www.bcbs.be
Open in
urlscan Pro
193.3.35.66
Malicious Activity!
Public Scan
Effective URL: https://www.bcbs.be/fh/step2.php?l=_JeHDCXZFUq_VJOXK0QWHtoersdfGYDw17742523456676546418&fid.13InboxLight.aspxn.17742...
Submission: On March 29 via api from IE — Scanned from DE
Summary
TLS certificate: Issued by R3 on March 13th 2022. Valid for: 3 months.
This is the only time www.bcbs.be was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 10 | 193.3.35.66 193.3.35.66 | 58059 (WIFIBER) (WIFIBER) | |
9 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
bcbs.be
1 redirects
www.bcbs.be |
647 KB |
9 | 1 |
Domain | Requested by | |
---|---|---|
10 | www.bcbs.be |
1 redirects
www.bcbs.be
|
9 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.bcbs.be R3 |
2022-03-13 - 2022-06-11 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.bcbs.be/fh/step2.php?l=_JeHDCXZFUq_VJOXK0QWHtoersdfGYDw17742523456676546418&fid.13InboxLight.aspxn.1774256418&fid.1252899642528194560278553343InboxLighwsd5dfgsgfgyuiokjlt996123212342_Product-userid&userid
Frame ID: 955D4F7ABF3CA326144A224642F2D019
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
Sign InPage URL History Show full URLs
-
http://www.bcbs.be/fh/step2.php?l=_JeHDCXZFUq_VJOXK0QWHtoersdfGYDw17742523456676546418&fid.13In...
HTTP 301
https://www.bcbs.be/fh/step2.php?l=_JeHDCXZFUq_VJOXK0QWHtoersdfGYDw17742523456676546418&fid.13In... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.bcbs.be/fh/step2.php?l=_JeHDCXZFUq_VJOXK0QWHtoersdfGYDw17742523456676546418&fid.13InboxLight.aspxn.1774256418&fid.1252899642528194560278553343InboxLighwsd5dfgsgfgyuiokjlt996123212342_Product-userid&userid
HTTP 301
https://www.bcbs.be/fh/step2.php?l=_JeHDCXZFUq_VJOXK0QWHtoersdfGYDw17742523456676546418&fid.13InboxLight.aspxn.1774256418&fid.1252899642528194560278553343InboxLighwsd5dfgsgfgyuiokjlt996123212342_Product-userid&userid Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
step2.php
www.bcbs.be/fh/ Redirect Chain
|
6 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
conv.min.css
www.bcbs.be/fh/css/ |
18 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
t3.png
www.bcbs.be/fh/images/ |
52 KB 52 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logn.png
www.bcbs.be/fh/images/ |
523 B 765 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
m9.png
www.bcbs.be/fh/images/ |
753 B 994 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
small.jpg
www.bcbs.be/fh/images/ |
0 169 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
t1.jpg
www.bcbs.be/fh/images/ |
566 KB 566 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
csscheckbox_a4824bcf5d413f078bdd6abd3e6e5bf4.png
www.bcbs.be/fh/images/ |
895 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logn.png
www.bcbs.be/fh/images/ |
523 B 764 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone object| oncontextlost object| oncontextrestored0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.bcbs.be
193.3.35.66
7764c38d71f5ee52d39f237f08b4e82b4715c73bfa0afbaee30a60b0dfd058ca
7b73f03db4759a9a8cfe2860f5af3f4e9be1101dc03ffba61357960947092bb6
9dd5e031a96cb31830ef2fb13009f70f2001f7204e8e96faf0999821e7dd67eb
a082b1de897c01c874a9adebe1176db62100aeca440a0692a000a1da7b361f2b
aae824da040b448d7cac0c5cf43cb7fa7d038f1f550ca80e151bceed94a75fa3
c2d5ac2e5a041d4925fd77de1880a678ad3638186f57e0970e0e081c6c8812d4
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e8fc8a8a07adf6262c1a9b88f2d659a35278ac2e23c49c4870fc454a5b44bcc9