URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1...
Submission: On March 26 via api from US

Summary

This website contacted 69 IPs in 7 countries across 53 domains to perform 356 HTTP transactions. The main IP is 2606:4700::6811:7763, located in United States and belongs to CLOUDFLARENET, US. The main domain is www.darkreading.com.
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on January 28th 2020. Valid for: 8 months.
This is the only time www.darkreading.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 13 2606:4700::68... 13335 (CLOUDFLAR...)
2 2001:4de0:ac1... 20446 (HIGHWINDS3)
13 2606:4700:303... 13335 (CLOUDFLAR...)
2 2a00:1450:400... 15169 (GOOGLE)
3 2606:4700:303... 13335 (CLOUDFLAR...)
52 2606:4700:303... 13335 (CLOUDFLAR...)
3 2606:4700:303... 13335 (CLOUDFLAR...)
1 151.101.13.131 54113 (FASTLY)
3 2606:4700:303... 13335 (CLOUDFLAR...)
1 2a00:1450:400... 15169 (GOOGLE)
1 172.217.23.162 15169 (GOOGLE)
2 13.225.73.50 16509 (AMAZON-02)
1 3 52.212.4.209 16509 (AMAZON-02)
9 2606:2800:234... 15133 (EDGECAST)
2 2600:9000:20e... 16509 (AMAZON-02)
1 2606:2800:233... 15133 (EDGECAST)
12 13.224.194.146 16509 (AMAZON-02)
2 2606:4700:303... 13335 (CLOUDFLAR...)
2 15.188.105.205 16509 (AMAZON-02)
1 1 66.117.28.86 15224 (OMNITURE)
2 2a00:1450:400... 15169 (GOOGLE)
22 2a00:1450:400... 15169 (GOOGLE)
1 13.224.194.118 16509 (AMAZON-02)
12 172.217.16.194 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 4 172.227.85.103 16625 (AKAMAI-AS)
4 2a03:2880:f02... 32934 (FACEBOOK)
2 46.105.202.39 16276 (OVH)
13 2a00:1450:400... 15169 (GOOGLE)
2 2620:1ec:c11:... 8068 (MICROSOFT...)
1 34.241.125.133 16509 (AMAZON-02)
1 2 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
1 2600:9000:20e... 16509 (AMAZON-02)
1 2 2600:9000:21f... 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
54 95.101.185.246 20940 (AKAMAI-ASN1)
4 2a03:2880:f12... 32934 (FACEBOOK)
1 18.195.112.151 16509 (AMAZON-02)
2 2a00:1450:400... 15169 (GOOGLE)
1 13.227.156.115 16509 (AMAZON-02)
1 172.217.18.166 15169 (GOOGLE)
8 95.101.185.124 20940 (AKAMAI-ASN1)
1 6 52.16.75.38 16509 (AMAZON-02)
1 34.254.71.178 16509 (AMAZON-02)
2 13.224.194.122 16509 (AMAZON-02)
1 95.100.78.166 16625 (AKAMAI-AS)
1 2 2620:103::192... 19994 (RACKSPACE)
1 54.172.119.91 14618 (AMAZON-AES)
29 143.204.97.81 16509 (AMAZON-02)
2 216.58.206.2 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 107.23.162.230 14618 (AMAZON-AES)
1 2 142.0.160.13 7160 (NETDYNAMICS)
1 2 209.167.231.17 7160 (NETDYNAMICS)
1 142.0.173.134 7160 (NETDYNAMICS)
1 2606:2800:134... 15133 (EDGECAST)
1 2 104.244.42.200 13414 (TWITTER)
17 2606:2800:134... 15133 (EDGECAST)
11 34.227.6.166 14618 (AMAZON-AES)
2 23.210.248.12 16625 (AKAMAI-AS)
1 2a00:1450:400... 15169 (GOOGLE)
1 52.44.39.89 14618 (AMAZON-AES)
1 23.45.237.36 20940 (AKAMAI-ASN1)
2 2 35.190.72.21 15169 (GOOGLE)
2 2 52.215.109.156 16509 (AMAZON-02)
2 2 52.19.214.236 16509 (AMAZON-02)
1 3.122.214.165 16509 (AMAZON-02)
1 5 95.101.184.154 20940 (AKAMAI-ASN1)
1 3 52.30.34.11 16509 (AMAZON-02)
356 69
Apex Domain
Subdomains
Transfer
55 moatads.com
z.moatads.com
geo.moatads.com
px.moatads.com
893 KB
52 deusm.com
img.deusm.com
1 MB
41 celtra.com
ads.celtra.com
cache-ssl.celtra.com
track.celtra.com
227 KB
20 googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
517 KB
18 twimg.com
cdn.syndication.twimg.com
pbs.twimg.com
ton.twimg.com
154 KB
17 doubleclick.net
securepubads.g.doubleclick.net
googleads.g.doubleclick.net
stats.g.doubleclick.net
ad.doubleclick.net
googleads4.g.doubleclick.net
120 KB
14 googletagservices.com
www.googletagservices.com
330 KB
14 darkreading.com
www.darkreading.com
trk.darkreading.com
57 KB
13 twimgs.com
twimgs.com
102 KB
12 boltdns.net
cf-images.us-east-1.prod.boltdns.net
53 KB
11 twitter.com
platform.twitter.com
syndication.twitter.com
112 KB
10 teads.tv
a.teads.tv
t.teads.tv
sync.teads.tv
cdn2.teads.tv
192 KB
7 adroll.com
s.adroll.com
d.adroll.com
47 KB
7 ml314.com
ml314.com
in.ml314.com
15 KB
6 ubm-us.net
i.ubm-us.net
dsimg.ubm-us.net
72 KB
4 eloqua.com
s657486201.t.eloqua.com
s2150.t.eloqua.com
2 KB
4 facebook.com
www.facebook.com
300 B
4 facebook.net
connect.facebook.net
256 KB
4 scorecardresearch.com
sb.scorecardresearch.com
2 KB
4 techweb.com
ins.techweb.com
ng.techweb.com
3 KB
4 flipboard.com
cdn.flipboard.com
fpn.flipboard.com
6 KB
4 demdex.net
dpm.demdex.net
ubm.demdex.net
3 KB
4 bibblio.org
cdn.bibblio.org
api.bibblio.org
15 KB
3 gstatic.com
www.gstatic.com
fonts.gstatic.com
110 KB
3 cmpnet.com
i.cmpnet.com
67 KB
2 crwdcntrl.net
sync.crwdcntrl.net
1 KB
2 adsrvr.org
match.adsrvr.org
929 B
2 rlcdn.com
idsync.rlcdn.com
723 B
2 youtube.com
www.youtube.com
931 B
2 google-analytics.com
www.google-analytics.com
18 KB
2 bing.com
bat.bing.com
8 KB
2 heatmap.it
u.heatmap.it
11 KB
2 google.de
adservice.google.de
www.google.de
285 B
2 google.com
www.google.com
686 B
2 omtrdc.net
ubmtech.d3.sc.omtrdc.net
566 B
2 ubembed.com
6600d6d98e534115970f9529a45f3195.js.ubembed.com
assets.ubembed.com
47 KB
2 googleapis.com
fonts.googleapis.com
1 KB
1 consensu.org
d.adroll.mgr.consensu.org
137 B
1 eyeota.net
ps.eyeota.net
344 B
1 bluekai.com
tags.bluekai.com
1 ytimg.com
s.ytimg.com
14 KB
1 informa.com
assets.informa.com
12 KB
1 2mdn.net
s0.2mdn.net
233 KB
1 chartbeat.net
ping.chartbeat.net
168 B
1 en25.com
img.en25.com
3 KB
1 lightreading.com
img.lightreading.com
371 B
1 jquery.com
code.jquery.com
33 KB
1 chartbeat.com
static.chartbeat.com
14 KB
1 everesttech.net
cm.everesttech.net
554 B
1 linkedin.com
platform.linkedin.com
55 KB
1 googleadservices.com
www.googleadservices.com
10 KB
1 googletagmanager.com
www.googletagmanager.com
28 KB
1 bootstrapcdn.com
maxcdn.bootstrapcdn.com
7 KB
356 53
Domain Requested by
52 img.deusm.com www.darkreading.com
securepubads.g.doubleclick.net
www.google-analytics.com
45 px.moatads.com www.darkreading.com
29 cache-ssl.celtra.com ads.celtra.com
www.darkreading.com
14 pbs.twimg.com www.darkreading.com
platform.twitter.com
14 www.googletagservices.com www.darkreading.com
securepubads.g.doubleclick.net
www.googletagservices.com
ad.doubleclick.net
13 tpc.googlesyndication.com securepubads.g.doubleclick.net
ad.doubleclick.net
tpc.googlesyndication.com
www.darkreading.com
z.moatads.com
13 twimgs.com www.darkreading.com
securepubads.g.doubleclick.net
13 www.darkreading.com 2 redirects www.darkreading.com
img.deusm.com
12 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
www.darkreading.com
12 cf-images.us-east-1.prod.boltdns.net www.darkreading.com
11 track.celtra.com www.darkreading.com
9 z.moatads.com securepubads.g.doubleclick.net
9 platform.twitter.com www.darkreading.com
platform.twitter.com
7 pagead2.googlesyndication.com www.darkreading.com
securepubads.g.doubleclick.net
6 ml314.com 1 redirects z.moatads.com
ml314.com
www.darkreading.com
5 s.adroll.com 1 redirects www.darkreading.com
s.adroll.com
4 t.teads.tv www.darkreading.com
4 a.teads.tv securepubads.g.doubleclick.net
a.teads.tv
4 www.facebook.com www.darkreading.com
connect.facebook.net
4 connect.facebook.net www.darkreading.com
connect.facebook.net
4 sb.scorecardresearch.com 1 redirects www.darkreading.com
3 ton.twimg.com platform.twitter.com
www.darkreading.com
3 dpm.demdex.net 1 redirects i.cmpnet.com
www.darkreading.com
3 dsimg.ubm-us.net www.darkreading.com
3 i.cmpnet.com www.darkreading.com
3 i.ubm-us.net www.darkreading.com
2 d.adroll.com
2 sync.crwdcntrl.net 2 redirects
2 match.adsrvr.org 2 redirects
2 idsync.rlcdn.com 2 redirects
2 syndication.twitter.com 1 redirects www.darkreading.com
2 s2150.t.eloqua.com 1 redirects img.en25.com
2 s657486201.t.eloqua.com 1 redirects www.darkreading.com
2 googleads4.g.doubleclick.net ad.doubleclick.net
2 ng.techweb.com 1 redirects img.deusm.com
2 api.bibblio.org cdn.bibblio.org
www.darkreading.com
2 www.youtube.com i.ubm-us.net
www.darkreading.com
2 fpn.flipboard.com 1 redirects www.darkreading.com
2 fonts.gstatic.com www.darkreading.com
2 www.google-analytics.com 1 redirects www.googletagmanager.com
2 bat.bing.com www.darkreading.com
2 u.heatmap.it www.darkreading.com
u.heatmap.it
2 www.google.com dsimg.ubm-us.net
www.darkreading.com
2 ubmtech.d3.sc.omtrdc.net i.cmpnet.com
www.darkreading.com
2 ins.techweb.com www.darkreading.com
ins.techweb.com
2 cdn.flipboard.com www.darkreading.com
2 cdn.bibblio.org www.darkreading.com
2 fonts.googleapis.com www.darkreading.com
1 d.adroll.mgr.consensu.org 1 redirects
1 ps.eyeota.net www.darkreading.com
1 tags.bluekai.com www.darkreading.com
1 in.ml314.com ml314.com
1 s.ytimg.com www.youtube.com
1 cdn2.teads.tv www.darkreading.com
1 sync.teads.tv a.teads.tv
1 cdn.syndication.twimg.com platform.twitter.com
1 trk.darkreading.com www.darkreading.com
1 assets.informa.com www.googletagservices.com
1 s0.2mdn.net www.darkreading.com
1 ping.chartbeat.net www.darkreading.com
1 img.en25.com www.darkreading.com
1 geo.moatads.com z.moatads.com
1 ad.doubleclick.net www.googletagservices.com
1 img.lightreading.com www.darkreading.com
1 ads.celtra.com www.darkreading.com
1 code.jquery.com securepubads.g.doubleclick.net
1 stats.g.doubleclick.net www.darkreading.com
1 www.google.de www.darkreading.com
1 static.chartbeat.com www.darkreading.com
1 www.gstatic.com www.google.com
1 ubm.demdex.net i.cmpnet.com
1 googleads.g.doubleclick.net www.googleadservices.com
1 adservice.google.de www.googletagservices.com
1 assets.ubembed.com 6600d6d98e534115970f9529a45f3195.js.ubembed.com
1 cm.everesttech.net 1 redirects
1 platform.linkedin.com www.darkreading.com
1 www.googleadservices.com www.darkreading.com
1 www.googletagmanager.com www.darkreading.com
1 6600d6d98e534115970f9529a45f3195.js.ubembed.com www.darkreading.com
1 maxcdn.bootstrapcdn.com www.darkreading.com
356 80
Subject Issuer Validity Valid
darkreading.com
CloudFlare Inc ECC CA-2
2020-01-28 -
2020-10-09
8 months crt.sh
*.bootstrapcdn.com
Sectigo RSA Domain Validation Secure Server CA
2019-09-14 -
2020-10-13
a year crt.sh
sni.cloudflaressl.com
CloudFlare Inc ECC CA-2
2020-02-04 -
2020-10-09
8 months crt.sh
*.storage.googleapis.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
z.ssl.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2020-02-27 -
2020-08-07
5 months crt.sh
*.google-analytics.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
www.googleadservices.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
cdn.bibblio.org
Amazon
2019-07-18 -
2020-08-18
a year crt.sh
*.demdex.net
DigiCert SHA2 High Assurance Server CA
2018-01-09 -
2021-02-12
3 years crt.sh
*.twimg.com
DigiCert SHA2 High Assurance Server CA
2019-11-12 -
2020-11-18
a year crt.sh
*.flipboard.com
DigiCert SHA2 High Assurance Server CA
2019-11-02 -
2021-11-15
2 years crt.sh
platform.linkedin.com
DigiCert SHA2 Secure Server CA
2019-10-10 -
2021-10-14
2 years crt.sh
*.prod.boltdns.net
Amazon
2019-12-19 -
2021-01-19
a year crt.sh
*.d3.sc.omtrdc.net
DigiCert SHA2 High Assurance Server CA
2019-04-23 -
2020-04-14
a year crt.sh
www.google.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
*.g.doubleclick.net
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
assets.ubembed.com
Amazon
2019-05-02 -
2020-06-02
a year crt.sh
*.google.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
*.scorecardresearch.com
Sectigo RSA Organization Validation Secure Server CA
2019-12-16 -
2020-12-25
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2020-03-01 -
2020-05-30
3 months crt.sh
*.heatmap.it
Sectigo RSA Domain Validation Secure Server CA
2019-06-14 -
2020-06-26
a year crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
www.bing.com
Microsoft IT TLS CA 2
2019-04-30 -
2021-04-30
2 years crt.sh
*.chartbeat.com
Gandi Standard SSL CA 2
2019-04-10 -
2020-04-10
a year crt.sh
www.google.de
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
jquery.org
COMODO RSA Domain Validation Secure Server CA
2018-10-17 -
2020-10-16
2 years crt.sh
moatads.com
DigiCert SHA2 Secure Server CA
2020-01-17 -
2021-03-17
a year crt.sh
*.celtra.com
Go Daddy Secure Certificate Authority - G2
2018-05-15 -
2020-06-15
2 years crt.sh
*.lightreading.com
Amazon
2019-12-30 -
2021-01-30
a year crt.sh
*.doubleclick.net
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
teads.tv
Let's Encrypt Authority X3
2020-03-24 -
2020-06-22
3 months crt.sh
*.ml314.com
Amazon
2020-02-17 -
2021-03-17
a year crt.sh
*.moatads.com
DigiCert SHA2 Secure Server CA
2019-03-12 -
2021-06-10
2 years crt.sh
api.bibblio.org
Amazon
2019-11-05 -
2020-12-05
a year crt.sh
*.en25.com
DigiCert SHA2 Secure Server CA
2019-06-21 -
2020-08-19
a year crt.sh
ng.techweb.com
Let's Encrypt Authority X3
2020-01-22 -
2020-04-21
3 months crt.sh
*.chartbeat.net
Thawte RSA CA 2018
2019-12-16 -
2020-12-30
a year crt.sh
informa.com
Amazon
2019-05-21 -
2020-06-21
a year crt.sh
*.t.eloqua.com
DigiCert SHA2 Secure Server CA
2020-03-09 -
2022-04-08
2 years crt.sh
trk.darkreading.com
RapidSSL RSA CA 2018
2020-03-03 -
2021-03-03
a year crt.sh
syndication.twitter.com
DigiCert SHA2 High Assurance Server CA
2020-01-02 -
2020-12-24
a year crt.sh
odc-prod-01.oracle.com
DigiCert SHA2 Secure Server CA
2020-01-10 -
2021-04-10
a year crt.sh
*.eyeota.net
Let's Encrypt Authority X3
2020-02-10 -
2020-05-10
3 months crt.sh
*.adroll.com
DigiCert SHA2 Secure Server CA
2020-01-29 -
2021-04-29
a year crt.sh
adroll.mgr.consensu.org
Amazon
2019-11-06 -
2020-12-06
a year crt.sh

This page contains 26 frames:

Primary Page: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Frame ID: 0119272CF075A3EDB2AFE2A29F822AD4
Requests: 234 HTTP requests in this frame

Frame: https://ubm.demdex.net/dest5.html?d_nsid=0
Frame ID: B84B8EBCB5E624C60DF79606AB695ACB
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsumrU95vAW_lAWGMP00JOFuhvajzPCSdD2SGu_q5zo0275SRSR0lDn7EqPQ6f5eFiGPIM48KHKSWfOkxhpCLZheUfaSblNA_DrVlboi8FzE-BlC3_OiILxqLESyMEUhw8QWtpQel3-gAnAS-HbDTerb4fAPElqE3e9gAiJb_nZ2OGdYkTzIKWqyuGURWeIF1eHt_QC29lGst3HTfhoydLvzB79sDpjsgTqO8sAuGV-NAA_7LJjvmR2IegZH84h4_KrDRHlW3Qv-4LH5xtegaOoQO_1KsI_aRHX86sf_Sd1dymCcrrz3Iw&sai=AMfl-YTgGikS5X9IndfWKJPrC9XT5EgshCJygpaqQCmKMA9P1mWUFtmUEWAgOU7CyBIpldTc4b1gxi827iSIe_3fVsn2NISrZavovpwNuY1_Pw&sig=Cg0ArKJSzIftob_MJQ_qEAE&urlfix=1&adurl=
Frame ID: 0467C2C017A52133A4B7F3EE5A987999
Requests: 16 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsshLqdjwyJpUjEnb-Q-XXXz_r-5yBMkkDUv3C70jnXBU-h5_x8HVuyIKaK8ySvnALJ-yLxVFOYthHHZRj87xW1gqeiRxqXoV0LmVD_vNHaJbB4YJT4ywY2B8HZCDb3PmwyRkktfkyLnF2HgYrpJ2-GfcYuk_okjuK9O63E7jXd9DLp57E5jSvbU9DFnFhFCDfrc2rYhjGT8_fe4yM7ZxOVWSZ5lWSTu5TOoAo9A8PVzqLKyzTrqzVt-_12TISPPpH6CQSabR7ckJz1kXrq9Ua-8kMoZLBnxD1Sl&sai=AMfl-YRQV1U1Xc0y9G0YsAlZG-KXnhvZxzIOm6xDceNrTdqpUS_OFC4y4BhBvqUP4c5gfxbbDPjp34OkLtT5L7hXY8aTu6Gl68Y3H6FweXpcuw&sig=Cg0ArKJSzM73MAy3ngz2EAE&urlfix=1&adurl=
Frame ID: D0EBDB685102FE6051548E20BFAE9266
Requests: 16 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjst4B7h8bRCbSSHMlVlagfM2AXv9MQCsVaXR9x0MTKves9T_3kwwtgEWt4tpH1FhT8_g9dj3zMtofrYu9XQypa_11rsEVuu_hiJDAdhEaJSf75_KzQJ2XxoBePvaQLXi-HDc9ueiL2p9t1BxEI68FgCGDWEVlkTYGShJeCuEB529-0KjEhNxmSXBSOM0PTIBthGwHemiOiPjyVJiFZ4R23IK-Z25EV6AONygXCemt2Pa5Rz42GLBjHX9oH5YHGO6Nnz9Hs9xcoQ167OOJRthKC_7SpPWMrfwWy5s&sai=AMfl-YQFhfwsdmrMFqEBDDJXo4hG78mfLNPeWZCkultfrbbr2FbRi_ezHm2kPIbwY2-dHRTcaghh0qRE_34IcKmSE7hrI9bqvPu9iw93JnZB2Q&sig=Cg0ArKJSzIuYtjxhbmzoEAE&adurl=
Frame ID: 8608AC1B22AACF66E2E4D131EB537FEE
Requests: 7 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvuTuuFCunAJBt45q_CY8cKGg_9Dl2zcTKpAE2t_UK2YQlL_J1BEsXQvec-81BCGsHcnc9i8JCVNx0av_uVESB6Pj6rtHj2zHamM_0j-lpOWY-RnfgLWikR5_8tS-EOz-Bv5KMWPhZXstDMnDV5VKyw3dJmyjyuL5FYoOFKCaQmuoE9iRIrGGqW-nFK5T23exBgMdjs9EMRgUXOgATm6jn-0zxzyka3Ccn5ydv3xBGck3RHAOcXAl1AwsC1HXAi6mpV42k1mvAhkrIL7-tSsc5O1HMlVAYJLPeQdiuX&sai=AMfl-YRmSB-dw6K6zt-1SMcRxon9qGQZf46TVFke34f7P_v9lZL3dTFxGdnS4CeLNZOQs0Oyub7rEHIvxjoKhj6ye8ucGzUb7I6D8_ViQIfkUA&sig=Cg0ArKJSzAiA2fVS-9lREAE&urlfix=1&adurl=
Frame ID: E7B6A93BDB385FE75BC7CC6AEABBEDF5
Requests: 5 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstSMPkDZSStOw9AjnI4Q1ViVv1gQQqXZ3-naTvdvYh1uzOFgZAeWk_CiYZuQ6iKzGvo_mB6z8fB6NBkd1uzfYnIOiBwZWtSWIpdCV74p7JxEDXc9GHbwN3yNqSeARRZunBW-q1_GXtwalvNH9TSKH9wTT5R1fSTBxWd-YwdmqhYezSZOYrzMPmeheZBI1qX1lKEHtV1RQQWib-z2GoMhHGi3Ird9hscf9roMs9QKuqr0o2Apv8jOb9M7scuhXRhiwd46Yt1PQ0QYaC2HuDCQjswPSmkb54&sai=AMfl-YRuGmm1UVo43O6K9h_SVkZnxZDWy4t-pe8St-ddt28XKoqABtevWFsm8jJ_gXMFmJVWP03Z9VFlkzzADTFUFbRoZUJpctei99BXOUVUIg&sig=Cg0ArKJSzGdomvrF5vQmEAE&adurl=
Frame ID: 83ED49C1B40BABDBC7C68BF7B7A73EB3
Requests: 7 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjss961iXWFx5mDtOYjrFjcwYNJtXJ8LBVe9RPDXd1k8bXDT9DlgrUb4qb_8o2vzu4VI2dbkt6UYv1Da-rrUdyU8U_M77YkOFJ6U8qHN2TabTW--nwiNCJdR-6o-VpZkXci9VtmhsQdVwd8DlT2QuCDwrfG4qGMdj8lx0EQQBD1voShll9TUB0sDSTja7GPPomzsvQV2KmtbXT1FOfN4ezraCbxQ0xzfbPezwXKJu4DteT_qSGTGFTA1mLHOYIMmNo4KwI8Oh__iGR5WFpsd2p71VsjB_D1o&sai=AMfl-YTER1dZsrE-YVrrktON10J2UJiuzFtNHXXvYkS7LV-Yjt5_LK7MVSLmiwzYiyKLaN_vXO6C4qEcZe_U9gqZJT5sv-jweislVJ_JGtqN4A&sig=Cg0ArKJSzAvZUUZDxXRwEAE&adurl=
Frame ID: A75ADCE6E246232B31963E80D9110D8A
Requests: 6 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsthVQc1MoGvUfZLcE7sJspOjZdNscEVRnF-vBoffoZ6RL_v89fCTavn1A3_1BiuhbmSeX_afEOc94ZnsbO814GNqRHgQI9HIgoBcryxZCepu6Jgp0uqMz_Zi4HwZTuPUfMUs044q-TF-q0Nl7_verNNIuKixQicrQ_ZpU2x8LZOPtiBgOj-FRjDS9o9W40_cNafbst2N0KNddp5TdGcaSg1-qV6H6-VYy7xzwThc3y5EQKjAUNsIrFjm7iuMSsdAod5Mdc24pjlh-xWHPGACQ2iKn6Fh6kFcq8&sai=AMfl-YRDFf1Ade2cDX84cDJOjgCvT2dPnvHbymvpSxeUraHDY_8M9JJB26a21sjBlTx4skCg0IjHCnFtSVlRcv5wAEO8k2Xb8-xFHwaOKqKDtQ&sig=Cg0ArKJSzIB1zKOXHvQrEAE&urlfix=1&adurl=
Frame ID: 9CD36770156497336249FEDCEFFE8322
Requests: 3 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvlx9GosOQppApuTpII99Z6VCjdyi1G9LkCbxu88vLl3AM-SwB9RXjyvhv6AWkQY52gEbVRrfFbKdH3_h6DTz9U17cDze8948udrENmT7gDqsuT4Aq76iVyqzPjDhkpTFwpAuZVJOotUo1y8HC_ygps2SfkAYuZA71gdXcdrUL00m35tmR_Fkgd41R_UHergUTqxvkZdFOrGENFsN6rr83lYOSOVyv22xJC7nf6Wpda5faOfWiqHM2mMTcR_u9Yop7qxRPvVaWvSECM_7Ghhr9KNEaCOR0Gda4&sai=AMfl-YSbgAWxbVZM7B5tP40A8eKARrJ3lwmqTFYweiK8XM6y_amnrnygBBSprhtY039_kfAs8TN27V4YDwiGg6wLJJ3UMMSiROCb5tmEU9E55g&sig=Cg0ArKJSzBhaWv3bHclsEAE&urlfix=1&adurl=
Frame ID: CF73A486781B4123D484654E0049C388
Requests: 4 HTTP requests in this frame

