.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
bbe2e1d5d2b866037fa588ec458821a816524cf99df748bff1099f0541d6ea85

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 varnish, 1.1 varnish
age
870865
edge-cache-tag
598336962699232003897055077846120165802,459052303457394366171479749282851127576,29ecf9b93bbf306179626feeda1fab70
status
200, 200 OK
x-cache
MISS, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_234%2Cw_280%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/b99ee30c25d6a970fc24028c61f22b99.jpg
content-length
14590
x-request-id
5a00a92eeb0d80ad766620081c0fb512
x-served-by
cache-fra19143-FRA, cache-fra19129-FRA
last-modified
Tue, 08 Oct 2019 13:39:39 GMT
server
cloudinary
x-timer
S1571493455.021930,VS0,VE0
etag
"154b3be555d8b73c13a28a5a20c148d1"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
0, 162
available
trc.taboola.com/threatpost-threatpost/log/3/
0
139 B
XHR
General
Full URL
https://trc.taboola.com/threatpost-threatpost/log/3/available?route=AM%3AAM%3AV&lti=deflated
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.20191016-8-RELEASE.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

pragma
no-cache
date
Sat, 19 Oct 2019 13:57:34 GMT
via
1.1 varnish
server
nginx
x-timer
S1571493455.930698,VS0,VE10
x-served-by
cache-fra19129-FRA
status
204
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
access-control-allow-origin
https://threatpost.com
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
content-type
image/gif
x-cache-hits
0
neues-startup-audible-grnder-sagt-groen-energiekonzernen-den-kampf-an.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_234%2Cw_280%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//static2.businessinsider.de/image/5806694525948b25008b496d/
6 KB
7 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_234%2Cw_280%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//static2.businessinsider.de/image/5806694525948b25008b496d/neues-startup-audible-grnder-sagt-groen-energiekonzernen-den-kampf-an.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
77fa1b491a9f90fc9b0795e07a44266e1ba50339ba69ed3f3a031707a0fc3f3e

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 varnish, 1.1 varnish
age
724476
edge-cache-tag
310128619433857190821320605277019178465,459052303457394366171479749282851127576,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Thu, 07 Nov 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
HIT, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_234%2Cw_280%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//static2.businessinsider.de/image/5806694525948b25008b496d/neues-startup-audible-grnder-sagt-groen-energiekonzernen-den-kampf-an.jpg
content-length
6628
x-served-by
cache-fra19141-FRA, cache-fra19129-FRA
last-modified
Mon, 07 Oct 2019 08:39:20 GMT
server
cloudinary
x-timer
S1571493455.027996,VS0,VE0
etag
"d5e5d2dcdd5b4a93925e8b0bd39cd6cf"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1, 2
8714d89525912b4b96224241c48b6d56.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_234%2Cw_280%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
27 KB
28 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_234%2Cw_280%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/8714d89525912b4b96224241c48b6d56.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
f790bc607925a79d9f1de6177969b0a3a65a25760dbda8675fab141352d89386

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 varnish, 1.1 varnish
age
2083935
edge-cache-tag
496298816202542752217565155855747801386,459052303457394366171479749282851127576,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Sat, 26 Oct 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
MISS, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_234%2Cw_280%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/8714d89525912b4b96224241c48b6d56.jpg
content-length
27711
x-served-by
cache-fra19179-FRA, cache-fra19129-FRA
last-modified
Wed, 25 Sep 2019 08:56:29 GMT
server
cloudinary
x-timer
S1571493455.029201,VS0,VE0
etag
"7cff8fe5b6e85fb2fd238cd9bdae9e75"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
0, 3
056ebce99c845c5505c7903246f63712.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_234%2Cw_280%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
33 KB
34 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_234%2Cw_280%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/056ebce99c845c5505c7903246f63712.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
87f9aee51d14c2f0e4f1f40ce673d5ca478a872d3a912d773e6af5042c5cfd83

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 varnish, 1.1 varnish
age
179042
edge-cache-tag
303911005764468498990440393039549762002,459052303457394366171479749282851127576,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Fri, 18 Oct 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
MISS, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_234%2Cw_280%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/056ebce99c845c5505c7903246f63712.jpg
content-length
34010
x-served-by
cache-fra19140-FRA, cache-fra19129-FRA
last-modified
Tue, 17 Sep 2019 12:13:32 GMT
server
cloudinary
x-timer
S1571493455.030654,VS0,VE0
etag
"97a26ff7641483fced5e495d0027b128"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
0, 77
d271dc628059fa15446e6b082ebe8af7.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_234%2Cw_280%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
23 KB
24 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_234%2Cw_280%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/d271dc628059fa15446e6b082ebe8af7.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
d49ce8cb5b0586fe39582e35ac823c01943d1e9f3be57047063684fb6d17ec55

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 varnish, 1.1 varnish
age
712138
edge-cache-tag
511140545538054651357698255807618433655,459052303457394366171479749282851127576,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Sun, 13 Oct 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
HIT, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_234%2Cw_280%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/d271dc628059fa15446e6b082ebe8af7.jpg
content-length
23817
x-served-by
cache-fra19125-FRA, cache-fra19129-FRA
last-modified
Thu, 12 Sep 2019 16:53:06 GMT
server
cloudinary
x-timer
S1571493455.034113,VS0,VE0
etag
"6435aed7f2fff25ce6d8b4c4afef42e9"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1, 2
9c59c928099bf8ed80bbda0934b3036d.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_234%2Cw_280%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
16 KB
16 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_234%2Cw_280%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/9c59c928099bf8ed80bbda0934b3036d.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
a325b567a51ff594ad3e9a25cad9d81972801934622c20c0abae0c47b4cb8c62

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 varnish, 1.1 varnish
age
2093705
edge-cache-tag
479976357791226356304736130931664362477,459052303457394366171479749282851127576,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Sat, 26 Oct 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
HIT, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_234%2Cw_280%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/9c59c928099bf8ed80bbda0934b3036d.jpg
content-length
16102
x-served-by
cache-fra19160-FRA, cache-fra19129-FRA
last-modified
Wed, 25 Sep 2019 08:15:36 GMT
server
cloudinary
x-timer
S1571493455.035301,VS0,VE0
etag
"92d18f32daeeb5f8c73a37006d444e00"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1, 5
f539211219b796ffbb49949997c764f0.png
cdn.taboola.com/libtrc/static/thumbnails/
254 B
731 B
Image
General
Full URL
https://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.20191016-8-RELEASE.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
f68019eb4b4e5933301d4ee75969e0cb94ed8333bf514630fa749eb9c3e483c9

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
hL.cyLD7Q4TL5ceY.7JQwF9m5IYI8mkC
via
1.1 varnish
etag
"dfa7b52c86e56bd67fa4002f6ed19854"
age
7530
x-cache
HIT
status
200
x-amz-replication-status
COMPLETED
content-length
254
x-amz-id-2
Vjnfq2okxpLEG/cBVxSfv3DOOCGN7KTpixt29L7DwUhoZL6eRlgDSODZqhfatrYL58q01gaLKf4=
x-served-by
cache-fra19129-FRA
last-modified
Wed, 24 Jun 2015 07:14:11 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:0/gname:root/uname:root/gid:0/mode:33188/mtime:1377415166/atime:1435052450/md5:dfa7b52c86e56bd67fa4002f6ed19854/ctime:1422381567
x-timer
S1571493455.037057,VS0,VE0
date
Sat, 19 Oct 2019 13:57:35 GMT
x-amz-request-id
F6D91014AAA6CDC4
cache-control
private,max-age=31536000
accept-ranges
bytes
content-type
image/png
abp
10
x-cache-hits
8159
creative_js.js
vidstat.taboola.com/vpaid/units/14_12_0/creatives/
4 KB
2 KB
Script
General
Full URL
https://vidstat.taboola.com/vpaid/units/14_12_0/creatives/creative_js.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.20191016-8-RELEASE.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
10eba73b3641332bde05fa8d6223e7017ac5207673602247c35f358ea89e3092

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 a436b6df4b0d1bd189edf722b5d2a523.cloudfront.net (CloudFront), 1.1 varnish
age
374476
x-amz-meta-mtime
1499351521
x-cache
Hit from cloudfront, HIT
status
200
x-amz-meta-mode
33188
content-encoding
gzip
content-length
1827
x-served-by
cache-fra19129-FRA
last-modified
Wed, 06 Sep 2017 08:46:00 GMT
server
AmazonS3
x-timer
S1571493455.040901,VS0,VE0
etag
"0df6cb700db4e2c8b3b7dcb734e91cb0"
x-amz-meta-uid
0
vary
Accept-Encoding
x-amz-meta-gid
0
cache-control
public, max-age=2592000
x-amz-cf-pop
FRA50
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
Bz1oMGf3im0GdaDR1lpP366TMdyCBt5NXOq1IlamWrJqJW2zqe6XsA==
x-cache-hits
819615
st
imprammp.taboola.com/ Frame 0289
0
0
Document
General
Full URL
https://imprammp.taboola.com/st?cipid=66301605&ttype=0&cirid=4914CDAE581581727041213028452&cicmp=2040445&cijs=1&dast=V7RgECFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHLRcjDYkBos1XKyGi91kN9gsR6vNZjRbDqbgMGWnyWU5qAWypsnld8MRmk6Hz3WvFx0tL4fp8Pec7hq_2692WP2Wt8JpOfwtp7faYfY9LC-3wnR6eLxuvemteXlcl6fp-VeMlpvNYC8HAAAAgAcAqPN8iB9AAIAIAAAAAAkAAAAAioCKfwuBCwAAAAAMgIPkcQ0AKA6Gc92tL7vR4fq87P4AAHgIAAEAGFAgASh4SCsByHDdOgEAAAAAAAAAYPn___-PGZh3LZUB-BDpuzHoAXjwAXgQAgAAyBoi-PfSxFQ5SSEqQCxiBAAAAADJ1OZxNKkTKosqAACCdCuAKwCAgDbyJ5KcLN1BibcwAAAAgbEFelj8frPDrvG7XQYAAAAAAAAAYPZ_9o8mRDTmlhbEUsCr9gsIALD2CwgAwKZuAABvAXBBR9CKwWB1ATE7AAAAgLv___9_PZCy2Da2mcvjWVh8i4XFN3JZLMONcTiZrQa7wXDkvfwjJWLHVJqOPocpO00uy0EtkDVNLr_9JmwxWk0mm-VwtlxMBsPRcDTan8CNBjhBw-FgsRssdovFcLKYjAbLwQIFYjDBCRmONpPVaLfaTZbDyWg020w2SNGq1Wy0GQxXs8lst1sNB8PlaIQUrVnMJpPFbLTcbQbLyWgwnAyHCAOL4XDlsk3WytFs4xYNJ661xDEYrlWTyXDjGI5MK9duLXp9TKeFaTnxuLwoGECzF8FFOhEdLS-H6fD3nN6io-XlMB3-ntNFLNGcLNKJ7LJvWWwb28zl8SwsvsXC4hu5LJbhxjiczFaD3WA48hcWw-HKZZuslaPZxi0aTlxriWMwXKsmk-HGMRyZVq7dWvT6mE4L03Licfkbq91itNyMVqN9Y7VbjJab0Wq079AZvqvP2Sitlksel2KjfcksM6dB4TJYvD-JaTHtzg6e3-_oVKkuGmND9k0ozAaPwaCIJYLTRToRvYyni1gieVqkE5XHODOOTBvjcuawrDaW4WKxWfk2C-dy4xutXM6JWKI0XaQTvdph9VveCqfl8Lec3mqH2fewvNwK0-nh8br1prfm5XFdnqbnXzFabjaDifqPDTEazXWzuWKwnGsGqwQAAAAAAAAAsIQ58yYAAAAAp8FsFrPJarkAEg_ju6Mm3QOhu3GuxY0fV9DR8nKYDn_P6S06Wl4O0-HvOV0ZQOJBHA!&excid=22&tst=1&docw=0&cs=false
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash

Request headers

:method
GET
:authority
imprammp.taboola.com
:scheme
https
:path
/st?cipid=66301605&ttype=0&cirid=4914CDAE581581727041213028452&cicmp=2040445&cijs=1&dast=V7RgECFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHLRcjDYkBos1XKyGi91kN9gsR6vNZjRbDqbgMGWnyWU5qAWypsnld8MRmk6Hz3WvFx0tL4fp8Pec7hq_2692WP2Wt8JpOfwtp7faYfY9LC-3wnR6eLxuvemteXlcl6fp-VeMlpvNYC8HAAAAgAcAqPN8iB9AAIAIAAAAAAkAAAAAioCKfwuBCwAAAAAMgIPkcQ0AKA6Gc92tL7vR4fq87P4AAHgIAAEAGFAgASh4SCsByHDdOgEAAAAAAAAAYPn___-PGZh3LZUB-BDpuzHoAXjwAXgQAgAAyBoi-PfSxFQ5SSEqQCxiBAAAAADJ1OZxNKkTKosqAACCdCuAKwCAgDbyJ5KcLN1BibcwAAAAgbEFelj8frPDrvG7XQYAAAAAAAAAYPZ_9o8mRDTmlhbEUsCr9gsIALD2CwgAwKZuAABvAXBBR9CKwWB1ATE7AAAAgLv___9_PZCy2Da2mcvjWVh8i4XFN3JZLMONcTiZrQa7wXDkvfwjJWLHVJqOPocpO00uy0EtkDVNLr_9JmwxWk0mm-VwtlxMBsPRcDTan8CNBjhBw-FgsRssdovFcLKYjAbLwQIFYjDBCRmONpPVaLfaTZbDyWg020w2SNGq1Wy0GQxXs8lst1sNB8PlaIQUrVnMJpPFbLTcbQbLyWgwnAyHCAOL4XDlsk3WytFs4xYNJ661xDEYrlWTyXDjGI5MK9duLXp9TKeFaTnxuLwoGECzF8FFOhEdLS-H6fD3nN6io-XlMB3-ntNFLNGcLNKJ7LJvWWwb28zl8SwsvsXC4hu5LJbhxjiczFaD3WA48hcWw-HKZZuslaPZxi0aTlxriWMwXKsmk-HGMRyZVq7dWvT6mE4L03Licfkbq91itNyMVqN9Y7VbjJab0Wq079AZvqvP2Sitlksel2KjfcksM6dB4TJYvD-JaTHtzg6e3-_oVKkuGmND9k0ozAaPwaCIJYLTRToRvYyni1gieVqkE5XHODOOTBvjcuawrDaW4WKxWfk2C-dy4xutXM6JWKI0XaQTvdph9VveCqfl8Lec3mqH2fewvNwK0-nh8br1prfm5XFdnqbnXzFabjaDifqPDTEazXWzuWKwnGsGqwQAAAAAAAAAsIQ58yYAAAAAp8FsFrPJarkAEg_ju6Mm3QOhu3GuxY0fV9DR8nKYDn_P6S06Wl4O0-HvOV0ZQOJBHA!&excid=22&tst=1&docw=0&cs=false
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
accept-encoding
gzip, deflate, br
cookie
t_gid=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/

Response headers

status
200
server
nginx/1.13.12
accept-ranges
bytes
date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 varnish
x-served-by
cache-hhn4070-HHN
x-cache
MISS
x-cache-hits
0
x-timer
S1571493455.052419,VS0,VE9
content-length
0
cmTagSLIDER_INSTREAM.js
vidstat.taboola.com/vpaid/units/23_14_12/infra/
722 KB
173 KB
Script
General
Full URL
https://vidstat.taboola.com/vpaid/units/23_14_12/infra/cmTagSLIDER_INSTREAM.js
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/units/14_12_0/creatives/creative_js.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
6c211271ea253db5f533b33d2a85143e68684f8293db4c57b380e90896e76d41

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 b6d1611761652d7a383651f2bf480596.cloudfront.net (CloudFront), 1.1 varnish
age
1469069
x-amz-meta-mtime
1570024235
x-cache
Miss from cloudfront, HIT
status
200
x-amz-meta-mode
33188
content-encoding
gzip
content-length
177262
x-served-by
cache-fra19129-FRA
last-modified
Wed, 02 Oct 2019 13:50:51 GMT
server
AmazonS3
x-timer
S1571493455.052336,VS0,VE0
etag
"3be1e1ec1873418d0f09a0b69841d285"
x-amz-meta-uid
0
vary
Accept-Encoding
x-amz-meta-gid
0
cache-control
public, max-age=2592000
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
K-kuLgckvsf4PHdCIDLz3kXbdsTVHX6DZvasdWISdKqa3OJ5OKQt6g==
x-cache-hits
223772
cmOsUnit.css
vidstat.taboola.com/vpaid/units/23_14_12/assets/css/
34 KB
6 KB
Stylesheet
General
Full URL
https://vidstat.taboola.com/vpaid/units/23_14_12/assets/css/cmOsUnit.css
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/units/14_12_0/creatives/creative_js.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
3dba93f65c632536a0fcba4dff71f82f7d6ae88b3a2814d82a1b1876558d79c1

