navyfederal-onlineapp-szjwcsv12.glozzom.cfd
Open in
urlscan Pro
161.35.231.220
Malicious Activity!
Public Scan
Effective URL: https://navyfederal-onlineapp-szjwcsv12.glozzom.cfd/iloJ1CTf?wreply=/web/login?en=signin?client_id=p3JSMN&redirect_uri=https%3A%2F%2F%2FAuth%2FPostH...
Submission: On March 10 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by ZeroSSL RSA Domain Secure Site CA on March 9th 2022. Valid for: 3 months.
This is the only time navyfederal-onlineapp-szjwcsv12.glozzom.cfd was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 165.232.74.215 165.232.74.215 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
6 | 161.35.231.220 161.35.231.220 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
2 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:2a | 20446 (STACKPATH...) (STACKPATH-CDN) | |
2 | 2a02:26f0:e30... 2a02:26f0:e300:18e::35c1 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 192.229.221.185 192.229.221.185 | 15133 (EDGECAST) (EDGECAST) | |
1 | 2620:1ec:bdf::45 2620:1ec:bdf::45 | 8068 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
2 | 2606:4700:303... 2606:4700:3038::6815:ead4 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
14 | 7 |
ASN14061 (DIGITALOCEAN-ASN, US)
rrgro-bgf.reignindustry.com |
ASN14061 (DIGITALOCEAN-ASN, US)
navyfederal-onlineapp-szjwcsv12.glozzom.cfd | |
imytnz.mortengass.cfd |
ASN20940 (AKAMAI-ASN1, NL)
secure.aadcdn.microsoftonline-p.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
mortengass.cfd
imytnz.mortengass.cfd |
33 KB |
2 |
iili.io
iili.io — Cisco Umbrella Rank: 123503 |
8 KB |
2 |
msauth.net
logincdn.msauth.net — Cisco Umbrella Rank: 2290 aadcdn.msauth.net — Cisco Umbrella Rank: 1253 |
2 KB |
2 |
microsoftonline-p.com
secure.aadcdn.microsoftonline-p.com — Cisco Umbrella Rank: 9244 |
2 KB |
2 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 588 |
162 KB |
1 |
glozzom.cfd
navyfederal-onlineapp-szjwcsv12.glozzom.cfd |
192 KB |
1 |
reignindustry.com
1 redirects
rrgro-bgf.reignindustry.com |
561 B |
14 | 7 |
Domain | Requested by | |
---|---|---|
5 | imytnz.mortengass.cfd |
code.jquery.com
imytnz.mortengass.cfd |
2 | iili.io |
imytnz.mortengass.cfd
|
2 | secure.aadcdn.microsoftonline-p.com |
imytnz.mortengass.cfd
|
2 | code.jquery.com |
navyfederal-onlineapp-szjwcsv12.glozzom.cfd
imytnz.mortengass.cfd |
1 | aadcdn.msauth.net |
imytnz.mortengass.cfd
|
1 | logincdn.msauth.net |
imytnz.mortengass.cfd
|
1 | navyfederal-onlineapp-szjwcsv12.glozzom.cfd | |
1 | rrgro-bgf.reignindustry.com | 1 redirects |
14 | 8 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.glozzom.cfd ZeroSSL RSA Domain Secure Site CA |
2022-03-09 - 2022-06-07 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2021-07-14 - 2022-08-14 |
a year | crt.sh |
*.mortengass.cfd ZeroSSL RSA Domain Secure Site CA |
2022-03-09 - 2022-06-07 |
3 months | crt.sh |
secure.aadcdn.microsoftonline-p.com Microsoft RSA TLS CA 02 |
2021-11-18 - 2022-11-18 |
a year | crt.sh |
identitycdn.msauth.net DigiCert SHA2 Secure Server CA |
2021-05-13 - 2022-05-13 |
a year | crt.sh |
aadcdn.msauth.net DigiCert SHA2 Secure Server CA |
2022-02-22 - 2023-02-22 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-06-14 - 2022-06-13 |
a year | crt.sh |
This page contains 3 frames:
Primary Page:
https://navyfederal-onlineapp-szjwcsv12.glozzom.cfd/iloJ1CTf?wreply=/web/login?en=signin?client_id=p3JSMN&redirect_uri=https%3A%2F%2F%2FAuth%2FPostHandler&state=WfqdC0GS-fqgV-9yzC-JcvW-LVoAqsV9drRy&lc=&lc&id=xcQ56u&rdir=true&mkt=en-US&psi=&elld=bWFyeV9tY2R1ZmZpZUBuYXZ5ZmVkZXJhbC5vcmc=&lw=1
Frame ID: 52C76BFD846E9CB35ABFC99728165E26
Requests: 2 HTTP requests in this frame
Frame:
https://imytnz.mortengass.cfd/common/index-m.php?ijbgtrf=bWFyeV9tY2R1ZmZpZUBuYXZ5ZmVkZXJhbC5vcmc6OjU=
Frame ID: CE4151F7611D513A11888A0C656A9C9E
Requests: 12 HTTP requests in this frame
Frame:
https://imytnz.mortengass.cfd/common/Sign%20in%20to%20your%20account_files/prefetch(1).html
Frame ID: A4B8550AB81A6FD49CF41E22EF414DA4
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
Sign in to your accountPage URL History Show full URLs
-
https://rrgro-bgf.reignindustry.com/LJDlPIfqtZHU9bWljJmVydD1iV0Z5ZVY5dFkyUjFabVpwWlVCdVlYWjVabVZrWlhKaGJDNXZjbWM...