Frame: https://www.youtube.com/embed/XUQYFHVg7UI?rel=0&showinfo=0
Frame ID: 0828DC71465B3F0D51E211EE514995AD
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvgrzuwW0ffo2eQYiUhh3JgjVj3kRzPr5ZKYtBTcTKXab5ee8alU77h2CWaJ0mLZt7sesyXmLWg1xpXQWU_S2pMvIhGsHisYGfArBKPAr-TMVgu4R3uz0jaRVdRWbdCjWO4Eq_Fw4urtcOhCPZjO6cNNrk3twEPHSRO6QvrE6NYVlG6KNaGDPeS5v892t0Ak1SU96nUsSrdgi8pe4B4WTFtD3W-vlOzsnx24rOG-WxrFjRLAxDTXp27cZB67UgbaPhCgaOFyjJ8nhBejGZOKtubowKQ_A&sai=AMfl-YRxmQHto6QenfhFHbBK2DSLLyOanc46HAWLc3tS5yGI-zHcQpiDeTyaVCZRMFih8_6At8edUDhlsDIO1PyG8MQ-NBj6VP4gkVs72nFAqw&sig=Cg0ArKJSzI7E8ASfjxiGEAE&urlfix=1&adurl=
Frame ID: 0341C598FCBF639FDFEEC651FCC3B791
Requests: 5 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/widget_iframe.d0f13be8321eb432fba28cfc1c3351b1.html?origin=https%3A%2F%2Fwww.darkreading.com
Frame ID: 9593D4136685F4D95B0BFEE8B354357D
Requests: 1 HTTP requests in this frame

Frame: https://www.facebook.com/plugins/like.php?app_id=640989409269461&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D46%23cb%3Dfc78fcc310077c%26domain%3Dwww.darkreading.com%26origin%3Dhttps%253A%252F%252Fwww.darkreading.com%252Ff3754e240d442%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&layout=button&locale=en_US&sdk=joey&send=false&show_faces=false&width=87
Frame ID: 236B564DFC9ED2C383FD243836756541
Requests: 1 HTTP requests in this frame

Frame: https://ins.techweb.com/beacon/record.do?a=68841bbbf037b3bd9eda236cfd0edcb96932f665438d7b833aaa994d869277ac&u=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%252Fd%252Fd-id%252F1336729&t=P
Frame ID: 61F8E82A464601A0B94DD1EBC41E9123
Requests: 1 HTTP requests in this frame

Frame: https://ng.techweb.com/authds/login/login.jsp?type=iframe&cdsocket_client=https://www.darkreading.com/cdsocket_proxy.html
Frame ID: A35868FB461E1801E6A1D3B010694AAF
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/Enqz_20U.html
Frame ID: E34D686639EF0D265CE7192D2D523F8D
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/tweet_button.d0f13be8321eb432fba28cfc1c3351b1.en.html
Frame ID: 89F220B4245151AB339C8D6FC178BF12
Requests: 1 HTTP requests in this frame

Frame: https://pbs.twimg.com/card_img/1242909366086520838/sMvA6z5o?format=jpg&name=144x144_2
Frame ID: F74C27E262E27AB58A74DE87FF723DDD
Requests: 19 HTTP requests in this frame

Frame: https://sync.teads.tv/iframe?pid=21882&userId=83a31af8-9227-4fc5-b43d-f5a747eb90c6&gdprIab={%22status%22:22,%22consent%22:%22%22,%22reason%22:220}&fromFormat=true&env=js-web&vid=95d9fe91-1fd5-4ce4-9919-66f57bf932db&1585227271311
Frame ID: C1E11D0C456A59E3BF65295671A053FE
Requests: 1 HTTP requests in this frame

Frame: https://a.teads.tv/media/format/v3/assets/default/player-sprite.svg
Frame ID: 386F3B7EF81A6EC24FA44B9C7FBCA932
Requests: 2 HTTP requests in this frame

Frame: data://truncated
Frame ID: 8A8AD23105D6E1805C402AEB77AD5EAE
Requests: 3 HTTP requests in this frame

Frame: https://fonts.googleapis.com/css?family=Lato:400&text=BCDEGILORSTUVW
Frame ID: 9F856D5609DDC41D7001F022733C79BF
Requests: 33 HTTP requests in this frame

Frame: https://platform.twitter.com/jot.html
Frame ID: 90CC2CCC031A22839E43FFFFA90AE450
Requests: 1 HTTP requests in this frame

Frame: https://www.darkreading.com/ng_initgatewaycheck.asp?init_gateway=true&httpscheck=true
Frame ID: A162B2C2421D6E9DAE21C72E23935144
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Frame ID: 4D83D3BBFD06BF3FB11116900207C3A9
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • script /ubembed\.com/i

Overall confidence: 100%
Detected patterns
  • script /chartbeat\.js/i

Overall confidence: 100%
Detected patterns
  • headers server /^cloudflare$/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Overall confidence: 100%
Detected patterns
  • script /\/s[_-]code.*\.js/i

Overall confidence: 100%
Detected patterns
  • script /\/\/platform\.twitter\.com\/widgets\.js/i

Overall confidence: 100%
Detected patterns
  • html /<iframe[^>]* (?:id="comscore"|scr=[^>]+comscore)|\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • script /\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i

Overall confidence: 100%
Detected patterns
  • script /jquery[.-]([\d.]*\d)[^/]*\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

356
Requests

100 %
HTTPS

46 %
IPv6

53
Domains

80
Subdomains

69
IPs

7
Countries

4927 kB
Transfer

11760 kB
Size

2
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 91
  • https://www.darkreading.com/client_pathlog.asp?p=%2Fdarkreading%2Fsection%2F314&f=%2Fdarkreading%2Fsection%2F314%2F1336729&rndserial=32069 HTTP 302
  • https://img.deusm.com/images/spacer.gif
Request Chain 96
  • https://cm.everesttech.net/cm/dd?d_uuid=07337755590199379744569472324685963239 HTTP 302
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=XnymBgAAAwJc-1L0 HTTP 302
  • https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=411&dpuuid=XnymBgAAAwJc-1L0
Request Chain 127
  • https://fpn.flipboard.com/pix/__fpn.gif?utm_source=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729 HTTP 307
  • https://fpn.flipboard.com/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fattacks-breaches%25252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%25252Fd%25252Fd-id%25252F1336729&rh=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%252Fd%252Fd-id%252F1336729
Request Chain 128
  • https://sb.scorecardresearch.com/b?c1=2&c2=3005435&ns__t=1585227270159&ns_c=windows-1252&cv=3.5&c8=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&c7=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=3005435&ns__t=1585227270159&ns_c=windows-1252&cv=3.5&c8=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&c7=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&c9=
Request Chain 136
  • https://www.google-analytics.com/r/collect?v=1&_v=j81&a=1230320910&t=pageview&_s=1&dl=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&ul=en-us&de=windows-1252&dt=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=IAhAAUAB~&jid=703436335&gjid=727260421&cid=750948819.1585227270&tid=UA-135180592-2&_gid=241002669.1585227270&_r=1&gtm=2ou3i0&z=275396943 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-135180592-2&cid=750948819.1585227270&jid=703436335&_gid=241002669.1585227270&gjid=727260421&_v=j81&z=275396943
Request Chain 216
  • https://s657486201.t.eloqua.com/visitor/v200/svrGP?pps=50&siteid=657486201&DLKey=7435f16d0b5c4189a89d0d109d2517f5&DLLookup=&ms=919&firstPartyCookieDomain=trk.darkreading.com HTTP 302
  • https://s657486201.t.eloqua.com/visitor/v200/svrGP.aspx?pps=50&siteid=657486201&DLKey=7435f16d0b5c4189a89d0d109d2517f5&DLLookup=&ms=919&firstPartyCookieDomain=trk.darkreading.com&elqCookie=1
Request Chain 217
  • https://s2150.t.eloqua.com/visitor/v200/svrGP?pps=3&siteid=2150&ref2=elqNone&tzo=-60&ms=919&optin=disabled&firstPartyCookieDomain=trk.darkreading.com HTTP 302
  • https://trk.darkreading.com/visitor/v200/svrGP.aspx?pps=3&siteid=2150&ref2=elqNone&tzo=-60&ms=919&optin=disabled&elq1pcGUID=21669A877CC34C64A0ECDC87B4DB6AC4
Request Chain 325
  • https://syndication.twitter.com/i/jot HTTP 302
  • https://platform.twitter.com/jot.html
Request Chain 333
  • https://idsync.rlcdn.com/395886.gif?partner_uid=3609131046399901769 HTTP 307
  • https://idsync.rlcdn.com/1000.gif?memo=CO6UGBIeChoIARCuXxoTMzYwOTEzMTA0NjM5OTkwMTc2ORAAGg0Iiszy8wUSBQjoBxAAQgBKAA HTTP 307
  • https://ml314.com/csync.ashx?fp=04a8f4b3c7bb2a52593cdda2e6cb963729f45129ec909c4319bd432ec2fdf1c2f4cb09cee1a4f8eb&person_id=3609131046399901769&eid=50082
Request Chain 334
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=d0tro1j&ttd_tpi=1 HTTP 302
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=d0tro1j&ttd_tpi=1 HTTP 302
  • https://ml314.com/utsync.ashx?eid=53819&et=0&fp=f2215868-7d37-4c1a-8e6d-a03ca9987b24 HTTP 302
  • https://ml314.com/csync.ashx?fp=f2215868-7d37-4c1a-8e6d-a03ca9987b24&person_id=3609131046399901769&eid=53819
Request Chain 335
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3609131046399901769 HTTP 302
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3609131046399901769 HTTP 302
  • https://ml314.com/csync.ashx?fp=4011677290683f63baa053dc76f0998b&eid=50146&person_id=3609131046399901769
Request Chain 339
  • https://www.darkreading.com/ng_initgatewaycheck.asp HTTP 301
  • https://ng.techweb.com/authds/gateway?gateway=true&return=https%3A%2F%2Fwww%2Edarkreading%2Ecom%2Fng%5Finitgatewaycheck%2Easp%3Finit%5Fgateway%3Dtrue%26httpscheck%3Dtrue HTTP 302
  • https://www.darkreading.com/ng_initgatewaycheck.asp?init_gateway=true&httpscheck=true
Request Chain 343
  • https://s.adroll.com/j/exp/TQSV74R4GVCSJITSZC2MCP/index.js HTTP 302
  • https://s.adroll.com/j/exp/index.js
Request Chain 345
  • https://d.adroll.mgr.consensu.org/consent/iabcheck/TQSV74R4GVCSJITSZC2MCP?_s=4b6153849a44cc3c25f30b24df882d85&_b=2 HTTP 302
  • https://d.adroll.com/consent/check/TQSV74R4GVCSJITSZC2MCP/?_s=4b6153849a44cc3c25f30b24df882d85&_b=2

356 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request 1336729
www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/
172 KB
31 KB
Document
General
Full URL
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7763 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
0ec83cc5d20f2bb3118b53e35814d4204fade9bd6ce3ee7e280dc109f653d406
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains

Request headers

:method
GET
:authority
www.darkreading.com
:scheme
https
:path
/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
document
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document

Response headers

status
200
date
Thu, 26 Mar 2020 12:54:29 GMT
content-type
text/html
set-cookie
__cfduid=d5d788539ee3586a5e849b95bca103a821585227268; expires=Sat, 25-Apr-20 12:54:28 GMT; path=/; domain=.darkreading.com; HttpOnly; SameSite=Lax darkreading_lastvisit=3/26/2020 8:54:28 AM; expires=Mon, 26-Mar-2035 12:54:28 GMT; path=/; HttpOnly darkreading_lastvisit=3/26/2020 8:54:28 AM; expires=Mon, 26-Mar-2035 12:54:28 GMT; path=/; HttpOnly cplChannelTagID=; path=/; secure darkreading%2Dmeter=1336729; expires=Fri, 27-Mar-2020 04:00:00 GMT; path=/ darkreading%5Fvisits=2; expires=Mon, 26-Mar-2035 04:00:00 GMT; path=/ gatewayChecked=; path=/; secure
vary
Accept-Encoding
cache-control
private
x-pingback
http://www.staging.new.informationweek.com/xmlrpc.asp
x-powered-by
ASP.NET
strict-transport-security
max-age=63072000; includeSubDomains
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
57a1053b98d6c2fe-FRA
content-encoding
gzip
font-awesome.min.css
maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/
30 KB
7 KB
Stylesheet
General
Full URL
https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4de0:ac19::1:b:3b , Netherlands, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
gzip
last-modified
Wed, 12 Dec 2018 18:35:20 GMT
access-control-allow-origin
*
etag
"1544639720"
vary
Accept-Encoding
x-cache
HIT
content-type
text/css; charset=utf-8
status
200
cache-control
public, max-age=31536000
x-hello-human
Say hello back! @getBootstrapCDN on Twitter
accept-ranges
bytes
timing-allow-origin
*
content-length
7050
common-footer.css
twimgs.com/nojitter/css/
9 KB
2 KB
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/common-footer.css?
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::681f:449e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3eea91bd1f33507891a2909689d21be3a6e0fb1b688037c2a7d59c042503d910

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 09 Jan 2020 06:37:35 GMT
server
cloudflare
age
3496
etag
W/"23cf-59baf3e93a9c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-ray
57a10541ba0fdfef-FRA
css
fonts.googleapis.com/
2 KB
684 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto+Slab:700
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
549f49487512850a6147e411ca138deb4d69f5b370e636147619992b45c77c2c
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
x-xss-protection
0
last-modified
Thu, 26 Mar 2020 12:54:29 GMT
server
ESF
date
Thu, 26 Mar 2020 12:54:29 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Thu, 26 Mar 2020 12:54:29 GMT
darkreading.css
twimgs.com/nojitter/css/
17 KB
3 KB
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/darkreading.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::681f:449e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
cf167be72549318f78f8c03d0d93b923f8e8e290acec47b870a1cede920e859b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 27 Apr 2017 09:38:14 GMT
server
cloudflare
age
2399
etag
W/"45f8-54e22b7428d80"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-ray
57a10541ba15dfef-FRA
pano-framework.css
www.darkreading.com/styles/
128 KB
10 KB
Stylesheet
General
Full URL
https://www.darkreading.com/styles/pano-framework.css?v1.27
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7763 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
a78d1a014ffb73ea1788d562070f9de9145793b25ebfb1d9e44b1ae3eb843b7a
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
gzip
cf-cache-status
HIT
age
1548
x-powered-by
ASP.NET
status
200
strict-transport-security
max-age=63072000; includeSubDomains
last-modified
Tue, 07 Jan 2020 07:22:37 GMT
server
cloudflare
etag
W/"8d7543d2bc5d51:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
cache-control
public, max-age=7200
cf-ray
57a105417aabc2fe-FRA
expires
Thu, 26 Mar 2020 14:54:29 GMT
styles.css
www.darkreading.com/styles/
292 B
306 B
Stylesheet
General
Full URL
https://www.darkreading.com/styles/styles.css?v7
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7763 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
a8fc74838ba253a4076b8eb46aeed79c10341380609dcfe11bed40d974d1fd10
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
gzip
cf-cache-status
HIT
age
6577
x-powered-by
ASP.NET
status
200
strict-transport-security
max-age=63072000; includeSubDomains
last-modified
Mon, 03 Apr 2017 14:07:01 GMT
server
cloudflare
etag
W/"d632e39083acd21:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
cache-control
public, max-age=7200
cf-ray
57a105417aacc2fe-FRA
expires
Thu, 26 Mar 2020 14:54:29 GMT
dr_nativead.css
i.ubm-us.net/oas/nativead/css/
2 KB
663 B
Stylesheet
General
Full URL
https://i.ubm-us.net/oas/nativead/css/dr_nativead.css?v3
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::6818:7975 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
f5932acd6c5f2796f354dedc5e8dfe30e206787365186bbf0f9789d083472a75

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 06 Feb 2019 18:48:56 GMT
server
cloudflare
age
5408
etag
W/"861-5813e2d913600"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-polished
origSize=2145
cf-ray
57a10541ba05dfef-FRA
cf-bgj
minify
nativead.js
i.ubm-us.net/oas/nativead/js/
1 KB
768 B
Script
General
Full URL
https://i.ubm-us.net/oas/nativead/js/nativead.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::6818:7975 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
984cd1fa5dd20c2b1b8fd77b6bb876a3a211cdf14aaaed6bc1481e3c98027544

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 30 Jul 2015 14:31:41 GMT
server
cloudflare
age
11470
cf-polished
origSize=1373
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
57a10541ba0ddfef-FRA
cf-bgj
minify
dr_nativead.js
i.ubm-us.net/oas/nativead/js/
8 KB
1 KB
Script
General
Full URL
https://i.ubm-us.net/oas/nativead/js/dr_nativead.js?v3
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::6818:7975 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
b309c9c4a6c27c7cfc64ab2bc7f545e8d7b41a795c46202ab2a9c633f7128287

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 06 Oct 2017 16:50:20 GMT
server
cloudflare
age
67399
cf-polished
origSize=8434
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
57a10541ba13dfef-FRA
cf-bgj
minify
respond.min.js
www.darkreading.com/script/
4 KB
2 KB
Script
General
Full URL
https://www.darkreading.com/script/respond.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7763 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
cf7bdb0487590885c13a3cc0a2a1450b3ac649a465de267af12f552be8bcb5fe
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
gzip
cf-cache-status
HIT
age
1548
x-powered-by
ASP.NET
status
200
last-modified
Mon, 22 Sep 2014 21:04:30 GMT
server
cloudflare
x-frame-options
SAMEORIGIN
etag
W/"03ccda8d6cf1:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
public, max-age=7200
cf-ray
57a105417aadc2fe-FRA
expires
Thu, 26 Mar 2020 14:54:29 GMT
jquery.mobile.custom.min.js
www.darkreading.com/script/
8 KB
3 KB
Script
General
Full URL
https://www.darkreading.com/script/jquery.mobile.custom.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7763 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
b4cf7d6d50b6a36f070f6c49e975198a9a8930838695b64e480bf1f6199f0572
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
gzip
cf-cache-status
HIT
age
7056
x-powered-by
ASP.NET
status
200
last-modified
Mon, 22 Sep 2014 21:04:30 GMT
server
cloudflare
x-frame-options
SAMEORIGIN
etag
W/"03ccda8d6cf1:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
public, max-age=7200
cf-ray
57a105418ab0c2fe-FRA
expires
Thu, 26 Mar 2020 14:54:29 GMT
complete.js
twimgs.com/nojitter/js/
45 KB
9 KB
Script
General
Full URL
https://twimgs.com/nojitter/js/complete.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::681f:449e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
8420f59cd348cf0e10e05482724523ad6b83f88467bbfacf6826eaadd3a03985

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 05 May 2017 06:04:53 GMT
server
cloudflare
age
14828
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
57a10541ba23dfef-FRA
jquery.mobile-1.4.5.js
img.deusm.com/darkreading/JQuery_Library/
256 KB
62 KB
Script
General
Full URL
https://img.deusm.com/darkreading/JQuery_Library/jquery.mobile-1.4.5.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a456c328bbb88fc991a5ddb80db492ec9e179a3ef443d50bf80b3fbbb5e8a7f7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Tue, 17 Mar 2020 04:33:16 GMT
server
cloudflare
age
6104
etag
W/"71b34-5a1056f31db00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cf-polished
origSize=465716
cf-ray
57a10541bb3a96bc-FRA
cf-bgj
minify
Jquery_3.4.1.js
img.deusm.com/darkreading/JQuery_Library/
140 KB
39 KB
Script
General
Full URL
https://img.deusm.com/darkreading/JQuery_Library/Jquery_3.4.1.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
d50d436889f46d5b9455690493e877e02ad30ea4dca963ffcaa3024c45c1d58c

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Mon, 16 Mar 2020 04:36:27 GMT
server
cloudflare
age
6104
etag
W/"47090-5a0f15cbce8c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cf-polished
origSize=290960
cf-ray
57a10541bb3b96bc-FRA
cf-bgj
minify
darkreading.js
img.deusm.com/darkreading/JQuery_Library/
20 KB
3 KB
Script
General
Full URL
https://img.deusm.com/darkreading/JQuery_Library/darkreading.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
74a584aafb20fa5524e8005c8f236bb47119e12225ac0d9e30d6c6ae69354808

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Mon, 16 Mar 2020 04:36:15 GMT
server
cloudflare
age
5635
etag
W/"6a97-5a0f15c05cdc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cf-polished
origSize=27287
cf-ray
57a10541bb4096bc-FRA
cf-bgj
minify
VisitorAPI.js
i.cmpnet.com/s_code/
45 KB
14 KB
Script
General
Full URL
https://i.cmpnet.com/s_code/VisitorAPI.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:9174 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
aa92b44ae441805b86a9603ffea3890a8df348fb2269d716c557b6970c11e9f4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 12 Feb 2020 19:20:49 GMT
server
cloudflare
age
12526
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
57a10541b89896e0-FRA
at.js
i.cmpnet.com/s_code/
106 KB
33 KB
Script
General
Full URL
https://i.cmpnet.com/s_code/at.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:9174 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
42eb48be2f9f6fc91fcda10af9802cb6aa0733e2dd007c224570ae6ece3dac33

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 12 Feb 2020 19:20:49 GMT
server
cloudflare
age
18620
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
57a10541b8a096e0-FRA
informa-iribbon.css
img.deusm.com/darkreading/
2 KB
848 B
Stylesheet
General
Full URL
https://img.deusm.com/darkreading/informa-iribbon.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
1ae4b8548f250831a2443bd449af625f6331b7c72e1f408789642a3050596d45

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
br
cf-cache-status
REVALIDATED
last-modified
Thu, 25 Apr 2019 07:05:41 GMT
server
cloudflare
etag
W/"cea-58755722bdb40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cf-polished
origSize=3306
cf-ray
57a10541bb3896bc-FRA
cf-bgj
minify
informa-iribbon.js
img.deusm.com/darkreading/
489 B
281 B
Script
General
Full URL
https://img.deusm.com/darkreading/informa-iribbon.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
fb295c2a72d39784b18a1d2d5b0c9976807f7cf010fe730b86d43bc55b0ae251

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
br
cf-cache-status
REVALIDATED
last-modified
Thu, 25 Apr 2019 07:05:52 GMT
server
cloudflare
etag
W/"229-5875572d3b400"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cf-polished
origSize=553
cf-ray
57a10541bb4496bc-FRA
cf-bgj
minify
cookie_banner.js
www.darkreading.com/script/
2 KB
807 B
Script
General
Full URL
https://www.darkreading.com/script/cookie_banner.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7763 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
020d8d4a55a5f088527c3c75c3ac4920b8f190393f841071d6f3d00807e07abc
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
gzip
cf-cache-status
HIT
age
6577
x-powered-by
ASP.NET
status
200
last-modified
Mon, 06 Jan 2020 08:32:43 GMT
server
cloudflare
x-frame-options
SAMEORIGIN
etag
W/"b753a1dd6bc4d51:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
public, max-age=7200
cf-ray
57a105418ab7c2fe-FRA
expires
Thu, 26 Mar 2020 14:54:29 GMT
/
6600d6d98e534115970f9529a45f3195.js.ubembed.com/
483 B
752 B
Script
General
Full URL
https://6600d6d98e534115970f9529a45f3195.js.ubembed.com/
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.13.131 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
3de15613d058c75b8a6e8222169cee309f0c65a37606fcacffba64e9a57bf02c

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
br
x-backend-region
eu_west_1
age
5903
etag
aaab40e12ca91eabbcb0f8f10bd5715a-v0.178.1
vary
Accept-Encoding
x-cache
Miss from cloudfront, HIT
content-type
application/json
status
200
cache-control
max-age=0, must-revalidate
access-control-allow-origin
*
x-amz-cf-pop
FRA54
accept-ranges
none
x-amz-apigw-id
J2StxFHujoEFaMA=
jplayer.blue.monday.css
twimgs.com/nojitter/css/
12 KB
3 KB
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/jplayer.blue.monday.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::681f:449e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0a4f12795a11d0957a7e476cdd2516967e3e00f54841456fbd8c0dd607984d92

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 05 May 2017 07:28:28 GMT
server
cloudflare
age
2766
etag
W/"2f89-54ec1d5e89f00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-ray
57a10541ba17dfef-FRA
style.css
twimgs.com/nojitter/css/
912 B
397 B
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/style.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::681f:449e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3a08be5766c0e198ba8171f7decd09065c08a5c850276325cc1792f25e7b356e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 05 May 2017 07:30:36 GMT
server
cloudflare
age
4727
etag
W/"390-54ec1dd89bf00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-ray
57a10541ba1ddfef-FRA
jquery.jplayer.min.js
twimgs.com/nojitter/js/
48 KB
11 KB
Script
General
Full URL
https://twimgs.com/nojitter/js/jquery.jplayer.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::681f:449e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
cddbf405266cd4b3e66229592e63666012dbceaaad02635af5da9d303bfd3ed1

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 27 Apr 2017 11:20:55 GMT
server
cloudflare
age
8681
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
57a10541ba2adfef-FRA
jquery.tablesorter.min.js
twimgs.com/nojitter/js/
16 KB
5 KB
Script
General
Full URL
https://twimgs.com/nojitter/js/jquery.tablesorter.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::681f:449e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
b90279154254e108748dc80dd226eab336e2c320e4a40569952b46dc5d785536

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 27 Apr 2017 11:21:05 GMT
server
cloudflare
age
8681
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
57a10541ba28dfef-FRA
ubm-widget-style.css
dsimg.ubm-us.net/ubm-widget/css/
29 KB
5 KB
Stylesheet
General
Full URL
https://dsimg.ubm-us.net/ubm-widget/css/ubm-widget-style.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3035::6818:7875 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
6414656f939f73a463499bd2c5a8f75793658adf6e05d0e4cd61d1ba36636b94