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 d8328954e51c0912a8419c1a67cea1dc.cloudfront.net (CloudFront), 1.1 varnish
age
1469069
x-amz-meta-mtime
1570024231
x-cache
Miss from cloudfront, HIT
status
200
x-amz-meta-mode
33188
content-encoding
gzip
content-length
6240
x-served-by
cache-fra19129-FRA
last-modified
Wed, 02 Oct 2019 13:50:40 GMT
server
AmazonS3
x-timer
S1571493455.052271,VS0,VE0
etag
"1112e8ccb1e3ed0d2e59d31564a5dfae"
x-amz-meta-uid
0
vary
Accept-Encoding
x-amz-meta-gid
0
cache-control
public, max-age=2592000
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
text/css
x-amz-cf-id
K_S9bnFbD3OkN1pxw0iJ_GxM2UezskcDXOJUz7h9PJ_-Fa9C0gb1lw==
x-cache-hits
1699497
content14_10_18m.js
vidstat.taboola.com/
37 KB
8 KB
Script
General
Full URL
https://vidstat.taboola.com/content14_10_18m.js
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/units/23_14_12/infra/cmTagSLIDER_INSTREAM.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ab8bbbaf028510d8b119cce741f0c2cc94816dcc113d83cac81a6aade6a76fa9

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 3ccfbae98f5816b531634c1e82e45259.cloudfront.net (CloudFront), 1.1 varnish
age
438619
x-cache
Hit from cloudfront, HIT
status
200
content-encoding
gzip
content-length
7638
x-served-by
cache-fra19129-FRA
last-modified
Sun, 14 Oct 2018 13:31:31 GMT
server
AmazonS3
x-timer
S1571493455.215583,VS0,VE0
etag
"d8d81221ec6e604811ce469d899c9c8b"
vary
Accept-Encoding
content-type
application/javascript
cache-control
public, max-age=2592000
x-amz-cf-pop
FRA50
accept-ranges
bytes
x-amz-cf-id
Vs4TubaGEnCgigh3kN5-OJytJd-a8QzTxQCNFZg0hh5KVFK_O_tI7g==
x-cache-hits
902281
OvaMediaPlayer.js
vidstat.taboola.com/vpaid/vPlayer/player/v10.5.0/
678 KB
180 KB
Script
General
Full URL
https://vidstat.taboola.com/vpaid/vPlayer/player/v10.5.0/OvaMediaPlayer.js
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/units/23_14_12/infra/cmTagSLIDER_INSTREAM.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
c192e736291c95f8940690aa3ebb3b5d71c44b61c41c7fac96962c904ac2abdd

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 dde0b4b1e223fa23670e93078a04c116.cloudfront.net (CloudFront), 1.1 varnish
age
539757
x-amz-meta-mtime
1570941529
x-cache
Hit from cloudfront, HIT
status
200
x-amz-meta-mode
33188
content-encoding
gzip
content-length
184156
x-served-by
cache-fra19129-FRA
last-modified
Sun, 13 Oct 2019 04:38:50 GMT
server
AmazonS3
x-timer
S1571493455.229711,VS0,VE0
etag
"6399613242e0223a965a4387ac435350"
x-amz-meta-uid
0
vary
Accept-Encoding
x-amz-meta-gid
0
cache-control
public, max-age=2592000
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
fJQO508MyhXPhSeZxlqu007UmXRpFWfziKcUnMUhodzdDbB-IDF0uw==
x-cache-hits
995283
sync
match.taboola.com/ Frame 9413
0
0
Document
General
Full URL
https://match.taboola.com/sync?dast=V7RgECFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHLRcjDYkBos1XKyGi91kN9gsR6vNZjRbDqbgMGWnyWU5qAWypsnld8MRmk6Hz3WvFx0tL4fp8Pec7hq_2692WP2Wt8JpOfwtp7faYfY9LC-3wnR6eLxuvemteXlcl6fp-VeMlpvNYC8HAAAAgAcAqPN8iB9AAIAIAAAAAAkAAAAAioCKfwuBCwAAAAAMgIPkcQ0AKA6Gc92tL7vR4fq87P4AAHgIAAEAGFAgASh4SCsByHDdOgEAAAAAAAAAYPn___-PGZh3LZUB-BDpuzHoAXjwAXgQAgAAyBoi-PfSxFQ5SSEqQCxiBAAAAADJ1OZxNKkTKosqAACCdCuAKwCAgDbyJ5KcLN1BibcwAAAAgbEFelj8frPDrvG7XQYAAAAAAAAAYPZ_9o8mRDTmlhbEUsCr9gsIALD2CwgAwKZuAABvAXBBR9CKwWB1ATE7AAAAgLv___9_PZCy2Da2mcvjWVh8i4XFN3JZLMONcTiZrQa7wXDkvfwjJWLHVJqOPocpO00uy0EtkDVNLr_9JmwxWk0mm-VwtlxMBsPRcDTan8CNBjhBw-FgsRssdovFcLKYjAbLwQIFYjDBCRmONpPVaLfaTZbDyWg020w2SNGq1Wy0GQxXs8lst1sNB8PlaIQUrVnMJpPFbLTcbQbLyWgwnAyHCAOL4XDlsk3WytFs4xYNJ661xDEYrlWTyXDjGI5MK9duLXp9TKeFaTnxuLwoGECzF8FFOhEdLS-H6fD3nN6io-XlMB3-ntNFLNGcLNKJ7LJvWWwb28zl8SwsvsXC4hu5LJbhxjiczFaD3WA48hcWw-HKZZuslaPZxi0aTlxriWMwXKsmk-HGMRyZVq7dWvT6mE4L03Licfkbq91itNyMVqN9Y7VbjJab0Wq079AZvqvP2Sitlksel2KjfcksM6dB4TJYvD-JaTHtzg6e3-_oVKkuGmND9k0ozAaPwaCIJYLTRToRvYyni1gieVqkE5XHODOOTBvjcuawrDaW4WKxWfk2C-dy4xutXM6JWKI0XaQTvdph9VveCqfl8Lec3mqH2fewvNwK0-nh8br1prfm5XFdnqbnXzFabjaDifqPDTEazXWzuWKwnGsGqwQAAAAAAAAAsIQ58yYAAAAAp8FsFrPJarkAEg_ju6Mm3QOhu3GuxY0fV9DR8nKYDn_P6S06Wl4O0-HvOV0ZQOJBHA!&excid=22&docw=0&cijs=1
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/units/23_14_12/infra/cmTagSLIDER_INSTREAM.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash

Request headers

:method
GET
:authority
match.taboola.com
:scheme
https
:path
/sync?dast=V7RgECFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHLRcjDYkBos1XKyGi91kN9gsR6vNZjRbDqbgMGWnyWU5qAWypsnld8MRmk6Hz3WvFx0tL4fp8Pec7hq_2692WP2Wt8JpOfwtp7faYfY9LC-3wnR6eLxuvemteXlcl6fp-VeMlpvNYC8HAAAAgAcAqPN8iB9AAIAIAAAAAAkAAAAAioCKfwuBCwAAAAAMgIPkcQ0AKA6Gc92tL7vR4fq87P4AAHgIAAEAGFAgASh4SCsByHDdOgEAAAAAAAAAYPn___-PGZh3LZUB-BDpuzHoAXjwAXgQAgAAyBoi-PfSxFQ5SSEqQCxiBAAAAADJ1OZxNKkTKosqAACCdCuAKwCAgDbyJ5KcLN1BibcwAAAAgbEFelj8frPDrvG7XQYAAAAAAAAAYPZ_9o8mRDTmlhbEUsCr9gsIALD2CwgAwKZuAABvAXBBR9CKwWB1ATE7AAAAgLv___9_PZCy2Da2mcvjWVh8i4XFN3JZLMONcTiZrQa7wXDkvfwjJWLHVJqOPocpO00uy0EtkDVNLr_9JmwxWk0mm-VwtlxMBsPRcDTan8CNBjhBw-FgsRssdovFcLKYjAbLwQIFYjDBCRmONpPVaLfaTZbDyWg020w2SNGq1Wy0GQxXs8lst1sNB8PlaIQUrVnMJpPFbLTcbQbLyWgwnAyHCAOL4XDlsk3WytFs4xYNJ661xDEYrlWTyXDjGI5MK9duLXp9TKeFaTnxuLwoGECzF8FFOhEdLS-H6fD3nN6io-XlMB3-ntNFLNGcLNKJ7LJvWWwb28zl8SwsvsXC4hu5LJbhxjiczFaD3WA48hcWw-HKZZuslaPZxi0aTlxriWMwXKsmk-HGMRyZVq7dWvT6mE4L03Licfkbq91itNyMVqN9Y7VbjJab0Wq079AZvqvP2Sitlksel2KjfcksM6dB4TJYvD-JaTHtzg6e3-_oVKkuGmND9k0ozAaPwaCIJYLTRToRvYyni1gieVqkE5XHODOOTBvjcuawrDaW4WKxWfk2C-dy4xutXM6JWKI0XaQTvdph9VveCqfl8Lec3mqH2fewvNwK0-nh8br1prfm5XFdnqbnXzFabjaDifqPDTEazXWzuWKwnGsGqwQAAAAAAAAAsIQ58yYAAAAAp8FsFrPJarkAEg_ju6Mm3QOhu3GuxY0fV9DR8nKYDn_P6S06Wl4O0-HvOV0ZQOJBHA!&excid=22&docw=0&cijs=1
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
accept-encoding
gzip, deflate, br
cookie
t_gid=0188ee62-946c-48b5-b108-5228c18d4e57-tuct4a49bce
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/

Response headers

status
200
server
nginx/1.13.12
content-type
text/html;charset=ISO-8859-1
machineid
401
accept-ranges
bytes
date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 varnish
x-served-by
cache-hhn4070-HHN
x-cache
MISS
x-cache-hits
0
x-timer
S1571493455.234077,VS0,VE10
st
convammp.taboola.com/
0
52 B
Image
General
Full URL
https://convammp.taboola.com/st?cijs=convusmp&ttype=45&cisd=convusmp&cipid=66301605&crid=5302265&dast=V79JkCFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHbRcjDYkBos1XKyGi91kNxgtJovNYDIcrSZD4KDlYrQhMVis4WI1XOwmu8FmOVptNqPZcjAFhyk7TS7LQS2QNU0uvxuO0HQ6fK57vehoeTlMh7_ndNf43X61w-q3vBVOy-FvOb3VDrPvYXm5FabTw-N1601vzcvjujxNz79itNxsBns5AAAAADwAQJ3nQ_wAAgBEAAAAAEgAAAAAUARU_FsIXAAAAABgABwkj2sAQHEwnOtufdmNDtfnZfcHAMBDAAgAwIACCUDBQ1oJQIbr1gkAAAAAAAAAAMv___9_zMC8a6kMwIdIXw_Agw_AA1EBYhEjAAAAAEimNo-jSZ1QWVQBABCkWwFcAQAEtJE_keiEAQAACIwt0MPi95sddo3f7TIAAAAAAAAAALP_s380IaIxt7QglgJetV9AAIC1X0AAADZ1AwB4C4ALOoJWDAarC4jZAQAAANz9____64GUxbaxzVwez8LiWywsvpHLYhlujMPJbDXYDYYj7-UfKRE7ptJ09DlM2WlyWQ5qgaxpcvntN2GL0Woy2SyHs-ViMhiOhqPR_gRuNMAJGg4Hi91gsVsshpPFZDRYDhYoEIMJTshwtJmsRrvVbrIcTkaj2WayQYpWrWajzWC4mk1mu91qOBguRyOkaM1iNpksZqPlbjNYTkaD4WQ4RBhYDIcrl22yVo5mG7doOHGtJY7BcK2aTIYbx3BkWrl2a9HrYzotTMuJx-VFwQCavQgu0onoaHk5TIe_5_QWHS0vh-nw95wuYonmZJFOZJd9y2Lb2GYuj2dh8S0WFt_IZbEMN8bhZLYa7AbDkb-wGA5XLttkrRzNNm7RcOJaSxyD4Vo1mQw3juHItHLt1qLXx3RamJYTj8vfWO0Wo-VmtBrtG6vdYrTcjFajfYfO8F19zkZptVzyuBQb7UtmmTkNCpfB4v1JTItpd3bw_H5Hp0p10Rgbsm9CYTZ4DAZFLBGcLtKJ6GU8XcQSydMinag8xplxZNoYlzOHZbWxDBeLzcq3WTiXG99o5XJOxBKl6SKd6NUOq9_yVjgth7_l9FY7zL6H5eVWmE4Pj9etN701L4_r8jQ9_4rRcrMZTNR_bIjRaK6bzRWD5VwzWCUAAAAAAAAAgCXMmTcBAAAAOA1ms5hNVssFkHgY3x016R4I3Y1zLW78uIKOlpfDdPh7Tm_R0fJymA5_z-nKABIP4g!&cmcv=&pix=31589837&cb=1571493455211&uv=231412&tms=1571493455211&abt=arbr_vB!expl_vA&ft=0&unm=SLIDER_INSTREAM&debug=pn:!sqg:!torgn:1571493453422.2751!ts:1571493455211&
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 varnish
server
nginx/1.13.12
x-timer
S1571493455.233390,VS0,VE9
x-cache
MISS
status
200
x-cache-hits
0
accept-ranges
bytes
content-length
0
x-served-by
cache-hhn4070-HHN
st
convammp.taboola.com/
0
53 B
Image
General
Full URL
https://convammp.taboola.com/st?cijs=convusmp&ttype=72&cisd=convusmp&cipid=66301605&crid=5302265&dast=V79JkCFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHbRcjDYkBos1XKyGi91kNxgtJovNYDIcrSZD4KDlYrQhMVis4WI1XOwmu8FmOVptNqPZcjAFhyk7TS7LQS2QNU0uvxuO0HQ6fK57vehoeTlMh7_ndNf43X61w-q3vBVOy-FvOb3VDrPvYXm5FabTw-N1601vzcvjujxNz79itNxsBns5AAAAADwAQJ3nQ_wAAgBEAAAAAEgAAAAAUARU_FsIXAAAAABgABwkj2sAQHEwnOtufdmNDtfnZfcHAMBDAAgAwIACCUDBQ1oJQIbr1gkAAAAAAAAAAMv___9_zMC8a6kMwIdIXw_Agw_AA1EBYhEjAAAAAEimNo-jSZ1QWVQBABCkWwFcAQAEtJE_keiEAQAACIwt0MPi95sddo3f7TIAAAAAAAAAALP_s380IaIxt7QglgJetV9AAIC1X0AAADZ1AwB4C4ALOoJWDAarC4jZAQAAANz9____64GUxbaxzVwez8LiWywsvpHLYhlujMPJbDXYDYYj7-UfKRE7ptJ09DlM2WlyWQ5qgaxpcvntN2GL0Woy2SyHs-ViMhiOhqPR_gRuNMAJGg4Hi91gsVsshpPFZDRYDhYoEIMJTshwtJmsRrvVbrIcTkaj2WayQYpWrWajzWC4mk1mu91qOBguRyOkaM1iNpksZqPlbjNYTkaD4WQ4RBhYDIcrl22yVo5mG7doOHGtJY7BcK2aTIYbx3BkWrl2a9HrYzotTMuJx-VFwQCavQgu0onoaHk5TIe_5_QWHS0vh-nw95wuYonmZJFOZJd9y2Lb2GYuj2dh8S0WFt_IZbEMN8bhZLYa7AbDkb-wGA5XLttkrRzNNm7RcOJaSxyD4Vo1mQw3juHItHLt1qLXx3RamJYTj8vfWO0Wo-VmtBrtG6vdYrTcjFajfYfO8F19zkZptVzyuBQb7UtmmTkNCpfB4v1JTItpd3bw_H5Hp0p10Rgbsm9CYTZ4DAZFLBGcLtKJ6GU8XcQSydMinag8xplxZNoYlzOHZbWxDBeLzcq3WTiXG99o5XJOxBKl6SKd6NUOq9_yVjgth7_l9FY7zL6H5eVWmE4Pj9etN701L4_r8jQ9_4rRcrMZTNR_bIjRaK6bzRWD5VwzWCUAAAAAAAAAgCXMmTcBAAAAOA1ms5hNVssFkHgY3x016R4I3Y1zLW78uIKOlpfDdPh7Tm_R0fJymA5_z-nKABIP4g!&cmcv=&pix=&cb=1571493455226&uv=231412&tms=1571493455226&abt=arbr_vB!expl_vA&ft=0&unm=SLIDER_INSTREAM
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 varnish
server
nginx/1.13.12
x-timer
S1571493455.233483,VS0,VE8
x-cache
MISS
status
200
x-cache-hits
0
accept-ranges
bytes
content-length
0
x-served-by
cache-hhn4070-HHN
c5ef96bc-30ab-456a-b3d5-a84f367c6a46.svg
cdn.taboola.com/static/c5/
3 KB
2 KB
Image
General
Full URL
https://cdn.taboola.com/static/c5/c5ef96bc-30ab-456a-b3d5-a84f367c6a46.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1d89405054b0eccfd66baa763bf4781b8dff83824636284b79800ecdc25579f1

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
3GoWmPpnzFDs5CP3.ebHbCmhALWQMuvH
content-encoding
gzip
etag
"11d8569a7da0739259e3ac0b0d666e94"
age
11
via
1.1 varnish
x-cache
HIT
status
200
x-amz-replication-status
COMPLETED
content-length
1502
x-amz-id-2
AXAHtprjJeOKcP/XBQrFiMRLv4NAuGzoEHvPRfl+umBEDDMyljhhZzZEOhKTIB8C04Osobd5Mso=
x-served-by
cache-fra19129-FRA
last-modified
Sun, 10 Jun 2018 13:23:55 GMT
server
AmazonS3
x-timer
S1571493455.280815,VS0,VE0
date
Sat, 19 Oct 2019 13:57:35 GMT
vary
Accept-Encoding
access-control-allow-methods
GET
x-amz-request-id
51FAB2B347D521B2
access-control-allow-origin
*
cache-control
private,max-age=31536000
accept-ranges
bytes
content-type
image/svg+xml
access-control-allow-headers
*
abp
10
x-cache-hits
19
cd003eb6-08f3-4aae-95b2-a32a920995c2
https://threatpost.com/
1 KB
0
Media
General
Full URL
blob:https://threatpost.com/cd003eb6-08f3-4aae-95b2-a32a920995c2
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
60ddc774c7b5fd0c01d169321a444da403d60c0042f6bee01b0c96f6e1535fda

