cacti.cybercable.net.mx
Open in
urlscan Pro
201.130.192.28
Malicious Activity!
Public Scan
Submission: On October 29 via automatic, source openphish
Summary
This is the only time cacti.cybercable.net.mx was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
14 | 201.130.192.28 201.130.192.28 | 16960 (Cablevisi...) (Cablevision Red) | |
15 | 2 |
ASN16960 (Cablevision Red, S.A de C.V., MX)
PTR: 201-130-192-28-cable.cybercable.net.mx
cacti.cybercable.net.mx |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
cybercable.net.mx
cacti.cybercable.net.mx |
934 KB |
0 |
bankofamerica.com
Failed
chat.bankofamerica.com Failed |
|
15 | 2 |
Domain | Requested by | |
---|---|---|
14 | cacti.cybercable.net.mx |
cacti.cybercable.net.mx
|
0 | chat.bankofamerica.com Failed |
cacti.cybercable.net.mx
|
15 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://cacti.cybercable.net.mx/www.bankofamerica.com/customer.php?_nfpb=true&_nfls=false&_pageLabel=page_ecareprofile&p_returnUrl=page_customercenter
Frame ID: 1053EAEA616AFBD5CCCC4353D2B9B352
Requests: 15 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
CentOS (Operating Systems) Expand
Detected patterns
- headers server /CentOS/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
customer.php
cacti.cybercable.net.mx/www.bankofamerica.com/ |
12 KB 12 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
global-jawr.css
cacti.cybercable.net.mx/www.bankofamerica.com/files/ |
90 KB 90 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vipaa-jawr.css
cacti.cybercable.net.mx/www.bankofamerica.com/files/ |
184 KB 184 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
global-jawr.js
cacti.cybercable.net.mx/www.bankofamerica.com/files/ |
270 KB 270 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vipaa-jawr.js
cacti.cybercable.net.mx/www.bankofamerica.com/files/ |
328 KB 328 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
deploy2.js
cacti.cybercable.net.mx/www.bankofamerica.com/files/ |
20 KB 20 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mTag.js
cacti.cybercable.net.mx/www.bankofamerica.com/files/ |
17 KB 17 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boa_logo.gif
cacti.cybercable.net.mx/www.bankofamerica.com/IMG/ |
4 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
continue.jpg
cacti.cybercable.net.mx/www.bankofamerica.com/ |
2 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mtagconfig.js
cacti.cybercable.net.mx/www.bankofamerica.com/files/ |
4 KB 4 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fsd-secure-esp-sprite.png
cacti.cybercable.net.mx/pa/components/modules/header-module/2.1/graphic/ |
359 B 359 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gfoot-home-icon.png
cacti.cybercable.net.mx/pa/components/modules/global-footer-module/2.5/graphic/ |
360 B 360 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gfootb-static-sprite.png
cacti.cybercable.net.mx/pa/components/modules/global-footer-module/2.5/graphic/ |
365 B 365 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fsd-arrows.png
cacti.cybercable.net.mx/pa/components/modules/quick-help-module/2.0/graphic/ |
352 B 352 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
deploy2.asp
chat.bankofamerica.com/visitor/addons/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- chat.bankofamerica.com
- URL
- http://chat.bankofamerica.com/visitor/addons/deploy2.asp?site=LPBofA2&d_id=olb-passcode-english&default=simpleDeploy
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)163 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
string| boaVIPAAuseGzippedBundles string| boaVIPAAjawrEnabled object| boa function| windowSetup function| displayPopup function| boaLangSetup function| boaLocationReplace function| boaEqualHeight function| boaEqualWidth function| boaCenterAlign function| boaTLUIFieldValidationError function| boaTLAddCustomEvent function| boaTLAddEvent function| dartFireOnClick function| dartFireOnClickWithoutNumParam function| dartFireOnClickSpecial function| boaOBORestricted object| selectBofa object| cfLoader boolean| autoCompleteEnabled string| search_box_default string| search_box_prompt string| search_host_default function| set_css function| get_suggest function| get_jsonp_suggest function| setOptionFastSearch object| SessionTimeout function| $ function| jQuery function| setFlexLayoutFooterHeight