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 11 Apr 2018 16:31:21 GMT
server
cloudflare
age
7165
etag
W/"7393-569952b4c0840"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-polished
origSize=29587
cf-ray
57a10541bd936401-FRA
cf-bgj
minify
ubm-widget-min.js
dsimg.ubm-us.net/ubm-widget/js/
192 KB
50 KB
Script
General
Full URL
https://dsimg.ubm-us.net/ubm-widget/js/ubm-widget-min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3035::6818:7875 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
ffcaeef328a1e67717f714997426aaf936e4b9d378a5fbe1bd2a063dfeb50750

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 11 Apr 2018 17:29:33 GMT
server
cloudflare
age
7165
etag
W/"2fe99-56995fb6fbbe3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=14400
cf-ray
57a10541bd946401-FRA
ng_forms.js
www.darkreading.com/script/
31 KB
7 KB
Script
General
Full URL
https://www.darkreading.com/script/ng_forms.js?v7.9
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7763 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
ccb577fe731d9954057d10cd6d941eef90e15af6d1b0e4b1469f0ad3af3e84e4
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
gzip
cf-cache-status
HIT
age
6577
x-powered-by
ASP.NET
status
200
strict-transport-security
max-age=63072000; includeSubDomains
last-modified
Wed, 09 Oct 2019 05:19:47 GMT
server
cloudflare
etag
W/"d8d5ac2a617ed51:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
public, max-age=7200
cf-ray
57a105418abbc2fe-FRA
expires
Thu, 26 Mar 2020 14:54:29 GMT
widget-extra.css
twimgs.com/nojitter/css/
443 B
298 B
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/widget-extra.css?v1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::681f:449e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
61494fd1b573b217034bef7e22044bda91962797d68efada6726910d32bb995b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 13 Sep 2017 07:28:37 GMT
server
cloudflare
age
5637
etag
W/"1bb-5590d1ba81340"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-ray
57a10541ba1fdfef-FRA
js
www.googletagmanager.com/gtag/
75 KB
28 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=UA-135180592-2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
18375d659cf0fab2f2dde562f9d139f7695c0788d9e04bc966aade2082c88e47
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
br
status
200
strict-transport-security
max-age=31536000; includeSubDomains
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
28643
x-xss-protection
0
last-modified
Thu, 26 Mar 2020 12:00:00 GMT
server
Google Tag Manager
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
http://www.googletagmanager.com
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Thu, 26 Mar 2020 12:54:29 GMT
conversion.js
www.googleadservices.com/pagead/
25 KB
10 KB
Script
General
Full URL
https://www.googleadservices.com/pagead/conversion.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.162 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s22-in-f2.1e100.net
Software
cafe /
Resource Hash
4018efefc22b78a68e56b06c70e764df6429cbc4fb73961a92bbdd9d21dcaee3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
9877
x-xss-protection
0
server
cafe
etag
8752864327442515687
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Thu, 26 Mar 2020 12:54:29 GMT
adblockDetector.js
www.darkreading.com/prestitial/
118 B
224 B
Script
General
Full URL
https://www.darkreading.com/prestitial/adblockDetector.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7763 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
d61987a91f9b986e18af273a5aee45ec1256c64df947a156efa81dd96dce56df
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
gzip
cf-cache-status
HIT
age
1473
x-powered-by
ASP.NET
status
200
strict-transport-security
max-age=63072000; includeSubDomains
last-modified
Mon, 20 May 2019 09:07:27 GMT
server
cloudflare
etag
W/"46cb5f72ebed51:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
public, max-age=7200
cf-ray
57a10541ebcdc2fe-FRA
expires
Thu, 26 Mar 2020 14:54:29 GMT
iwk-it-network-dr.gif
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/iwk-it-network-dr.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
d6df7d1f2b9c65c06c5ae1e798650b6c388f26f6852b8814f942557d712b9745

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
cf-cache-status
HIT
last-modified
Wed, 02 Nov 2016 13:53:05 GMT
server
cloudflare
age
2395
etag
"abc-54051c29ab240"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
57a105441de896bc-FRA
content-length
2748
DR_mobile_User_nav.png
img.deusm.com/darkreading/
1 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_mobile_User_nav.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7b02cdb496b954e874c4b87d48eb1ea16f088258786ed0d2f0771acc3d01649e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:03 GMT
server
cloudflare
age
5635
etag
"5be-4f2ebd21a06c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a105443df596bc-FRA
content-length
1470
spacer.gif
img.deusm.com/images/
49 B
152 B
Image
General
Full URL
https://img.deusm.com/images/spacer.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3c5b83e390d046c3623c4b8e35b58aaf64a7481bb2372fb51ae2e0e7818f7407

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
cf-cache-status
HIT
last-modified
Fri, 13 Oct 2000 01:54:07 GMT
server
cloudflare
age
6102
etag
"31-3737c29f20dc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
57a105444e0796bc-FRA
content-length
49
DR_search.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_search.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
dafb72bcf008c9b9754482b88e8ba8b8e854f1a69483f0753b1c3f12101c1a9f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:03 GMT
server
cloudflare
age
2395
etag
"7e9-4f2ebd21a06c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a105447e5396bc-FRA
content-length
2025
DR_mobile_SM.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_mobile_SM.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
bfc1797e85a0565d0cfba1621eac801dc5ebd78a02f45e0ab8de5c6c2eb3f987

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:03 GMT
server
cloudflare
age
2394
etag
"864-4f2ebd21a06c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a105449e6b96bc-FRA
content-length
2148
DR-sections-nav.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-sections-nav.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
4f89a03faa36f0b6eeb92b9a8f0b8d2f9d3e564ba8bf13bb169bf05b126ca81e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:03 GMT
server
cloudflare
age
2394
etag
"9aa-4f2ebd21a06c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a10544be8b96bc-FRA
content-length
2474
mobile_close.jpg
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/mobile_close.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
b5c543f59d71e1e4f6b51c896febf86975206dcf9e34757f475b125d64d16ea6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
cf-cache-status
HIT
last-modified
Thu, 13 Mar 2014 12:44:20 GMT
server
cloudflare
age
2394
etag
"638-4f47c4fdf5100"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
57a10544ce9696bc-FRA
content-length
1592
DR_logo_314x49.png
img.deusm.com/darkreading/
7 KB
7 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_logo_314x49.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0615fb751c4db849533b1e432f05428e307591466902876f8ab30d7873b7f38b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
cf-cache-status
HIT
last-modified
Mon, 15 Oct 2018 10:02:43 GMT
server
cloudflare
age
2395
etag
"1b78-5784189c2b6f8"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a10544eeaf96bc-FRA
content-length
7032
DR_Newsletters.png
img.deusm.com/darkreading/
4 KB
4 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_Newsletters.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
33194e1b282eaf349b01b68de4fee20452ff6877b4b82605d5c68c5132444f96

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
cf-cache-status
HIT
last-modified
Wed, 18 Sep 2019 13:04:00 GMT
server
cloudflare
age
2395
etag
"fec-592d378715000"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a10544febd96bc-FRA
content-length
4076
bib-related-content.min.css
cdn.bibblio.org/rcm/4.9/
22 KB
4 KB
Stylesheet
General
Full URL
https://cdn.bibblio.org/rcm/4.9/bib-related-content.min.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.73.50 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-225-73-50.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
fa30597c8340ed18b045cc801a2dfb2e1185f9ca5ea02753e5935e64df5aa4c5

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Wed, 25 Mar 2020 19:57:53 GMT
content-encoding
gzip
last-modified
Fri, 20 Mar 2020 10:35:36 GMT
server
AmazonS3
age
60997
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/css
status
200
x-amz-cf-pop
FRA2-C2
x-amz-cf-id
FyRph-fCjwy3fVpGEpPA8cfCwiTW2zlvVRx9173JP_y90hp-3T6wIQ==
via
1.1 32e3b86ae254a231182567c0124af893.cloudfront.net (CloudFront)
bib-related-content.min.js
cdn.bibblio.org/rcm/4.9/
45 KB
11 KB
Script
General
Full URL
https://cdn.bibblio.org/rcm/4.9/bib-related-content.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.73.50 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-225-73-50.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
5b21d495e672a89a4d8dc047b17ab94531525297644c1a4340a2bc3f26ab782f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 19:17:44 GMT
content-encoding
gzip
last-modified
Fri, 20 Mar 2020 10:35:37 GMT
server
AmazonS3
age
63406
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-pop
FRA2-C2
x-amz-cf-id
YHVPnttQmaDwnuSNe_znYxNq9FGNRewTq3_3tEGXZMbdZHGxUg1TDg==
via
1.1 32e3b86ae254a231182567c0124af893.cloudfront.net (CloudFront)
Jai-Vijayan.jpg
img.deusm.com/informationweek/
11 KB
11 KB
Image
General
Full URL
https://img.deusm.com/informationweek/Jai-Vijayan.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2e9b6fed568a85ee88f1eb2aa1d51cb2073d907cbb0109a5dd703f0b1e5651d6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
cf-cache-status
HIT
last-modified
Mon, 29 Sep 2014 13:34:14 GMT
server
cloudflare
age
4864
etag
"2c67-5043452972180"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
57a105450ed296bc-FRA
content-length
11367
id
dpm.demdex.net/
362 B
1 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=3.1.2&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_orgid=77FB1CFE532B22840A490D45%40AdobeOrg&d_nsid=0&ts=1585227269465
Requested by
Host: i.cmpnet.com
URL: https://i.cmpnet.com/s_code/VisitorAPI.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.212.4.209 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-212-4-209.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ac5a54903559229fdd3e90996d429d60cc9ab7c81e9fadb54d5bdb672a352dd6
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Origin
https://www.darkreading.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v064-07ee7aa4c.edge-irl1.demdex.com 5.66.0.20200310121811 3ms (+1ms)
Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
Content-Encoding
gzip
X-TID
9yFMe1DdTXM=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://www.darkreading.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
299
Expires
Thu, 01 Jan 1970 00:00:00 GMT
editor-TW.png
img.deusm.com/informationweek/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/editor-TW.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
32821e69d091e71a62b9dbefcd09516c2133b50c50a3f8d597207d9cab5d59b8

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
cf-cache-status
HIT
last-modified
Thu, 14 Nov 2013 19:33:41 GMT
server
cloudflare
age
2397
etag
"60d-4eb2828b4cf40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a105452ee896bc-FRA
content-length
1549
editor-IN.png
img.deusm.com/informationweek/
1 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/editor-IN.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e5cc2027e2da5b3d553fba6a4d2d7276aafa604001e9b0321e18d1fd62b03b3f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
cf-cache-status
HIT
last-modified
Thu, 14 Nov 2013 19:33:41 GMT
server
cloudflare
age
3554
etag
"5b7-4eb2828b4cf40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a105453f0896bc-FRA
content-length
1463
editor-RSS.png
img.deusm.com/informationweek/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/editor-RSS.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a8f4fa7376444ffe05d0f7b296439401fb9729bdee84d760ee6286e7b663c753

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
cf-cache-status
HIT
last-modified
Thu, 14 Nov 2013 19:33:41 GMT
server
cloudflare
age
2396
etag
"6fa-4eb2828b4cf40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a105454f2796bc-FRA
content-length
1786
editor-email.png
img.deusm.com/informationweek/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/editor-email.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
190f689e0f479324a217a5ea88c1acc132b66d24b16559052d59b892ff5dcba2

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
cf-cache-status
HIT
last-modified
Thu, 14 Nov 2013 19:33:40 GMT
server
cloudflare
age
2396
etag
"70f-4eb2828a58d00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a105456f4c96bc-FRA
content-length
1807
DR-comment.png
img.deusm.com/darkreading/
1011 B
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-comment.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
63484bd691450c081b848e5159315bfcd02720741d3f72a69717643d6630e578

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:02 GMT
server
cloudflare
age
2041
etag
"3f3-4f2ebd20ac480"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a105458f6c96bc-FRA
content-length
1011
thumbs-up.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/thumbs-up.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0c9111d9514a49ad97e7c6d5fd97a00f3232b73537e9155726f32f123eb69b5a

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Fri, 14 Mar 2014 16:09:21 GMT
server
cloudflare
age
2398
etag
"607-4f4934ae90e40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a105458f6d96bc-FRA
content-length
1543
thumbs-down.png
img.deusm.com/informationweek/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/thumbs-down.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
b19f14d674857362b6e10d0dcb1703b149d9dda6f350d1737562fc36e4e67a81

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Wed, 20 Nov 2013 19:20:31 GMT
server
cloudflare
age
2398
etag
"624-4eba0acaa9dc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a105458f6f96bc-FRA
content-length
1572
email-decode.min.js
www.darkreading.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/
1 KB
807 B
Script
General
Full URL
https://www.darkreading.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7763 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2595496fe48df6fcf9b1bc57c29a744c121eb4dd11566466bc13d2e52e6bbcc8
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
gzip
vary
Accept-Encoding
last-modified
Mon, 23 Mar 2020 15:58:02 GMT
server
cloudflare
etag
W/"5e78dc8a-4d7"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
application/javascript
status
200
cache-control
max-age=172800, public
cf-ray
57a105430e5ec2fe-FRA
expires
Sat, 28 Mar 2020 12:54:29 GMT
widgets.js
platform.twitter.com/
96 KB
29 KB
Script
General
Full URL
https://platform.twitter.com/widgets.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/4191) /
Resource Hash
198c88313d65f4d2b30b218566c00f96002f78ae125643d5a73a669b46cab112

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 26 Mar 2020 12:54:29 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Mar 2020 21:21:21 GMT
Server
ECS (fcn/4191)
Age
1216
Etag
"3ce571864e8afdda3bc0a81ffbebe447+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Access-Control-Max-Age
3000
Cache-Control
public, max-age=1800
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
29105
flipboard_srsw.png
cdn.flipboard.com/badges/
322 B
763 B
Image
General
Full URL
https://cdn.flipboard.com/badges/flipboard_srsw.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:b800:e:5a70:ca47:86e1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
44fc0a3d10c47ae5aa6c77c76b4b8f81aa08022ca464ef235005ddd86570eb5b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 02:27:38 GMT
via
1.1 0f538ee832e1105649039b38ce89e883.cloudfront.net (CloudFront)
last-modified
Wed, 07 Feb 2018 22:03:59 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
atime:1518040945/ctime:1518040834/gid:20/gname:staff/md5:37351783e1813119a3e0710c16137273/mode:33152/mtime:1518064798/uid:502/uname:jlee
age
37613
etag
"37351783e1813119a3e0710c16137273"
x-cache
Hit from cloudfront
content-type
image/png
status
200
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-length
322
x-amz-cf-id
OJd7mBBY2FiFn-CdR_y7JgxnEZGzV56T4OVi54YWPoHW0mSfPgDkRQ==
flbuttons.min.js
cdn.flipboard.com/web/buttons/js/
7 KB
4 KB
Script
General
Full URL
https://cdn.flipboard.com/web/buttons/js/flbuttons.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:b800:e:5a70:ca47:86e1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
8e7ad8de87781f6ad65b36a7d3243b44d80dc182df6af076484a2bec85051550

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 07:29:01 GMT
content-encoding
gzip
last-modified
Wed, 11 Oct 2017 00:24:00 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:502/gname:staff/uname:alee/gid:20/mode:33188/mtime:1507680760/atime:1507680783/md5:ec6e4306e5e274d25c4f9afde663da81/ctime:1507680760
age
38941
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-pop
FRA2-C1
x-amz-cf-id
vO2IKUlB5ayZZdfEA1hZoG3m4PtaA69_9Ky8opa6kf85fBJlbcYsQw==
via
1.1 0f538ee832e1105649039b38ce89e883.cloudfront.net (CloudFront)
in.js
platform.linkedin.com/
181 KB
55 KB
Script
General
Full URL
https://platform.linkedin.com/in.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:66b5:799a:7cd3:f74d:7071 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (frc/8F0A) /
Resource Hash
3ae6a79f9e52460b9615a34cdee5a80ab2e3e936953e462d0bfe3d5d836502d7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
gzip
x-cdn-client-ip-version
IPV6
x-cdn
ECST
age
1088
x-cache
HIT
status
200
x-cdn-proto
HTTP2
nel
{"report_to":"network-errors","max_age":1296000,"success_fraction":0.00066,"failure_fraction":1,"include_subdomains":true}
x-li-pop
prod-eda6
content-length
55596
x-li-uuid
4jQYTNDa/xVAfPluVSsAAA==
last-modified
Thu, 26 Mar 2020 12:36:22 GMT
server
ECAcc (frc/8F0A)
vary
Accept-Encoding
report-to
{"group":"network-errors","max_age":2592000,"endpoints":[{"url":"https://www.linkedin.com/li/rep"}],"include_subdomains":true}
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=3600
accept-ranges
bytes
x-li-proto
http/1.1
x-li-fabric
prod-lva1
expires
Thu, 26 Mar 2020 13:36:22 GMT
Edgepromohorizontal.jpg
img.deusm.com/darkreading/MarilynCohodas/
12 KB
12 KB
Image
General
Full URL
https://img.deusm.com/darkreading/MarilynCohodas/Edgepromohorizontal.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7259b4d8e7ac33a579f3a8df3b0eb3fa9c0818ae203fb58b45564cf4d2057ca4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Tue, 27 Aug 2019 12:24:47 GMT
server
cloudflare
age
2040
etag
"2f0f-591185baf21c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
57a105458f7096bc-FRA
content-length
12047
DR-user.jpg
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-user.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
d4b95126382745e9e07d76812e3bbc8d6de2cfa6356c586f930ece7d4acb8052

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Tue, 04 Mar 2014 15:58:18 GMT
server
cloudflare
age
2395
etag
"97d-4f3c9f8faba80"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
57a105458f7196bc-FRA
content-length
2429
lightreading_cropped_635201064811931964.jpg
dsimg.ubm-us.net/user/15111803/86143/
14 KB
15 KB
Image
General
Full URL
https://dsimg.ubm-us.net/user/15111803/86143/lightreading_cropped_635201064811931964.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3035::6818:7875 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c23174343e12f3cc9db1f4e6c9ed2528206c45efec68825a90dff4719d966111

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
REVALIDATED
last-modified
Fri, 15 Nov 2013 15:01:21 GMT
server
cloudflare
etag
"3911-4eb38789b9240"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
cache-control
max-age=14400
accept-ranges
bytes
cf-ray
57a1054588f96401-FRA
content-length
14609
Kelly_Jackson_Higgins.jpg
twimgs.com/nojitter/informationweek/resources/images/
23 KB
24 KB
Image
General
Full URL
https://twimgs.com/nojitter/informationweek/resources/images/Kelly_Jackson_Higgins.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::681f:449e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
bf298157a19ff06a7b27a36eb4a3be2994016452a5f9c1ad6b480aa7ce3799ff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Wed, 12 Jul 2017 11:38:18 GMT
server
cloudflare
age
61901
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
cache-control
public, max-age=86400
accept-ranges
bytes
cf-ray
57a105458cb5dfef-FRA
content-length
24037
Robert-Lemos.png
img.deusm.com/darkreading/authors/
45 KB
46 KB
Image
General
Full URL
https://img.deusm.com/darkreading/authors/Robert-Lemos.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
87cdbacb358e421a482bc1a52dc9cfc04a9f6d8dfe86c7c6c66bcde013792850

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Wed, 12 Dec 2018 13:37:24 GMT
server
cloudflare
age
1905
etag
"b5d4-57cd34c52ed00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a105458f7296bc-FRA
content-length
46548
Sara-Peters-125x125.jpg
img.deusm.com/enterpriseefficiency/
27 KB
27 KB
Image
General
Full URL
https://img.deusm.com/enterpriseefficiency/Sara-Peters-125x125.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
4c611336fd66dfb1fe52805debfb7dc11fd1b7f1ef2eee5906e694b2e971cce1

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Wed, 26 Mar 2014 20:26:56 GMT
server
cloudflare
age
2039
etag
"6a74-4f5884a322400"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
57a105458f7496bc-FRA
content-length
27252
NL-icon.png
img.deusm.com/informationweek/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/informationweek/NL-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
d8b7ea5cc75abc79d502a95c5ccac8f97aa82fd8c13acc74c84c754eb86cc4c3

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Fri, 08 Nov 2013 15:09:43 GMT
server
cloudflare
age
2039
etag
"a27-4eaabc5a3dbc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a105458f7596bc-FRA
content-length
2599
video-arrow_left_off.gif
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/video-arrow_left_off.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
9f61400081191bf755c967c186a8fd356b02010fac3412f84cf83d5dfe10dd5d

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Fri, 14 Mar 2014 16:02:37 GMT
server
cloudflare
age
2039
etag
"53e-4f49332d48140"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
57a105458f7796bc-FRA
content-length
1342
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/fa726b0a-898c-4556-9c4e-8513ab3eb45d/11ab51b4-e776-4639-97c3-07e5210bfd9d/160x90/match/
3 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/fa726b0a-898c-4556-9c4e-8513ab3eb45d/11ab51b4-e776-4639-97c3-07e5210bfd9d/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.194.146 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-194-146.fra2.r.cloudfront.net
Software
/ BC
Resource Hash
fdb0066a030a45bd44f17d459c6369901b3fa648c94de3afa0f824d87dfd1527

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 26 Mar 2020 05:18:52 GMT
Via
1.1 adb1b226e6965f6206603ba087bd4a0a.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Age
27338
X-Powered-From
us-east-1c
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
f67NH1Qk20LMjRIx-MkzPfqBqZ-BqdkB0WnN7wTyNfcFAiUJsaAxXw==
comment.png
img.deusm.com/informationweek/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/informationweek/comment.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
4f65ccd30d1c95588b51035a804dd49090d7fbe6c2829a576a31d1b6a3e0f86b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Wed, 20 Nov 2013 19:22:53 GMT
server
cloudflare
age
1905
etag
"446-4eba0b5215d40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a105458f7a96bc-FRA
content-length
1094
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/2fe20654-2cfe-4555-8102-d79cc405847e/0e955e8e-0506-45e1-b715-3062ef29198b/160x90/match/
5 KB
5 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/2fe20654-2cfe-4555-8102-d79cc405847e/0e955e8e-0506-45e1-b715-3062ef29198b/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.194.146 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-194-146.fra2.r.cloudfront.net
Software
/ BC
Resource Hash
6dd394ad8df7d5e2ed0f220ff18451f281ccc907cae0d25d233c51533ad8887f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 26 Mar 2020 05:19:22 GMT
Via
1.1 59d92388a3a66e5f245f384a437fa025.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Age
27308
X-Powered-From
us-east-1a
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
F1OG_DQnQ8i8Q3Cb6qVwh4k4hqAEZUNFihtAr6moljXBpk4NGHZmaQ==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/c601c055-fcb3-4a63-98f8-d1882e680cbc/32d6c778-320c-47c4-91cf-4508cb0d5c40/160x90/match/
3 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/c601c055-fcb3-4a63-98f8-d1882e680cbc/32d6c778-320c-47c4-91cf-4508cb0d5c40/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.194.146 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-194-146.fra2.r.cloudfront.net
Software
/ BC
Resource Hash
01b4ebef3b601f246d0adbff5259fabbe7c8e0311f1169b495f0bb2b862db981

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 26 Mar 2020 05:54:49 GMT
Via
1.1 c28c128e9402fb070daca09bab68490a.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Age
25181
X-Powered-From
us-east-1d
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
Fy4lI_N8T4fBSEMp2n5RVMMCLQ22YDcw-05CnkG_HZ6Mamk77cM1jw==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/a7f317ff-8706-4af7-9f0e-9e2417e9af2d/29fd1a56-9d84-4424-bebd-e25a67a974d3/160x90/match/
4 KB
5 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/a7f317ff-8706-4af7-9f0e-9e2417e9af2d/29fd1a56-9d84-4424-bebd-e25a67a974d3/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.194.146 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-194-146.fra2.r.cloudfront.net
Software
/ BC
Resource Hash
eb12eaa9c690d06187a7099545a6bf52318a2364411fc9c4ec73e7fa4ecbb0f9

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 26 Mar 2020 01:54:02 GMT
Via
1.1 0f538ee832e1105649039b38ce89e883.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Age
39628
X-Powered-From
us-east-1d
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
NaEvLqpUTV6Wlhf_xWjiSdAnzr-Iho6kXWZLdoiPpE74VvfMqPmovQ==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/7d8fd3f5-736a-4751-9741-c63476a1c55f/9e10932e-22cf-4161-8f97-7ded08968b25/160x90/match/
4 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/7d8fd3f5-736a-4751-9741-c63476a1c55f/9e10932e-22cf-4161-8f97-7ded08968b25/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.194.146 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-194-146.fra2.r.cloudfront.net
Software
/ BC
Resource Hash
2ec7b8d3c38a996f67dd4e580c975ece3e9d936d4267167d12604a59a5ff2c87

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 22:21:01 GMT
Via
1.1 d8328954e51c0912a8419c1a67cea1dc.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Age
52409
X-Powered-From
us-east-1c
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
2e_7lJhAdELmhJSkH7r7WmMBGUKs1NcIxp7jPchlcKPFHXd2oxDuvQ==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/3afccae7-9c97-4434-b702-84e95b2c9e9b/213e62f9-b1ab-4368-a58c-5bf046478bff/160x90/match/
4 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/3afccae7-9c97-4434-b702-84e95b2c9e9b/213e62f9-b1ab-4368-a58c-5bf046478bff/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.194.146 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-194-146.fra2.r.cloudfront.net
Software
/ BC
Resource Hash
c670b28572ed7804386b274eb1ddafbc0253a1aff515b0d15805c57c26bcee64

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 26 Mar 2020 04:36:40 GMT
Via
1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Age
29870
X-Powered-From
us-east-1a
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
wNlQz7ufJOJkmtg-n-OKnigy_uHYyWyDgkUP6PPsjB4UX0pswjKDvQ==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/1d764395-3566-4875-8962-a175d38af9e5/main/160x90/2m58s368ms/match/
5 KB
5 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/1d764395-3566-4875-8962-a175d38af9e5/main/160x90/2m58s368ms/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.194.146 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-194-146.fra2.r.cloudfront.net
Software
/ BC
Resource Hash
f598a8748bf3e022bb3b431e6a0ad2b735d99b41288d56361dc9ce63b4e4d285