Request headers

Sec-Fetch-Mode
no-cors
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=0-

Response headers

Content-Range
bytes 0-1492/1493
Content-Length
1493
Content-Type
video/mp4
b51af5fe-7eef-4a25-a1d3-1838c8117726
https://threatpost.com/
1 KB
0
Media
General
Full URL
blob:https://threatpost.com/b51af5fe-7eef-4a25-a1d3-1838c8117726
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
60ddc774c7b5fd0c01d169321a444da403d60c0042f6bee01b0c96f6e1535fda

Request headers

Sec-Fetch-Mode
no-cors
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=0-

Response headers

Content-Range
bytes 0-1492/1493
Content-Length
1493
Content-Type
video/mp4
pixel;r=1132932410;rf=0;a=p-_7kVx0t9Jqj90;url=https%3A%2F%2Fthreatpost.com%2Fmajor-airport-malware-attack-ot-security%2F149330%2F;fpan=1;fpa=P0-54819468-1571493455315;ns=0;ce=1;qjs=1;qv=4c19192-201...
pixel.quantserve.com/
35 B
494 B
Image
General
Full URL
https://pixel.quantserve.com/pixel;r=1132932410;rf=0;a=p-_7kVx0t9Jqj90;url=https%3A%2F%2Fthreatpost.com%2Fmajor-airport-malware-attack-ot-security%2F149330%2F;fpan=1;fpa=P0-54819468-1571493455315;ns=0;ce=1;qjs=1;qv=4c19192-20180628134937;cm=;ref=;je=0;sr=1600x1200x24;enc=n;dst=1;et=1571493455315;tzo=-120;ogl=image.https%3A%2F%2Fmedia%252Ethreatpost%252Ecom%2Fwp-content%2Fuploads%2Fsites%2F103%2F2019%2F02%2F07101809%2Fairli%2Ctype.article%2Ctitle.Major%20Airport%20Malware%20Attack%20Shines%20a%20Light%20on%20OT%20Security%2Cdescription.A%20cryptomining%20infection%20spread%20to%20half%20of%20the%20workstations%20at%20a%20major%20internati%2Curl.https%3A%2F%2Fthreatpost%252Ecom%2Fmajor-airport-malware-attack-ot-security%2F149330%2F
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.244 , United Kingdom, ASN27281 (QUANTCAST - Quantcast Corporation, US),
Reverse DNS
Software
QS /
Resource Hash
a0d3a0aff7dc3bf32d2176fc3dcda6e7aba2867c4f4d1f7af6355d2cfc6c44f8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 19 Oct 2019 13:57:35 GMT
Server
QS
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAo PSDo OUR SAMa IND COM NAV"
Cache-Control
private, no-cache, no-store, proxy-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
Fri, 04 Aug 1978 12:00:00 GMT
player.css
vidstat.taboola.com/vpaid/vPlayer/player/v10.5.0/assets/
14 KB
3 KB
Stylesheet
General
Full URL
https://vidstat.taboola.com/vpaid/vPlayer/player/v10.5.0/assets/player.css
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/vPlayer/player/v10.5.0/OvaMediaPlayer.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
25d238eac82235b53958982f2d7c8db542d0c4b05ed49ccc8cfd9d1d56f38760

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 3bf3e75bcb9a86b3eb343a1d4392a6df.cloudfront.net (CloudFront), 1.1 varnish
age
539757
x-amz-meta-mtime
1570941532
x-cache
Hit from cloudfront, HIT
status
200
x-amz-meta-mode
33188
content-encoding
gzip
content-length
2454
x-served-by
cache-fra19129-FRA
last-modified
Sun, 13 Oct 2019 04:38:53 GMT
server
AmazonS3
x-timer
S1571493455.419067,VS0,VE0
etag
"06641339ce27ddb2d0da0bf718d4974a"
x-amz-meta-uid
0
vary
Accept-Encoding
x-amz-meta-gid
0
cache-control
public, max-age=2592000
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
text/css
x-amz-cf-id
yZ-UguYdc9AdjUrV8nR5z0JIuG73EQDM92tolOuGUiD5ZZ0WKYrRaA==
x-cache-hits
904090
st
convammp.taboola.com/
0
53 B
Image
General
Full URL
https://convammp.taboola.com/st?cijs=convusmp&ttype=81&cisd=convusmp&cipid=66301605&crid=5302265&dast=V79JkCFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHbRcjDYkBos1XKyGi91kNxgtJovNYDIcrSZD4KDlYrQhMVis4WI1XOwmu8FmOVptNqPZcjAFhyk7TS7LQS2QNU0uvxuO0HQ6fK57vehoeTlMh7_ndNf43X61w-q3vBVOy-FvOb3VDrPvYXm5FabTw-N1601vzcvjujxNz79itNxsBns5AAAAADwAQJ3nQ_wAAgBEAAAAAEgAAAAAUARU_FsIXAAAAABgABwkj2sAQHEwnOtufdmNDtfnZfcHAMBDAAgAwIACCUDBQ1oJQIbr1gkAAAAAAAAAAMv___9_zMC8a6kMwIdIXw_Agw_AA1EBYhEjAAAAAEimNo-jSZ1QWVQBABCkWwFcAQAEtJE_keiEAQAACIwt0MPi95sddo3f7TIAAAAAAAAAALP_s380IaIxt7QglgJetV9AAIC1X0AAADZ1AwB4C4ALOoJWDAarC4jZAQAAANz9____64GUxbaxzVwez8LiWywsvpHLYhlujMPJbDXYDYYj7-UfKRE7ptJ09DlM2WlyWQ5qgaxpcvntN2GL0Woy2SyHs-ViMhiOhqPR_gRuNMAJGg4Hi91gsVsshpPFZDRYDhYoEIMJTshwtJmsRrvVbrIcTkaj2WayQYpWrWajzWC4mk1mu91qOBguRyOkaM1iNpksZqPlbjNYTkaD4WQ4RBhYDIcrl22yVo5mG7doOHGtJY7BcK2aTIYbx3BkWrl2a9HrYzotTMuJx-VFwQCavQgu0onoaHk5TIe_5_QWHS0vh-nw95wuYonmZJFOZJd9y2Lb2GYuj2dh8S0WFt_IZbEMN8bhZLYa7AbDkb-wGA5XLttkrRzNNm7RcOJaSxyD4Vo1mQw3juHItHLt1qLXx3RamJYTj8vfWO0Wo-VmtBrtG6vdYrTcjFajfYfO8F19zkZptVzyuBQb7UtmmTkNCpfB4v1JTItpd3bw_H5Hp0p10Rgbsm9CYTZ4DAZFLBGcLtKJ6GU8XcQSydMinag8xplxZNoYlzOHZbWxDBeLzcq3WTiXG99o5XJOxBKl6SKd6NUOq9_yVjgth7_l9FY7zL6H5eVWmE4Pj9etN701L4_r8jQ9_4rRcrMZTNR_bIjRaK6bzRWD5VwzWCUAAAAAAAAAgCXMmTcBAAAAOA1ms5hNVssFkHgY3x016R4I3Y1zLW78uIKOlpfDdPh7Tm_R0fJymA5_z-nKABIP4g!&cmcv=&uv=231412&unm=SLIDER_INSTREAM&cb=1571493455409&abt=arbr_vB!expl_vA&baseReportD=taboola.com&dataCenter=am&
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 varnish
server
nginx/1.13.12
x-timer
S1571493455.427668,VS0,VE8
x-cache
MISS
status
200
x-cache-hits
0
accept-ranges
bytes
content-length
0
x-served-by
cache-hhn4070-HHN
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
12-life-saving-travel-hacks-for-your-next-trip.mp4
vidstatb.taboola.com/vid/
3 MB
0
Media
General
Full URL
https://vidstatb.taboola.com/vid/12-life-saving-travel-hacks-for-your-next-trip.mp4
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=0-

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 7549433a09d06354ea864d169b689e51.cloudfront.net (CloudFront), 1.1 varnish
age
1001500
x-cache
Miss from cloudfront, HIT
status
206
content-length
4059008
x-served-by
cache-hhn4020-HHN
content-range
bytes 0-4059007/4059008
last-modified
Thu, 29 Mar 2018 08:22:43 GMT
server
AmazonS3
x-timer
S1571493456.525144,VS0,VE0
etag
"59fbf476f7d512080c64b4ca58402211"
content-type
video/mp4
cache-control
public, max-age=2592000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
x-amz-cf-id
YAXohQWg2v9YrVSneQ2OS0WH9CcDBxMUvEbO1OqpWsOodLwtjsMzXw==
x-cache-hits
162743
desk_muted2.svg
vidstat.taboola.com/assets/video_controls/
688 B
682 B
Image
General
Full URL
https://vidstat.taboola.com/assets/video_controls/desk_muted2.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
b07af50f99890a6edd3601bb8cf2d7ebdb404904067925d794d1cd450e939f57

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://vidstat.taboola.com/vpaid/vPlayer/player/v10.5.0/assets/player.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 150f249515041adfcc44683bff172916.cloudfront.net (CloudFront), 1.1 varnish
age
998275
x-cache
Hit from cloudfront, HIT
status
200
access-control-max-age
3000
content-encoding
gzip
content-length
376
x-served-by
cache-fra19129-FRA
last-modified
Sun, 19 Nov 2017 12:19:28 GMT
server
AmazonS3
x-timer
S1571493456.529835,VS0,VE0
etag
"c374f9a1c65db8dd9f4b435bd1adb4ed"
vary
Accept-Encoding
access-control-allow-methods
GET, HEAD
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
public, max-age=2592000
x-amz-cf-pop
FRA53
accept-ranges
bytes
x-amz-cf-id
J0h1bbgZx_fPwEYeomGFygG9cnvgZaaoxk7QD_wy2O__I2_lbcJ9xQ==
x-cache-hits
105207
pause2.svg
vidstat.taboola.com/assets/video_controls/
391 B
501 B
Image
General
Full URL
https://vidstat.taboola.com/assets/video_controls/pause2.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
437513ec64a0d4c9b838a51cf1e57bfb0d75586f35ddd91d0de1d01335fd0969

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://vidstat.taboola.com/vpaid/vPlayer/player/v10.5.0/assets/player.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 d6fa2e1de8f392301c10fd5bb7b263c3.cloudfront.net (CloudFront), 1.1 varnish
age
1170870
x-amz-meta-mtime
1498396298
x-cache
Hit from cloudfront, HIT
status
200
x-amz-meta-mode
33188
content-encoding
gzip
content-length
246
x-served-by
cache-fra19129-FRA
last-modified
Sun, 02 Jul 2017 14:26:33 GMT
server
AmazonS3
x-timer
S1571493456.529960,VS0,VE0
etag
"0ae31cb3e45e52b441abf8cc6208a36e"
x-amz-meta-uid
0
vary
Accept-Encoding
x-amz-meta-gid
0
cache-control
public, max-age=2592000
x-amz-cf-pop
FRA50
accept-ranges
bytes
content-type
image/svg+xml
x-amz-cf-id
FgANvHKLjNJ9Fpv1F934JCvXZ2GjvpFBRjvAevQp1Q1BSN_UYSA3BQ==
x-cache-hits
82643
VideoBidRequestHandlerServlet
wf.taboola.com/
9 KB
9 KB
XHR
General
Full URL
https://wf.taboola.com/VideoBidRequestHandlerServlet?oid=15&width=400&height=225&pubid=198827&tagid=1020237&crid=5302265&noaop=2&sortOrderType=0&cb=1571493455548&mimes=5,10,11,12&isvideo=0&plmd=2&mindur=1&maxdur=210&minbr=1&maxbr=10000&st=0&seq=1&pv=1050&pt=-35418769&tz=120&viewable=true&ddast=V79JkCFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHbRcjDYkBos1XKyGi91kNxgtJovNYDIcrSZD4KDlYrQhMVis4WI1XOwmu8FmOVptNqPZcjAFhyk7TS7LQS2QNU0uvxuO0HQ6fK57vehoeTlMh7_ndNf43X61w-q3vBVOy-FvOb3VDrPvYXm5FabTw-N1601vzcvjujxNz79itNxsBns5AAAAADwAQJ3nQ_wAAgBEAAAAAEgAAAAAUARU_FsIXAAAAABgABwkj2sAQHEwnOtufdmNDtfnZfcHAMBDAAgAwIACCUDBQ1oJQIbr1gkAAAAAAAAAAMv___9_zMC8a6kMwIdIXw_Agw_AA1EBYhEjAAAAAEimNo-jSZ1QWVQBABCkWwFcAQAEtJE_keiEAQAACIwt0MPi95sddo3f7TIAAAAAAAAAALP_s380IaIxt7QglgJetV9AAIC1X0AAADZ1AwB4C4ALOoJWDAarC4jZAQAAANz9____64GUxbaxzVwez8LiWywsvpHLYhlujMPJbDXYDYYj7-UfKRE7ptJ09DlM2WlyWQ5qgaxpcvntN2GL0Woy2SyHs-ViMhiOhqPR_gRuNMAJGg4Hi91gsVsshpPFZDRYDhYoEIMJTshwtJmsRrvVbrIcTkaj2WayQYpWrWajzWC4mk1mu91qOBguRyOkaM1iNpksZqPlbjNYTkaD4WQ4RBhYDIcrl22yVo5mG7doOHGtJY7BcK2aTIYbx3BkWrl2a9HrYzotTMuJx-VFwQCavQgu0onoaHk5TIe_5_QWHS0vh-nw95wuYonmZJFOZJd9y2Lb2GYuj2dh8S0WFt_IZbEMN8bhZLYa7AbDkb-wGA5XLttkrRzNNm7RcOJaSxyD4Vo1mQw3juHItHLt1qLXx3RamJYTj8vfWO0Wo-VmtBrtG6vdYrTcjFajfYfO8F19zkZptVzyuBQb7UtmmTkNCpfB4v1JTItpd3bw_H5Hp0p10Rgbsm9CYTZ4DAZFLBGcLtKJ6GU8XcQSydMinag8xplxZNoYlzOHZbWxDBeLzcq3WTiXG99o5XJOxBKl6SKd6NUOq9_yVjgth7_l9FY7zL6H5eVWmE4Pj9etN701L4_r8jQ9_4rRcrMZTNR_bIjRaK6bzRWD5VwzWCUAAAAAAAAAgCXMmTcBAAAAOA1ms5hNVssFkHgY3x016R4I3Y1zLW78uIKOlpfDdPh7Tm_R0fJymA5_z-nKABIP4g!&proto=2,3,5,6&dtagid=1683035&dpubid=331625&abtst=arbr_vB!expl_vA&mPre=0.033&encoded=1&pstn=1&cirf=https%3A%2F%2Fthreatpost.com&callback=&en=1&wfv=1&cdb=&gdprApplies=false&amp=0&qsz=6&ft=0&pb=0
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/vPlayer/player/v10.5.0/OvaMediaPlayer.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
4c0ac27ccc95afb8f74f2075e7d5b49b248279ea15decf519bcf5319abe96dbd