HTTP 302
https://navyfederal-onlineapp-szjwcsv12.glozzom.cfd/iloJ1CTf?wreply=/web/login?en=signin?client_id=p3JSMN&redirect_uri=https%3A%... Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://rrgro-bgf.reignindustry.com/LJDlPIfqtZHU9bWljJmVydD1iV0Z5ZVY5dFkyUjFabVpwWlVCdVlYWjVabVZrWlhKaGJDNXZjbWM9Jm10PTU=pthq
HTTP 302
https://navyfederal-onlineapp-szjwcsv12.glozzom.cfd/iloJ1CTf?wreply=/web/login?en=signin?client_id=p3JSMN&redirect_uri=https%3A%2F%2F%2FAuth%2FPostHandler&state=WfqdC0GS-fqgV-9yzC-JcvW-LVoAqsV9drRy&lc=&lc&id=xcQ56u&rdir=true&mkt=en-US&psi=&elld=bWFyeV9tY2R1ZmZpZUBuYXZ5ZmVkZXJhbC5vcmc=&lw=1 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
iloJ1CTf
navyfederal-onlineapp-szjwcsv12.glozzom.cfd/ Redirect Chain
|
192 KB 192 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.4.1.js
code.jquery.com/ |
274 KB 81 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index-m.php
imytnz.mortengass.cfd/common/ Frame CE41 |
41 KB 13 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.4.1.js
code.jquery.com/ Frame CE41 |
274 KB 81 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
imytnz.mortengass.cfd/common/ Frame CE41 |
98 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft_logo.svg
secure.aadcdn.microsoftonline-p.com/ests/2.1.8148.16/content/images/ Frame CE41 |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow_left.svg
logincdn.msauth.net/16.000.28345.6/images/ Frame CE41 |
513 B 752 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
documentation_bcb4d1dc4eae64f0b2b2538209d8435a.svg
aadcdn.msauth.net/shared/1.0/content/images/ Frame CE41 |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ellipsis_white.svg
secure.aadcdn.microsoftonline-p.com/ests/2.1.8148.16/content/images/ Frame CE41 |
915 B 641 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ellipsis_grey.svg
imytnz.mortengass.cfd/common/Sign%20in%20to%20your%20account_files/ Frame CE41 |
127 B 127 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ Frame CE41 |
5 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
prefetch(1).html
imytnz.mortengass.cfd/common/Sign%20in%20to%20your%20account_files/ Frame A4B8 |
127 B 339 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
bck.php
imytnz.mortengass.cfd/tools/ Frame CE41 |
72 B 365 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1WNx5X.jpg
iili.io/ Frame CE41 |
901 B 1 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1WNzen.md.jpg
iili.io/ Frame CE41 |
6 KB 7 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| structuredClone object| oncontextlost object| oncontextrestored string| crypt_data function| cryptor function| $ function| jQuery function| makeid function| action0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
6 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msauth.net
code.jquery.com
iili.io
imytnz.mortengass.cfd
logincdn.msauth.net
navyfederal-onlineapp-szjwcsv12.glozzom.cfd
rrgro-bgf.reignindustry.com
secure.aadcdn.microsoftonline-p.com
161.35.231.220
165.232.74.215
192.229.221.185
2001:4de0:ac18::1:a:2a
2606:4700:3038::6815:ead4
2620:1ec:bdf::45
2a02:26f0:e300:18e::35c1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