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 26 Mar 2020 03:06:18 GMT
Via
1.1 c28c128e9402fb070daca09bab68490a.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Age
35292
X-Powered-From
us-east-1d
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
nVZcm73a7xw30Bgx7qRvNkbekLdDNCz63rfeyYrPFWtYXuoSBJ2tdw==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/96082f18-026e-44fb-abf1-f81e163dc2f2/cb35f38f-1826-419f-a5e0-7e1971f4c1c6/160x90/match/
4 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/96082f18-026e-44fb-abf1-f81e163dc2f2/cb35f38f-1826-419f-a5e0-7e1971f4c1c6/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.194.146 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-194-146.fra2.r.cloudfront.net
Software
/ BC
Resource Hash
71c805ad1e5135a1d4dd9fccaa913bbdaf94cc3608d9619e5b546c1b865a2c16

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 26 Mar 2020 08:51:59 GMT
Via
1.1 59d92388a3a66e5f245f384a437fa025.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Age
14551
X-Powered-From
us-east-1e
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
0ObLkXmQyOLKY0jBQqZvXTKTg8uUd42KCBulGueIwhYulSoDR9YEbw==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/25c39f65-9707-4f3a-9f06-88fccdd69a43/main/160x90/4m39s829ms/match/
4 KB
5 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/25c39f65-9707-4f3a-9f06-88fccdd69a43/main/160x90/4m39s829ms/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.194.146 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-194-146.fra2.r.cloudfront.net
Software
/ BC
Resource Hash
20cbcc1c3a0b7c92033adbeb8f6f8b0cb03067db48a19f7116b40e8f2fbf8b3a

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 26 Mar 2020 03:24:31 GMT
Via
1.1 adb1b226e6965f6206603ba087bd4a0a.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Age
34199
X-Powered-From
us-east-1a
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
Hd8TEFxkdGOPLX9RJ1iuxonTDgdg3G37zoAzBbWpCD-TSwOXGnjXXA==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/d0e7fead-2e5a-4562-a430-556e3516311c/e5ff9746-37c2-40c4-bb2d-10e4ec8d3ad3/160x90/match/
4 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/d0e7fead-2e5a-4562-a430-556e3516311c/e5ff9746-37c2-40c4-bb2d-10e4ec8d3ad3/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.194.146 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-194-146.fra2.r.cloudfront.net
Software
/ BC
Resource Hash
9bb134ceb966cd6cbccfec7ab7dcb2fede6b0a5705e991030c0c248670d99168

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 26 Mar 2020 10:43:10 GMT
Via
1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Age
7880
X-Powered-From
us-east-1c
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
uEjM37Vx6aK_pl1yMwV4C3qFhMlZepbmcMIibSxtMQnI6asTgCtIIQ==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/c0da3834-c2d6-4c82-bef6-4ccdef7da688/911a7f6c-fc39-413a-bb28-272f6702ab8e/160x90/match/
4 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/c0da3834-c2d6-4c82-bef6-4ccdef7da688/911a7f6c-fc39-413a-bb28-272f6702ab8e/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.194.146 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-194-146.fra2.r.cloudfront.net
Software
/ BC
Resource Hash
731e7bf0e3b7c8fb1978a6c04ba3940b77ce5166bd55dcc2c710baa011c517c6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 26 Mar 2020 02:21:46 GMT
Via
1.1 0f538ee832e1105649039b38ce89e883.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Age
37963
X-Powered-From
us-east-1e
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
ja8gUQnQcbDFNWSJnSgTopMczz7FdFmhU92YNdxZX39fjo1R1W_08Q==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/d28d35f7-16e0-4c08-9500-8257f224764a/0c968b04-c649-44ca-96b7-867f99c5e6b4/160x90/match/
4 KB
5 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/d28d35f7-16e0-4c08-9500-8257f224764a/0c968b04-c649-44ca-96b7-867f99c5e6b4/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.194.146 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-194-146.fra2.r.cloudfront.net
Software
/ BC
Resource Hash
de309132f417ea1f43ee235841b11e40081e1ea204cbbf29b9c896dc3350dd64

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 26 Mar 2020 03:06:18 GMT
Via
1.1 d8328954e51c0912a8419c1a67cea1dc.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Age
35292
X-Powered-From
us-east-1e
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
o8IWcluLWFIOKwAlzk-qtVXJMkQnsCxqfxbzA3xkWNA5QkxSB-Om5A==
video-arrow_right_on.gif
img.deusm.com/darkreading/
2 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/video-arrow_right_on.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c7d1ee4f5a608fa05b8f9c6cbd47e3eab7516facc3380d704b7332805877afff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Fri, 14 Mar 2014 15:55:19 GMT
server
cloudflare
age
1904
etag
"9f7-4f49318b927c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
57a105458f7b96bc-FRA
content-length
2551
JK-FebruaryCartoon.jpg
img.deusm.com/darkreading/MarilynCohodas/
803 KB
804 KB
Image
General
Full URL
https://img.deusm.com/darkreading/MarilynCohodas/JK-FebruaryCartoon.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
d2cb9c5d8afc8f538bea2f545024ae5d6040d9a580d3bfc235189dd9953132af

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Wed, 12 Feb 2020 16:26:11 GMT
server
cloudflare
age
1904
etag
"c8bd3-59e636e2dcec0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
57a105458f7d96bc-FRA
content-length
822227
DRTD_Cover_6EmgThrts.jpg
twimgs.com/custom_content/
18 KB
18 KB
Image
General
Full URL
https://twimgs.com/custom_content/DRTD_Cover_6EmgThrts.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::681f:449e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c9886783680c77ed7e2778b4794cb6ba552c7722d66fc960415a95867094e4b8

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Fri, 13 Mar 2020 16:00:08 GMT
server
cloudflare
age
70423
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
cache-control
public, max-age=86400
accept-ranges
bytes
cf-ray
57a105458cb8dfef-FRA
content-length
18136
survey_jspage.asp
www.darkreading.com/
7 KB
1 KB
Script
General
Full URL
https://www.darkreading.com/survey_jspage.asp?survey_id=130&cbust=164875
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7763 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
47b3c860615f2e891107d75ab26407dc9029a16ee7bb76f7510c50a70688b2ef
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
cf-cache-status
DYNAMIC
server
cloudflare
x-powered-by
ASP.NET
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/html
status
200
cache-control
private
strict-transport-security
max-age=63072000; includeSubDomains
cf-ray
57a105434f15c2fe-FRA
DRRPT_CVR_IRChallenge.jpg
twimgs.com/custom_content/
17 KB
18 KB
Image
General
Full URL
https://twimgs.com/custom_content/DRRPT_CVR_IRChallenge.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::681f:449e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
ce6a7904aab17a50ea6a7d81ef58c0e92c7f40c7e44268a85839483559994661

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Fri, 13 Mar 2020 15:59:57 GMT
server
cloudflare
age
72800
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
cache-control
public, max-age=86400
accept-ranges
bytes
cf-ray
57a105458cbadfef-FRA
content-length
17894
DR-bug.png
img.deusm.com/darkreading/
1 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-bug.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
f30d5c0433d74c8224a2343a3c6c08468015909c22315b8693f9bdee33f48217

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:01 GMT
server
cloudflare
age
1904
etag
"5d2-4f2ebd1fb8240"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a105458f7e96bc-FRA
content-length
1490
Social-FB.png
img.deusm.com/darkreading/
2 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/Social-FB.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
fbb475f48d03815474a554d3c16599917c2fabf811e3fe2772aeabeee474aa8f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Fri, 11 Oct 2019 04:28:57 GMT
server
cloudflare
age
1904
etag
"9a2-5949af4d49440"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a105458f8196bc-FRA
content-length
2466
Social-Twitter.png
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/Social-Twitter.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0f762bf1a58c917c1ad50006bfcd192ab55b2d01a857b7c08b6c40e3af878695

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Fri, 11 Oct 2019 12:05:31 GMT
server
cloudflare
age
2036
etag
"a2c-594a155a3d8c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a105458f8396bc-FRA
content-length
2604
Social-LI.png
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/Social-LI.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
4bbed2de83df27dc8130644101bce3dd9ddd1c178815e42bcb49118b4a73593c

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Fri, 11 Oct 2019 12:05:08 GMT
server
cloudflare
age
2036
etag
"a0b-594a15444e500"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a105458f8596bc-FRA
content-length
2571
Social-Flip.png
img.deusm.com/darkreading/
825 B
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/Social-Flip.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
973ccce3f58b175a9e021c76978726083cc7e5cbed75cd0ff09ff83919934d15

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Wed, 16 Oct 2019 04:56:12 GMT
server
cloudflare
age
2036
etag
"339-594ffeb7d9300"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a105458f8f96bc-FRA
content-length
825
Social-RSS.png
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/Social-RSS.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a0761aa1289035f3d20430d55e475043a8fa40deff221715e31068905d561753

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Fri, 11 Oct 2019 12:05:19 GMT
server
cloudflare
age
5635
etag
"a73-594a154ecbdc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a105458f9196bc-FRA
content-length
2675
Whitelogo.png
twimgs.com/nojitter/img/
7 KB
7 KB
Image
General
Full URL
https://twimgs.com/nojitter/img/Whitelogo.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::681f:449e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a8041ba3d02102bd99dcead4dcc9882c484902362927cfd598e389e930f68ceb

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Thu, 09 Jan 2020 05:04:54 GMT
server
cloudflare
age
6469
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=86400
accept-ranges
bytes
cf-ray
57a105458cbcdfef-FRA
content-length
7304
ubm-tech-global-app-measurement.js
i.cmpnet.com/s_code/
56 KB
20 KB
Script
General
Full URL
https://i.cmpnet.com/s_code/ubm-tech-global-app-measurement.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:9174 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
924b3a471d549de6251aea0e74fe6eb136141d3f0a8bf001906fff933dec45d4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Sat, 14 Jul 2018 00:08:25 GMT
server
cloudflare
age
17489
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
57a105438aae96e0-FRA
spacer.gif
img.deusm.com/images/
Redirect Chain
  • https://www.darkreading.com/client_pathlog.asp?p=%2Fdarkreading%2Fsection%2F314&f=%2Fdarkreading%2Fsection%2F314%2F1336729&rndserial=32069
  • https://img.deusm.com/images/spacer.gif
49 B
157 B
Image
General
Full URL
https://img.deusm.com/images/spacer.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3c5b83e390d046c3623c4b8e35b58aaf64a7481bb2372fb51ae2e0e7818f7407

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Fri, 13 Oct 2000 01:54:07 GMT
server
cloudflare
age
6103
etag
"31-3737c29f20dc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
57a1054a3c7e96bc-FRA
content-length
49

Redirect headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
DYNAMIC
server
cloudflare
status
302
x-powered-by
ASP.NET
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=63072000; includeSubDomains
content-type
text/html
location
https://img.deusm.com/images/spacer.gif
cache-control
private
cf-ray
57a105458cc3c2fe-FRA
lightreading_rating_dot_10x7.gif
img.deusm.com/lightreading/
49 B
152 B
Image
General
Full URL
https://img.deusm.com/lightreading/lightreading_rating_dot_10x7.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3c5b83e390d046c3623c4b8e35b58aaf64a7481bb2372fb51ae2e0e7818f7407

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Wed, 25 Sep 2013 21:21:36 GMT
server
cloudflare
age
2035
etag
"31-4e73bd694b800"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
57a105458f9296bc-FRA
content-length
49
twitter_intevol_18x18.gif
img.deusm.com/darkreading/
619 B
724 B
Image
General
Full URL
https://img.deusm.com/darkreading/twitter_intevol_18x18.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
ebe3a0272a317857bf566a0deec42181bf0e89d280bb3143bba14da1ae1ddb10

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Fri, 09 Feb 2018 10:56:35 GMT
server
cloudflare
age
1903
etag
"26b-564c561c21ec0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
57a105458f9496bc-FRA
content-length
619
beacon-min.js
ins.techweb.com/beacon/js/
6 KB
2 KB
Script
General
Full URL
https://ins.techweb.com/beacon/js/beacon-min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6812:29f2 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a290ede885635a3f7bb2b8e630bf795f15dde146fea32520b775bee1b2926ff3

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 23 Mar 2017 17:04:42 GMT
server
cloudflare
age
6114
etag
W/"6108-1490288682000"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
p3p
CP='IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT'
status
200
cache-control
max-age=14400
cf-ray
57a10543f83363d7-FRA
content-type
application/javascript
id
ubmtech.d3.sc.omtrdc.net/
2 B
321 B
XHR
General
Full URL
https://ubmtech.d3.sc.omtrdc.net/id?d_visid_ver=3.1.2&d_fieldgroup=A&mcorgid=77FB1CFE532B22840A490D45%40AdobeOrg&mid=03504492879460757173574144929457086740&ts=1585227269615
Requested by
Host: i.cmpnet.com
URL: https://i.cmpnet.com/s_code/VisitorAPI.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
15.188.105.205 Paris, France, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-15-188-105-205.eu-west-3.compute.amazonaws.com
Software
jag /
Resource Hash
44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Origin
https://www.darkreading.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

status
200
date
Thu, 26 Mar 2020 12:54:29 GMT
x-content-type-options
nosniff
server
jag
xserver
anedge-5cd6d4f775-bkxsv
vary
Origin
x-c
master-1216.I0bfb28.M0-370
p3p
CP="This is not a P3P policy"
access-control-allow-origin
https://www.darkreading.com
cache-control
no-cache, no-store, max-age=0, no-transform, private
access-control-allow-credentials
true
content-type
application/x-javascript;charset=utf-8
content-length
2
x-xss-protection
1; mode=block
demconf.jpg
dpm.demdex.net/
Redirect Chain
  • https://cm.everesttech.net/cm/dd?d_uuid=07337755590199379744569472324685963239
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=XnymBgAAAwJc-1L0
  • https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=411&dpuuid=XnymBgAAAwJc-1L0
42 B
915 B
Image
General
Full URL
https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=411&dpuuid=XnymBgAAAwJc-1L0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.212.4.209 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-212-4-209.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

DCS
dcs-prod-irl1-v064-0ccfced6e.edge-irl1.demdex.com 5.66.0.20200310121811 1ms (+0ms)
Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Content-Type-Options
nosniff
X-TID
bretvqO/QXE=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT

Redirect headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-TID
AZ3veKzDQ50=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Location
https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=411&dpuuid=XnymBgAAAwJc-1L0
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Length
0
Expires
Thu, 01 Jan 1970 00:00:00 GMT
api.js
www.google.com/recaptcha/
729 B
572 B
Script
General
Full URL
https://www.google.com/recaptcha/api.js?onload=rcCallback&render=explicit
Requested by
Host: dsimg.ubm-us.net
URL: https://dsimg.ubm-us.net/ubm-widget/js/ubm-widget-min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
5a78895d15e3c7bff826b273a83a627d792232379892b4cd3b18212d945d7481
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self'
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
GSE
x-frame-options
SAMEORIGIN
content-type
text/javascript; charset=UTF-8
status
200
cache-control
private, max-age=300
content-security-policy
frame-ancestors 'self'
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
469
x-xss-protection
1; mode=block
expires
Thu, 26 Mar 2020 12:54:30 GMT
gpt.js
www.googletagservices.com/tag/js/
43 KB
14 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
2ad6f11aca9703e03bfe4c7bfc653ed76c80da9ead9eb8fbd4c4f883e967caba
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Sec-Fetch-Dest
script
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"467 / 144 of 1000 / last-modified: 1585081309"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
14458
x-xss-protection
0
expires
Thu, 26 Mar 2020 12:54:29 GMT
bundle.js
assets.ubembed.com/universalscript/releases/v0.178.1/
162 KB
46 KB
Script
General
Full URL
https://assets.ubembed.com/universalscript/releases/v0.178.1/bundle.js
Requested by
Host: 6600d6d98e534115970f9529a45f3195.js.ubembed.com
URL: https://6600d6d98e534115970f9529a45f3195.js.ubembed.com/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.194.118 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-194-118.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
df25786bc3951d78d0f763a2a75a1f33b01b8ae2a5157831d2cf4d0348c2ede7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 18 Mar 2020 05:01:28 GMT
content-encoding
gzip
last-modified
Wed, 11 Dec 2019 22:14:50 GMT
server
AmazonS3
age
719583
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA2-C1
x-amz-cf-id
4bKoFLFYBwIww22vXtu2dwzUo_PiOpWztakkPwa5pa4UV1i5dErh_w==
via
1.1 f797fc0ae68a3abc35e081e46174c9f2.cloudfront.net (CloudFront)
pubads_impl_2020030501.js
securepubads.g.doubleclick.net/gpt/
165 KB
60 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
sffe /
Resource Hash
8ee04e0441c9e51785d17ac835a93cf4d30d90826f87350b42ba233496a26f55
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Sec-Fetch-Dest
script
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 05 Mar 2020 14:08:10 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
61481
x-xss-protection
0
expires
Thu, 26 Mar 2020 12:54:29 GMT
integrator.sync.js
adservice.google.de/adsid/
113 B
175 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.sync.js?domain=www.darkreading.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ea03bfd7fdda1eac185ebc3e8e74b33065b04c8e0adc48cbbd4136748dbd2742
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
108
x-xss-protection
0
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
172.227.85.103 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a172-227-85-103.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a256529bd5b1b8846f8d2536ce7581fb6cea4479992f222d01535903dff48d79

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 26 Mar 2020 12:54:30 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
884
Expires
Fri, 27 Mar 2020 12:54:30 GMT
fbevents.js
connect.facebook.net/en_US/
126 KB
30 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
5a91c6d3e635c0bd1551a53cf0769328132151a7732039170280d500dbcb4685
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-27=":443"; ma=3600
content-length
30466
x-xss-protection
0
pragma
public
x-fb-debug
1FKeFloXYdX4wxmh2Yy0q+W6N0Wy+mPjHYTdib/N7b7p0XV09LxH1Q81zYd5wrRLU2TCG9rRocQ38YZrok1RlA==
x-fb-trip-id
1850256238
date
Thu, 26 Mar 2020 12:54:30 GMT, Thu, 26 Mar 2020 12:54:30 GMT
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
vary
Accept-Encoding
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
log.js
u.heatmap.it/
27 KB
11 KB
Script
General
Full URL
https://u.heatmap.it/log.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
46.105.202.39 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
/
Resource Hash
f851a9c6eb2bc09da1f51b84e5d218efa514d76c6fa53e803f22ad7dca9f93cf

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 15:50:25 GMT
content-encoding
br
last-modified
Fri, 28 Feb 2020 13:51:05 GMT
x-cdn-pop-ip
51.254.41.128/26
etag
W/"5e591ac9-6b00"
x-cacheable
Matched cache
vary
Accept-Encoding
content-type
application/x-javascript; charset=UTF-8
status
200
cache-control
max-age=3600
x-cdn-pop
rbx1
accept-ranges
bytes
content-length
10520
x-request-id
893095992
expires
Wed, 25 Mar 2020 16:50:26 GMT
background-pattern.png
img.deusm.com/darkreading/
493 B
702 B
Image
General
Full URL
https://img.deusm.com/darkreading/background-pattern.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
98fb88ec226feae902fb7f98528a41db7abd7de155a6d7b65658c6ab7f2b95f4

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.27
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:01 GMT
server
cloudflare
age
1906
etag
"1ed-4f2ebd1fb8240"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a105458f9796bc-FRA
content-length
493
iribbon-logo.gif
twimgs.com/nojitter/gama/
2 KB
2 KB
Image
General
Full URL
https://twimgs.com/nojitter/gama/iribbon-logo.gif
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::681f:449e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
f3bd482cd3ec17583f25ad0819d1ccbcd0cdcb0fe26f8d87b7f30fd61b3dc640

Request headers

Referer
https://img.deusm.com/darkreading/informa-iribbon.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Fri, 19 Apr 2019 06:59:19 GMT
server
cloudflare
age
6704
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
public, max-age=86400
accept-ranges
bytes
cf-ray
57a105458cbddfef-FRA
content-length
1931
ads
securepubads.g.doubleclick.net/gampad/
85 KB
19 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=1335525645972433&correlator=1333046469582029&output=ldjh&impl=fifs&adsid=NT&eid=21061507%2C21065391%2C21065392%2C21065517&vrg=2020030501&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200326&iu_parts=2441%2Cdarkreading%2Cattacks_breaches&enc_prev_ius=%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2&prev_iu_szs=2x2%2C5x5%2C300x250%7C336x280%7C300x600%7C336x850%2C6x6%2C1x2%2C728x90%7C970x250%2C336x27%2C300x250%7C336x280%7C300x600%7C336x850%2C300x60%2C3x3%2C4x4%2C8x2%2C8x4&csp=testAd%3D&prev_scp=pos%3Dwelcome%7Cpos%3DTAPunit%7Cpos%3Drec1%7Cpos%3Dpromo%7Cpos%3Dwallpaper%7Cpos%3Dtop%7Cpos%3Dlogo%7Cpos%3Drec2%7Cpos%3Deventpromo%7Cpos%3Dribbon%7Cpos%3Dvideo%7Cpos%3Dnative%7Cpos%3Dinsight&cust_params=kw%3DAdvanced_Threats%252CAttacks%252CAttacks-Breaches%252CBanking-Finance%252CBreaches%26aid%3D1336729&cookie_enabled=1&bc=31&abxe=1&lmt=1585227270&dt=1585227270014&dlt=1585227269332&idt=650&frm=20&biw=1600&bih=1200&oid=3&adxs=0%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9&adys=35%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9&adks=1417865500%2C2285942263%2C4220632109%2C4159207384%2C2332965166%2C2966194094%2C2269036440%2C4220632108%2C1032152201%2C885452677%2C693593060%2C929715771%2C3939335409&ucis=1%7C2%7C3%7C4%7C5%7C6%7C7%7C8%7C9%7Ca%7Cb%7Cc%7Cd&ifi=1&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&dssz=44&icsg=4123181199912&std=0&csl=80&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1600x1200%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1&msz=1600x2%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1&ga_vid=750948819.1585227270&ga_sid=1585227270&ga_hid=1230320910&fws=0%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2&ohw=0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
387a9a14daadb8afaf15d90eaaf75d4e64beab4c0dce5cc2910c00bb45630617
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Origin
https://www.darkreading.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
19419
x-xss-protection
0
google-lineitem-id
5307825743,5296245972,5296245972,-2,5296245972,5327285441,-2,5334439834,-2,-2,42403476,5327424477,5324259748
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138306474687,138304748693,138304213647,-2,138304147575,138306663349,-2,138307481617,-2,-2,138212589663,138306392388,138305900297
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.darkreading.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2020030501.js
securepubads.g.doubleclick.net/gpt/
69 KB
25 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
sffe /
Resource Hash
ffdc18ac8f47bcd50dd9c33532c334e7073717a62b367d95b9cb1561048547dc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 05 Mar 2020 14:08:10 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
25689
x-xss-protection
0
expires
Thu, 26 Mar 2020 12:54:30 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
empty

Response headers

/
googleads.g.doubleclick.net/pagead/viewthroughconversion/1007530244/
2 KB
1 KB
Script
General
Full URL
https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1007530244/?random=1585227270030&cv=9&fst=1585227270030&num=1&guid=ON&resp=GooglemKTybQhCsO&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=60&u_java=false&u_nplug=0&u_nmime=0&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&tiba=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&hn=www.googleadservices.com&rfmt=3&fmt=4
Requested by
Host: www.googleadservices.com
URL: https://www.googleadservices.com/pagead/conversion.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
80d63128814950dd3d8f7155025138afc80b6dfde4f2832f328214bec3bf9a92
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
text/javascript; charset=UTF-8
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
no-cache, must-revalidate
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
1076
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
bat.js
bat.bing.com/
24 KB
8 KB
Script
General
Full URL
https://bat.bing.com/bat.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:c11::200 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
0d0cbd713d59b1214b24864c2d86699c88d951162983b8e20011a8738be20589

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:29 GMT
content-encoding
gzip
last-modified
Thu, 19 Mar 2020 02:21:04 GMT
x-msedge-ref
Ref A: D9324F3C9C004CC586002E40B20F780A Ref B: FRAEDGE0915 Ref C: 2020-03-26T12:54:30Z
access-control-allow-origin
*
etag
"0682da95fdd51:0"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
private,max-age=1800
accept-ranges
bytes
content-length
7461
all.js
connect.facebook.net/en_US/
3 KB
2 KB
Script
General
Full URL
https://connect.facebook.net/en_US/all.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
e3bd1c858f571522b26aa777b27cd87b228635902a500034112fe19a860f68ac
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
DESqnG4+rx8ciUIG+E5Rag==
status
200
date
Thu, 26 Mar 2020 12:54:30 GMT, Thu, 26 Mar 2020 12:54:30 GMT
expires
Thu, 26 Mar 2020 13:08:19 GMT
alt-svc
h3-27=":443"; ma=3600
content-length
1781
x-fb-debug
YXYzZcNi7aDJendgxGTvmFSXQHh8n1BTI4JhXVZDC8EGLC+M+UJlbvFS/byvEyu6j81HY+6ZlCWIZzwh7KNJPA==
x-fb-trip-id
1850256238
x-fb-content-md5
99d256365b7f97c3c14b4600f525b90c
etag
"a9abcad7194eed4d05fc04a719558ddc"
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public,max-age=1200,stale-while-revalidate=3600
timing-allow-origin
*
access-control-expose-headers
X-FB-Content-MD5
Cookie set dest5.html
ubm.demdex.net/ Frame B84B
0
0
Document
General
Full URL
https://ubm.demdex.net/dest5.html?d_nsid=0
Requested by
Host: i.cmpnet.com
URL: https://i.cmpnet.com/s_code/VisitorAPI.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.241.125.133 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-34-241-125-133.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Host
ubm.demdex.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
demdex=07337755590199379744569472324685963239
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729