Request headers

Sec-Fetch-Mode
cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
text/plain

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
via
1.1 varnish
machineid
1411
x-cache
MISS
status
200
x-cache-hits
0
x-served-by
cache-fra19158-FRA
pragma
no-cache
server
nginx/1.13.12
x-timer
S1571493456.554983,VS0,VE196
content-type
application/json;charset=utf-8
access-control-allow-origin
https://threatpost.com
cache-control
no-cache,must-revalidate,no-store,max-age=0,s-maxage=0
access-control-allow-credentials
true
accept-ranges
bytes
expires
Sat, 26 Jul 1997 05:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
15 KB
5 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=1730446476775593&correlator=3626302100350987&output=ldjh&impl=fif&adsid=NT&eid=21064809%2C21062420%2C21064688%2C21064811&vrg=2019101401&guci=1.2.0.0.2.2.0.0&plat=1%3A536903688%2C2%3A536903688%2C8%3A134250504&sc=1&sfv=1-0-35&ecs=20191019&iu=%2F21707124336%2Fthreatpost%2Fheader&sz=970x250&eri=1&cust_params=UrlHost%3Dthreatpost.com%26UrlPath%3D%252Fmajor-airport-malware-attack-ot-security%252F149330%26UrlQuery%3D%26category%3Dcritical-infrastructure%26contentid%3D149330%26contenttags%3Dproduction%252Chomeairport%252Ccryptomining%252Ccyberattack%252Ccyberbit%252Cmalware%252Coperational-technology%252Cot-it-convergence%252Cplayerz%252C&cookie_enabled=1&bc=31&abxe=1&lmt=1571493455&dt=1571493455613&dlt=1571493453787&idt=1030&frm=20&biw=1585&bih=1200&oid=3&adx=308&ady=0&adk=151559616&uci=1&ifi=1&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fthreatpost.com%2Fmajor-airport-malware-attack-ot-security%2F149330%2F&dssz=41&icsg=140740720590848&std=3&vis=1&dmc=8&scr_x=0&scr_y=0&ga_vid=2039105488.1571493456&ga_sid=1571493456&ga_hid=1716329525&fws=0&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_2019101401.js?21064809
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
db3c80ba02dac654dc866abcadaa37866385183ada04c9ac1c77c0cb77686054
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
4621
x-xss-protection
0
google-lineitem-id
5186380942
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138289192148
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://threatpost.com
access-control-expose-headers
x-google-amp-ad-validated-version
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_modern_rendering_2019101401.js
securepubads.g.doubleclick.net/gpt/
59 KB
24 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_rendering_2019101401.js?21064809
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_2019101401.js?21064809
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
sffe /
Resource Hash
d7652307a998bbb0733e6006eaa22634247fe690efd13ed1e242cb8ccc8420e7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 14 Oct 2019 13:08:16 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
24001
x-xss-protection
0
expires
Sat, 19 Oct 2019 13:57:35 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-35/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-35/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_2019101401.js?21064809
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

ads
securepubads.g.doubleclick.net/gampad/
15 KB
5 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=1730446476775593&correlator=3626302100350987&output=ldjh&impl=fif&adsid=NT&eid=21064809%2C21062420%2C21064688%2C21064811&vrg=2019101401&guci=1.2.0.0.2.2.0.0&plat=1%3A536903688%2C2%3A536903688%2C8%3A134250504&sc=1&sfv=1-0-35&ecs=20191019&iu=%2F21707124336%2Fthreatpost%2Fmedrectangle&sz=300x250&eri=1&cust_params=UrlHost%3Dthreatpost.com%26UrlPath%3D%252Fmajor-airport-malware-attack-ot-security%252F149330%26UrlQuery%3D%26category%3Dcritical-infrastructure%26contentid%3D149330%26contenttags%3Dproduction%252Chomeairport%252Ccryptomining%252Ccyberattack%252Ccyberbit%252Cmalware%252Coperational-technology%252Cot-it-convergence%252Cplayerz%252C&cookie_enabled=1&bc=31&abxe=1&lmt=1571493455&dt=1571493455624&dlt=1571493453787&idt=1030&frm=20&biw=1585&bih=1200&oid=3&adx=1093&ady=407&adk=689239265&uci=2&ifi=2&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fthreatpost.com%2Fmajor-airport-malware-attack-ot-security%2F149330%2F&dssz=42&icsg=140740720590848&std=3&vis=1&dmc=8&scr_x=0&scr_y=0&ga_vid=2039105488.1571493456&ga_sid=1571493456&ga_hid=1716329525&fws=0&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_2019101401.js?21064809
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
b214588ca57c400c6927a115662fd43fb4362973c0ccfe22e3615c61b8391f49
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
4636
x-xss-protection
0
google-lineitem-id
5186380942
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138289113621
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://threatpost.com
access-control-expose-headers
x-google-amp-ad-validated-version
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
15 KB
5 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=1730446476775593&correlator=3626302100350987&output=ldjh&impl=fif&adsid=NT&eid=21064809%2C21062420%2C21064688%2C21064811&vrg=2019101401&guci=1.2.0.0.2.2.0.0&plat=1%3A536903688%2C2%3A536903688%2C8%3A134250504&sc=1&sfv=1-0-35&ecs=20191019&iu=%2F21707124336%2Fthreatpost%2Ftower&sz=300x600&eri=1&cust_params=UrlHost%3Dthreatpost.com%26UrlPath%3D%252Fmajor-airport-malware-attack-ot-security%252F149330%26UrlQuery%3D%26category%3Dcritical-infrastructure%26contentid%3D149330%26contenttags%3Dproduction%252Chomeairport%252Ccryptomining%252Ccyberattack%252Ccyberbit%252Cmalware%252Coperational-technology%252Cot-it-convergence%252Cplayerz%252C&cookie_enabled=1&bc=31&abxe=1&lmt=1571493455&dt=1571493455638&dlt=1571493453787&idt=1030&frm=20&biw=1585&bih=1200&oid=3&adx=1093&ady=1761&adk=2784303562&uci=3&ifi=3&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fthreatpost.com%2Fmajor-airport-malware-attack-ot-security%2F149330%2F&dssz=42&icsg=140740720590848&std=3&vis=1&dmc=8&scr_x=0&scr_y=0&ga_vid=2039105488.1571493456&ga_sid=1571493456&ga_hid=1716329525&fws=0&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_2019101401.js?21064809
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
a20acfd5d15f3215fedef24f7696d060614f377460decc67c8d819f82f87cf42
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
4618
x-xss-protection
0
google-lineitem-id
5186380942
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138289113879
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://threatpost.com
access-control-expose-headers
x-google-amp-ad-validated-version
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
397 B
372 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=1730446476775593&correlator=3626302100350987&output=ldjh&impl=fif&adsid=NT&eid=21064809%2C21062420%2C21064688%2C21064811&vrg=2019101401&guci=1.2.0.0.2.2.0.0&plat=1%3A536903688%2C2%3A536903688%2C8%3A134250504&sc=1&sfv=1-0-35&ecs=20191019&iu=%2F21707124336%2Fthreatpost%2Finterstitial&sz=2x2&eri=1&cust_params=UrlHost%3Dthreatpost.com%26UrlPath%3D%252Fmajor-airport-malware-attack-ot-security%252F149330%26UrlQuery%3D%26category%3Dcritical-infrastructure%26contentid%3D149330%26contenttags%3Dproduction%252Chomeairport%252Ccryptomining%252Ccyberattack%252Ccyberbit%252Cmalware%252Coperational-technology%252Cot-it-convergence%252Cplayerz%252C&cookie_enabled=1&bc=31&abxe=1&lmt=1571493455&dt=1571493455642&dlt=1571493453787&idt=1030&frm=20&biw=1585&bih=1200&oid=3&adx=792&ady=5393&adk=1322721597&uci=4&ifi=4&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fthreatpost.com%2Fmajor-airport-malware-attack-ot-security%2F149330%2F&dssz=42&icsg=140740720590848&std=3&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1585x5394&msz=1585x2&ga_vid=2039105488.1571493456&ga_sid=1571493456&ga_hid=1716329525&fws=0&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_2019101401.js?21064809
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
77faf8fbf8f4559dd77b78c4b053518029497ce33ae537f9023890ccd5bdd146
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
211
x-xss-protection
0
google-lineitem-id
-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://threatpost.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=UA-109681207-2
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
dbb67c620eaabf6679a314db18d3ae43037aef71ab27422e6feec08ee987cc0a
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 19 Aug 2019 17:22:41 GMT
server
Golfe2
age
206
date
Sat, 19 Oct 2019 13:54:09 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
17803
expires
Sat, 19 Oct 2019 15:54:09 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&a=1716329525&t=pageview&_s=1&dl=https%3A%2F%2Fthreatpost.com%2Fmajor-airport-malware-attack-ot-security%2F149330%2F&ul=en-us&de=UTF-8&dt=Major%...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-109681207-2&cid=2039105488.1571493456&jid=115668203&_gid=227326998.1571493456&gjid=196739357&_v=j79&z=2074647833
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-109681207-2&cid=2039105488.1571493456&jid=115668203&_v=j79&z=2074647833
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-109681207-2&cid=2039105488.1571493456&jid=115668203&_v=j79&z=2074647833&slf_rd=1&random=979449891
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-109681207-2&cid=2039105488.1571493456&jid=115668203&_v=j79&z=2074647833&slf_rd=1&random=979449891
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 19 Oct 2019 13:57:35 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sat, 19 Oct 2019 13:57:35 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-109681207-2&cid=2039105488.1571493456&jid=115668203&_v=j79&z=2074647833&slf_rd=1&random=979449891
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
adsct
analytics.twitter.com/i/
31 B
266 B
Script
General
Full URL
https://analytics.twitter.com/i/adsct?p_id=Twitter&p_user_id=0&txn_id=ntt0j&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0&tpx_cb=twttr.conversion.loadPixels&tw_document_href=https%3A%2F%2Fthreatpost.com%2Fmajor-airport-malware-attack-ot-security%2F149330%2F
Requested by
Host: static.ads-twitter.com
URL: https://static.ads-twitter.com/uwt.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.195 , United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_o /
Resource Hash
df3e003cc30e9bdd0313100e8ee5d468070b4b34d11ad355f276a356d4b9c7bf
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 19 Oct 2019 13:57:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
strict-transport-security
max-age=631138519
content-length
57
x-xss-protection
0
x-response-time
121
pragma
no-cache
last-modified
Sat, 19 Oct 2019 13:57:35 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
content-type
application/javascript;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
9aa839b795d99ef9bcccd9018d584dc4
x-transaction
004a432c005a72f2
expires
Tue, 31 Mar 1981 05:00:00 GMT
amp4ads-host-v0.js
cdn.ampproject.org/rtv/011910071804120/
20 KB
7 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011910071804120/amp4ads-host-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_2019101401.js?21064809
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8055b71507df36a9a9d807b0799d9c26533101139e1078ea222897c02ad854c5
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
etag
"c4c4a08298eb0376"
age
65932
status
200
strict-transport-security
max-age=31536000; includeSubDomains; preload
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
7118
x-xss-protection
0
server
sffe
date
Fri, 18 Oct 2019 19:38:43 GMT
vary
Accept-Encoding
content-type
text/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
x-content-type-options
nosniff
expires
Sat, 17 Oct 2020 19:38:43 GMT
amp4ads-v0.js
cdn.ampproject.org/rtv/011910071804120/ Frame 4DDC
251 KB
68 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011910071804120/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_rendering_2019101401.js?21064809
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
93dd062566471fa91604aee574ff8f6e78e80bd20b01f5e080adb0ac61680f94
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
etag
"6fedf66162310d96"
age
65917
status
200
strict-transport-security
max-age=31536000; includeSubDomains; preload
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
69642
x-xss-protection
0
server
sffe
date
Fri, 18 Oct 2019 19:38:58 GMT
vary
Accept-Encoding
content-type
text/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
x-content-type-options
nosniff
expires
Sat, 17 Oct 2020 19:38:58 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/011910071804120/v0/ Frame 4DDC
150 KB
40 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011910071804120/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_rendering_2019101401.js?21064809
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
aa95eb8757140f09d3424399b939ed3f10a20c45c6c52476c614c9bc375eb667
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
etag
"8beba9134cdf5c44"
age
65932
status
200
strict-transport-security
max-age=31536000; includeSubDomains; preload
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
40847
x-xss-protection
0
server
sffe
date
Fri, 18 Oct 2019 19:38:43 GMT
vary
Accept-Encoding
content-type
text/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
x-content-type-options
nosniff
expires
Sat, 17 Oct 2020 19:38:43 GMT
truncated
/ Frame 4DDC
213 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
e21224ee854bf918f26d323a8571ab379ebdc5db33285de85bcc6f678ea8a8fb

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
amp4ads-v0.js
cdn.ampproject.org/rtv/011910071804120/ Frame 1E77
251 KB
69 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011910071804120/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_rendering_2019101401.js?21064809
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
93dd062566471fa91604aee574ff8f6e78e80bd20b01f5e080adb0ac61680f94
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
etag
"6fedf66162310d96"
age
65917
status
200
strict-transport-security
max-age=31536000; includeSubDomains; preload
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
69642
x-xss-protection
0
server
sffe
date
Fri, 18 Oct 2019 19:38:58 GMT
vary
Accept-Encoding
content-type
text/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
x-content-type-options
nosniff
expires
Sat, 17 Oct 2020 19:38:58 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/011910071804120/v0/ Frame 1E77
150 KB
40 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011910071804120/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_rendering_2019101401.js?21064809
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
aa95eb8757140f09d3424399b939ed3f10a20c45c6c52476c614c9bc375eb667
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
etag
"8beba9134cdf5c44"
age
65932
status
200
strict-transport-security
max-age=31536000; includeSubDomains; preload
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
40847
x-xss-protection
0
server
sffe
date
Fri, 18 Oct 2019 19:38:43 GMT
vary
Accept-Encoding
content-type
text/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
x-content-type-options
nosniff
expires
Sat, 17 Oct 2020 19:38:43 GMT
truncated
/ Frame 1E77
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f0dca1ff26f2b14e22b5ad853b7922c8e5f63f853c8d4d2c0e706e7c1088e8d0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
amp4ads-v0.js
cdn.ampproject.org/rtv/011910071804120/ Frame 896F
251 KB
68 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011910071804120/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_rendering_2019101401.js?21064809
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
93dd062566471fa91604aee574ff8f6e78e80bd20b01f5e080adb0ac61680f94
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
etag
"6fedf66162310d96"
age
65917
status
200
strict-transport-security
max-age=31536000; includeSubDomains; preload
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
69642
x-xss-protection
0
server
sffe
date
Fri, 18 Oct 2019 19:38:58 GMT
vary
Accept-Encoding
content-type
text/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
x-content-type-options
nosniff
expires
Sat, 17 Oct 2020 19:38:58 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/011910071804120/v0/ Frame 896F
150 KB
40 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011910071804120/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_rendering_2019101401.js?21064809
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
aa95eb8757140f09d3424399b939ed3f10a20c45c6c52476c614c9bc375eb667
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
etag
"8beba9134cdf5c44"
age
65932
status
200
strict-transport-security
max-age=31536000; includeSubDomains; preload
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
40847
x-xss-protection
0
server
sffe
date
Fri, 18 Oct 2019 19:38:43 GMT
vary
Accept-Encoding
content-type
text/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
x-content-type-options
nosniff
expires
Sat, 17 Oct 2020 19:38:43 GMT
truncated
/ Frame 896F
212 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
3067a5d4d756133c2d262afda5b697a3cecd39ece58ba2bb7ebdac1e377c4f50