undefined| flexLayoutFooterHeightOriginal undefined| flexLayoutCenterContentHeightOriginal undefined| $flexLayoutFooterDiv undefined| $flexLayoutFooterInner string| SEP string| PAIR function| PM_FP_activeXDetect function| PM_FP_stripIllegalChars function| PM_FP_stripFullPath object| PM_FP_BrowserDetect function| PM_FP_FingerPrint function| Hashtable function| IE_FingerPrint function| Mozilla_FingerPrint function| Opera_FingerPrint function| add_deviceprint function| PM_FP_urlEncode function| encode_deviceprint function| decode_deviceprint function| post_deviceprint function| post_deviceprint_sk function| getBrowserType function| addPassMarkFlash2 boolean| isIE boolean| isWin boolean| isOpera function| ControlVersion function| GetSwfVer function| DetectFlashVer function| AC_AddExtension function| AC_Generateobj function| AC_FL_RunContent function| AC_GetArgs number| requiredMajorVersion number| requiredMinorVersion number| requiredRevision string| src string| width string| height string| application string| bgcolor function| showWidget string| spwSafePassNonFlashUrl string| spwPageCode string| spwFormName string| spwDeviceIndex string| spwExpand string| spwDivId number| spwProgressBarEachPercent string| spwContainerID undefined| spwScriptNode undefined| spwLinkNode function| showNonFlashWidget object| spwProgressBar function| isBrowserIE function| isBrowserOpera function| getVersionString function| isExternalInterfaceCompatible function| isWidgetCompatible function| isSitekeyWidgetCompatible string| $errorMessageContent undefined| $ssnfirst undefined| $ssnmiddle undefined| $ssnlast object| onlineidverify object| passcodeVerify object| $quickHelpBoaLangObj function| loadURL number| skmodSiteKeyLoadLimit number| skmodSiteKeyDisplayLimit number| skmodLastSitekeyDisplayed number| skmodDisplayID number| skmodImageID string| skmodLoadPage undefined| skmodPageIndex string| skImgADAText function| skmodLogSKImageError function| skmodUpdateSKImages function| skmodUpdatePreviousNextImages function| skmodClearSKImagesSrc function| skmodClearImageSelection string| questionValue boolean| duplicateExists number| lpfielderror string| requestAuthUrl object| requstAuthCode object| $popupFsdHeader object| cmPageViewForModal undefined| vendorURL string| CONTEXT object| olbTnCModuleTwoScrollSkin function| validNumeriChars function| isValid function| verifySubmit function| redirectPage function| trimVal function| processCoremetrics function| printContinue function| dualActionClick function| actionSplashParam function| actionECDParam function| actionModalParam function| actionOnlineIDParam object| input undefined| ConversionStageTrim function| hcArrayStorage function| lpRequest function| lpConnectionLibrary object| lpJSLib object| lpConnLib function| lpMonitorTag undefined| lpLazy undefined| lpMTag function| lpJSLibrary object| theBody string| continueURL function| myUrl string| quickHelpRequestURL string| lpUnit string| lpLanguage string| ConversionStage object| lpMTagConfig function| lpAddMonitorTag function| lpSendData function| lpAddVars number| passCodeErrorCounter number| onlineIdErrorCounter function| updateLpCounters function| getSelectedAcctForConvAction object| $boaLangObj string| browserFullVersion string| browserClass0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cacti.cybercable.net.mx
chat.bankofamerica.com
chat.bankofamerica.com
201.130.192.28
09a54bbb2061a17e8895e42f87442d2ff1648fb89f5246fc64b5eaa9e04fc4f0
115501150f8b31062bc58c5ca57102a4437ebd0f5130ba6994ac80c920084058
15e295aa25dc34c6096bbc1ac5ecfe8a2d3903b5c1ef126222388edae9266383
3d76e5ba2c6ead84f5578ca057b443ebf014eb22d8cd6c756103da606e9234ec
3fda09990a0f8f5d422544c0c4905d65232fb63483b79f8c85a74bc5fd15f051
6a361099bb5fcc42210561ee8575f11cf0312b54ad8ef190f31b7f7c0de8345f
716d41b4ff253cccbf90f548b06b866d2bb12566ae81fb8fb8eee9380c0144ba
7a351c2fda295ba9e270f6830f4efcaedd5e3b5c818aa2527e47561fac1b80e9
7fa4b8e6a601d0b18b51d24b96cc52e73484bf3ef3daa40cd27f5a4c3d4ab353
840772d09e59128aa49aa179604b4b6d9c62605431188aa79fbac51b745858fd
ba6489e76aba3ddc05d3256ef4c25f3e05c2bc1c8c5dc704c61652ef9f9f3983
bf6f4e5d78537fb20e049849e212df92dab5eb66890108b186a8e87efa84b0e5
cf8bb428d40df9eb7d4f399443cbaacc8bc1bdd598a8828788748ba6fba1be8d
eed255602bd228872fc5822dff420c99797c059d3364486bf6f93d528b3bfb48