Response headers

Accept-Ranges
bytes
Cache-Control
max-age=21600
Content-Encoding
gzip
Content-Type
text/html
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified
Wed, 18 Mar 2020 11:39:41 GMT
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Pragma
no-cache
Set-Cookie
demdex=07337755590199379744569472324685963239;Path=/;Domain=.demdex.net;Expires=Tue, 22-Sep-2020 12:54:30 GMT;Max-Age=15552000;Secure;SameSite=None
Strict-Transport-Security
max-age=31536000; includeSubDomains
Vary
Accept-Encoding, User-Agent
X-TID
sON41gScRyw=
Content-Length
2785
Connection
keep-alive
analytics.js
www.google-analytics.com/
44 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=UA-135180592-2
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
eaf1b128b927ac2868755cb7366d35554255c8af362235afe270f9614f8c806d
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 06 Feb 2020 00:21:02 GMT
server
Golfe2
age
955
date
Thu, 26 Mar 2020 12:38:35 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
18174
expires
Thu, 26 Mar 2020 14:38:35 GMT
recaptcha__en.js
www.gstatic.com/recaptcha/releases/P6KLRNy7h3K160ZmYNUOAce7/
260 KB
93 KB
Script
General
Full URL
https://www.gstatic.com/recaptcha/releases/P6KLRNy7h3K160ZmYNUOAce7/recaptcha__en.js
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api.js?onload=rcCallback&render=explicit
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b2d6fcca7b06d9b949f7f407e9229e0323cb2a75cb6ee4ad35b53e25cf161605
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Mon, 23 Mar 2020 16:31:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 23 Mar 2020 04:07:14 GMT
server
sffe
age
246200
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
94799
x-xss-protection
0
expires
Tue, 23 Mar 2021 16:31:10 GMT
rss-icon.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/rss-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7bb0d75d42e3ccf1a9d1a055bcddfbc23003ed3ab75bb0eb49c05ba747bce8c9

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Mon, 24 Feb 2014 16:00:47 GMT
server
cloudflare
age
2397
etag
"649-4f329132149c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a10546382d96bc-FRA
content-length
1609
tw-icon.png
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/tw-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
48d211ee8f54e0f314ee98a2b63e6e470b33fb1de29d326c742be16125bda71a

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Mon, 24 Feb 2014 16:00:47 GMT
server
cloudflare
age
2397
etag
"56e-4f329132149c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a10546382f96bc-FRA
content-length
1390
flipboard-icon.png
img.deusm.com/darkreading/
425 B
661 B
Image
General
Full URL
https://img.deusm.com/darkreading/flipboard-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
22c53eeed2c33c21657590793b89fed83648ee555686c0e9ff90b39c1dab406f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Fri, 30 Nov 2018 12:31:36 GMT
server
cloudflare
age
2397
etag
"1a9-57be0fae8ba00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a10546383096bc-FRA
content-length
425
facebook-icon.png
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/facebook-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
4e19e8f9902a8b9ec4840aaf54110d6f502c5fb500303dc605f8776c40f7fb67

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Mon, 24 Feb 2014 16:00:47 GMT
server
cloudflare
age
2397
etag
"4a9-4f329132149c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a10546383196bc-FRA
content-length
1193
li-icon.png
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/li-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
976aabc512994a6ecc5981a85c489d1bb242ba6734b746a964d69db615f72875

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Mon, 24 Feb 2014 16:00:47 GMT
server
cloudflare
age
2396
etag
"54b-4f329132149c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a10546383296bc-FRA
content-length
1355
reb-border.png
img.deusm.com/darkreading/
331 B
437 B
Image
General
Full URL
https://img.deusm.com/darkreading/reb-border.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
523296d1a2c9a67ee707b5e0bc582f488e5786ec9b343c7b3da58a0d162d643b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Thu, 03 Nov 2016 06:29:01 GMT
server
cloudflare
age
2033
etag
"14b-5405fac56e540"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a10546383596bc-FRA
content-length
331
nav-background.png
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/nav-background.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a6595372db2688a9dfb0991bc6cea16343042dd3caa33483b393d21a77d1c4be

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.27
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Sat, 22 Feb 2014 17:43:38 GMT
server
cloudflare
age
5401
etag
"af8-4f30247448680"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a10546383696bc-FRA
content-length
2808
nav-background-edge.png
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/nav-background-edge.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
fd2f3015d1e62a6f24420652afa85f8dbce31636ea8ee86781dc794c243dec68

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.27
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Tue, 11 Jun 2019 06:13:41 GMT
server
cloudflare
age
1052
etag
"aeb-58b0632bf0f40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a10546383996bc-FRA
content-length
2795
BngbUXZYTXPIvIBgJJSb6s3BzlRRfKOFbvjoa4Omb2RlV9Su1cai.woff
fonts.gstatic.com/s/robotoslab/v11/
15 KB
15 KB
Font
General
Full URL
https://fonts.gstatic.com/s/robotoslab/v11/BngbUXZYTXPIvIBgJJSb6s3BzlRRfKOFbvjoa4Omb2RlV9Su1cai.woff
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
0b6f5ef9a0c4b8bdc17d9f04174cf25472ee3e519abe18e5edfe46a736ec86bc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/css?family=Roboto+Slab:700
Origin
https://www.darkreading.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 10 Mar 2020 17:43:26 GMT
x-content-type-options
nosniff
last-modified
Tue, 04 Feb 2020 23:35:54 GMT
server
sffe
age
1365064
content-type
font/woff
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
15360
x-xss-protection
0
expires
Wed, 10 Mar 2021 17:43:26 GMT
chartbeat.js
static.chartbeat.com/js/
35 KB
14 KB
Script
General
Full URL
https://static.chartbeat.com/js/chartbeat.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:6800:18:1fcd:349:ca21 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
ffe2ef5ce19169f51b69f0dfdac122f402043b13afd7c65b2dab551ebf3b7629

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:18:14 GMT
content-encoding
gzip
last-modified
Tue, 29 Oct 2019 02:24:02 GMT
server
nginx
age
2176
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/x-javascript
status
200
cache-control
max-age=7200
x-amz-cf-pop
FRA2-C1
x-amz-cf-id
8yz3wfWN34gc_nj9K2cn-vDTnJ7nZABrswDsEM-C2X8oJHCSe2l7ew==
via
1.1 dde0b4b1e223fa23670e93078a04c116.cloudfront.net (CloudFront)
expires
Thu, 26 Mar 2020 14:18:14 GMT
832000476880185
connect.facebook.net/signals/config/
447 KB
112 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/832000476880185?v=2.9.15&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
6b32273d502be4ac793cba3d1e1524fcfe423a433c822ab529b1f77af0b8d60b
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-27=":443"; ma=3600
content-length
114947
x-xss-protection
0
pragma
public
x-fb-debug
S1fp+xZQbQhDzI689ubJIPXf7MuwNQ2bRuroOlMz+1bItihq6lMrIyFnL7eOFAy5Kgfb4UVANq1MNco3NqSayQ==
x-fb-trip-id
1850256238
date
Thu, 26 Mar 2020 12:54:30 GMT, Thu, 26 Mar 2020 12:54:30 GMT
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
vary
Accept-Encoding
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
__fpn.gif
fpn.flipboard.com/tr/
Redirect Chain
  • https://fpn.flipboard.com/pix/__fpn.gif?utm_source=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729
  • https://fpn.flipboard.com/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fattacks-breaches%25252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-at...
35 B
360 B
Image
General
Full URL
https://fpn.flipboard.com/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fattacks-breaches%25252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%25252Fd%25252Fd-id%25252F1336729&rh=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%252Fd%252Fd-id%252F1336729
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:9c00:14:85db:2b40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 25 Mar 2020 22:58:13 GMT
via
1.1 6c9a2d99a25484f38efa27d58a726b2d.cloudfront.net (CloudFront)
last-modified
Thu, 12 Oct 2017 18:19:12 GMT
server
AmazonS3
age
83300
etag
"28d6814f309ea289f847c69cf91194c6"
x-cache
Hit from cloudfront
content-type
image/gif
status
200
x-amz-cf-pop
FRA2-C2
accept-ranges
bytes
content-length
35
x-amz-cf-id
bulJTnvjUQNmUpTDWNOfxzskgC3qWzwpEulQNVkQn4n0Of2d7xq9VQ==

Redirect headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:30 GMT
via
1.1 6c9a2d99a25484f38efa27d58a726b2d.cloudfront.net (CloudFront)
server
CloudFront
x-amz-cf-pop
FRA2-C2
location
/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fattacks-breaches%25252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%25252Fd%25252Fd-id%25252F1336729&rh=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%252Fd%252Fd-id%252F1336729
x-cache
LambdaGeneratedResponse from cloudfront
status
307
cache-control
no-cache, no-store, must-revalidate
content-length
0
x-amz-cf-id
jSyfQz-JLu7utWRrhxRE_SQvNUekVTPVKOEVb66uRUZ6QbV1FZXeUA==
expires
Thu, 01 Dec 1994 16:00:00 GMT
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=3005435&ns__t=1585227270159&ns_c=windows-1252&cv=3.5&c8=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&c7=https%3A%2F%2Fwww.d...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=3005435&ns__t=1585227270159&ns_c=windows-1252&cv=3.5&c8=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&c7=https%3A%2F%2Fwww....
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=3005435&ns__t=1585227270159&ns_c=windows-1252&cv=3.5&c8=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&c7=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&c9=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
172.227.85.103 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a172-227-85-103.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 26 Mar 2020 12:54:30 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=3005435&ns__t=1585227270159&ns_c=windows-1252&cv=3.5&c8=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&c7=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&c9=
Pragma
no-cache
Date
Thu, 26 Mar 2020 12:54:30 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
bullet.png
img.deusm.com/informationweek/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/informationweek/bullet.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
9e0e2ad3a93ec78d016efee0993b5856ba9b4acafcee3aa4d6f7162f039fcce4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Sat, 02 Nov 2013 00:57:26 GMT
server
cloudflare
age
6102
etag
"41e-4ea272a96e980"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a10546a8aa96bc-FRA
content-length
1054
www.darkreading.com.js
u.heatmap.it/conf/
0
213 B
Script
General
Full URL
https://u.heatmap.it/conf/www.darkreading.com.js
Requested by
Host: u.heatmap.it
URL: https://u.heatmap.it/log.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
46.105.202.39 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
x-cacheable
Cacheable
x-cdn-pop-ip
51.254.41.128/26
content-type
text/javascript;charset=UTF-8
status
204
cache-control
max-age=60
x-cdn-pop
rbx1
x-request-id
500438630
expires
Thu, 26 Mar 2020 12:59:30 GMT
/
www.google.com/pagead/1p-user-list/1007530244/
42 B
114 B
Image
General
Full URL
https://www.google.com/pagead/1p-user-list/1007530244/?random=1585227270030&cv=9&fst=1585224000000&num=1&guid=ON&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=60&u_java=false&u_nplug=0&u_nmime=0&sendb=1&frm=0&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&tiba=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&fmt=3&is_vtc=1&random=1870861919&resp=GooglemKTybQhCsO&rmt_tld=0&ipr=y
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Content-Security-Policy script-src 'none'; object-src 'none'
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:30 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-security-policy
script-src 'none'; object-src 'none'
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
www.google.de/pagead/1p-user-list/1007530244/
42 B
110 B
Image
General
Full URL
https://www.google.de/pagead/1p-user-list/1007530244/?random=1585227270030&cv=9&fst=1585224000000&num=1&guid=ON&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=60&u_java=false&u_nplug=0&u_nmime=0&sendb=1&frm=0&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&tiba=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&fmt=3&is_vtc=1&random=1870861919&resp=GooglemKTybQhCsO&rmt_tld=1&ipr=y
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Content-Security-Policy script-src 'none'; object-src 'none'
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:30 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-security-policy
script-src 'none'; object-src 'none'
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
DR-hot-topics-comment.png
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-hot-topics-comment.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
9182e8a1e20a5437d2f311b096b2a98a33d54e94d4d9d6d01c5db3861460d04e

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.27
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
REVALIDATED
last-modified
Fri, 21 Feb 2014 14:56:02 GMT
server
cloudflare
etag
"4a5-4f2ebd20ac480"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a10546c8bf96bc-FRA
content-length
1189
all.js
connect.facebook.net/en_US/
385 KB
111 KB
Script
General
Full URL
https://connect.facebook.net/en_US/all.js?hash=191a980866f4b4bf8d3ffff47058b46f&ua=modern_es6
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/all.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
54d7b288f0f1dba98ddaa3987e6b0c5eb75be52a7eea62529b1113b302f3e6fa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Origin
https://www.darkreading.com
Sec-Fetch-Dest
script
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
AEpfdgOZUn+i5TuqN9krOw==
status
200
date
Thu, 26 Mar 2020 12:54:30 GMT, Thu, 26 Mar 2020 12:54:30 GMT
expires
Fri, 26 Mar 2021 12:48:19 GMT
alt-svc
h3-27=":443"; ma=3600
content-length
113419
x-fb-debug
Zh+w8rxAf7M7tWhT34h3/lUF6L+gURcosoRtuYOvuuH8OdGbvcn9ZJWtqb04PV4ahWeiVVcOH6HouV7b54YLTQ==
x-fb-trip-id
1850256238
x-fb-content-md5
cb5110ca5f18f445628d2909c32ceb5c
etag
"c25da2b3d80535708f895e76cf5aeb63"
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public,max-age=31536000,stale-while-revalidate=3600,immutable
timing-allow-origin
*
access-control-expose-headers
X-FB-Content-MD5
NL-button.png
img.deusm.com/informationweek/
2 KB
3 KB
Image
General
Full URL
https://img.deusm.com/informationweek/NL-button.png
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::681c:3e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7b5688f8b168e06251901442c4f2f72b30c4477cb472833cde7979a8dca0a862

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.27
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
cf-cache-status
HIT
last-modified
Fri, 08 Nov 2013 15:09:43 GMT
server
cloudflare
age
6101
etag
"9c6-4eaabc5a3dbc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
57a10546d8d296bc-FRA
content-length
2502
collect
stats.g.doubleclick.net/r/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j81&a=1230320910&t=pageview&_s=1&dl=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-rans...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-135180592-2&cid=750948819.1585227270&jid=703436335&_gid=241002669.1585227270&gjid=727260421&_v=j81&z=275396943
35 B
102 B
Image
General
Full URL
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-135180592-2&cid=750948819.1585227270&jid=703436335&_gid=241002669.1585227270&gjid=727260421&_v=j81&z=275396943
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:400c:c00::9a Brussels, Belgium, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
strict-transport-security
max-age=10886400; includeSubDomains; preload
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
*
date
Thu, 26 Mar 2020 12:54:30 GMT
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:30 GMT
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
*
location
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-135180592-2&cid=750948819.1585227270&jid=703436335&_gid=241002669.1585227270&gjid=727260421&_v=j81&z=275396943
content-type
text/html; charset=UTF-8
status
302
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
416
expires
Fri, 01 Jan 1990 00:00:00 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 0467
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsumrU95vAW_lAWGMP00JOFuhvajzPCSdD2SGu_q5zo0275SRSR0lDn7EqPQ6f5eFiGPIM48KHKSWfOkxhpCLZheUfaSblNA_DrVlboi8FzE-BlC3_OiILxqLESyMEUhw8QWtpQel3-gAnAS-HbDTerb4fAPElqE3e9gAiJb_nZ2OGdYkTzIKWqyuGURWeIF1eHt_QC29lGst3HTfhoydLvzB79sDpjsgTqO8sAuGV-NAA_7LJjvmR2IegZH84h4_KrDRHlW3Qv-4LH5xtegaOoQO_1KsI_aRHX86sf_Sd1dymCcrrz3Iw&sai=AMfl-YTgGikS5X9IndfWKJPrC9XT5EgshCJygpaqQCmKMA9P1mWUFtmUEWAgOU7CyBIpldTc4b1gxi827iSIe_3fVsn2NISrZavovpwNuY1_Pw&sig=Cg0ArKJSzIftob_MJQ_qEAE&urlfix=1&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
empty

Response headers

timing-allow-origin
*
date
Thu, 26 Mar 2020 12:54:30 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Thu, 26 Mar 2020 12:54:30 GMT
dcmads.js
www.googletagservices.com/dcm/ Frame 0467
4 KB
2 KB
Script
General
Full URL
https://www.googletagservices.com/dcm/dcmads.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
cc0069dab5b1c410fc8bb1a109f8ceb4792e4780bbe7ea9e969662a7d6e49915
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:20:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 24 Oct 2019 14:04:48 GMT
server
sffe
age
2066
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
2032
x-xss-protection
0
expires
Thu, 26 Mar 2020 13:20:04 GMT
jquery-1.11.0.min.js
code.jquery.com/ Frame 0467
94 KB
33 KB
Script
General
Full URL
https://code.jquery.com/jquery-1.11.0.min.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2001:4de0:ac19::1:b:3b , Netherlands, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
nginx /
Resource Hash
b294e973896f8f874e90a8eb1a8908ac790980d034c4c4bdf0fc3d37b8abf682

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 26 Mar 2020 12:54:30 GMT
Content-Encoding
gzip
Last-Modified
Fri, 24 Oct 2014 00:16:07 GMT
Server
nginx
ETag
W/"54499a47-1787d"
Vary
Accept-Encoding
X-HW
1585227270.dop014.fr8.t,1585227270.cds060.fr8.shn,1585227270.cds060.fr8.c
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000, public
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
33357
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 0467
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
458860ce8b256b66b223ed10f813b32a012b91698bd98867374cfb24da8ce172
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1585165059237800"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
28264
x-xss-protection
0
expires
Thu, 26 Mar 2020 12:54:30 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame 0467
289 KB
98 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2542142bdc331698a291e4bc03d74becf379dbb3b08d39c4c3f70602c4ed1034

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
last-modified
Thu, 20 Feb 2020 16:31:53 GMT
server
AmazonS3
x-amz-request-id
588274ACF138F2F9
etag
"a12bd163654327e7ec198d6d87345585"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=17385
accept-ranges
bytes
content-length
99749
x-amz-id-2
QhLeoPb8HmrJ2t/bD2QgybsO6zrZqKYlHhwndXhd+Fac+wHwMzo9FfND2BZNM2FVTdDV+PS7kAQ=
osd.js
www.googletagservices.com/activeview/js/current/
74 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f2e60d0a77f1d63a9fd3b21fbb9d21345a61dc43d6c9b749e45753c5d993a6e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1585165059237800"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
28015
x-xss-protection
0
expires
Thu, 26 Mar 2020 12:54:30 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame D0EB
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsshLqdjwyJpUjEnb-Q-XXXz_r-5yBMkkDUv3C70jnXBU-h5_x8HVuyIKaK8ySvnALJ-yLxVFOYthHHZRj87xW1gqeiRxqXoV0LmVD_vNHaJbB4YJT4ywY2B8HZCDb3PmwyRkktfkyLnF2HgYrpJ2-GfcYuk_okjuK9O63E7jXd9DLp57E5jSvbU9DFnFhFCDfrc2rYhjGT8_fe4yM7ZxOVWSZ5lWSTu5TOoAo9A8PVzqLKyzTrqzVt-_12TISPPpH6CQSabR7ckJz1kXrq9Ua-8kMoZLBnxD1Sl&sai=AMfl-YRQV1U1Xc0y9G0YsAlZG-KXnhvZxzIOm6xDceNrTdqpUS_OFC4y4BhBvqUP4c5gfxbbDPjp34OkLtT5L7hXY8aTu6Gl68Y3H6FweXpcuw&sig=Cg0ArKJSzM73MAy3ngz2EAE&urlfix=1&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
empty

Response headers

timing-allow-origin
*
date
Thu, 26 Mar 2020 12:54:30 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Thu, 26 Mar 2020 12:54:30 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame D0EB
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
458860ce8b256b66b223ed10f813b32a012b91698bd98867374cfb24da8ce172
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1585165059237800"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
28264
x-xss-protection
0
expires
Thu, 26 Mar 2020 12:54:30 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame D0EB
289 KB
98 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2542142bdc331698a291e4bc03d74becf379dbb3b08d39c4c3f70602c4ed1034

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
last-modified
Thu, 20 Feb 2020 16:31:53 GMT
server
AmazonS3
x-amz-request-id
588274ACF138F2F9
etag
"a12bd163654327e7ec198d6d87345585"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=17385
accept-ranges
bytes
content-length
99749
x-amz-id-2
QhLeoPb8HmrJ2t/bD2QgybsO6zrZqKYlHhwndXhd+Fac+wHwMzo9FfND2BZNM2FVTdDV+PS7kAQ=
view
securepubads.g.doubleclick.net/pcs/ Frame 8608
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjst4B7h8bRCbSSHMlVlagfM2AXv9MQCsVaXR9x0MTKves9T_3kwwtgEWt4tpH1FhT8_g9dj3zMtofrYu9XQypa_11rsEVuu_hiJDAdhEaJSf75_KzQJ2XxoBePvaQLXi-HDc9ueiL2p9t1BxEI68FgCGDWEVlkTYGShJeCuEB529-0KjEhNxmSXBSOM0PTIBthGwHemiOiPjyVJiFZ4R23IK-Z25EV6AONygXCemt2Pa5Rz42GLBjHX9oH5YHGO6Nnz9Hs9xcoQ167OOJRthKC_7SpPWMrfwWy5s&sai=AMfl-YQFhfwsdmrMFqEBDDJXo4hG78mfLNPeWZCkultfrbbr2FbRi_ezHm2kPIbwY2-dHRTcaghh0qRE_34IcKmSE7hrI9bqvPu9iw93JnZB2Q&sig=Cg0ArKJSzIuYtjxhbmzoEAE&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
empty

Response headers

timing-allow-origin
*
date
Thu, 26 Mar 2020 12:54:30 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Thu, 26 Mar 2020 12:54:30 GMT
window_focus_fy2019.js
tpc.googlesyndication.com/pagead/js/r20200319/r20110914/client/ Frame 8608
2 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20200319/r20110914/client/window_focus_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
c7ec8f4f61d81af95253c861bd5164cd8ac2eceac931f6385651717389e614f5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 06:09:07 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
24323
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
1228
x-xss-protection
0
server
cafe
etag
6354087966754203456
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Thu, 09 Apr 2020 06:09:07 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 8608
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
458860ce8b256b66b223ed10f813b32a012b91698bd98867374cfb24da8ce172
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1585165059237800"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
28264
x-xss-protection
0
expires
Thu, 26 Mar 2020 12:54:30 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame 8608
289 KB
98 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2542142bdc331698a291e4bc03d74becf379dbb3b08d39c4c3f70602c4ed1034

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
last-modified
Thu, 20 Feb 2020 16:31:53 GMT
server
AmazonS3
x-amz-request-id
588274ACF138F2F9
etag
"a12bd163654327e7ec198d6d87345585"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=17385
accept-ranges
bytes
content-length
99749
x-amz-id-2
QhLeoPb8HmrJ2t/bD2QgybsO6zrZqKYlHhwndXhd+Fac+wHwMzo9FfND2BZNM2FVTdDV+PS7kAQ=
9835165613398450709
tpc.googlesyndication.com/simgad/ Frame 8608
48 KB
48 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/9835165613398450709
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
6fc14303089cc39437d764f5b4b7234626d20d5a768588af2ee7568920fa1e9c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Fri, 06 Mar 2020 10:56:32 GMT
x-content-type-options
nosniff
age
1735078
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
48776
x-xss-protection
0
last-modified
Tue, 25 Feb 2020 20:26:34 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 06 Mar 2021 10:56:32 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame E7B6
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvuTuuFCunAJBt45q_CY8cKGg_9Dl2zcTKpAE2t_UK2YQlL_J1BEsXQvec-81BCGsHcnc9i8JCVNx0av_uVESB6Pj6rtHj2zHamM_0j-lpOWY-RnfgLWikR5_8tS-EOz-Bv5KMWPhZXstDMnDV5VKyw3dJmyjyuL5FYoOFKCaQmuoE9iRIrGGqW-nFK5T23exBgMdjs9EMRgUXOgATm6jn-0zxzyka3Ccn5ydv3xBGck3RHAOcXAl1AwsC1HXAi6mpV42k1mvAhkrIL7-tSsc5O1HMlVAYJLPeQdiuX&sai=AMfl-YRmSB-dw6K6zt-1SMcRxon9qGQZf46TVFke34f7P_v9lZL3dTFxGdnS4CeLNZOQs0Oyub7rEHIvxjoKhj6ye8ucGzUb7I6D8_ViQIfkUA&sig=Cg0ArKJSzAiA2fVS-9lREAE&urlfix=1&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
empty

Response headers

timing-allow-origin
*
date
Thu, 26 Mar 2020 12:54:30 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Thu, 26 Mar 2020 12:54:30 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame E7B6
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
458860ce8b256b66b223ed10f813b32a012b91698bd98867374cfb24da8ce172
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1585165059237800"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
28264
x-xss-protection
0
expires
Thu, 26 Mar 2020 12:54:30 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame E7B6
289 KB
98 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2542142bdc331698a291e4bc03d74becf379dbb3b08d39c4c3f70602c4ed1034

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
last-modified
Thu, 20 Feb 2020 16:31:53 GMT
server
AmazonS3
x-amz-request-id
588274ACF138F2F9
etag
"a12bd163654327e7ec198d6d87345585"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=17385
accept-ranges
bytes
content-length
99749
x-amz-id-2
QhLeoPb8HmrJ2t/bD2QgybsO6zrZqKYlHhwndXhd+Fac+wHwMzo9FfND2BZNM2FVTdDV+PS7kAQ=
view
securepubads.g.doubleclick.net/pcs/ Frame 83ED
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstSMPkDZSStOw9AjnI4Q1ViVv1gQQqXZ3-naTvdvYh1uzOFgZAeWk_CiYZuQ6iKzGvo_mB6z8fB6NBkd1uzfYnIOiBwZWtSWIpdCV74p7JxEDXc9GHbwN3yNqSeARRZunBW-q1_GXtwalvNH9TSKH9wTT5R1fSTBxWd-YwdmqhYezSZOYrzMPmeheZBI1qX1lKEHtV1RQQWib-z2GoMhHGi3Ird9hscf9roMs9QKuqr0o2Apv8jOb9M7scuhXRhiwd46Yt1PQ0QYaC2HuDCQjswPSmkb54&sai=AMfl-YRuGmm1UVo43O6K9h_SVkZnxZDWy4t-pe8St-ddt28XKoqABtevWFsm8jJ_gXMFmJVWP03Z9VFlkzzADTFUFbRoZUJpctei99BXOUVUIg&sig=Cg0ArKJSzGdomvrF5vQmEAE&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
empty

Response headers

timing-allow-origin
*
date
Thu, 26 Mar 2020 12:54:30 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Thu, 26 Mar 2020 12:54:30 GMT
window_focus_fy2019.js
tpc.googlesyndication.com/pagead/js/r20200319/r20110914/client/ Frame 83ED
2 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20200319/r20110914/client/window_focus_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
c7ec8f4f61d81af95253c861bd5164cd8ac2eceac931f6385651717389e614f5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 06:09:07 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
24323
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
1228
x-xss-protection
0
server
cafe
etag
6354087966754203456
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Thu, 09 Apr 2020 06:09:07 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 83ED
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
458860ce8b256b66b223ed10f813b32a012b91698bd98867374cfb24da8ce172
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1585165059237800"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
28264
x-xss-protection
0
expires
Thu, 26 Mar 2020 12:54:30 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame 83ED
289 KB
98 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2542142bdc331698a291e4bc03d74becf379dbb3b08d39c4c3f70602c4ed1034