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
15000646345624493667
tpc.googlesyndication.com/simgad/ Frame 4DDC
188 KB
188 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/15000646345624493667
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
f351a175cfb54b48d592e707cb8d41f82a3e20b74e7397886d8b7eaf8679d047
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 05:29:51 GMT
x-content-type-options
nosniff
age
289664
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
192555
x-xss-protection
0
last-modified
Mon, 30 Sep 2019 15:38:44 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 15 Oct 2020 05:29:51 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 4DDC
0
256 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvzs_9S3Ly79EaF0djhxHY5ejG054hW70obr3iFlbJQI7KAjmPezTIVyuYZZGYpK4nzaGSLxpEZcu_NzDIcfx1tC1cgQQPBbGzEOldbZr_btnZ7e8t1yfnwy_UwrHGX681qAOcPdsanZwtADocY4z2HicihxQ0SwP0exAWbdcNjvsnHG-BKVJ-00CayhCGusbY51YQlIh1CnHEXDQeLgSRYsxmPnfC7NE4s2rf121KCIJhuubGhzThEJZDnT_yI_ihwvfe9hmKIDFHoB2E&sai=AMfl-YQ67Wj5GxO8pv731C400dYtUXX9L-pJREoKmt3YJ8l7P2pBCTnnqQq_VhGoHzqapvGNml-WqC_ic-FTlhlDNTuUfYm-eM7lnRB4h851EQ&sig=Cg0ArKJSzPqZNwBEEoonEAE&adurl=
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 19 Oct 2019 13:57:35 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Sat, 19 Oct 2019 13:57:35 GMT
3283195214905849124
tpc.googlesyndication.com/simgad/ Frame 1E77
82 KB
82 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/3283195214905849124
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
abda430ccd6cd1ffb44168be512994c2a9f328e1451f4658d20d44310de5b71b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 08:29:53 GMT
x-content-type-options
nosniff
age
278862
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
84338
x-xss-protection
0
last-modified
Mon, 30 Sep 2019 15:36:12 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 15 Oct 2020 08:29:53 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 1E77
0
256 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssInH_AXYE1KRe_vYm2hVU1v7Qha1GofPl3QXaWItym6s-wN1UgIk-XGV6bZ9nJ-_twECa7Fr8VbPX5RHUyEBLHSXLtoL88XCP2o_xZKukaC1daS7AU-pCHL-Wp_TvfQIWr5_W__QKEbTcr2VcEwQKG4vakvgpvmC2OhH9gaAipDK40wsxUGJO_1waELpEJXnEJJ8sVtE-py9eyTXo3ddgt80AMieEfyukmYuw-u8cfryDKoiaw6azrZUKG4DJ8YJtI8003vggbH5jtFZYLRJ_F8ac&sai=AMfl-YRM1o1tRD4jLevEIEH8-x5_sobiPFQCWvHRM-Ao5ZZyBdtsUj4KcSR1k82OuBQNxbj6ssPdTnm1hgK2F8PmfsKElRAGRRKAyCFVjlVHXw&sig=Cg0ArKJSzFRVnL_9CRyKEAE&adurl=
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 19 Oct 2019 13:57:35 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Sat, 19 Oct 2019 13:57:35 GMT
15860408569297213706
tpc.googlesyndication.com/simgad/ Frame 896F
164 KB
164 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/15860408569297213706
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
b45ad4386badf666a42dffebbdfe1bab948228318d81552b5ac7ff86b091a4ce
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 15 Oct 2019 00:12:58 GMT
x-content-type-options
nosniff
age
395077
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
167668
x-xss-protection
0
last-modified
Mon, 30 Sep 2019 15:36:13 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 14 Oct 2020 00:12:58 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 896F
0
255 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstFkovkvmDWq4TBh0wWmmVvZYRfCqdb_7ONz_jTJtSb7tVg4gaywtXFflvilHuRvIW1H4W01OiSi-_plLVrKEcJ6wO58CuEYwkCyheO9wGhhaGI6tUR3WuEAAg7Y4aTDcJoJbQSHwOmgZz6hansinQUG_dViz3egM5KUZBJB6v7KlyoVMk7826HmHmzIHcnaTaf7JthV7LgpYdG-lJKE07CIm4ayRzLGovNmjF4nRq8j_sWCzI0kwjwm4wrWgZCWGc7vRsxAnehTpZFgA&sai=AMfl-YQr1wgN7iHvmXIvm8_fs7dl59tgbpXbQjU4WNXRA9bPJKJL4lX-s2MAdAY5hXRCCoBcC42z45EcOGItfz5WYbrs8q6TGZAXTn9h85h1&sig=Cg0ArKJSzDc7H1hu7mSJEAE&adurl=
Requested by
Host: threatpost.com
URL: https://threatpost.com/major-airport-malware-attack-ot-security/149330/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 19 Oct 2019 13:57:35 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Sat, 19 Oct 2019 13:57:35 GMT
ptv
secure.adnxs.com/
85 B
1 KB
XHR
General
Full URL
https://secure.adnxs.com/ptv?id=16816843&size=400x225&promo_alignment=center&cb=R0.1571493455806&ext_inv_code=cm_331625-1683035_Unknown&referrer=https%3A%2F%2Fthreatpost.com&pubclick=http%3A%2F%2Fclickam.zorosrv.com%2Fst%3Fcipid%3D66363425%26ttype%3D1%26crid%3D5302265%26dast%3DV79JkCFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHbRcjDYkBos1XKyGi91kNxgtJovNYDIcrSZD4KDlYrQhMVis4WI1XOwmu8FmOVptNqPZcjAFhyk7TS7LQS2QNU0uvxuO0HQ6fK57vehoeTlMh7_ndNf43X61w-q3vBVOy-FvOb3VDrPvYXm5FabTw-N1601vzcvjujxNz79itNxsBns5AAAAADwAQJ3nQ_wAAgBEAAAAAEgAAAAAUARU_FsIXAAAAABgABwkj2sAQHEwnOtufdmNDtfnZfcHAMBDAAgAwIACCUDBQ1oJQIbr1gkAAAAAAAAAAMv___9_zMC8a6kMwIdIXw_Agw_AA1EBYhEjAAAAAEimNo-jSZ1QWVQBABCkWwFcAQAEtJE_keiEAQAACIwt0MPi95sddo3f7TIAAAAAAAAAALP_s380IaIxt7QglgJetV9AAIC1X0AAADZ1AwB4C4ALOoJWDAarC4jZAQAAANz9____64GUxbaxzVwez8LiWywsvpHLYhlujMPJbDXYDYYj7-UfKRE7ptJ09DlM2WlyWQ5qgaxpcvntN2GL0Woy2SyHs-ViMhiOhqPR_gRuNMAJGg4Hi91gsVsshpPFZDRYDhYoEIMJTshwtJmsRrvVbrIcTkaj2WayQYpWrWajzWC4mk1mu91qOBguRyOkaM1iNpksZqPlbjNYTkaD4WQ4RBhYDIcrl22yVo5mG7doOHGtJY7BcK2aTIYbx3BkWrl2a9HrYzotTMuJx-VFwQCavQgu0onoaHk5TIe_5_QWHS0vh-nw95wuYonmZJFOZJd9y2Lb2GYuj2dh8S0WFt_IZbEMN8bhZLYa7AbDkb-wGA5XLttkrRzNNm7RcOJaSxyD4Vo1mQw3juHItHLt1qLXx3RamJYTj8vfWO0Wo-VmtBrtG6vdYrTcjFajfYfO8F19zkZptVzyuBQb7UtmmTkNCpfB4v1JTItpd3bw_H5Hp0p10Rgbsm9CYTZ4DAZFLBGcLtKJ6GU8XcQSydMinag8xplxZNoYlzOHZbWxDBeLzcq3WTiXG99o5XJOxBKl6SKd6NUOq9_yVjgth7_l9FY7zL6H5eVWmE4Pj9etN701L4_r8jQ9_4rRcrMZTNR_bIjRaK6bzRWD5VwzWCUAAAAAAAAAgCXMmTcBAAAAOA1ms5hNVssFkHgY3x016R4I3Y1zLW78uIKOlpfDdPh7Tm_R0fJymA5_z-nKABIP4g!%26cmcv%3D${CMCV}%26tgtf%3D&GDPR_APPLIES=1
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/vPlayer/player/v10.5.0/OvaMediaPlayer.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.208 , Netherlands, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
311.bm-nginx-loadbalancer.mgmt.ams1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
b2effcb18f514a7896e737bdda537f2ef3b5bb989eb247f4ab2aa3facf1148ea
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Sat, 19 Oct 2019 13:57:37 GMT
X-Proxy-Origin
144.76.109.30; 144.76.109.30; 311.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.9:80
AN-X-Request-Uuid
5bc46d71-ff8a-4b4e-a6f2-eecb109a43d9
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/xml; charset=utf-8
Content-Length
85
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
AdServerServlet
vid.pubmatic.com/AdServer/
27 B
853 B
XHR
General
Full URL
https://vid.pubmatic.com/AdServer/AdServerServlet?adtype=13&pubId=156307&siteId=583006&adId=2174376&vadFmt=3&vapi=2&vminl=1&vmaxl=60&vh=225&vw=400&placement=3&vtype=0&vpos=1&vskip=0&vcom=0&vfmt=1+3+4+5+6+7&kadpageurl=https%3A%2F%2Fthreatpost.com&sec=1&gdpr=1
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/vPlayer/player/v10.5.0/OvaMediaPlayer.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.111 , United Kingdom, ASN62713 (AS-PUBMATIC - PubMatic, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
a71702232a771b558b12f8c0012a15f5652b500fd2e33464d283406cee36754d

Request headers

Sec-Fetch-Mode
cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

Date
Sat, 19 Oct 2019 13:57:35 GMT
Content-Encoding
gzip
Server
nginx
Transfer-Encoding
chunked
Connection
keep-alive
P3P
CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
X-Vdbg
1:0/165:-1
Content-Type
application/xml; charset=utf-8
activeview
pagead2.googlesyndication.com/pcs/ Frame 4DDC
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsu_z9RB8VtoqGAwIoddIPoVZ0I8NKkOhR4TEbMtrfDeTsz3wM6uApWl_mwLqPEJcugqdAHATl2ZN26Akq04ceW308uiSHpyoe2n51DBfQ0&sig=Cg0ArKJSzH7X8V-fm0quEAE&id=ampim&o=308,0&d=970,250&ss=1600,1200&bs=1600,1200&mcvt=1000&mtos=0,0,0,1000,1000&tos=0,0,0,1000,0&tfs=77&tls=1077&g=100&h=100&pt=271&tt=1077&rpt=271&rst=1571493455730&r=v&adk=151559616&avms=ampa
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 19 Oct 2019 13:57:37 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 1E77
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjssXAdctvv1hHMmnocJM2rkS0Ii29-M5g1l1HR65M5F394CKkyEV1vFrSz_1MKrKbrqc1Ui77AaIY8lh7sWYtaz4TJRMqUWDjeXcmpLRO-M&sig=Cg0ArKJSzGCZ07VUg7D0EAE&id=ampim&o=1093,407&d=300,250&ss=1600,1200&bs=1600,1200&mcvt=1005&mtos=0,0,1005,1005,1005&tos=0,0,1005,0,0&tfs=153&tls=1158&g=100&h=100&pt=230&tt=1158&rpt=230&rst=1571493455736&r=v&adk=689239265&avms=ampa
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 19 Oct 2019 13:57:37 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
sync
match.taboola.com/ Frame FDE3
0
0
Document
General
Full URL
https://match.taboola.com/sync?dast=V7RgECFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHLRcjDYkBos1XKyGi91kN9gsR6vNZjRbDqbgMGWnyWU5qAWypsnld8MRmk6Hz3WvFx0tL4fp8Pec7hq_2692WP2Wt8JpOfwtp7faYfY9LC-3wnR6eLxuvemteXlcl6fp-VeMlpvNYC8HAAAAgAcAqPN8iB9AAIAIAAAAAAkAAAAAioCKfwuBCwAAAAAMgIPkcQ0AKA6Gc92tL7vR4fq87P4AAHgIAAEAGFAgASh4SCsByHDdOgEAAAAAAAAAYPn___-PGZh3LZUB-BDpuzHoAXjwAXgQAgAAyBoi-PfSxFQ5SSEqQCxiBAAAAADJ1OZxNKkTKosqAACCdCuAKwCAgDbyJ5KcLN1BibcwAAAAgbEFelj8frPDrvG7XQYAAAAAAAAAYPZ_9o8mRDTmlhbEUsCr9gsIALD2CwgAwKZuAABvAXBBR9CKwWB1ATE7AAAAgLv___9_PZCy2Da2mcvjWVh8i4XFN3JZLMONcTiZrQa7wXDkvfwjJWLHVJqOPocpO00uy0EtkDVNLr_9JmwxWk0mm-VwtlxMBsPRcDTan8CNBjhBw-FgsRssdovFcLKYjAbLwQIFYjDBCRmONpPVaLfaTZbDyWg020w2SNGq1Wy0GQxXs8lst1sNB8PlaIQUrVnMJpPFbLTcbQbLyWgwnAyHCAOL4XDlsk3WytFs4xYNJ661xDEYrlWTyXDjGI5MK9duLXp9TKeFaTnxuLwoGECzF8FFOhEdLS-H6fD3nN6io-XlMB3-ntNFLNGcLNKJ7LJvWWwb28zl8SwsvsXC4hu5LJbhxjiczFaD3WA48hcWw-HKZZuslaPZxi0aTlxriWMwXKsmk-HGMRyZVq7dWvT6mE4L03Licfkbq91itNyMVqN9Y7VbjJab0Wq079AZvqvP2Sitlksel2KjfcksM6dB4TJYvD-JaTHtzg6e3-_oVKkuGmND9k0ozAaPwaCIJYLTRToRvYyni1gieVqkE5XHODOOTBvjcuawrDaW4WKxWfk2C-dy4xutXM6JWKI0XaQTvdph9VveCqfl8Lec3mqH2fewvNwK0-nh8br1prfm5XFdnqbnXzFabjaDifqPDTEazXWzuWKwnGsGqwQAAAAAAAAAsIQ58yYAAAAAp8FsFrPJarkAEg_ju6Mm3QOhu3GuxY0fV9DR8nKYDn_P6S06Wl4O0-HvOV0ZQOJBHA!&excid=22&docw=0&cijs=1
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/units/23_14_12/infra/cmTagSLIDER_INSTREAM.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash

Request headers

:method
GET
:authority
match.taboola.com
:scheme
https
:path
/sync?dast=V7RgECFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHLRcjDYkBos1XKyGi91kN9gsR6vNZjRbDqbgMGWnyWU5qAWypsnld8MRmk6Hz3WvFx0tL4fp8Pec7hq_2692WP2Wt8JpOfwtp7faYfY9LC-3wnR6eLxuvemteXlcl6fp-VeMlpvNYC8HAAAAgAcAqPN8iB9AAIAIAAAAAAkAAAAAioCKfwuBCwAAAAAMgIPkcQ0AKA6Gc92tL7vR4fq87P4AAHgIAAEAGFAgASh4SCsByHDdOgEAAAAAAAAAYPn___-PGZh3LZUB-BDpuzHoAXjwAXgQAgAAyBoi-PfSxFQ5SSEqQCxiBAAAAADJ1OZxNKkTKosqAACCdCuAKwCAgDbyJ5KcLN1BibcwAAAAgbEFelj8frPDrvG7XQYAAAAAAAAAYPZ_9o8mRDTmlhbEUsCr9gsIALD2CwgAwKZuAABvAXBBR9CKwWB1ATE7AAAAgLv___9_PZCy2Da2mcvjWVh8i4XFN3JZLMONcTiZrQa7wXDkvfwjJWLHVJqOPocpO00uy0EtkDVNLr_9JmwxWk0mm-VwtlxMBsPRcDTan8CNBjhBw-FgsRssdovFcLKYjAbLwQIFYjDBCRmONpPVaLfaTZbDyWg020w2SNGq1Wy0GQxXs8lst1sNB8PlaIQUrVnMJpPFbLTcbQbLyWgwnAyHCAOL4XDlsk3WytFs4xYNJ661xDEYrlWTyXDjGI5MK9duLXp9TKeFaTnxuLwoGECzF8FFOhEdLS-H6fD3nN6io-XlMB3-ntNFLNGcLNKJ7LJvWWwb28zl8SwsvsXC4hu5LJbhxjiczFaD3WA48hcWw-HKZZuslaPZxi0aTlxriWMwXKsmk-HGMRyZVq7dWvT6mE4L03Licfkbq91itNyMVqN9Y7VbjJab0Wq079AZvqvP2Sitlksel2KjfcksM6dB4TJYvD-JaTHtzg6e3-_oVKkuGmND9k0ozAaPwaCIJYLTRToRvYyni1gieVqkE5XHODOOTBvjcuawrDaW4WKxWfk2C-dy4xutXM6JWKI0XaQTvdph9VveCqfl8Lec3mqH2fewvNwK0-nh8br1prfm5XFdnqbnXzFabjaDifqPDTEazXWzuWKwnGsGqwQAAAAAAAAAsIQ58yYAAAAAp8FsFrPJarkAEg_ju6Mm3QOhu3GuxY0fV9DR8nKYDn_P6S06Wl4O0-HvOV0ZQOJBHA!&excid=22&docw=0&cijs=1
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/

Response headers

status
200
server
nginx/1.13.12
content-type
text/html;charset=ISO-8859-1
machineid
402
accept-ranges
bytes
date
Sat, 19 Oct 2019 13:57:37 GMT
via
1.1 varnish
x-served-by
cache-hhn4070-HHN
x-cache
MISS
x-cache-hits
0
x-timer
S1571493457.254528,VS0,VE9
sync
match.taboola.com/ Frame 9092
0
0
Document
General
Full URL
https://match.taboola.com/sync?dast=V7RgECFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHLRcjDYkBos1XKyGi91kN9gsR6vNZjRbDqbgMGWnyWU5qAWypsnld8MRmk6Hz3WvFx0tL4fp8Pec7hq_2692WP2Wt8JpOfwtp7faYfY9LC-3wnR6eLxuvemteXlcl6fp-VeMlpvNYC8HAAAAgAcAqPN8iB9AAIAIAAAAAAkAAAAAioCKfwuBCwAAAAAMgIPkcQ0AKA6Gc92tL7vR4fq87P4AAHgIAAEAGFAgASh4SCsByHDdOgEAAAAAAAAAYPn___-PGZh3LZUB-BDpuzHoAXjwAXgQAgAAyBoi-PfSxFQ5SSEqQCxiBAAAAADJ1OZxNKkTKosqAACCdCuAKwCAgDbyJ5KcLN1BibcwAAAAgbEFelj8frPDrvG7XQYAAAAAAAAAYPZ_9o8mRDTmlhbEUsCr9gsIALD2CwgAwKZuAABvAXBBR9CKwWB1ATE7AAAAgLv___9_PZCy2Da2mcvjWVh8i4XFN3JZLMONcTiZrQa7wXDkvfwjJWLHVJqOPocpO00uy0EtkDVNLr_9JmwxWk0mm-VwtlxMBsPRcDTan8CNBjhBw-FgsRssdovFcLKYjAbLwQIFYjDBCRmONpPVaLfaTZbDyWg020w2SNGq1Wy0GQxXs8lst1sNB8PlaIQUrVnMJpPFbLTcbQbLyWgwnAyHCAOL4XDlsk3WytFs4xYNJ661xDEYrlWTyXDjGI5MK9duLXp9TKeFaTnxuLwoGECzF8FFOhEdLS-H6fD3nN6io-XlMB3-ntNFLNGcLNKJ7LJvWWwb28zl8SwsvsXC4hu5LJbhxjiczFaD3WA48hcWw-HKZZuslaPZxi0aTlxriWMwXKsmk-HGMRyZVq7dWvT6mE4L03Licfkbq91itNyMVqN9Y7VbjJab0Wq079AZvqvP2Sitlksel2KjfcksM6dB4TJYvD-JaTHtzg6e3-_oVKkuGmND9k0ozAaPwaCIJYLTRToRvYyni1gieVqkE5XHODOOTBvjcuawrDaW4WKxWfk2C-dy4xutXM6JWKI0XaQTvdph9VveCqfl8Lec3mqH2fewvNwK0-nh8br1prfm5XFdnqbnXzFabjaDifqPDTEazXWzuWKwnGsGqwQAAAAAAAAAsIQ58yYAAAAAp8FsFrPJarkAEg_ju6Mm3QOhu3GuxY0fV9DR8nKYDn_P6S06Wl4O0-HvOV0ZQOJBHA!&excid=22&docw=0&cijs=1
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/units/23_14_12/infra/cmTagSLIDER_INSTREAM.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash

Request headers

:method
GET
:authority
match.taboola.com
:scheme
https
:path
/sync?dast=V7RgECFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHLRcjDYkBos1XKyGi91kN9gsR6vNZjRbDqbgMGWnyWU5qAWypsnld8MRmk6Hz3WvFx0tL4fp8Pec7hq_2692WP2Wt8JpOfwtp7faYfY9LC-3wnR6eLxuvemteXlcl6fp-VeMlpvNYC8HAAAAgAcAqPN8iB9AAIAIAAAAAAkAAAAAioCKfwuBCwAAAAAMgIPkcQ0AKA6Gc92tL7vR4fq87P4AAHgIAAEAGFAgASh4SCsByHDdOgEAAAAAAAAAYPn___-PGZh3LZUB-BDpuzHoAXjwAXgQAgAAyBoi-PfSxFQ5SSEqQCxiBAAAAADJ1OZxNKkTKosqAACCdCuAKwCAgDbyJ5KcLN1BibcwAAAAgbEFelj8frPDrvG7XQYAAAAAAAAAYPZ_9o8mRDTmlhbEUsCr9gsIALD2CwgAwKZuAABvAXBBR9CKwWB1ATE7AAAAgLv___9_PZCy2Da2mcvjWVh8i4XFN3JZLMONcTiZrQa7wXDkvfwjJWLHVJqOPocpO00uy0EtkDVNLr_9JmwxWk0mm-VwtlxMBsPRcDTan8CNBjhBw-FgsRssdovFcLKYjAbLwQIFYjDBCRmONpPVaLfaTZbDyWg020w2SNGq1Wy0GQxXs8lst1sNB8PlaIQUrVnMJpPFbLTcbQbLyWgwnAyHCAOL4XDlsk3WytFs4xYNJ661xDEYrlWTyXDjGI5MK9duLXp9TKeFaTnxuLwoGECzF8FFOhEdLS-H6fD3nN6io-XlMB3-ntNFLNGcLNKJ7LJvWWwb28zl8SwsvsXC4hu5LJbhxjiczFaD3WA48hcWw-HKZZuslaPZxi0aTlxriWMwXKsmk-HGMRyZVq7dWvT6mE4L03Licfkbq91itNyMVqN9Y7VbjJab0Wq079AZvqvP2Sitlksel2KjfcksM6dB4TJYvD-JaTHtzg6e3-_oVKkuGmND9k0ozAaPwaCIJYLTRToRvYyni1gieVqkE5XHODOOTBvjcuawrDaW4WKxWfk2C-dy4xutXM6JWKI0XaQTvdph9VveCqfl8Lec3mqH2fewvNwK0-nh8br1prfm5XFdnqbnXzFabjaDifqPDTEazXWzuWKwnGsGqwQAAAAAAAAAsIQ58yYAAAAAp8FsFrPJarkAEg_ju6Mm3QOhu3GuxY0fV9DR8nKYDn_P6S06Wl4O0-HvOV0ZQOJBHA!&excid=22&docw=0&cijs=1
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/

Response headers

status
200
server
nginx/1.13.12
content-type
text/html;charset=ISO-8859-1
machineid
403
accept-ranges
bytes
date
Sat, 19 Oct 2019 13:57:39 GMT
via
1.1 varnish
x-served-by
cache-hhn4069-HHN
x-cache
MISS
x-cache-hits
0
x-timer
S1571493459.277964,VS0,VE9
OpportunityServlet
opps.taboola.com/
1 B
201 B
XHR
General
Full URL
https://opps.taboola.com/OpportunityServlet
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/vPlayer/player/v10.5.0/OvaMediaPlayer.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

Request headers

Sec-Fetch-Mode
cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
text/plain

Response headers

date
Sat, 19 Oct 2019 13:57:40 GMT
via
1.1 varnish
server
nginx/1.13.12
x-timer
S1571493461.577479,VS0,VE17
x-served-by
cache-hhn4068-HHN
status
200
x-cache
MISS
access-control-allow-origin
https://threatpost.com
access-control-allow-credentials
true
accept-ranges
bytes
content-length
1
x-cache-hits
0
VideoBidRequestHandlerServlet
wf.taboola.com/
9 KB
9 KB
XHR
General
Full URL
https://wf.taboola.com/VideoBidRequestHandlerServlet?oid=15&width=400&height=225&pubid=198827&tagid=1020237&crid=5302265&noaop=2&sortOrderType=0&cb=1571493460919&mimes=5,10,11,12&isvideo=0&plmd=2&mindur=1&maxdur=210&minbr=1&maxbr=10000&st=-1&seq=2&pv=1050&pt=-35418769&tz=120&viewable=true&ddast=V79JkCFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHbRcjDYkBos1XKyGi91kNxgtJovNYDIcrSZD4KDlYrQhMVis4WI1XOwmu8FmOVptNqPZcjAFhyk7TS7LQS2QNU0uvxuO0HQ6fK57vehoeTlMh7_ndNf43X61w-q3vBVOy-FvOb3VDrPvYXm5FabTw-N1601vzcvjujxNz79itNxsBns5AAAAADwAQJ3nQ_wAAgBEAAAAAEgAAAAAUARU_FsIXAAAAABgABwkj2sAQHEwnOtufdmNDtfnZfcHAMBDAAgAwIACCUDBQ1oJQIbr1gkAAAAAAAAAAMv___9_zMC8a6kMwIdIXw_Agw_AA1EBYhEjAAAAAEimNo-jSZ1QWVQBABCkWwFcAQAEtJE_keiEAQAACIwt0MPi95sddo3f7TIAAAAAAAAAALP_s380IaIxt7QglgJetV9AAIC1X0AAADZ1AwB4C4ALOoJWDAarC4jZAQAAANz9____64GUxbaxzVwez8LiWywsvpHLYhlujMPJbDXYDYYj7-UfKRE7ptJ09DlM2WlyWQ5qgaxpcvntN2GL0Woy2SyHs-ViMhiOhqPR_gRuNMAJGg4Hi91gsVsshpPFZDRYDhYoEIMJTshwtJmsRrvVbrIcTkaj2WayQYpWrWajzWC4mk1mu91qOBguRyOkaM1iNpksZqPlbjNYTkaD4WQ4RBhYDIcrl22yVo5mG7doOHGtJY7BcK2aTIYbx3BkWrl2a9HrYzotTMuJx-VFwQCavQgu0onoaHk5TIe_5_QWHS0vh-nw95wuYonmZJFOZJd9y2Lb2GYuj2dh8S0WFt_IZbEMN8bhZLYa7AbDkb-wGA5XLttkrRzNNm7RcOJaSxyD4Vo1mQw3juHItHLt1qLXx3RamJYTj8vfWO0Wo-VmtBrtG6vdYrTcjFajfYfO8F19zkZptVzyuBQb7UtmmTkNCpfB4v1JTItpd3bw_H5Hp0p10Rgbsm9CYTZ4DAZFLBGcLtKJ6GU8XcQSydMinag8xplxZNoYlzOHZbWxDBeLzcq3WTiXG99o5XJOxBKl6SKd6NUOq9_yVjgth7_l9FY7zL6H5eVWmE4Pj9etN701L4_r8jQ9_4rRcrMZTNR_bIjRaK6bzRWD5VwzWCUAAAAAAAAAgCXMmTcBAAAAOA1ms5hNVssFkHgY3x016R4I3Y1zLW78uIKOlpfDdPh7Tm_R0fJymA5_z-nKABIP4g!&proto=2,3,5,6&dtagid=1683035&dpubid=331625&abtst=arbr_vB!expl_vA&mPre=0.033&encoded=1&pstn=1&cirf=https%3A%2F%2Fthreatpost.com&callback=&en=1&wfv=1&cdb=&gdprApplies=false&amp=0&qsz=6&ft=0&pb=0
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/vPlayer/player/v10.5.0/OvaMediaPlayer.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
ba4035bb26161f009af7f501b4324c9e96dc790660b5a87405f5930a0437348f

Request headers

Sec-Fetch-Mode
cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
text/plain

Response headers

date
Sat, 19 Oct 2019 13:57:41 GMT
via
1.1 varnish
machineid
1424
x-cache
MISS
status
200
x-cache-hits
0
x-served-by
cache-hhn4069-HHN
pragma
no-cache
server
nginx/1.13.12
x-timer
S1571493461.924428,VS0,VE124
content-type
application/json;charset=utf-8
access-control-allow-origin
https://threatpost.com
cache-control
no-cache,must-revalidate,no-store,max-age=0,s-maxage=0
access-control-allow-credentials
true
accept-ranges
bytes
expires
Sat, 26 Jul 1997 05:00:00 GMT
ptv
secure.adnxs.com/
85 B
1 KB
XHR
General
Full URL
https://secure.adnxs.com/ptv?id=16816843&size=400x225&promo_alignment=center&cb=R0.1571493461079&ext_inv_code=cm_331625-1683035_Unknown&referrer=https%3A%2F%2Fthreatpost.com&pubclick=http%3A%2F%2Fclickam.zorosrv.com%2Fst%3Fcipid%3D66363425%26ttype%3D1%26crid%3D5302265%26dast%3DV79JkCFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHbRcjDYkBos1XKyGi91kNxgtJovNYDIcrSZD4KDlYrQhMVis4WI1XOwmu8FmOVptNqPZcjAFhyk7TS7LQS2QNU0uvxuO0HQ6fK57vehoeTlMh7_ndNf43X61w-q3vBVOy-FvOb3VDrPvYXm5FabTw-N1601vzcvjujxNz79itNxsBns5AAAAADwAQJ3nQ_wAAgBEAAAAAEgAAAAAUARU_FsIXAAAAABgABwkj2sAQHEwnOtufdmNDtfnZfcHAMBDAAgAwIACCUDBQ1oJQIbr1gkAAAAAAAAAAMv___9_zMC8a6kMwIdIXw_Agw_AA1EBYhEjAAAAAEimNo-jSZ1QWVQBABCkWwFcAQAEtJE_keiEAQAACIwt0MPi95sddo3f7TIAAAAAAAAAALP_s380IaIxt7QglgJetV9AAIC1X0AAADZ1AwB4C4ALOoJWDAarC4jZAQAAANz9____64GUxbaxzVwez8LiWywsvpHLYhlujMPJbDXYDYYj7-UfKRE7ptJ09DlM2WlyWQ5qgaxpcvntN2GL0Woy2SyHs-ViMhiOhqPR_gRuNMAJGg4Hi91gsVsshpPFZDRYDhYoEIMJTshwtJmsRrvVbrIcTkaj2WayQYpWrWajzWC4mk1mu91qOBguRyOkaM1iNpksZqPlbjNYTkaD4WQ4RBhYDIcrl22yVo5mG7doOHGtJY7BcK2aTIYbx3BkWrl2a9HrYzotTMuJx-VFwQCavQgu0onoaHk5TIe_5_QWHS0vh-nw95wuYonmZJFOZJd9y2Lb2GYuj2dh8S0WFt_IZbEMN8bhZLYa7AbDkb-wGA5XLttkrRzNNm7RcOJaSxyD4Vo1mQw3juHItHLt1qLXx3RamJYTj8vfWO0Wo-VmtBrtG6vdYrTcjFajfYfO8F19zkZptVzyuBQb7UtmmTkNCpfB4v1JTItpd3bw_H5Hp0p10Rgbsm9CYTZ4DAZFLBGcLtKJ6GU8XcQSydMinag8xplxZNoYlzOHZbWxDBeLzcq3WTiXG99o5XJOxBKl6SKd6NUOq9_yVjgth7_l9FY7zL6H5eVWmE4Pj9etN701L4_r8jQ9_4rRcrMZTNR_bIjRaK6bzRWD5VwzWCUAAAAAAAAAgCXMmTcBAAAAOA1ms5hNVssFkHgY3x016R4I3Y1zLW78uIKOlpfDdPh7Tm_R0fJymA5_z-nKABIP4g!%26cmcv%3D${CMCV}%26tgtf%3D&GDPR_APPLIES=1
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/vPlayer/player/v10.5.0/OvaMediaPlayer.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.206 , Netherlands, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
301.bm-nginx-loadbalancer.mgmt.ams1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
b2effcb18f514a7896e737bdda537f2ef3b5bb989eb247f4ab2aa3facf1148ea
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Sat, 19 Oct 2019 13:57:43 GMT
X-Proxy-Origin
144.76.109.30; 144.76.109.30; 301.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.223.55:80
AN-X-Request-Uuid
6d2a3c3a-cb75-44c3-9a1e-57502beeeada
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/xml; charset=utf-8
Content-Length
85
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
AdServerServlet
vid.pubmatic.com/AdServer/
27 B
853 B
XHR
General
Full URL
https://vid.pubmatic.com/AdServer/AdServerServlet?adtype=13&pubId=156307&siteId=583006&adId=2174376&vadFmt=3&vapi=2&vminl=1&vmaxl=60&vh=225&vw=400&placement=3&vtype=0&vpos=1&vskip=0&vcom=0&vfmt=1+3+4+5+6+7&kadpageurl=https%3A%2F%2Fthreatpost.com&sec=1&gdpr=1
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/vPlayer/player/v10.5.0/OvaMediaPlayer.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.111 , United Kingdom, ASN62713 (AS-PUBMATIC - PubMatic, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
a71702232a771b558b12f8c0012a15f5652b500fd2e33464d283406cee36754d

Request headers

Sec-Fetch-Mode
cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

Date
Sat, 19 Oct 2019 13:57:41 GMT
Content-Encoding
gzip
Server
nginx
Transfer-Encoding
chunked
Connection
keep-alive
P3P
CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
X-Vdbg
1:0/165:-1
Content-Type
application/xml; charset=utf-8
sync
match.taboola.com/ Frame C6EB
0
0
Document
General
Full URL
https://match.taboola.com/sync?dast=V7RgECFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHLRcjDYkBos1XKyGi91kN9gsR6vNZjRbDqbgMGWnyWU5qAWypsnld8MRmk6Hz3WvFx0tL4fp8Pec7hq_2692WP2Wt8JpOfwtp7faYfY9LC-3wnR6eLxuvemteXlcl6fp-VeMlpvNYC8HAAAAgAcAqPN8iB9AAIAIAAAAAAkAAAAAioCKfwuBCwAAAAAMgIPkcQ0AKA6Gc92tL7vR4fq87P4AAHgIAAEAGFAgASh4SCsByHDdOgEAAAAAAAAAYPn___-PGZh3LZUB-BDpuzHoAXjwAXgQAgAAyBoi-PfSxFQ5SSEqQCxiBAAAAADJ1OZxNKkTKosqAACCdCuAKwCAgDbyJ5KcLN1BibcwAAAAgbEFelj8frPDrvG7XQYAAAAAAAAAYPZ_9o8mRDTmlhbEUsCr9gsIALD2CwgAwKZuAABvAXBBR9CKwWB1ATE7AAAAgLv___9_PZCy2Da2mcvjWVh8i4XFN3JZLMONcTiZrQa7wXDkvfwjJWLHVJqOPocpO00uy0EtkDVNLr_9JmwxWk0mm-VwtlxMBsPRcDTan8CNBjhBw-FgsRssdovFcLKYjAbLwQIFYjDBCRmONpPVaLfaTZbDyWg020w2SNGq1Wy0GQxXs8lst1sNB8PlaIQUrVnMJpPFbLTcbQbLyWgwnAyHCAOL4XDlsk3WytFs4xYNJ661xDEYrlWTyXDjGI5MK9duLXp9TKeFaTnxuLwoGECzF8FFOhEdLS-H6fD3nN6io-XlMB3-ntNFLNGcLNKJ7LJvWWwb28zl8SwsvsXC4hu5LJbhxjiczFaD3WA48hcWw-HKZZuslaPZxi0aTlxriWMwXKsmk-HGMRyZVq7dWvT6mE4L03Licfkbq91itNyMVqN9Y7VbjJab0Wq079AZvqvP2Sitlksel2KjfcksM6dB4TJYvD-JaTHtzg6e3-_oVKkuGmND9k0ozAaPwaCIJYLTRToRvYyni1gieVqkE5XHODOOTBvjcuawrDaW4WKxWfk2C-dy4xutXM6JWKI0XaQTvdph9VveCqfl8Lec3mqH2fewvNwK0-nh8br1prfm5XFdnqbnXzFabjaDifqPDTEazXWzuWKwnGsGqwQAAAAAAAAAsIQ58yYAAAAAp8FsFrPJarkAEg_ju6Mm3QOhu3GuxY0fV9DR8nKYDn_P6S06Wl4O0-HvOV0ZQOJBHA!&excid=22&docw=0&cijs=1
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/units/23_14_12/infra/cmTagSLIDER_INSTREAM.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash