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
last-modified
Thu, 20 Feb 2020 16:31:53 GMT
server
AmazonS3
x-amz-request-id
588274ACF138F2F9
etag
"a12bd163654327e7ec198d6d87345585"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=17385
accept-ranges
bytes
content-length
99749
x-amz-id-2
QhLeoPb8HmrJ2t/bD2QgybsO6zrZqKYlHhwndXhd+Fac+wHwMzo9FfND2BZNM2FVTdDV+PS7kAQ=
15597202546216543198
tpc.googlesyndication.com/simgad/ Frame 83ED
26 KB
26 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/15597202546216543198
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5b6c32019df468225132d8512864aa165b98c36d37e7027f9abe6b00f6030778
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 16 Mar 2020 06:48:04 GMT
x-content-type-options
nosniff
age
885986
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
26955
x-xss-protection
0
last-modified
Fri, 13 Mar 2020 21:37:24 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 16 Mar 2021 06:48:04 GMT
0
bat.bing.com/action/
0
148 B
Image
General
Full URL
https://bat.bing.com/action/0?ti=5476211&Ver=2&mid=f79db391-43eb-ae5a-8f60-8b92db89461b&pi=0&lg=en-US&sw=1600&sh=1200&sc=24&tl=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&p=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&r=&evt=pageLoad&msclkid=N&rn=520464
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:c11::200 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

status
204
pragma
no-cache
date
Thu, 26 Mar 2020 12:54:29 GMT
cache-control
no-cache, must-revalidate
x-msedge-ref
Ref A: C1421E597F31418696B31F832C3B5E36 Ref B: FRAEDGE0915 Ref C: 2020-03-26T12:54:30Z
access-control-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
www.facebook.com/tr/
44 B
260 B
Image
General
Full URL
https://www.facebook.com/tr/?id=832000476880185&ev=PageView&dl=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&rl=&if=false&ts=1585227270292&sw=1600&sh=1200&v=2.9.15&r=stable&ec=0&o=30&fbp=fb.1.1585227270291.127736529&it=1585227270126&coo=false&rqm=GET
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT, Thu, 26 Mar 2020 12:54:30 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
alt-svc
h3-27=":443"; ma=3600
content-length
44
expires
Thu, 26 Mar 2020 12:54:30 GMT
web.js
ads.celtra.com/ac76bfd5/ Frame D0EB
13 KB
5 KB
Script
General
Full URL
https://ads.celtra.com/ac76bfd5/web.js?&clickUrl=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjstpGKLkTYSFTVomXnboefv5bvQVndMxL37fFXKfUhCibfm-V2rhiClTtcRuJbAjME0e2J87dhoTFuO8iyrcu-T1SLGw3HhMDLWIYEaYfCkkHWO0RazPNojRGOgMI_Gil9elHkQebj9k5MlA69TqHyHx-iMV6Hz7MtMSalpwMQ5yePJSjar_Gve8pm6BmfGFOY4oUPf8xiVsgZpLEItf3m2mHIM_RB4dsT9pjnyUYWCqVtRYQqjZm7ZPt4yoe8pWaNbQw6nbn-8V9i8GAhlxCnrC0DNnlDar%26sai%3DAMfl-YS0VZbiVIfcCEM7dRns6kcc1xvDU3jZYRsLVukqMFAVbB_pK8T-kuXsC1H0ouQgAnz2GHBCsbGS9BBuL74V8i7yYvwLh4W0QJwI76ZJPA%26sig%3DCg0ArKJSzLIJCq6UbR_OEAE%26urlfix%3D1%26adurl%3D&expandDirection=undefined&clickEvent=advertiser&iosAdvId=&androidAdvId=&externalAdServer=DFPPremium&tagVersion=6&externalCreativeId=138304748693&externalPlacementId=43863396&externalSiteId=27868836&externalSiteName=darkreading.com&externalLineItemId=5296245972&externalCampaignId=2664366423&externalAdvertiserId=4655091588&scriptId=celtra-script-1&clientTimestamp=1585227270.303&clientTimeZoneOffsetInMinutes=-60&hostPageLoadId=4389032988725605
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.195.112.151 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-18-195-112-151.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
bac1c052633d0e914e85ff18cf439d8de58fd0b78b9772bdb4711e1da9c5ed7a

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Pragma
no-cache
Date
Thu, 26 Mar 2020 12:54:30 GMT
Content-Encoding
gzip
Content-Type
application/javascript; charset=UTF-8
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Length
4598
Expires
0
view
securepubads.g.doubleclick.net/pcs/ Frame A75A
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjss961iXWFx5mDtOYjrFjcwYNJtXJ8LBVe9RPDXd1k8bXDT9DlgrUb4qb_8o2vzu4VI2dbkt6UYv1Da-rrUdyU8U_M77YkOFJ6U8qHN2TabTW--nwiNCJdR-6o-VpZkXci9VtmhsQdVwd8DlT2QuCDwrfG4qGMdj8lx0EQQBD1voShll9TUB0sDSTja7GPPomzsvQV2KmtbXT1FOfN4ezraCbxQ0xzfbPezwXKJu4DteT_qSGTGFTA1mLHOYIMmNo4KwI8Oh__iGR5WFpsd2p71VsjB_D1o&sai=AMfl-YTER1dZsrE-YVrrktON10J2UJiuzFtNHXXvYkS7LV-Yjt5_LK7MVSLmiwzYiyKLaN_vXO6C4qEcZe_U9gqZJT5sv-jweislVJ_JGtqN4A&sig=Cg0ArKJSzAvZUUZDxXRwEAE&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
empty

Response headers

timing-allow-origin
*
date
Thu, 26 Mar 2020 12:54:30 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
window_focus_fy2019.js
tpc.googlesyndication.com/pagead/js/r20200319/r20110914/client/ Frame A75A
2 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20200319/r20110914/client/window_focus_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
c7ec8f4f61d81af95253c861bd5164cd8ac2eceac931f6385651717389e614f5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 06:09:07 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
24323
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
1228
x-xss-protection
0
server
cafe
etag
6354087966754203456
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Thu, 09 Apr 2020 06:09:07 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame A75A
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
458860ce8b256b66b223ed10f813b32a012b91698bd98867374cfb24da8ce172
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1585165059237800"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
28264
x-xss-protection
0
expires
Thu, 26 Mar 2020 12:54:30 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame A75A
289 KB
98 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2542142bdc331698a291e4bc03d74becf379dbb3b08d39c4c3f70602c4ed1034

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
last-modified
Thu, 20 Feb 2020 16:31:53 GMT
server
AmazonS3
x-amz-request-id
588274ACF138F2F9
etag
"a12bd163654327e7ec198d6d87345585"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=17385
accept-ranges
bytes
content-length
99749
x-amz-id-2
QhLeoPb8HmrJ2t/bD2QgybsO6zrZqKYlHhwndXhd+Fac+wHwMzo9FfND2BZNM2FVTdDV+PS7kAQ=
3180686778985860659
tpc.googlesyndication.com/simgad/ Frame A75A
67 KB
67 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/3180686778985860659
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5460f10a1c2c85f3685f806afbbacf1e35c551aa7ba1da8ab7981c8a111ae6c0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 15:55:30 GMT
x-content-type-options
nosniff
age
75540
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
68666
x-xss-protection
0
last-modified
Wed, 25 Mar 2020 14:41:51 GMT
server
sffe
content-type
image/gif
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 25 Mar 2021 15:55:30 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 9CD3
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsthVQc1MoGvUfZLcE7sJspOjZdNscEVRnF-vBoffoZ6RL_v89fCTavn1A3_1BiuhbmSeX_afEOc94ZnsbO814GNqRHgQI9HIgoBcryxZCepu6Jgp0uqMz_Zi4HwZTuPUfMUs044q-TF-q0Nl7_verNNIuKixQicrQ_ZpU2x8LZOPtiBgOj-FRjDS9o9W40_cNafbst2N0KNddp5TdGcaSg1-qV6H6-VYy7xzwThc3y5EQKjAUNsIrFjm7iuMSsdAod5Mdc24pjlh-xWHPGACQ2iKn6Fh6kFcq8&sai=AMfl-YRDFf1Ade2cDX84cDJOjgCvT2dPnvHbymvpSxeUraHDY_8M9JJB26a21sjBlTx4skCg0IjHCnFtSVlRcv5wAEO8k2Xb8-xFHwaOKqKDtQ&sig=Cg0ArKJSzIB1zKOXHvQrEAE&urlfix=1&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
empty

Response headers

timing-allow-origin
*
date
Thu, 26 Mar 2020 12:54:30 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 9CD3
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
458860ce8b256b66b223ed10f813b32a012b91698bd98867374cfb24da8ce172
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1585165059237800"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
28264
x-xss-protection
0
expires
Thu, 26 Mar 2020 12:54:30 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame 9CD3
289 KB
98 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2542142bdc331698a291e4bc03d74becf379dbb3b08d39c4c3f70602c4ed1034

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
last-modified
Thu, 20 Feb 2020 16:31:53 GMT
server
AmazonS3
x-amz-request-id
588274ACF138F2F9
etag
"a12bd163654327e7ec198d6d87345585"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=17385
accept-ranges
bytes
content-length
99749
x-amz-id-2
QhLeoPb8HmrJ2t/bD2QgybsO6zrZqKYlHhwndXhd+Fac+wHwMzo9FfND2BZNM2FVTdDV+PS7kAQ=
view
securepubads.g.doubleclick.net/pcs/ Frame CF73
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvlx9GosOQppApuTpII99Z6VCjdyi1G9LkCbxu88vLl3AM-SwB9RXjyvhv6AWkQY52gEbVRrfFbKdH3_h6DTz9U17cDze8948udrENmT7gDqsuT4Aq76iVyqzPjDhkpTFwpAuZVJOotUo1y8HC_ygps2SfkAYuZA71gdXcdrUL00m35tmR_Fkgd41R_UHergUTqxvkZdFOrGENFsN6rr83lYOSOVyv22xJC7nf6Wpda5faOfWiqHM2mMTcR_u9Yop7qxRPvVaWvSECM_7Ghhr9KNEaCOR0Gda4&sai=AMfl-YSbgAWxbVZM7B5tP40A8eKARrJ3lwmqTFYweiK8XM6y_amnrnygBBSprhtY039_kfAs8TN27V4YDwiGg6wLJJ3UMMSiROCb5tmEU9E55g&sig=Cg0ArKJSzBhaWv3bHclsEAE&urlfix=1&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
empty

Response headers

timing-allow-origin
*
date
Thu, 26 Mar 2020 12:54:30 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
XUQYFHVg7UI
www.youtube.com/embed/ Frame 0828
0
0
Document
General
Full URL
https://www.youtube.com/embed/XUQYFHVg7UI?rel=0&showinfo=0
Requested by
Host: i.ubm-us.net
URL: https://i.ubm-us.net/oas/nativead/js/dr_nativead.js?v3
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
YouTube Frontend Proxy /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www.youtube.com
:scheme
https
:path
/embed/XUQYFHVg7UI?rel=0&showinfo=0
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729

Response headers

status
200
content-type
text/html; charset=utf-8
content-encoding
br
cache-control
no-cache
expires
Tue, 27 Apr 1971 19:44:06 GMT
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657?hl=en for more info."
x-content-type-options
nosniff
strict-transport-security
max-age=31536000
date
Thu, 26 Mar 2020 12:54:30 GMT
server
YouTube Frontend Proxy
x-xss-protection
0
set-cookie
VISITOR_INFO1_LIVE=4jy8KYhfT8o; path=/; domain=.youtube.com; secure; expires=Tue, 22-Sep-2020 12:54:30 GMT; httponly; samesite=None YSC=tqO3PxOZDyo; path=/; domain=.youtube.com; secure; httponly; samesite=None GPS=1; path=/; domain=.youtube.com; expires=Thu, 26-Mar-2020 13:24:30 GMT VISITOR_INFO1_LIVE=4jy8KYhfT8o; path=/; domain=.youtube.com; secure; expires=Tue, 22-Sep-2020 12:54:30 GMT; httponly; samesite=None
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame CF73
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
458860ce8b256b66b223ed10f813b32a012b91698bd98867374cfb24da8ce172
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1585165059237800"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
28264
x-xss-protection
0
expires
Thu, 26 Mar 2020 12:54:30 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame CF73
289 KB
98 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2542142bdc331698a291e4bc03d74becf379dbb3b08d39c4c3f70602c4ed1034

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
last-modified
Thu, 20 Feb 2020 16:31:53 GMT
server
AmazonS3
x-amz-request-id
588274ACF138F2F9
etag
"a12bd163654327e7ec198d6d87345585"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=17385
accept-ranges
bytes
content-length
99749
x-amz-id-2
QhLeoPb8HmrJ2t/bD2QgybsO6zrZqKYlHhwndXhd+Fac+wHwMzo9FfND2BZNM2FVTdDV+PS7kAQ=
impl_v55.js
www.googletagservices.com/dcm/ Frame 0467
22 KB
9 KB
Script
General
Full URL
https://www.googletagservices.com/dcm/impl_v55.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/dcm/dcmads.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
0ec7c1eac6e0f82237b25ed509bf0e48b3cd7f9d989e8e8cac94e8b39edcca46
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 14:42:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 21 Oct 2019 14:05:29 GMT
server
sffe
age
79946
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
9535
x-xss-protection
0
expires
Thu, 25 Mar 2021 14:42:04 GMT
spacer.gif
img.lightreading.com/images/
49 B
371 B
Image
General
Full URL
https://img.lightreading.com/images/spacer.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.227.156.115 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-227-156-115.muc51.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
3c5b83e390d046c3623c4b8e35b58aaf64a7481bb2372fb51ae2e0e7818f7407

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:50:58 GMT
via
1.1 63fc1ac6cb60bc83b695e0c3e84b3602.cloudfront.net (CloudFront)
last-modified
Fri, 20 Jun 2014 19:05:53 GMT
server
AmazonS3
age
213
etag
"4909631c93ffa90e65247e3fd4454f2d"
x-cache
Hit from cloudfront
content-type
image/gif
status
200
x-amz-cf-pop
MUC51-C1
accept-ranges
bytes
content-length
49
x-amz-cf-id
dL5b5s2knrodeEK279CBJt4wW7DvW_f3W5z_GUT6bvo8OmjiVQGPtA==
truncated
/ Frame D0EB
212 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
120e55d2189e1ad2683419186d3609779223e9f0f3549c7543c57db55ad753be

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame 8608
219 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0485bcae96bc064f1e0c1dd08bf781289ec3aa8179630d85ccde981f3454794e

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame E7B6
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
3c855cdc67d97493562e5ab35bab34db6fb64eb33b683259ed2f4b3987556b0d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame 83ED
210 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
04297b23be58f72547204728100d4ed9ef1277982885833897ea4b47202b17a6

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
status
www.facebook.com/x/oauth/
0
0
Fetch
General
Full URL
https://www.facebook.com/x/oauth/status?client_id=640989409269461&input_token&origin=1&redirect_uri=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&sdk=joey&wants_cookie_data=false
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/all.js?hash=191a980866f4b4bf8d3ffff47058b46f&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/
Origin
https://www.darkreading.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
x-fb-debug
3FDlrbcqN4AUQeoZxTALVBP5Q2pgbj0qnaSzZxHadW/Ju2s/d8kq2iVhih2n27guYNd0gtwaHBS9dmYqoynWVw==
fb-s
unknown
status
200
date
Thu, 26 Mar 2020 12:54:30 GMT, Thu, 26 Mar 2020 12:54:30 GMT
strict-transport-security
max-age=15552000; preload
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.darkreading.com
access-control-expose-headers
fb-s
cache-control
private, no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
h3-27=":443"; ma=3600
content-length
0
x-content-type-options
nosniff
expires
Sat, 01 Jan 2000 00:00:00 GMT
B23930244.270297909;dc_ver=55.153;sz=640x480;u_sd=1;dc_adk=2097677786;ord=ykbq3w;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsvBZOVfqmoZIzSYos4JtlGpStH_YOTPu_dR1g1T_oon...
ad.doubleclick.net/ddm/adj/N510001.149354UBM2/ Frame 0467
26 KB
13 KB
Script
General
Full URL
https://ad.doubleclick.net/ddm/adj/N510001.149354UBM2/B23930244.270297909;dc_ver=55.153;sz=640x480;u_sd=1;dc_adk=2097677786;ord=ykbq3w;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsvBZOVfqmoZIzSYos4JtlGpStH_YOTPu_dR1g1T_oon-gXsgGay_uEuFSc1V9QS-3GLfpZwilEJfU-L8cbBUjnT4lg9b2ChfUHLKx5fxeYXvZWnpp33hL98rSjkB-iHCS1WfexmWpPKWqL1cUzRPR7T8AqzaHXMkGJaeV4Qlgqpnb4WISOHsCgbiiTZTGx-lr_HApcBNtt6BZxseEaenCIkgsxF1eFDZxoY6uF12nRetDOHgzWQVSGGx0AZJHNiT9qvST0MfRI4A7CHU6MitJN8Lu4%26sai%3DAMfl-YT2CbN8I6jPgPgPdnXNV_XWqeTYx1jLdk26SV0etoyKPxxESBqG2XD5ufp8KVA9x4WkT8QZQeUNuPfwF3GRPxRheZjHEY-9HGa2pw92Uw%26sig%3DCg0ArKJSzK2bY9LfxsDKEAE%26urlfix%3D1%26adurl%3D;dc_rfl=1,https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729$0;xdt=0;crlt=9YI'T6PxmD;osda=2;sttr=101;prcl=s?
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/dcm/impl_v55.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.18.166 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s29-in-f6.1e100.net
Software
cafe /
Resource Hash
5b38c1f42e64b1c277fbed644b10330db061230e42110f3c69ecde1e0e0eb847
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
br
x-content-type-options
nosniff
content-type
text/javascript; charset=UTF-8
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
no-cache, must-revalidate
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
12834
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
truncated
/ Frame A75A
212 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f859431daed891cd7c69a6f68327d2c70d078cb5430bc06b6cbe6327c6ae90ce

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame CF73
210 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
29d21478bdc4c51b0092a8c42f0ed7ace71d5b2d24bce404e4de52c732c5fbfd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
view
securepubads.g.doubleclick.net/pcs/ Frame 0341
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvgrzuwW0ffo2eQYiUhh3JgjVj3kRzPr5ZKYtBTcTKXab5ee8alU77h2CWaJ0mLZt7sesyXmLWg1xpXQWU_S2pMvIhGsHisYGfArBKPAr-TMVgu4R3uz0jaRVdRWbdCjWO4Eq_Fw4urtcOhCPZjO6cNNrk3twEPHSRO6QvrE6NYVlG6KNaGDPeS5v892t0Ak1SU96nUsSrdgi8pe4B4WTFtD3W-vlOzsnx24rOG-WxrFjRLAxDTXp27cZB67UgbaPhCgaOFyjJ8nhBejGZOKtubowKQ_A&sai=AMfl-YRxmQHto6QenfhFHbBK2DSLLyOanc46HAWLc3tS5yGI-zHcQpiDeTyaVCZRMFih8_6At8edUDhlsDIO1PyG8MQ-NBj6VP4gkVs72nFAqw&sig=Cg0ArKJSzI7E8ASfjxiGEAE&urlfix=1&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
empty

Response headers

timing-allow-origin
*
date
Thu, 26 Mar 2020 12:54:30 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
tag
a.teads.tv/page/11512/ Frame 0341
1 KB
913 B
Script
General
Full URL
https://a.teads.tv/page/11512/tag
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.124 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-124.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
06a65aae752e354adc66b935cb0fade25c9d8a058817ea4905777409ad6d4ba7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
access-control-allow-origin
*
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200
cache-control
private, must-revalidate, max-age=3600
access-control-allow-credentials
true
content-length
663
expires
Thu, 26 Mar 2020 13:54:30 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 0341
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
458860ce8b256b66b223ed10f813b32a012b91698bd98867374cfb24da8ce172
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1585165059237800"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
28264
x-xss-protection
0
expires
Thu, 26 Mar 2020 12:54:30 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame 0341
289 KB
98 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2542142bdc331698a291e4bc03d74becf379dbb3b08d39c4c3f70602c4ed1034

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
last-modified
Thu, 20 Feb 2020 16:31:53 GMT
server
AmazonS3
x-amz-request-id
588274ACF138F2F9
etag
"a12bd163654327e7ec198d6d87345585"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=17385
accept-ranges
bytes
content-length
99749
x-amz-id-2
QhLeoPb8HmrJ2t/bD2QgybsO6zrZqKYlHhwndXhd+Fac+wHwMzo9FfND2BZNM2FVTdDV+PS7kAQ=
s06364058010546
ubmtech.d3.sc.omtrdc.net/b/ss/cmpglobalvista/1/JS-2.8.2/
43 B
245 B
Image
General
Full URL
https://ubmtech.d3.sc.omtrdc.net/b/ss/cmpglobalvista/1/JS-2.8.2/s06364058010546?AQB=1&ndh=1&pf=1&t=26%2F2%2F2020%2013%3A54%3A30%204%20-60&mid=03504492879460757173574144929457086740&aamlh=6&ce=UTF-8&ns=ubmtech&pageName=darkreading.com%20attacks%2Fbreaches%20jai%20vijayan%20widely%20known%20flaw%20in%20pulse%20secure%20vpn%20being%20used%20in%20ransomware%20attacks&g=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&cc=USD&events=event5&aamb=6G1ynYcLPuiQxYZrsz_pkqfLG9yMXBpb2zX5dvJdYQJzPXImdj0y&h1=Dark%20Reading%7CAttacks%2FBreaches&c2=1336729&v2=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&c3=Dark%20Reading%20%7C%201336729%20%7C%20Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20Ransomware%20Attacks&c4=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20Ransomware%20Attacks&c5=Attacks%2FBreaches%20-%20Attacks%2FBreaches&c7=Jai%20Vijayan&c8=2a01%3A4f8%3A192%3A5414%3A%3A2%20%7C%20Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&v10=thursday%7C8%3A30am&c11=News%20Analysis&v12=1336729&c13=thursday%7C8%3A30am&v13=www.darkreading.com&v15=First%20Visit&c17=New&v17=New&c19=Un-Registered&c20=20200106&c22=First%20Visit&c23=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&v28=Jai%20Vijayan&v37=News%20Analysis&c41=3&c48=1&v48=1&c50=2.8.2&v61=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&s=1600x1200&c=24&j=1.6&v=N&k=Y&bw=1600&bh=1200&mcorgid=77FB1CFE532B22840A490D45%40AdobeOrg&AQE=1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
15.188.105.205 Paris, France, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-15-188-105-205.eu-west-3.compute.amazonaws.com
Software
jag /
Resource Hash
a1ecbaed793a1f564c49c671f2dd0ce36f858534ef6d26b55783a06b884cc506
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
x-content-type-options
nosniff
x-c
master-1216.I0bfb28.M0-370
p3p
CP="This is not a P3P policy"
status
200
content-length
43
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Fri, 27 Mar 2020 12:54:30 GMT
server
jag
xserver
anedge-5cd6d4f775-7w7gs
etag
3404249640773976064-4613909862845437332
vary
*
content-type
image/gif;charset=utf-8
access-control-allow-origin
*
cache-control
no-cache, no-store, max-age=0, no-transform, private
expires
Wed, 25 Mar 2020 12:54:30 GMT
tag.aspx
ml314.com/ Frame D0EB
26 KB
12 KB
Script
General
Full URL
https://ml314.com/tag.aspx?2622020
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/pentonmedia53440730609/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.16.75.38 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-16-75-38.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
9c6af299685617864c257472040f437ef951afec994720a24781931cc3527017

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 26 Mar 2020 12:54:29 GMT
Content-Encoding
gzip
Last-Modified
Thu, 26 Mar 2020 12:25:12 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, max-age=84642
Connection
keep-alive
Content-Length
11933
Expires
Fri, 27 Mar 2020 12:25:12 GMT
n.js
geo.moatads.com/
114 B
288 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1585227270497&de=215926730750&m=0&ar=b63606d9a9-clean&iw=e4a6545&q=2&cb=0&ym=0&cu=1585227270497&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=4655091588%3A2664366423%3A5296245972%3A138304748693&zMoatPS=TAPunit&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&bo=27868836&bp=43863396&bd=TAPunit&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1685%3A1717%3A0%3A0&fs=177454&na=455443624&cs=0&callback=MoatDataJsonpRequest_90632637
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/pentonmedia53440730609/moatad.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.254.71.178 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-34-254-71-178.eu-west-1.compute.amazonaws.com
Software
TornadoServer/4.5.3 /
Resource Hash
d562480240bd52db189bf57583fd0972038e55b05f7d4d3d180d5a4e1d419b8b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
server
TornadoServer/4.5.3
etag
"7717a5af4a08d42906189d3e6218b5c80ab4d939"
content-type
text/html; charset=UTF-8
status
200
cache-control
max-age=900
timing-allow-origin
*
content-length
114
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1585227270497&de=215926730750&m=0&ar=b63606d9a9-clean&iw=e4a6545&q=3&cb=0&ym=0&cu=1585227270497&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=4655091588%3A2664366423%3A5296245972%3A138304748693&zMoatPS=TAPunit&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&bo=27868836&bp=43863396&bd=TAPunit&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1685%3A1717%3A0%3A0&fs=177454&na=1622968454&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:30 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:30 GMT
/
api.bibblio.org/v1/content-item-url-ingestions/
0
414 B
XHR
General
Full URL
https://api.bibblio.org/v1/content-item-url-ingestions/
Requested by
Host: cdn.bibblio.org
URL: https://cdn.bibblio.org/rcm/4.9/bib-related-content.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.194.122 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-194-122.fra2.r.cloudfront.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Access-Control-Request-Method
POST
Origin
https://www.darkreading.com
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Access-Control-Request-Headers
authorization,content-type

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
via
1.1 96283be49fd5bce30b3a0e9559bd2d9e.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA2-C1
x-amz-apigw-id
J_7hEFVtjoEFzng=
x-amzn-requestid
70335931-1caf-476a-96e6-983e1523bd4a
access-control-allow-methods
POST,OPTIONS
content-type
application/json
status
200
x-cache
Miss from cloudfront
access-control-allow-origin
*
content-length
0
x-amz-cf-id
9KcTo3P67FpyzwqB-k5L9R4P5aIZtowkZjx9Nwfy9R04sKIiRi_9Rw==
access-control-allow-headers
Content-Type,X-Amz-Date,Authorization,X-Api-Key,X-Amz-Security-Token
widget_iframe.d0f13be8321eb432fba28cfc1c3351b1.html
platform.twitter.com/widgets/ Frame 9593
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/widget_iframe.d0f13be8321eb432fba28cfc1c3351b1.html?origin=https%3A%2F%2Fwww.darkreading.com
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/4197) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729

Response headers

Content-Encoding
gzip
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Age
572179
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Thu, 26 Mar 2020 12:54:30 GMT
Etag
"9fa476ae827f556d5b037fe43632370d+gzip"
Last-Modified
Thu, 19 Mar 2020 21:12:59 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/4197)
Vary
Accept-Encoding
X-Cache
HIT
Content-Length
5825
like.php
www.facebook.com/plugins/ Frame 236B
0
0
Document
General
Full URL
https://www.facebook.com/plugins/like.php?app_id=640989409269461&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D46%23cb%3Dfc78fcc310077c%26domain%3Dwww.darkreading.com%26origin%3Dhttps%253A%252F%252Fwww.darkreading.com%252Ff3754e240d442%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&layout=button&locale=en_US&sdk=joey&send=false&show_faces=false&width=87
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/all.js?hash=191a980866f4b4bf8d3ffff47058b46f&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;block-all-mixed-content;upgrade-insecure-requests;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www.facebook.com
:scheme
https
:path
/plugins/like.php?app_id=640989409269461&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D46%23cb%3Dfc78fcc310077c%26domain%3Dwww.darkreading.com%26origin%3Dhttps%253A%252F%252Fwww.darkreading.com%252Ff3754e240d442%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&layout=button&locale=en_US&sdk=joey&send=false&show_faces=false&width=87
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
fr=0s0SA5B6W3TnB7uPj..BefKYG...1.0.BefKYG.
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729

Response headers

status
200
cache-control
private, no-cache, no-store, must-revalidate
pragma
no-cache
strict-transport-security
max-age=15552000; preload
content-encoding
br
timing-allow-origin
*
content-security-policy
default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;block-all-mixed-content;upgrade-insecure-requests;
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
expires
Sat, 01 Jan 2000 00:00:00 GMT
content-type
text/html; charset="utf-8"
x-fb-debug
ojA1LFdk9kuZJY1bp3aXcs5/nXHQhQGy67q1EokiQHRAJXsrRRjilG4hP0Sqyxy2SabJ9OEkjSnwcX7zptk2RQ==
date
Thu, 26 Mar 2020 12:54:30 GMT Thu, 26 Mar 2020 12:54:30 GMT
alt-svc
h3-27=":443"; ma=3600
record.do
ins.techweb.com/beacon/ Frame 61F8
0
0
Document
General
Full URL
https://ins.techweb.com/beacon/record.do?a=68841bbbf037b3bd9eda236cfd0edcb96932f665438d7b833aaa994d869277ac&u=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%252Fd%252Fd-id%252F1336729&t=P
Requested by
Host: ins.techweb.com
URL: https://ins.techweb.com/beacon/js/beacon-min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6812:29f2 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

:method
GET
:authority
ins.techweb.com
:scheme
https
:path
/beacon/record.do?a=68841bbbf037b3bd9eda236cfd0edcb96932f665438d7b833aaa994d869277ac&u=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%252Fd%252Fd-id%252F1336729&t=P
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729

Response headers

status
204
date
Thu, 26 Mar 2020 12:54:31 GMT
set-cookie
__cfduid=d6231b6ab09d0be5a0a9e268b4fda9c521585227270; expires=Sat, 25-Apr-20 12:54:30 GMT; path=/; domain=.techweb.com; HttpOnly; SameSite=Lax Insights=35-cada667e-9071-4f1e-af0b-6fc2c3729f0b; Domain=.techweb.com; Expires=Tue, 25-Mar-2025 12:54:31 GMT; Path=/
p3p
CP='IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT'
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
57a10549acb363d7-FRA
elqCfg.min.js
img.en25.com/i/
6 KB
3 KB
Script
General
Full URL
https://img.en25.com/i/elqCfg.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.100.78.166 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a95-100-78-166.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6b4ebd6049c806e3eef1bd770b2d8b4fdd75803861ead3584ee753e41988efae
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Last-Modified
Wed, 22 Jan 2020 17:21:27 GMT
ETag
"164336148d1d51:0"
Vary
Accept-Encoding
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Cache-Control
no-cache, no-store
Date
Thu, 26 Mar 2020 12:54:30 GMT
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
application/x-javascript
Content-Length
2115
Expires
Thu, 26 Mar 2020 12:54:30 GMT
truncated
/ Frame 0341
211 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6a95ad3d78db7a45a992dc27bb9bdbd7adfd334323fb98dc8bdea2578c2b5e1f

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
moment~timeline~tweet.99ce5e0e4617985354c5c426d7e1b9f4.js
platform.twitter.com/js/
24 KB
8 KB
Script
General
Full URL
https://platform.twitter.com/js/moment~timeline~tweet.99ce5e0e4617985354c5c426d7e1b9f4.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40B6) /
Resource Hash
f13585ddb86f9ec0432f36eae40bcaabe3aad166eff8424b27082c2b8174a3a2

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 26 Mar 2020 12:54:30 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Mar 2020 21:12:51 GMT
Server
ECS (fcn/40B6)
Age
572179
Etag
"e137faa829d69782b030b8ae591989d1+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
7864
timeline.d228dcf3573461f298b082c9a5c0a42c.js
platform.twitter.com/js/
21 KB
7 KB
Script
General
Full URL
https://platform.twitter.com/js/timeline.d228dcf3573461f298b082c9a5c0a42c.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/4191) /
Resource Hash
72945876902af2cd35e37c7dc27c9a1ece0e3f3185100c36f5e55e468182467a

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 26 Mar 2020 12:54:30 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Mar 2020 21:12:51 GMT
Server
ECS (fcn/4191)
Age
572177
Etag
"cd03198280cd4775cf9715d3c461a225+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
6656
button.93a0c25c2d2f3081c705c98c2d9dec0e.js
platform.twitter.com/js/
7 KB
3 KB
Script
General
Full URL
https://platform.twitter.com/js/button.93a0c25c2d2f3081c705c98c2d9dec0e.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/4191) /
Resource Hash
cef013ba053c40f6bfa36baf6b11dca3426b1697bb52bec0902a4746f5f7d169

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 26 Mar 2020 12:54:30 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Mar 2020 21:12:50 GMT
Server
ECS (fcn/4191)
Age
572179
Etag
"0745fc0bb127ba13d716d66761b4628d+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
2298
Cookie set login.jsp
ng.techweb.com/authds/login/ Frame A358
0
0
Document
General
Full URL
https://ng.techweb.com/authds/login/login.jsp?type=iframe&cdsocket_client=https://www.darkreading.com/cdsocket_proxy.html
Requested by
Host: img.deusm.com
URL: https://img.deusm.com/darkreading/JQuery_Library/Jquery_3.4.1.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2620:103::192:155:48:119 , United States, ASN19994 (RACKSPACE, US),
Reverse DNS
Software
NG /
Resource Hash

Request headers

Host
ng.techweb.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729

Response headers

Set-Cookie
JSESSIONID=A526D2C40B1164371BC45ADBE40C2041; Path=/; Secure; HttpOnly
vary
accept-encoding
Content-Type
text/html;charset=ISO-8859-1
Content-Length
755
Date
Thu, 26 Mar 2020 12:54:30 GMT
Server
NG
Content-Encoding
gzip
Connection
Keep-Alive
ping
ping.chartbeat.net/
43 B
168 B
Image
General
Full URL
https://ping.chartbeat.net/ping?h=darkreading.com&p=%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&u=86ydoC_muenQqQYI&d=darkreading.com&g=53678&g0=News&g1=Jai%20Vijayan&n=1&f=00001&c=0&x=0&m=0&y=5108&o=1585&w=1200&j=45&R=1&W=0&I=0&E=0&e=0&r=&b=2399&t=BZLJZpIoavKBfQY5VCm4vlrDQvSzC&V=118&i=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&tz=-60&sn=1&sv=4OZ9exsy-dCIS-rMBFCsFeDv3klr&sd=1&im=067b0fff&_
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.172.119.91 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-54-172-119-91.compute-1.amazonaws.com
Software
/
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

status
200
pragma
no-cache
date
Thu, 26 Mar 2020 12:54:31 GMT
cache-control
no-cache, no-store, must-revalidate
expires
0
content-length
43
content-type
image/gif
web.js
cache-ssl.celtra.com/api/creatives/7e8a629a/compiled/ Frame D0EB
621 KB
131 KB
Script
General
Full URL
https://cache-ssl.celtra.com/api/creatives/7e8a629a/compiled/web.js?v=96-c00c0ae303&secure=1&cachedVariantChoices=W10-&eventMetadataExperiment=newMeta&inmobi=0&adx-in-banner-video=1
Requested by
Host: ads.celtra.com
URL: https://ads.celtra.com/ac76bfd5/web.js?&clickUrl=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjstpGKLkTYSFTVomXnboefv5bvQVndMxL37fFXKfUhCibfm-V2rhiClTtcRuJbAjME0e2J87dhoTFuO8iyrcu-T1SLGw3HhMDLWIYEaYfCkkHWO0RazPNojRGOgMI_Gil9elHkQebj9k5MlA69TqHyHx-iMV6Hz7MtMSalpwMQ5yePJSjar_Gve8pm6BmfGFOY4oUPf8xiVsgZpLEItf3m2mHIM_RB4dsT9pjnyUYWCqVtRYQqjZm7ZPt4yoe8pWaNbQw6nbn-8V9i8GAhlxCnrC0DNnlDar%26sai%3DAMfl-YS0VZbiVIfcCEM7dRns6kcc1xvDU3jZYRsLVukqMFAVbB_pK8T-kuXsC1H0ouQgAnz2GHBCsbGS9BBuL74V8i7yYvwLh4W0QJwI76ZJPA%26sig%3DCg0ArKJSzLIJCq6UbR_OEAE%26urlfix%3D1%26adurl%3D&expandDirection=undefined&clickEvent=advertiser&iosAdvId=&androidAdvId=&externalAdServer=DFPPremium&tagVersion=6&externalCreativeId=138304748693&externalPlacementId=43863396&externalSiteId=27868836&externalSiteName=darkreading.com&externalLineItemId=5296245972&externalCampaignId=2664366423&externalAdvertiserId=4655091588&scriptId=celtra-script-1&clientTimestamp=1585227270.303&clientTimeZoneOffsetInMinutes=-60&hostPageLoadId=4389032988725605
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
053dd2e30a4934c03fe5ac64cae432dce02bcda4046715034a41bc5e2f56103b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 08:53:04 GMT
content-encoding
gzip
age
14485
x-cache
Hit from cloudfront
status
200
content-length
133678
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
server
Apache
etag
"192e5cea6710c0040f9e9677f846457bf768a195c28d7db720d3a51662d6e970"
vary
Accept-Encoding
x-varnish
1704586
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
6PBZOpDrVeWDSuWedtmIElPKluHoBdeTZUIpxymEZ-TFzZnMWlFyig==
truncated
/ Frame D0EB
167 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d26432e661658ef9d3d538b1f71b1478193f6c141f1cd7dfed03e5b677d178c2

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
e4d96749-5287-4363-bd19-fe796d8f4f2d
https://www.darkreading.com/ Frame D0EB
167 B
0
Image
General
Full URL
blob:https://www.darkreading.com/e4d96749-5287-4363-bd19-fe796d8f4f2d
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d26432e661658ef9d3d538b1f71b1478193f6c141f1cd7dfed03e5b677d178c2

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Content-Length
167
Content-Type
image/png
/
api.bibblio.org/v1/content-item-url-ingestions/
175 B
546 B
XHR
General
Full URL
https://api.bibblio.org/v1/content-item-url-ingestions/
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.194.122 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-194-122.fra2.r.cloudfront.net
Software
/
Resource Hash
6daa62ec3812d8c4cc65448351cefcbe9a190ecec9c63cc261d28a851632d5fa

Request headers

Authorization
Bearer cad9e1a0-1087-4b12-918a-6a2155eb25a3
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Origin
https://www.darkreading.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/json

Response headers

date
Thu, 26 Mar 2020 12:54:31 GMT
via
1.1 96283be49fd5bce30b3a0e9559bd2d9e.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA2-C1
x-amzn-requestid
ccf34843-2c5e-4f21-9244-e1273bb93f28
status
422
x-cache
Error from cloudfront
content-type
application/json
access-control-allow-origin
*
x-amzn-trace-id
Root=1-5e7ca606-a62d3cc76ccc49636ce71a5e;Sampled=0
x-amz-apigw-id
J_7hFErnDoEFtIg=
content-length
175
x-amz-cf-id
1ma7GncBOLcnlLSy94P7j3NAqbFDBpxg4DVwFMeqiprlyhfXhza-IQ==
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1585227270574&de=12780450735&m=0&ar=b63606d9a9-clean&iw=e4a6545&q=7&cb=0&ym=0&cu=1585227270574&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=4655091588%3A2664366423%3A5296245972%3A138304213647&zMoatPS=rec1&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&bo=27868836&bp=43863396&bd=rec1&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1685%3A1717%3A0%3A0&fs=177454&na=228741025&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:30 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:30 GMT
lidar.js
www.googletagservices.com/activeview/js/current/ Frame 0467
75 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/lidar.js?cache=r20110914
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adj/N510001.149354UBM2/B23930244.270297909;dc_ver=55.153;sz=640x480;u_sd=1;dc_adk=2097677786;ord=ykbq3w;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsvBZOVfqmoZIzSYos4JtlGpStH_YOTPu_dR1g1T_oon-gXsgGay_uEuFSc1V9QS-3GLfpZwilEJfU-L8cbBUjnT4lg9b2ChfUHLKx5fxeYXvZWnpp33hL98rSjkB-iHCS1WfexmWpPKWqL1cUzRPR7T8AqzaHXMkGJaeV4Qlgqpnb4WISOHsCgbiiTZTGx-lr_HApcBNtt6BZxseEaenCIkgsxF1eFDZxoY6uF12nRetDOHgzWQVSGGx0AZJHNiT9qvST0MfRI4A7CHU6MitJN8Lu4%26sai%3DAMfl-YT2CbN8I6jPgPgPdnXNV_XWqeTYx1jLdk26SV0etoyKPxxESBqG2XD5ufp8KVA9x4WkT8QZQeUNuPfwF3GRPxRheZjHEY-9HGa2pw92Uw%26sig%3DCg0ArKJSzK2bY9LfxsDKEAE%26urlfix%3D1%26adurl%3D;dc_rfl=1,https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729$0;xdt=0;crlt=9YI'T6PxmD;osda=2;sttr=101;prcl=s?
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
43375fcfee5f30dcbc71fdb1e244854961ed40e0de4d2dc6799004817a7fc1da
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1585165059237800"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
27885
x-xss-protection
0
expires
Thu, 26 Mar 2020 12:54:30 GMT
view
googleads4.g.doubleclick.net/pcs/ Frame 0467
0
710 B
Other
General
Full URL
https://googleads4.g.doubleclick.net/pcs/view?xai=AKAOjssIpbIDS17iBcmQKemuQpV62jUrtsJaroWHCe3BZwmuQMMRL_Q2plQfMRYTEAOFblm-gQEtluH_f8FZqzKM2F5K9Mrk4J03nb1vMqLc4wprbER16hRVtoCpnXB9v95CLEwXtbJwNreHfPHeAyxiuA&sig=Cg0ArKJSzL5BvV9CIgr0EAE&urlfix=1&omid=0&rm=1&ctpt=1&cstd=0&cisv=r20200319.20975&adurl=
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adj/N510001.149354UBM2/B23930244.270297909;dc_ver=55.153;sz=640x480;u_sd=1;dc_adk=2097677786;ord=ykbq3w;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsvBZOVfqmoZIzSYos4JtlGpStH_YOTPu_dR1g1T_oon-gXsgGay_uEuFSc1V9QS-3GLfpZwilEJfU-L8cbBUjnT4lg9b2ChfUHLKx5fxeYXvZWnpp33hL98rSjkB-iHCS1WfexmWpPKWqL1cUzRPR7T8AqzaHXMkGJaeV4Qlgqpnb4WISOHsCgbiiTZTGx-lr_HApcBNtt6BZxseEaenCIkgsxF1eFDZxoY6uF12nRetDOHgzWQVSGGx0AZJHNiT9qvST0MfRI4A7CHU6MitJN8Lu4%26sai%3DAMfl-YT2CbN8I6jPgPgPdnXNV_XWqeTYx1jLdk26SV0etoyKPxxESBqG2XD5ufp8KVA9x4WkT8QZQeUNuPfwF3GRPxRheZjHEY-9HGa2pw92Uw%26sig%3DCg0ArKJSzK2bY9LfxsDKEAE%26urlfix%3D1%26adurl%3D;dc_rfl=1,https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729$0;xdt=0;crlt=9YI'T6PxmD;osda=2;sttr=101;prcl=s?
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Origin
https://www.darkreading.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
UFYwWwmt.js
tpc.googlesyndication.com/sodar/ Frame 0467
41 KB
15 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/UFYwWwmt.js
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adj/N510001.149354UBM2/B23930244.270297909;dc_ver=55.153;sz=640x480;u_sd=1;dc_adk=2097677786;ord=ykbq3w;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsvBZOVfqmoZIzSYos4JtlGpStH_YOTPu_dR1g1T_oon-gXsgGay_uEuFSc1V9QS-3GLfpZwilEJfU-L8cbBUjnT4lg9b2ChfUHLKx5fxeYXvZWnpp33hL98rSjkB-iHCS1WfexmWpPKWqL1cUzRPR7T8AqzaHXMkGJaeV4Qlgqpnb4WISOHsCgbiiTZTGx-lr_HApcBNtt6BZxseEaenCIkgsxF1eFDZxoY6uF12nRetDOHgzWQVSGGx0AZJHNiT9qvST0MfRI4A7CHU6MitJN8Lu4%26sai%3DAMfl-YT2CbN8I6jPgPgPdnXNV_XWqeTYx1jLdk26SV0etoyKPxxESBqG2XD5ufp8KVA9x4WkT8QZQeUNuPfwF3GRPxRheZjHEY-9HGa2pw92Uw%26sig%3DCg0ArKJSzK2bY9LfxsDKEAE%26urlfix%3D1%26adurl%3D;dc_rfl=1,https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729$0;xdt=0;crlt=9YI'T6PxmD;osda=2;sttr=101;prcl=s?
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5056305b09ad6474ea540f796c79be51d6b8e96043cb3d7bc4ef774e56765f4f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:03:11 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
3079
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
15207
x-xss-protection
0
last-modified
Tue, 03 Mar 2020 20:15:00 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 26 Mar 2021 12:03:11 GMT
MWB_Brand_Secure_AF_B2B_r2_v1_640x480.jpg
s0.2mdn.net/9812475/ Frame 0467
232 KB
233 KB
Image
General
Full URL
https://s0.2mdn.net/9812475/MWB_Brand_Secure_AF_B2B_r2_v1_640x480.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
6fad9ac78eae8e8cb645a0966c303b0269b2ee8229864cb0e45ffd909dbff29c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 04:31:08 GMT
x-content-type-options
nosniff
last-modified
Mon, 16 Mar 2020 15:07:43 GMT
server
sffe
age
30202
content-type
image/jpeg
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
cache-control
public, max-age=86400
accept-ranges
bytes
access-control-allow-origin
*
content-length
237851
x-xss-protection
0
expires
Fri, 27 Mar 2020 04:31:08 GMT
ad-overlay25.jpg
assets.informa.com/advert/ Frame 0467
12 KB
12 KB
Image
General
Full URL
https://assets.informa.com/advert/ad-overlay25.jpg
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
107.23.162.230 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-107-23-162-230.compute-1.amazonaws.com
Software
Apache/2.4.6 (CentOS) /
Resource Hash
a782f5c6312b15a57bc5cd6516c26c08bea8ebe5f27cf1062d08ed933c1e37a6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:31 GMT
last-modified
Fri, 25 Oct 2019 20:17:32 GMT
server
Apache/2.4.6 (CentOS)
etag
"2e7e-595c1d70f28f8"
content-type
image/jpeg
status
200
accept-ranges
bytes
content-length
11902
truncated
/ Frame 0467
214 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d4d6dbe7929f9ca4e64ea2eed6339c12a5018dbb72f3cf59e0ced522d013160

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
/
www.facebook.com/tr/
0
40 B
Other
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Origin
https://www.darkreading.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
multipart/form-data; boundary=----WebKitFormBoundary5eiviiVxdAdvuJb2

Response headers

strict-transport-security
max-age=31536000; includeSubDomains
server
proxygen-bolt
access-control-allow-origin
https://www.darkreading.com
date
Thu, 26 Mar 2020 12:54:30 GMT
content-type
text/plain
status
200
access-control-allow-credentials
true
alt-svc
h3-27=":443"; ma=3600
content-length
0
teads-format.min.js
a.teads.tv/media/format/v3/
669 KB
183 KB
Script
General
Full URL
https://a.teads.tv/media/format/v3/teads-format.min.js
Requested by
Host: a.teads.tv
URL: https://a.teads.tv/page/11512/tag
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.124 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-124.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a97a87aab3d2a0fc5ab6bf65c0bd99b4b83e1223e1ad986ce4f1a7745228e728

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
last-modified
Wed, 25 Mar 2020 10:17:22 GMT
x-amz-request-id
5C2DEB3B22E2DB89
etag
"93973942f5cf679c75b1c731e5bd519c"
vary
Accept-Encoding
content-type
text/javascript;charset=utf-8
status
200
cache-control
private, must-revalidate, max-age=600, no-transform
x-bucket
c
accept-ranges
bytes
content-length
186274
x-amz-id-2
yORGXW+/0vYCLMgxYEpVZS1oYWhnk6wusGOpRc6dbKjsLOadasa/QFl4UPSN9BX0P3fJAVeGiHs=
expires
Thu, 26 Mar 2020 13:04:30 GMT
svrGP.aspx
s657486201.t.eloqua.com/visitor/v200/
Redirect Chain
  • https://s657486201.t.eloqua.com/visitor/v200/svrGP?pps=50&siteid=657486201&DLKey=7435f16d0b5c4189a89d0d109d2517f5&DLLookup=&ms=919&firstPartyCookieDomain=trk.darkreading.com
  • https://s657486201.t.eloqua.com/visitor/v200/svrGP.aspx?pps=50&siteid=657486201&DLKey=7435f16d0b5c4189a89d0d109d2517f5&DLLookup=&ms=919&firstPartyCookieDomain=trk.darkreading.com&elqCookie=1
0
404 B
Script
General
Full URL
https://s657486201.t.eloqua.com/visitor/v200/svrGP.aspx?pps=50&siteid=657486201&DLKey=7435f16d0b5c4189a89d0d109d2517f5&DLLookup=&ms=919&firstPartyCookieDomain=trk.darkreading.com&elqCookie=1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
142.0.160.13 Ashburn, United States, ASN7160 (NETDYNAMICS, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000;
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Date
Thu, 26 Mar 2020 12:54:31 GMT
Vary
Accept-Encoding
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Cache-Control
private,no-cache, no-store
Content-Type
application/javascript
Content-Length
20
Expires
-1

Redirect headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
X-Content-Type-Options
nosniff
Date
Thu, 26 Mar 2020 12:54:30 GMT
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Location
//s657486201.t.eloqua.com/visitor/v200/svrGP.aspx?pps=50&siteid=657486201&DLKey=7435f16d0b5c4189a89d0d109d2517f5&DLLookup=&ms=919&firstPartyCookieDomain=trk.darkreading.com&elqCookie=1
Cache-Control
private,no-cache, no-store
Content-Type
text/html; charset=utf-8
Content-Length
325
Expires
-1
svrGP.aspx
trk.darkreading.com/visitor/v200/
Redirect Chain
  • https://s2150.t.eloqua.com/visitor/v200/svrGP?pps=3&siteid=2150&ref2=elqNone&tzo=-60&ms=919&optin=disabled&firstPartyCookieDomain=trk.darkreading.com
  • https://trk.darkreading.com/visitor/v200/svrGP.aspx?pps=3&siteid=2150&ref2=elqNone&tzo=-60&ms=919&optin=disabled&elq1pcGUID=21669A877CC34C64A0ECDC87B4DB6AC4
49 B
502 B
Image
General
Full URL
https://trk.darkreading.com/visitor/v200/svrGP.aspx?pps=3&siteid=2150&ref2=elqNone&tzo=-60&ms=919&optin=disabled&elq1pcGUID=21669A877CC34C64A0ECDC87B4DB6AC4
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
142.0.173.134 , United States, ASN7160 (NETDYNAMICS, US),
Reverse DNS
Software
/
Resource Hash
f1ccea6b7204d9f7913ab45e1afa51d79f83bd4f0319de937b0132e6e02b1aab
Security Headers
Name Value
Strict-Transport-Security max-age=31536000;
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
X-Content-Type-Options
nosniff
Date
Thu, 26 Mar 2020 12:54:32 GMT
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Cache-Control
private,no-cache, no-store
Content-Type
image/gif
Content-Length
49
Expires
-1