Request headers

:method
GET
:authority
match.taboola.com
:scheme
https
:path
/sync?dast=V7RgECFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHLRcjDYkBos1XKyGi91kN9gsR6vNZjRbDqbgMGWnyWU5qAWypsnld8MRmk6Hz3WvFx0tL4fp8Pec7hq_2692WP2Wt8JpOfwtp7faYfY9LC-3wnR6eLxuvemteXlcl6fp-VeMlpvNYC8HAAAAgAcAqPN8iB9AAIAIAAAAAAkAAAAAioCKfwuBCwAAAAAMgIPkcQ0AKA6Gc92tL7vR4fq87P4AAHgIAAEAGFAgASh4SCsByHDdOgEAAAAAAAAAYPn___-PGZh3LZUB-BDpuzHoAXjwAXgQAgAAyBoi-PfSxFQ5SSEqQCxiBAAAAADJ1OZxNKkTKosqAACCdCuAKwCAgDbyJ5KcLN1BibcwAAAAgbEFelj8frPDrvG7XQYAAAAAAAAAYPZ_9o8mRDTmlhbEUsCr9gsIALD2CwgAwKZuAABvAXBBR9CKwWB1ATE7AAAAgLv___9_PZCy2Da2mcvjWVh8i4XFN3JZLMONcTiZrQa7wXDkvfwjJWLHVJqOPocpO00uy0EtkDVNLr_9JmwxWk0mm-VwtlxMBsPRcDTan8CNBjhBw-FgsRssdovFcLKYjAbLwQIFYjDBCRmONpPVaLfaTZbDyWg020w2SNGq1Wy0GQxXs8lst1sNB8PlaIQUrVnMJpPFbLTcbQbLyWgwnAyHCAOL4XDlsk3WytFs4xYNJ661xDEYrlWTyXDjGI5MK9duLXp9TKeFaTnxuLwoGECzF8FFOhEdLS-H6fD3nN6io-XlMB3-ntNFLNGcLNKJ7LJvWWwb28zl8SwsvsXC4hu5LJbhxjiczFaD3WA48hcWw-HKZZuslaPZxi0aTlxriWMwXKsmk-HGMRyZVq7dWvT6mE4L03Licfkbq91itNyMVqN9Y7VbjJab0Wq079AZvqvP2Sitlksel2KjfcksM6dB4TJYvD-JaTHtzg6e3-_oVKkuGmND9k0ozAaPwaCIJYLTRToRvYyni1gieVqkE5XHODOOTBvjcuawrDaW4WKxWfk2C-dy4xutXM6JWKI0XaQTvdph9VveCqfl8Lec3mqH2fewvNwK0-nh8br1prfm5XFdnqbnXzFabjaDifqPDTEazXWzuWKwnGsGqwQAAAAAAAAAsIQ58yYAAAAAp8FsFrPJarkAEg_ju6Mm3QOhu3GuxY0fV9DR8nKYDn_P6S06Wl4O0-HvOV0ZQOJBHA!&excid=22&docw=0&cijs=1
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/

Response headers

status
200
server
nginx/1.13.12
content-type
text/html;charset=ISO-8859-1
machineid
402
accept-ranges
bytes
date
Sat, 19 Oct 2019 13:57:41 GMT
via
1.1 varnish
x-served-by
cache-hhn4069-HHN
x-cache
MISS
x-cache-hits
0
x-timer
S1571493461.246624,VS0,VE9
sync
match.taboola.com/ Frame FDD1
0
0
Document
General
Full URL
https://match.taboola.com/sync?dast=V7RgECFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHLRcjDYkBos1XKyGi91kN9gsR6vNZjRbDqbgMGWnyWU5qAWypsnld8MRmk6Hz3WvFx0tL4fp8Pec7hq_2692WP2Wt8JpOfwtp7faYfY9LC-3wnR6eLxuvemteXlcl6fp-VeMlpvNYC8HAAAAgAcAqPN8iB9AAIAIAAAAAAkAAAAAioCKfwuBCwAAAAAMgIPkcQ0AKA6Gc92tL7vR4fq87P4AAHgIAAEAGFAgASh4SCsByHDdOgEAAAAAAAAAYPn___-PGZh3LZUB-BDpuzHoAXjwAXgQAgAAyBoi-PfSxFQ5SSEqQCxiBAAAAADJ1OZxNKkTKosqAACCdCuAKwCAgDbyJ5KcLN1BibcwAAAAgbEFelj8frPDrvG7XQYAAAAAAAAAYPZ_9o8mRDTmlhbEUsCr9gsIALD2CwgAwKZuAABvAXBBR9CKwWB1ATE7AAAAgLv___9_PZCy2Da2mcvjWVh8i4XFN3JZLMONcTiZrQa7wXDkvfwjJWLHVJqOPocpO00uy0EtkDVNLr_9JmwxWk0mm-VwtlxMBsPRcDTan8CNBjhBw-FgsRssdovFcLKYjAbLwQIFYjDBCRmONpPVaLfaTZbDyWg020w2SNGq1Wy0GQxXs8lst1sNB8PlaIQUrVnMJpPFbLTcbQbLyWgwnAyHCAOL4XDlsk3WytFs4xYNJ661xDEYrlWTyXDjGI5MK9duLXp9TKeFaTnxuLwoGECzF8FFOhEdLS-H6fD3nN6io-XlMB3-ntNFLNGcLNKJ7LJvWWwb28zl8SwsvsXC4hu5LJbhxjiczFaD3WA48hcWw-HKZZuslaPZxi0aTlxriWMwXKsmk-HGMRyZVq7dWvT6mE4L03Licfkbq91itNyMVqN9Y7VbjJab0Wq079AZvqvP2Sitlksel2KjfcksM6dB4TJYvD-JaTHtzg6e3-_oVKkuGmND9k0ozAaPwaCIJYLTRToRvYyni1gieVqkE5XHODOOTBvjcuawrDaW4WKxWfk2C-dy4xutXM6JWKI0XaQTvdph9VveCqfl8Lec3mqH2fewvNwK0-nh8br1prfm5XFdnqbnXzFabjaDifqPDTEazXWzuWKwnGsGqwQAAAAAAAAAsIQ58yYAAAAAp8FsFrPJarkAEg_ju6Mm3QOhu3GuxY0fV9DR8nKYDn_P6S06Wl4O0-HvOV0ZQOJBHA!&excid=22&docw=0&cijs=1
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/units/23_14_12/infra/cmTagSLIDER_INSTREAM.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash

Request headers

:method
GET
:authority
match.taboola.com
:scheme
https
:path
/sync?dast=V7RgECFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHLRcjDYkBos1XKyGi91kN9gsR6vNZjRbDqbgMGWnyWU5qAWypsnld8MRmk6Hz3WvFx0tL4fp8Pec7hq_2692WP2Wt8JpOfwtp7faYfY9LC-3wnR6eLxuvemteXlcl6fp-VeMlpvNYC8HAAAAgAcAqPN8iB9AAIAIAAAAAAkAAAAAioCKfwuBCwAAAAAMgIPkcQ0AKA6Gc92tL7vR4fq87P4AAHgIAAEAGFAgASh4SCsByHDdOgEAAAAAAAAAYPn___-PGZh3LZUB-BDpuzHoAXjwAXgQAgAAyBoi-PfSxFQ5SSEqQCxiBAAAAADJ1OZxNKkTKosqAACCdCuAKwCAgDbyJ5KcLN1BibcwAAAAgbEFelj8frPDrvG7XQYAAAAAAAAAYPZ_9o8mRDTmlhbEUsCr9gsIALD2CwgAwKZuAABvAXBBR9CKwWB1ATE7AAAAgLv___9_PZCy2Da2mcvjWVh8i4XFN3JZLMONcTiZrQa7wXDkvfwjJWLHVJqOPocpO00uy0EtkDVNLr_9JmwxWk0mm-VwtlxMBsPRcDTan8CNBjhBw-FgsRssdovFcLKYjAbLwQIFYjDBCRmONpPVaLfaTZbDyWg020w2SNGq1Wy0GQxXs8lst1sNB8PlaIQUrVnMJpPFbLTcbQbLyWgwnAyHCAOL4XDlsk3WytFs4xYNJ661xDEYrlWTyXDjGI5MK9duLXp9TKeFaTnxuLwoGECzF8FFOhEdLS-H6fD3nN6io-XlMB3-ntNFLNGcLNKJ7LJvWWwb28zl8SwsvsXC4hu5LJbhxjiczFaD3WA48hcWw-HKZZuslaPZxi0aTlxriWMwXKsmk-HGMRyZVq7dWvT6mE4L03Licfkbq91itNyMVqN9Y7VbjJab0Wq079AZvqvP2Sitlksel2KjfcksM6dB4TJYvD-JaTHtzg6e3-_oVKkuGmND9k0ozAaPwaCIJYLTRToRvYyni1gieVqkE5XHODOOTBvjcuawrDaW4WKxWfk2C-dy4xutXM6JWKI0XaQTvdph9VveCqfl8Lec3mqH2fewvNwK0-nh8br1prfm5XFdnqbnXzFabjaDifqPDTEazXWzuWKwnGsGqwQAAAAAAAAAsIQ58yYAAAAAp8FsFrPJarkAEg_ju6Mm3QOhu3GuxY0fV9DR8nKYDn_P6S06Wl4O0-HvOV0ZQOJBHA!&excid=22&docw=0&cijs=1
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/

Response headers

status
200
server
nginx/1.13.12
content-type
text/html;charset=ISO-8859-1
machineid
402
accept-ranges
bytes
date
Sat, 19 Oct 2019 13:57:43 GMT
via
1.1 varnish
x-served-by
cache-hhn4069-HHN
x-cache
MISS
x-cache-hits
0
x-timer
S1571493463.248097,VS0,VE187
sync
match.taboola.com/ Frame 941A
0
0
Document
General
Full URL
https://match.taboola.com/sync?dast=V7RgECFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHLRcjDYkBos1XKyGi91kN9gsR6vNZjRbDqbgMGWnyWU5qAWypsnld8MRmk6Hz3WvFx0tL4fp8Pec7hq_2692WP2Wt8JpOfwtp7faYfY9LC-3wnR6eLxuvemteXlcl6fp-VeMlpvNYC8HAAAAgAcAqPN8iB9AAIAIAAAAAAkAAAAAioCKfwuBCwAAAAAMgIPkcQ0AKA6Gc92tL7vR4fq87P4AAHgIAAEAGFAgASh4SCsByHDdOgEAAAAAAAAAYPn___-PGZh3LZUB-BDpuzHoAXjwAXgQAgAAyBoi-PfSxFQ5SSEqQCxiBAAAAADJ1OZxNKkTKosqAACCdCuAKwCAgDbyJ5KcLN1BibcwAAAAgbEFelj8frPDrvG7XQYAAAAAAAAAYPZ_9o8mRDTmlhbEUsCr9gsIALD2CwgAwKZuAABvAXBBR9CKwWB1ATE7AAAAgLv___9_PZCy2Da2mcvjWVh8i4XFN3JZLMONcTiZrQa7wXDkvfwjJWLHVJqOPocpO00uy0EtkDVNLr_9JmwxWk0mm-VwtlxMBsPRcDTan8CNBjhBw-FgsRssdovFcLKYjAbLwQIFYjDBCRmONpPVaLfaTZbDyWg020w2SNGq1Wy0GQxXs8lst1sNB8PlaIQUrVnMJpPFbLTcbQbLyWgwnAyHCAOL4XDlsk3WytFs4xYNJ661xDEYrlWTyXDjGI5MK9duLXp9TKeFaTnxuLwoGECzF8FFOhEdLS-H6fD3nN6io-XlMB3-ntNFLNGcLNKJ7LJvWWwb28zl8SwsvsXC4hu5LJbhxjiczFaD3WA48hcWw-HKZZuslaPZxi0aTlxriWMwXKsmk-HGMRyZVq7dWvT6mE4L03Licfkbq91itNyMVqN9Y7VbjJab0Wq079AZvqvP2Sitlksel2KjfcksM6dB4TJYvD-JaTHtzg6e3-_oVKkuGmND9k0ozAaPwaCIJYLTRToRvYyni1gieVqkE5XHODOOTBvjcuawrDaW4WKxWfk2C-dy4xutXM6JWKI0XaQTvdph9VveCqfl8Lec3mqH2fewvNwK0-nh8br1prfm5XFdnqbnXzFabjaDifqPDTEazXWzuWKwnGsGqwQAAAAAAAAAsIQ58yYAAAAAp8FsFrPJarkAEg_ju6Mm3QOhu3GuxY0fV9DR8nKYDn_P6S06Wl4O0-HvOV0ZQOJBHA!&excid=22&docw=0&cijs=1
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/units/23_14_12/infra/cmTagSLIDER_INSTREAM.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash

Request headers

:method
GET
:authority
match.taboola.com
:scheme
https
:path
/sync?dast=V7RgECFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHLRcjDYkBos1XKyGi91kN9gsR6vNZjRbDqbgMGWnyWU5qAWypsnld8MRmk6Hz3WvFx0tL4fp8Pec7hq_2692WP2Wt8JpOfwtp7faYfY9LC-3wnR6eLxuvemteXlcl6fp-VeMlpvNYC8HAAAAgAcAqPN8iB9AAIAIAAAAAAkAAAAAioCKfwuBCwAAAAAMgIPkcQ0AKA6Gc92tL7vR4fq87P4AAHgIAAEAGFAgASh4SCsByHDdOgEAAAAAAAAAYPn___-PGZh3LZUB-BDpuzHoAXjwAXgQAgAAyBoi-PfSxFQ5SSEqQCxiBAAAAADJ1OZxNKkTKosqAACCdCuAKwCAgDbyJ5KcLN1BibcwAAAAgbEFelj8frPDrvG7XQYAAAAAAAAAYPZ_9o8mRDTmlhbEUsCr9gsIALD2CwgAwKZuAABvAXBBR9CKwWB1ATE7AAAAgLv___9_PZCy2Da2mcvjWVh8i4XFN3JZLMONcTiZrQa7wXDkvfwjJWLHVJqOPocpO00uy0EtkDVNLr_9JmwxWk0mm-VwtlxMBsPRcDTan8CNBjhBw-FgsRssdovFcLKYjAbLwQIFYjDBCRmONpPVaLfaTZbDyWg020w2SNGq1Wy0GQxXs8lst1sNB8PlaIQUrVnMJpPFbLTcbQbLyWgwnAyHCAOL4XDlsk3WytFs4xYNJ661xDEYrlWTyXDjGI5MK9duLXp9TKeFaTnxuLwoGECzF8FFOhEdLS-H6fD3nN6io-XlMB3-ntNFLNGcLNKJ7LJvWWwb28zl8SwsvsXC4hu5LJbhxjiczFaD3WA48hcWw-HKZZuslaPZxi0aTlxriWMwXKsmk-HGMRyZVq7dWvT6mE4L03Licfkbq91itNyMVqN9Y7VbjJab0Wq079AZvqvP2Sitlksel2KjfcksM6dB4TJYvD-JaTHtzg6e3-_oVKkuGmND9k0ozAaPwaCIJYLTRToRvYyni1gieVqkE5XHODOOTBvjcuawrDaW4WKxWfk2C-dy4xutXM6JWKI0XaQTvdph9VveCqfl8Lec3mqH2fewvNwK0-nh8br1prfm5XFdnqbnXzFabjaDifqPDTEazXWzuWKwnGsGqwQAAAAAAAAAsIQ58yYAAAAAp8FsFrPJarkAEg_ju6Mm3QOhu3GuxY0fV9DR8nKYDn_P6S06Wl4O0-HvOV0ZQOJBHA!&excid=22&docw=0&cijs=1
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/

Response headers

status
200
server
nginx/1.13.12
content-type
text/html;charset=ISO-8859-1
machineid
403
accept-ranges
bytes
date
Sat, 19 Oct 2019 13:57:45 GMT
via
1.1 varnish
x-served-by
cache-hhn4069-HHN
x-cache
MISS
x-cache-hits
0
x-timer
S1571493465.250176,VS0,VE49
OpportunityServlet
opps.taboola.com/
1 B
80 B
XHR
General
Full URL
https://opps.taboola.com/OpportunityServlet
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/vPlayer/player/v10.5.0/OvaMediaPlayer.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

Request headers

Sec-Fetch-Mode
cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
text/plain

Response headers

date
Sat, 19 Oct 2019 13:57:45 GMT
via
1.1 varnish
server
nginx/1.13.12
x-timer
S1571493466.551725,VS0,VE17
x-served-by
cache-hhn4068-HHN
status
200
x-cache
MISS
access-control-allow-origin
https://threatpost.com
access-control-allow-credentials
true
accept-ranges
bytes
content-length
1
x-cache-hits
0
VideoBidRequestHandlerServlet
wf.taboola.com/
9 KB
9 KB
XHR
General
Full URL
https://wf.taboola.com/VideoBidRequestHandlerServlet?oid=15&width=400&height=225&pubid=198827&tagid=1020237&crid=5302265&noaop=2&sortOrderType=0&cb=1571493465918&mimes=5,10,11,12&isvideo=0&plmd=2&mindur=1&maxdur=210&minbr=1&maxbr=10000&st=-1&seq=3&pv=1050&pt=-35418769&tz=120&viewable=true&ddast=V79JkCFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHbRcjDYkBos1XKyGi91kNxgtJovNYDIcrSZD4KDlYrQhMVis4WI1XOwmu8FmOVptNqPZcjAFhyk7TS7LQS2QNU0uvxuO0HQ6fK57vehoeTlMh7_ndNf43X61w-q3vBVOy-FvOb3VDrPvYXm5FabTw-N1601vzcvjujxNz79itNxsBns5AAAAADwAQJ3nQ_wAAgBEAAAAAEgAAAAAUARU_FsIXAAAAABgABwkj2sAQHEwnOtufdmNDtfnZfcHAMBDAAgAwIACCUDBQ1oJQIbr1gkAAAAAAAAAAMv___9_zMC8a6kMwIdIXw_Agw_AA1EBYhEjAAAAAEimNo-jSZ1QWVQBABCkWwFcAQAEtJE_keiEAQAACIwt0MPi95sddo3f7TIAAAAAAAAAALP_s380IaIxt7QglgJetV9AAIC1X0AAADZ1AwB4C4ALOoJWDAarC4jZAQAAANz9____64GUxbaxzVwez8LiWywsvpHLYhlujMPJbDXYDYYj7-UfKRE7ptJ09DlM2WlyWQ5qgaxpcvntN2GL0Woy2SyHs-ViMhiOhqPR_gRuNMAJGg4Hi91gsVsshpPFZDRYDhYoEIMJTshwtJmsRrvVbrIcTkaj2WayQYpWrWajzWC4mk1mu91qOBguRyOkaM1iNpksZqPlbjNYTkaD4WQ4RBhYDIcrl22yVo5mG7doOHGtJY7BcK2aTIYbx3BkWrl2a9HrYzotTMuJx-VFwQCavQgu0onoaHk5TIe_5_QWHS0vh-nw95wuYonmZJFOZJd9y2Lb2GYuj2dh8S0WFt_IZbEMN8bhZLYa7AbDkb-wGA5XLttkrRzNNm7RcOJaSxyD4Vo1mQw3juHItHLt1qLXx3RamJYTj8vfWO0Wo-VmtBrtG6vdYrTcjFajfYfO8F19zkZptVzyuBQb7UtmmTkNCpfB4v1JTItpd3bw_H5Hp0p10Rgbsm9CYTZ4DAZFLBGcLtKJ6GU8XcQSydMinag8xplxZNoYlzOHZbWxDBeLzcq3WTiXG99o5XJOxBKl6SKd6NUOq9_yVjgth7_l9FY7zL6H5eVWmE4Pj9etN701L4_r8jQ9_4rRcrMZTNR_bIjRaK6bzRWD5VwzWCUAAAAAAAAAgCXMmTcBAAAAOA1ms5hNVssFkHgY3x016R4I3Y1zLW78uIKOlpfDdPh7Tm_R0fJymA5_z-nKABIP4g!&proto=2,3,5,6&dtagid=1683035&dpubid=331625&abtst=arbr_vB!expl_vA&mPre=0.033&encoded=1&pstn=1&cirf=https%3A%2F%2Fthreatpost.com&callback=&en=1&wfv=1&cdb=&gdprApplies=false&amp=0&qsz=6&ft=0&pb=0
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/vPlayer/player/v10.5.0/OvaMediaPlayer.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
7209786b2ecfe772f700ff2c5933e42a347449c4fd8bd9ef873d9a421e79f746

Request headers

Sec-Fetch-Mode
cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
text/plain

Response headers

date
Sat, 19 Oct 2019 13:57:46 GMT
via
1.1 varnish
machineid
1439
x-cache
MISS
status
200
x-cache-hits
0
x-served-by
cache-hhn4069-HHN
pragma
no-cache
server
nginx/1.13.12
x-timer
S1571493466.922423,VS0,VE114
content-type
application/json;charset=utf-8
access-control-allow-origin
https://threatpost.com
cache-control
no-cache,must-revalidate,no-store,max-age=0,s-maxage=0
access-control-allow-credentials
true
accept-ranges
bytes
expires
Sat, 26 Jul 1997 05:00:00 GMT
ptv
secure.adnxs.com/
85 B
1 KB
XHR
General
Full URL
https://secure.adnxs.com/ptv?id=16816843&size=400x225&promo_alignment=center&cb=R0.1571493466060&ext_inv_code=cm_331625-1683035_Unknown&referrer=https%3A%2F%2Fthreatpost.com&pubclick=http%3A%2F%2Fclickam.zorosrv.com%2Fst%3Fcipid%3D66363425%26ttype%3D1%26crid%3D5302265%26dast%3DV79JkCFgNmSOURfwNsZQRmSOURfwNsZQUAAAAGBjsHHbRcjDYkBos1XKyGi91kNxgtJovNYDIcrSZD4KDlYrQhMVis4WI1XOwmu8FmOVptNqPZcjAFhyk7TS7LQS2QNU0uvxuO0HQ6fK57vehoeTlMh7_ndNf43X61w-q3vBVOy-FvOb3VDrPvYXm5FabTw-N1601vzcvjujxNz79itNxsBns5AAAAADwAQJ3nQ_wAAgBEAAAAAEgAAAAAUARU_FsIXAAAAABgABwkj2sAQHEwnOtufdmNDtfnZfcHAMBDAAgAwIACCUDBQ1oJQIbr1gkAAAAAAAAAAMv___9_zMC8a6kMwIdIXw_Agw_AA1EBYhEjAAAAAEimNo-jSZ1QWVQBABCkWwFcAQAEtJE_keiEAQAACIwt0MPi95sddo3f7TIAAAAAAAAAALP_s380IaIxt7QglgJetV9AAIC1X0AAADZ1AwB4C4ALOoJWDAarC4jZAQAAANz9____64GUxbaxzVwez8LiWywsvpHLYhlujMPJbDXYDYYj7-UfKRE7ptJ09DlM2WlyWQ5qgaxpcvntN2GL0Woy2SyHs-ViMhiOhqPR_gRuNMAJGg4Hi91gsVsshpPFZDRYDhYoEIMJTshwtJmsRrvVbrIcTkaj2WayQYpWrWajzWC4mk1mu91qOBguRyOkaM1iNpksZqPlbjNYTkaD4WQ4RBhYDIcrl22yVo5mG7doOHGtJY7BcK2aTIYbx3BkWrl2a9HrYzotTMuJx-VFwQCavQgu0onoaHk5TIe_5_QWHS0vh-nw95wuYonmZJFOZJd9y2Lb2GYuj2dh8S0WFt_IZbEMN8bhZLYa7AbDkb-wGA5XLttkrRzNNm7RcOJaSxyD4Vo1mQw3juHItHLt1qLXx3RamJYTj8vfWO0Wo-VmtBrtG6vdYrTcjFajfYfO8F19zkZptVzyuBQb7UtmmTkNCpfB4v1JTItpd3bw_H5Hp0p10Rgbsm9CYTZ4DAZFLBGcLtKJ6GU8XcQSydMinag8xplxZNoYlzOHZbWxDBeLzcq3WTiXG99o5XJOxBKl6SKd6NUOq9_yVjgth7_l9FY7zL6H5eVWmE4Pj9etN701L4_r8jQ9_4rRcrMZTNR_bIjRaK6bzRWD5VwzWCUAAAAAAAAAgCXMmTcBAAAAOA1ms5hNVssFkHgY3x016R4I3Y1zLW78uIKOlpfDdPh7Tm_R0fJymA5_z-nKABIP4g!%26cmcv%3D${CMCV}%26tgtf%3D&GDPR_APPLIES=1
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/vPlayer/player/v10.5.0/OvaMediaPlayer.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.206 , Netherlands, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
301.bm-nginx-loadbalancer.mgmt.ams1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
b2effcb18f514a7896e737bdda537f2ef3b5bb989eb247f4ab2aa3facf1148ea
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Sat, 19 Oct 2019 13:57:48 GMT
X-Proxy-Origin
144.76.109.30; 144.76.109.30; 301.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.223.46:80
AN-X-Request-Uuid
09532fb6-345e-4837-b7e1-b2068e3e2498
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/xml; charset=utf-8
Content-Length
85
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
AdServerServlet
vid.pubmatic.com/AdServer/
27 B
853 B
XHR
General
Full URL
https://vid.pubmatic.com/AdServer/AdServerServlet?adtype=13&pubId=156307&siteId=583006&adId=2174376&vadFmt=3&vapi=2&vminl=1&vmaxl=60&vh=225&vw=400&placement=3&vtype=0&vpos=1&vskip=0&vcom=0&vfmt=1+3+4+5+6+7&kadpageurl=https%3A%2F%2Fthreatpost.com&sec=1&gdpr=1
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/vPlayer/player/v10.5.0/OvaMediaPlayer.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.111 , United Kingdom, ASN62713 (AS-PUBMATIC - PubMatic, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
a71702232a771b558b12f8c0012a15f5652b500fd2e33464d283406cee36754d

Request headers

Sec-Fetch-Mode
cors
Referer
https://threatpost.com/major-airport-malware-attack-ot-security/149330/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

Date
Sat, 19 Oct 2019 13:57:46 GMT
Content-Encoding
gzip
Server
nginx
Transfer-Encoding
chunked
Connection
keep-alive
P3P
CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
X-Vdbg
1:0/165:-1
Content-Type
application/xml; charset=utf-8

Verdicts & Comments Add Verdict or Comment

311 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| postscribe undefined| $ function| jQuery object| gdprDynamicStrings object| kss function| initializeAds function| displayBanners function| initAdserver function| loadScript function| initiateAds function| gtag function| trackAdScript function| checkAdSize object| postscribeScript boolean| isMobile number| PREBID_TIMEOUT number| MAX_RETRIES undefined| resizeTimer object| gdprStrings object| dataLayer object| jQuery112407951629585633109 object| _taboola object| gf_global object| ___grecaptcha_cfg object| grecaptcha boolean| __google_recaptcha_client object| adrptRules object| TRC object| _tblConsole undefined| msg object| _comscore function| gformBindFormatPricingFields function| Currency function| gformCleanNumber function| gformGetDecimalSeparator function| gformIsNumber function| gformIsNumeric function| gformDeleteUploadedFile function| gformIsHidden function| gformCalculateTotalPrice function| gformGetShippingPrice function| gformGetFieldId function| gformCalculateProductPrice function| gformGetProductQuantity function| gformIsProductSelected function| gformGetBasePrice function| gformFormatMoney function| gformFormatPricingField function| gformToNumber function| gformGetPriceDifference function| gformGetOptionLabel function| gformGetProductIds function| gformGetPrice function| gformRegisterPriceField function| gformInitPriceFields function| gformShowPasswordStrength function| gformPasswordStrength function| gformAddListItem function| gformDeleteListItem function| gformAdjustClasses function| gformToggleIcons function| gformMatchCard function| gformFindCardType function| gformToggleCreditCard function| gformInitChosenFields function| gformInitCurrencyFormatFields function| gformFormatNumber function| getMatchGroups function| gf_get_field_number_format function| renderRecaptcha function| gformValidateFileSize function| gformInitSpinner function| gformAddSpinner function| gf_raw_input_change function| gf_get_input_id_by_html_id function| gf_get_form_id_by_html_id function| gf_get_ids_by_html_id function| gf_input_change function| gformExtractFieldId function| gformExtractInputIndex function| rgars function| rgar object| _gformPriceFields undefined| _anyProductSelected function| GFCalc object| gform undefined| __gf_keyup_timeout object| gfMultiFileUploader function| gf_apply_rules function| gf_check_field_rule function| gf_apply_field_rule function| gf_get_field_action function| gf_is_match function| gf_is_match_checkable function| gf_is_match_default function| gf_format_number function| gf_try_convert_float function| gf_matches_operation function| gf_get_value function| gf_do_field_action function| gf_do_next_button_action function| gf_do_action function| gf_reset_to_default undefined| __gf_timeout_handle object| ak_js object| commentForm undefined| replyRowContainer undefined| children object| wp object| Placeholders object| gf_form_conditional_logic string| gf_number_format object| googletag function| do_callback object| google_tag_manager function| jQuery112407951629585633109_1571493454204 object| recaptcha object| closure_lm_740935 function| __trcCopyProps function| __trcFromError function| __trcClientTimestamp function| __trcLog function| __trcError function| __trcDebug function| __trcInfo function| __trcWarn function| __trcDOMWalker function| __trcPurgeEventHandlers function| __trcJSONify function| __trcUnJSONify function| __trcGetMargins function| __trcAttachResize function| __trcDetachResize function| __trcTrim function| __trcGetElementsByClass function| __trcToArray function| __trcObjectCreate function| PageManager function| addHashParam object| params number| trc_debug_level string| trc_article_id object| TRCImpl number| taboola_view_id function| udm_ object| ns_p object| COMSCORE string| GoogleAnalyticsObject function| ga object| _qevents function| twq object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken object| google_tag_data object| gaplugins object| gaGlobal object| gaData number| google_srt undefined| google_measure_js_timing boolean| google_noFetch number| __google_ad_urls_id object| twttr function| quantserve function| __qc object| ezt object| _qoptions object| cmTag undefined| define function| startCMTagMain string| category number| _zid function| shuffle object| arrToUse object| travel object| news object| mobilecontent1 object| mobilecontent1_new object| travelmuted object| movietrailersHD object| movietrailersHDmuted object| widescreen object| movietrailerslight object| landscapeHD object| landscapeHDmuted object| blank object| blankblack object| blankblack7 object| blankblack5 object| blankblack_mob object| blankwhiteHDmpg object| blankblack10 object| blankwhite object| blankwhiteHD object| black_loader object| lightweight object| lightweight_single object| lightweight300600 object| bonnier object| home object| lipstick object| shoes object| art object| infiltrator object| glass object| lemurs object| NBAshoes object| Sunglasses object| Hummus object| Short_food object| Short_swim object| Euro_news object| Automoto_TV object| Uzoo object| SmartDuvet object| Tiger object| Chocolate object| Logan object| Jacket object| Bike object| Kanye object| Cancun object| Smartwatch object| Helicopter object| dogshampoo object| icetea object| charger object| blueysmoothie object| ShortContent object| carbsandwich object| pisatower object| Food1 object| Food2 object| Food3 object| Food4 object| Food5 object| Food6 object| Food7 object| Fashion object| Lifestyle1 object| Lifestyle2 object| Technology1 object| Technology2 object| Technology3 object| Entertainment object| Scrambledeggs object| Spinach object| Bub1 object| Pokemon object| style_hacks object| Motorcycle object| IceCracking object| Manatees object| Daiving object| Fishing_Lure object| Shark object| HundredsManatees object| TigerShark object| MandelaPrize object| Bertram35 object| bushfire object| Snow object| Delta object| Wheels object| Yellowfin object| Grip object| Kawasaki object| Yoga object| Cat object| Chickens object| RZR object| bitcoin object| bmw object| wombat object| koala object| Marsupial object| puppy object| bitcoinMuted object| bmwMuted object| Wallabies object| Bunny object| Pumpkins object| Dogs_Stress object| Dogs_Stress_image object| lightweight300600_short object| playlist string| vpaidId function| webpackHotUpdate function| OvaMediaPlayer string| lastWfUrl number| google_unique_id object| google_reactive_ads_global_state function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter object| __google_ad_urls object| ampInaboxIframes object| ampInaboxPendingMessages object| __AMP_LOG object| __AMP_ERRORS boolean| ampInaboxInitialized object| __AMP_MODE function| __AMP_REPORT_ERROR object| ampInaboxPositionObserver object| ampInaboxFrameOverlayManager object| AMP object| events

3 Cookies

Domain/Path Name / Value
.threatpost.com/ Name: _gat_gtag_UA_109681207_2
Value: 1
.threatpost.com/ Name: _gid
Value: GA1.2.227326998.1571493456
.threatpost.com/ Name: _ga
Value: GA1.2.2039105488.1571493456

3 Console Messages

Source Level URL
Text
console-api info URL: https://cdn.ampproject.org/rtv/011910071804120/amp4ads-v0.js(Line 529)
Message:
Powered by AMP ⚡ HTML – Version 1910071804120 https://threatpost.com/major-airport-malware-attack-ot-security/149330/
console-api info URL: https://cdn.ampproject.org/rtv/011910071804120/amp4ads-v0.js(Line 529)
Message:
Powered by AMP ⚡ HTML – Version 1910071804120 https://threatpost.com/major-airport-malware-attack-ot-security/149330/
console-api info URL: https://cdn.ampproject.org/rtv/011910071804120/amp4ads-v0.js(Line 529)
Message:
Powered by AMP ⚡ HTML – Version 1910071804120 https://threatpost.com/major-airport-malware-attack-ot-security/149330/

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

15.taboola.com
ads.creative-serving.com
adservice.google.com
adservice.google.de
analytics.twitter.com
assets.threatpost.com
bttrack.com
cdn.ampproject.org
cdn.taboola.com
cdnjs.cloudflare.com
cds.taboola.com
cm.g.doubleclick.net
convammp.taboola.com
graph.facebook.com
ib.adnxs.com
images.taboola.com
imprammp.taboola.com
kasperskycontenthub.com
match.adsrvr.org
match.taboola.com
media.threatpost.com
opps.taboola.com
pagead2.googlesyndication.com
pixel.quantserve.com
pixel.rubiconproject.com
px.powerlinks.com
rtb.mfadsrvr.com
rules.quantcount.com
sb.scorecardresearch.com
secure.adnxs.com
secure.quantserve.com
securepubads.g.doubleclick.net
static.ads-twitter.com
stats.g.doubleclick.net
sync.mathtag.com
t.co
threatpost.com
tpc.googlesyndication.com
trc.taboola.com
vid.pubmatic.com
vidstat.taboola.com
vidstatb.taboola.com
wf.taboola.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
www.gstatic.com
www.linkedin.com
www.reddit.com
www.storygize.net
x.bidswitch.net
100.20.21.65
104.244.42.195
104.244.42.69
130.211.13.252
151.101.112.157
151.101.114.2
151.101.114.49
151.101.13.140
151.101.14.2
151.101.14.49
172.217.16.162
172.217.16.194
18.185.163.33
18.197.235.0
185.29.133.199
185.33.223.206
185.33.223.208
185.33.223.221
185.64.189.111
192.132.33.46
2.19.43.224
2600:9000:200d:5800:6:44e3:f8c0:93a1
2600:9000:21f3:1c00:2:9275:3d40:93a1
2600:9000:21f3:5e00:0:5c46:4f40:93a1
2606:4700::6813:c497
2a00:1450:4001:800::2002
2a00:1450:4001:808::2002
2a00:1450:4001:80b::200e
2a00:1450:4001:818::2004
2a00:1450:4001:819::2003
2a00:1450:4001:81a::2008
2a00:1450:4001:81e::2001
2a00:1450:4001:821::2001
2a00:1450:4001:824::2003
2a00:1450:400c:c00::9b
2a03:2880:f007:1:face:b00c:0:1
2a05:f500:10:101::b93f:9101
35.173.160.135
40.113.136.100
52.57.126.118
63.32.23.112
69.173.144.136
91.228.74.165
91.228.74.244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