Redirect headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
X-Content-Type-Options
nosniff
Date
Thu, 26 Mar 2020 12:54:31 GMT
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Location
https://trk.darkreading.com/visitor/v200/svrGP.aspx?pps=3&siteid=2150&ref2=elqNone&tzo=-60&ms=919&optin=disabled&elq1pcGUID=21669A877CC34C64A0ECDC87B4DB6AC4
Cache-Control
private,no-cache, no-store
Content-Type
text/html; charset=utf-8
Content-Length
297
Expires
-1
profile
cdn.syndication.twimg.com/timeline/
171 KB
12 KB
Script
General
Full URL
https://cdn.syndication.twimg.com/timeline/profile?callback=__twttr.callbacks.tl_i0_profile_DarkReading_old&dnt=true&domain=www.darkreading.com&lang=en&screen_name=DarkReading&suppress_response_codes=true&t=1761363&tz=GMT%2B0100&with_replies=false
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (lcy/1D28) /
Resource Hash
facfcd4993946ff75ce0dbb0dd794833d43c3e4a00006e420749b7112b13a77d
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
206
x-cache
HIT
status
200
content-disposition
attachment; filename=jsonp.jsonp
strict-transport-security
max-age=631138519
content-length
11365
x-xss-protection
0
x-response-time
175
last-modified
Thu, 26 Mar 2020 12:51:04 GMT
server
ECS (lcy/1D28)
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/javascript;charset=utf-8
access-control-allow-origin
https://ton.smf1.twitter.com, https://ton.smf1.twitter.com
cache-control
must-revalidate, max-age=300
x-connection-hash
9dc8620219884f28a7e39e4678a5a891
accept-ranges
bytes
timing-allow-origin
*
x-transaction
0071ffa2000a5fac
expires
Thu, 26 Mar 2020 12:59:30 GMT
syndication
syndication.twitter.com/i/jot/
43 B
361 B
Image
General
Full URL
https://syndication.twitter.com/i/jot/syndication?dnt=1&l=%7B%22_category_%22%3A%22syndicated_impression%22%2C%22triggered_on%22%3A1585227270927%2C%22dnt%22%3Atrue%2C%22event_namespace%22%3A%7B%22client%22%3A%22tfw%22%2C%22page%22%3A%22timeline%22%2C%22action%22%3A%22impression%22%7D%7D
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.200 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_f /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:31 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
strict-transport-security
max-age=631138519
content-length
65
x-xss-protection
0
x-response-time
119
pragma
no-cache
last-modified
Thu, 26 Mar 2020 12:54:30 GMT
server
tsa_f
x-frame-options
SAMEORIGIN
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
5b2e30183ef4bea390cb9f02e7b68a66
x-transaction
002b3db600915e69
expires
Tue, 31 Mar 1981 05:00:00 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F9835165613398450709&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270574&de=12780450735&cu=1585227270574&m=18&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5108&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A1685%3A1717%3A0%3A0&as=0&ag=4&an=0&gf=4&gg=0&ix=4&ic=4&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=4&bx=0&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=0&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=7&cd=0&ah=7&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=4655091588%3A2664366423%3A5296245972%3A138304213647&bo=27868836&bp=43863396&bd=rec1&zMoatPS=rec1&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=1698544837&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:30 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:30 GMT
Enqz_20U.html
tpc.googlesyndication.com/sodar/ Frame E34D
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/Enqz_20U.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/UFYwWwmt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/Enqz_20U.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
8395
date
Thu, 26 Mar 2020 12:04:03 GMT
expires
Fri, 26 Mar 2021 12:04:03 GMT
last-modified
Tue, 03 Mar 2020 20:15:00 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
3027
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
tweet_button.d0f13be8321eb432fba28cfc1c3351b1.en.html
platform.twitter.com/widgets/ Frame 89F2
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/tweet_button.d0f13be8321eb432fba28cfc1c3351b1.en.html
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/4191) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729

Response headers

Content-Encoding
gzip
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Age
572179
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Thu, 26 Mar 2020 12:54:30 GMT
Etag
"4bd78bc4ddc705866241ed8372023e4e+gzip"
Last-Modified
Thu, 19 Mar 2020 21:12:56 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/4191)
Vary
Accept-Encoding
X-Cache
HIT
Content-Length
12387
view
googleads4.g.doubleclick.net/pcs/ Frame 0467
0
57 B
Other
General
Full URL
https://googleads4.g.doubleclick.net/pcs/view?xai=AKAOjssIpbIDS17iBcmQKemuQpV62jUrtsJaroWHCe3BZwmuQMMRL_Q2plQfMRYTEAOFblm-gQEtluH_f8FZqzKM2F5K9Mrk4J03nb1vMqLc4wprbER16hRVtoCpnXB9v95CLEwXtbJwNreHfPHeAyxiuA&sig=Cg0ArKJSzL5BvV9CIgr0EAE&urlfix=1&omid=0&rm=1&ctpt=112&vt=11&dtpt=111&dett=2&cstd=0&cisv=r20200319.20975&adurl=
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adj/N510001.149354UBM2/B23930244.270297909;dc_ver=55.153;sz=640x480;u_sd=1;dc_adk=2097677786;ord=ykbq3w;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsvBZOVfqmoZIzSYos4JtlGpStH_YOTPu_dR1g1T_oon-gXsgGay_uEuFSc1V9QS-3GLfpZwilEJfU-L8cbBUjnT4lg9b2ChfUHLKx5fxeYXvZWnpp33hL98rSjkB-iHCS1WfexmWpPKWqL1cUzRPR7T8AqzaHXMkGJaeV4Qlgqpnb4WISOHsCgbiiTZTGx-lr_HApcBNtt6BZxseEaenCIkgsxF1eFDZxoY6uF12nRetDOHgzWQVSGGx0AZJHNiT9qvST0MfRI4A7CHU6MitJN8Lu4%26sai%3DAMfl-YT2CbN8I6jPgPgPdnXNV_XWqeTYx1jLdk26SV0etoyKPxxESBqG2XD5ufp8KVA9x4WkT8QZQeUNuPfwF3GRPxRheZjHEY-9HGa2pw92Uw%26sig%3DCg0ArKJSzK2bY9LfxsDKEAE%26urlfix%3D1%26adurl%3D;dc_rfl=1,https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729$0;xdt=0;crlt=9YI'T6PxmD;osda=2;sttr=101;prcl=s?
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Origin
https://www.darkreading.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1585227270596&de=545077868720&m=0&ar=b63606d9a9-clean&iw=e4a6545&q=11&cb=0&ym=0&cu=1585227270596&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=4655091588%3A2664366423%3A5296245972%3A138304147575&zMoatPS=wallpaper&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&bo=27868836&bp=43863396&bd=wallpaper&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1685%3A1717%3A0%3A0&fs=177454&na=648790507&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:30 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:30 GMT
sMvA6z5o
pbs.twimg.com/card_img/1242909366086520838/ Frame F74C
7 KB
7 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1242909366086520838/sMvA6z5o?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41AB) /
Resource Hash
79a349acf01a0cee1c89d28d9406e0ebf55922ddd4d80d9b2081d66f9c396afb
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
x-content-type-options
nosniff
age
59426
x-cache
HIT
status
200
content-length
6844
x-response-time
146
surrogate-key
card_img card_img/bucket/6 card_img/1242909366086520838
last-modified
Wed, 25 Mar 2020 20:18:59 GMT
server
ECS (fcn/41AB)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
e5a7b97c8a6205db8f65bf8511eb4517
accept-ranges
bytes
IAHm30Pi
pbs.twimg.com/card_img/1242138468597166085/ Frame F74C
7 KB
8 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1242138468597166085/IAHm30Pi?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40E8) /
Resource Hash
3096df8c138a886695803d3b6eb1061837b63d194ffbbdab834e6afece58d753
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
x-content-type-options
nosniff
age
64757
x-cache
HIT
status
200
content-length
7670
x-response-time
144
surrogate-key
card_img card_img/bucket/0 card_img/1242138468597166085
last-modified
Mon, 23 Mar 2020 17:15:43 GMT
server
ECS (fcn/40E8)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
62ae909906be67c9f9f88d5aed77a56b
accept-ranges
bytes
EXl5uDcp
pbs.twimg.com/card_img/1242199048012156928/ Frame F74C
7 KB
7 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1242199048012156928/EXl5uDcp?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41A4) /
Resource Hash
163a508ae0ef52fc9d295da555959a8064477867164c82ecaed44ed96b0a591c
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
x-content-type-options
nosniff
age
228958
x-cache
HIT
status
200
content-length
6746
x-response-time
147
surrogate-key
card_img card_img/bucket/8 card_img/1242199048012156928
last-modified
Mon, 23 Mar 2020 21:16:26 GMT
server
ECS (fcn/41A4)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
8992401ae21e79cd170658b2773469c5
accept-ranges
bytes
fmnNZsnD
pbs.twimg.com/card_img/1242480066069700608/ Frame F74C
8 KB
8 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1242480066069700608/fmnNZsnD?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40FB) /
Resource Hash
27c6237a14abbf4ca473b4036c4c94b39c43a78b4ef567cd9dbee365689427fb
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:30 GMT
x-content-type-options
nosniff
age
161950
x-cache
HIT
status
200
content-length
7999
x-response-time
200
surrogate-key
card_img card_img/bucket/3 card_img/1242480066069700608
last-modified
Tue, 24 Mar 2020 15:53:06 GMT
server
ECS (fcn/40FB)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
cec807f02feefece1c7bf64e471027c1
accept-ranges
bytes
timeline.d41c1d7e4bac44f4658ca45d09564e79.light.ltr.css
platform.twitter.com/css/ Frame F74C
52 KB
12 KB
Stylesheet
General
Full URL
https://platform.twitter.com/css/timeline.d41c1d7e4bac44f4658ca45d09564e79.light.ltr.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/419E) /
Resource Hash
12bf529a0f4d0a3f10d003a07d5b91e40579a3da18022a9896a9ccd9e5dc1b33

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Thu, 26 Mar 2020 12:54:31 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Mar 2020 21:12:47 GMT
Server
ECS (fcn/419E)
Age
572180
Etag
"0100ec69a2c00683a1ae89e074b822c1+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
text/css; charset=utf-8
Content-Length
12155
timeline.d41c1d7e4bac44f4658ca45d09564e79.light.ltr.css
platform.twitter.com/css/
52 KB
52 KB
Image
General
Full URL
https://platform.twitter.com/css/timeline.d41c1d7e4bac44f4658ca45d09564e79.light.ltr.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/419E) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 26 Mar 2020 12:54:31 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Mar 2020 21:12:47 GMT
Server
ECS (fcn/419E)
Age
572180
Etag
"0100ec69a2c00683a1ae89e074b822c1+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
text/css; charset=utf-8
Content-Length
12155
p
sb.scorecardresearch.com/
43 B
309 B
Image
General
Full URL
https://sb.scorecardresearch.com/p?c1=2&c2=17198971&ns_ap_sv=2.1511.10&ns_type=hidden&ns_st_it=a&ns_st_sv=4.0.0&ns_st_ad=1&ns_st_sq=1&ns_st_id=1585227271129&ns_st_ec=1&ns_st_cn=1&ns_st_ev=play&ns_st_ct=va00&ns_st_cl=0&ns_st_pt=0&c3=*null&c4=*null&c6=*null&ns_ts=55701593&cs_ucfr=1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
172.227.85.103 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a172-227-85-103.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Thu, 26 Mar 2020 12:54:31 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Expires
Mon, 01 Jan 1990 00:00:00 GMT
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
track
t.teads.tv/
23 B
143 B
Image
General
Full URL
https://t.teads.tv/track?action=placementCall&ts=1585227271126&pageId=11512&pid=21882&env=js-web&pfid=[pfid]&f=1&auctid=76ed9b85-218d-49f2-9cc2-2a7db749ba86&fv=297&referer=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.124 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-124.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
328e90a318268aea96180cc31666ae6d6f79d90d078c123bc3d98ee08a192fb7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

status
200
date
Thu, 26 Mar 2020 12:54:31 GMT
cache-control
max-age=0, no-cache, no-store
content-type
image/gif
content-length
23
expires
Sat, 26 Jul 1997 05:00:00 GMT
track
t.teads.tv/
23 B
143 B
Image
General
Full URL
https://t.teads.tv/track?action=slotAvailable&ts=1585227271127&pageId=11512&pid=21882&env=js-web&pfid=[pfid]&f=1&slot=native&auctid=76ed9b85-218d-49f2-9cc2-2a7db749ba86&fv=297&referer=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.124 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-124.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
328e90a318268aea96180cc31666ae6d6f79d90d078c123bc3d98ee08a192fb7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

status
200
date
Thu, 26 Mar 2020 12:54:31 GMT
cache-control
max-age=0, no-cache, no-store
content-type
image/gif
content-length
23
expires
Sat, 26 Jul 1997 05:00:00 GMT
ad
a.teads.tv/page/11512/
32 KB
4 KB
XHR
General
Full URL
https://a.teads.tv/page/11512/ad?windowWidth=1600&windowHeight=1200&windowDepth=1&windowReferrerUrl=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&page=%7B%22id%22%3A11512%2C%22placements%22%3A%5B%7B%22id%22%3A21882%2C%22validity%22%3A%7B%22status%22%3Atrue%2C%22reasons%22%3A%5B%5D%7D%2C%22player%22%3A%7B%22width%22%3A489%2C%22height%22%3A275%7D%2C%22slotType%22%3A%22native%22%7D%5D%2C%22gdpr_iab%22%3A%7B%22status%22%3A22%2C%22consent%22%3A%22%22%2C%22reason%22%3A220%7D%7D&auctid=76ed9b85-218d-49f2-9cc2-2a7db749ba86&userId=83a31af8-9227-4fc5-b43d-f5a747eb90c6&formatVersion=2.22.61&env=js-web&netBw=9&ttfb=906
Requested by
Host: a.teads.tv
URL: https://a.teads.tv/media/format/v3/teads-format.min.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.124 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-124.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
03d819df04c8bb5e0f29846287427f2e1a0dfe3ec28d25204894507af1ad04f2

Request headers

Accept
application/json; charset=UTF-8
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Origin
https://www.darkreading.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:31 GMT
content-encoding
gzip
status
200
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
https://www.darkreading.com
cache-control
max-age=0, no-cache, no-store
access-control-allow-credentials
true
content-length
4144
expires
Thu, 26 Mar 2020 12:54:31 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1585227270670&de=854099274091&m=0&ar=b63606d9a9-clean&iw=e4a6545&q=15&cb=0&ym=0&cu=1585227270670&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=4655091588%3A2668166299%3A5327424477%3A138306392388&zMoatPS=native&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&bo=27868836&bp=43863396&bd=native&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1685%3A1717%3A0%3A2210&fs=177454&na=718480264&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:31 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:31 GMT
sMvA6z5o
pbs.twimg.com/card_img/1242909366086520838/ Frame F74C
7 KB
7 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1242909366086520838/sMvA6z5o?format=jpg&name=144x144_2
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/js/moment~timeline~tweet.99ce5e0e4617985354c5c426d7e1b9f4.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41AB) /
Resource Hash
79a349acf01a0cee1c89d28d9406e0ebf55922ddd4d80d9b2081d66f9c396afb
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:31 GMT
x-content-type-options
nosniff
age
59427
x-cache
HIT
status
200
content-length
6844
x-response-time
146
surrogate-key
card_img card_img/bucket/6 card_img/1242909366086520838
last-modified
Wed, 25 Mar 2020 20:18:59 GMT
server
ECS (fcn/41AB)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
e5a7b97c8a6205db8f65bf8511eb4517
accept-ranges
bytes
IAHm30Pi
pbs.twimg.com/card_img/1242138468597166085/ Frame F74C
7 KB
8 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1242138468597166085/IAHm30Pi?format=jpg&name=144x144_2
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/js/moment~timeline~tweet.99ce5e0e4617985354c5c426d7e1b9f4.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40E8) /
Resource Hash
3096df8c138a886695803d3b6eb1061837b63d194ffbbdab834e6afece58d753
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:31 GMT
x-content-type-options
nosniff
age
64758
x-cache
HIT
status
200
content-length
7670
x-response-time
144
surrogate-key
card_img card_img/bucket/0 card_img/1242138468597166085
last-modified
Mon, 23 Mar 2020 17:15:43 GMT
server
ECS (fcn/40E8)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
62ae909906be67c9f9f88d5aed77a56b
accept-ranges
bytes
EXl5uDcp
pbs.twimg.com/card_img/1242199048012156928/ Frame F74C
7 KB
7 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1242199048012156928/EXl5uDcp?format=jpg&name=144x144_2
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/js/moment~timeline~tweet.99ce5e0e4617985354c5c426d7e1b9f4.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41A4) /
Resource Hash
163a508ae0ef52fc9d295da555959a8064477867164c82ecaed44ed96b0a591c
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:31 GMT
x-content-type-options
nosniff
age
228959
x-cache
HIT
status
200
content-length
6746
x-response-time
147
surrogate-key
card_img card_img/bucket/8 card_img/1242199048012156928
last-modified
Mon, 23 Mar 2020 21:16:26 GMT
server
ECS (fcn/41A4)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
8992401ae21e79cd170658b2773469c5
accept-ranges
bytes
fmnNZsnD
pbs.twimg.com/card_img/1242480066069700608/ Frame F74C
8 KB
8 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1242480066069700608/fmnNZsnD?format=jpg&name=144x144_2
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/js/moment~timeline~tweet.99ce5e0e4617985354c5c426d7e1b9f4.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40FB) /
Resource Hash
27c6237a14abbf4ca473b4036c4c94b39c43a78b4ef567cd9dbee365689427fb
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:31 GMT
x-content-type-options
nosniff
age
161951
x-cache
HIT
status
200
content-length
7999
x-response-time
200
surrogate-key
card_img card_img/bucket/3 card_img/1242480066069700608
last-modified
Tue, 24 Mar 2020 15:53:06 GMT
server
ECS (fcn/40FB)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
cec807f02feefece1c7bf64e471027c1
accept-ranges
bytes
A4mG0U5P_normal.jpg
pbs.twimg.com/profile_images/885169621795565573/ Frame F74C
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/885169621795565573/A4mG0U5P_normal.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40B4) /
Resource Hash
25b438de3e944547e69c6de98e403f46a9aa4fb98e6d1bb34954fd30ebc19b56
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:31 GMT
x-content-type-options
nosniff
age
113081
x-cache
HIT
status
200
content-length
1883
x-response-time
126
surrogate-key
profile_images profile_images/bucket/8 profile_images/885169621795565573
last-modified
Wed, 12 Jul 2017 16:08:58 GMT
server
ECS (fcn/40B4)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
44dbe73c9af8b7150a93b915e353bced
accept-ranges
bytes
syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
ton.twimg.com/tfw/css/ Frame F74C
44 KB
7 KB
Stylesheet
General
Full URL
https://ton.twimg.com/tfw/css/syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/418C) /
Resource Hash
a549034009f79ead18a2154a8b730d8acb61e2f36c0434c0f9cff0f73df5d8cf
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Thu, 26 Mar 2020 12:54:31 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
463469
x-ton-expected-size
45170
x-cache
HIT
status
200
strict-transport-security
max-age=631138519
content-length
6839
x-response-time
10
surrogate-key
tfw
last-modified
Tue, 14 May 2019 18:53:54 GMT
server
ECS (fcn/418C)
etag
"4mhImCFS9rptiUICNnLD1g=="
vary
Accept-Encoding
content-type
text/css
access-control-allow-origin
*
x-connection-hash
816d07141f1ca411e004dca2884319c2
accept-ranges
bytes
expires
Thu, 02 Apr 2020 12:54:31 GMT
syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
ton.twimg.com/tfw/css/
44 KB
44 KB
Image
General
Full URL
https://ton.twimg.com/tfw/css/syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/418C) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:31 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
463469
x-ton-expected-size
45170
x-cache
HIT
status
200
strict-transport-security
max-age=631138519
content-length
6839
x-response-time
10
surrogate-key
tfw
last-modified
Tue, 14 May 2019 18:53:54 GMT
server
ECS (fcn/418C)
etag
"4mhImCFS9rptiUICNnLD1g=="
vary
Accept-Encoding
content-type
text/css
access-control-allow-origin
*
x-connection-hash
816d07141f1ca411e004dca2884319c2
accept-ranges
bytes
expires
Thu, 02 Apr 2020 12:54:31 GMT
truncated
/ Frame F74C
825 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
45055babdbc02ea34c7baa53f33fc68389c4c5f73afe0bfafd6c9bc5733399bc

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/ Frame F74C
572 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
abd2a457215e60ab60b2a6b4f25a17583c5d80e13935f76e097236f729c5dcd6

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/ Frame F74C
644 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a87f4fd815fc95288f2da6efc536c950ef940bd9eb52176fd9e8e56107cc65e2

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg1MjI3MjcweGMxOTJmY2M2NWE4YTNleDcyNjg0NzY2IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4Nzg4MjA5OTA4ODg4ODIyIiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg1MjI3MjcweGMxOTJmY2M2NWE4YTNleDcyNjg0NzY2IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4Nzg4MjA5OTA4ODg4ODIyIiwiaW5kZXgiOjAsImNsaWVudFRpbWVzdGFtcCI6MTU4NTIyNzI3MS4xNTUsIm5hbWUiOiJjb250YWluZXJCZWNhbWVWaWV3YWJsZSJ9XX0=?crc32c=2440196536
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.227.6.166 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-227-6-166.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Thu, 26 Mar 2020 12:54:31 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1585227270682&de=922849587863&m=0&ar=b63606d9a9-clean&iw=e4a6545&q=19&cb=0&ym=0&cu=1585227270682&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=21887076%3A2680018979%3A5334439834%3A138307481617&zMoatPS=rec2&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&bo=27868836&bp=43863396&bd=rec2&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1685%3A1717%3A0%3A2210&fs=177454&na=1576893494&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:31 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:31 GMT
iframe
sync.teads.tv/ Frame C1E1
0
0
Document
General
Full URL
https://sync.teads.tv/iframe?pid=21882&userId=83a31af8-9227-4fc5-b43d-f5a747eb90c6&gdprIab={%22status%22:22,%22consent%22:%22%22,%22reason%22:220}&fromFormat=true&env=js-web&vid=95d9fe91-1fd5-4ce4-9919-66f57bf932db&1585227271311
Requested by
Host: a.teads.tv
URL: https://a.teads.tv/media/format/v3/teads-format.min.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.248.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-248-12.deploy.static.akamaitechnologies.com
Software
akka-http/10.1.5 /
Resource Hash

Request headers

:method
GET
:authority
sync.teads.tv
:scheme
https
:path
/iframe?pid=21882&userId=83a31af8-9227-4fc5-b43d-f5a747eb90c6&gdprIab={%22status%22:22,%22consent%22:%22%22,%22reason%22:220}&fromFormat=true&env=js-web&vid=95d9fe91-1fd5-4ce4-9919-66f57bf932db&1585227271311
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
cs=1; tt_viewer=95d9fe91-1fd5-4ce4-9919-66f57bf932db
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729

Response headers

status
200
content-type
text/html; charset=UTF-8
server
akka-http/10.1.5
vary
Accept-Encoding
content-encoding
gzip
expires
Thu, 26 Mar 2020 12:54:32 GMT
cache-control
max-age=0, no-cache, no-store
pragma
no-cache
date
Thu, 26 Mar 2020 12:54:32 GMT
content-length
623
set-cookie
tt_bluekai=; Expires=Fri, 27 Mar 2020 12:54:31 GMT; Max-Age=86400; Domain=.teads.tv; Path=/; Secure; SameSite=None tt_exelate=; Expires=Fri, 27 Mar 2020 12:54:31 GMT; Max-Age=86400; Domain=.teads.tv; Path=/; Secure; SameSite=None tt_emetriq=; Expires=Fri, 27 Mar 2020 12:54:31 GMT; Max-Age=86400; Domain=.teads.tv; Path=/; Secure; SameSite=None tt_liveramp=; Expires=Fri, 27 Mar 2020 12:54:31 GMT; Max-Age=86400; Domain=.teads.tv; Path=/; Secure; SameSite=None tt_neustar=; Expires=Fri, 27 Mar 2020 12:54:31 GMT; Max-Age=86400; Domain=.teads.tv; Path=/; Secure; SameSite=None tt_salesforce=; Expires=Fri, 27 Mar 2020 12:54:31 GMT; Max-Age=86400; Domain=.teads.tv; Path=/; Secure; SameSite=None tt_dar=; Expires=Fri, 27 Mar 2020 12:54:31 GMT; Max-Age=86400; Domain=.teads.tv; Path=/; Secure; SameSite=None tt_skp=; Expires=Fri, 27 Mar 2020 12:54:31 GMT; Max-Age=86400; Domain=.teads.tv; Path=/; Secure; SameSite=None tt_retargetly=; Expires=Fri, 27 Mar 2020 12:54:31 GMT; Max-Age=86400; Domain=.teads.tv; Path=/; Secure; SameSite=None
track
t.teads.tv/
23 B
143 B
Image
General
Full URL
https://t.teads.tv/track?action=adReceived&ts=1585227271127&pageId=11512&pid=21882&env=js-web&pfid=1&f=1&slot=native&auctid=76ed9b85-218d-49f2-9cc2-2a7db749ba86&vid=95d9fe91-1fd5-4ce4-9919-66f57bf932db&fv=297&referer=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.124 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-124.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
328e90a318268aea96180cc31666ae6d6f79d90d078c123bc3d98ee08a192fb7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

status
200
date
Thu, 26 Mar 2020 12:54:31 GMT
cache-control
max-age=0, no-cache, no-store
content-type
image/gif
content-length
23
expires
Sat, 26 Jul 1997 05:00:00 GMT
truncated
/
669 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
35463ce93e7c820faa404db98d939ff640ae78ca0e29be043861853c9e07c586

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml
player-sprite.svg
a.teads.tv/media/format/v3/assets/default/ Frame 386F
9 KB
4 KB
Image
General
Full URL
https://a.teads.tv/media/format/v3/assets/default/player-sprite.svg
Requested by
Host: a.teads.tv
URL: https://a.teads.tv/media/format/v3/teads-format.min.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.124 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-124.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3ba7f40e2b4080979389e9b81e6d0ed155e9b7f74b3310bc1289ee70cba2035d

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:31 GMT
content-encoding
gzip
last-modified
Thu, 25 Jul 2019 15:14:19 GMT
x-amz-request-id
12C29EFD4D39087B
etag
"6a80cb691946e09ba579b0f8456aae28"
vary
Accept-Encoding
content-type
image/svg+xml
status
200
cache-control
private, must-revalidate, max-age=16070400
x-bucket
9
accept-ranges
bytes
content-length
3379
x-amz-id-2
vnDI7UrshJlqk4R3Wclk520+wFDskdSlFRcrhRoxKaZ6ae81c3dmuqfd4+tbvpWkL1kDLpz3U3Y=
expires
Mon, 28 Sep 2020 12:54:31 GMT
truncated
/ Frame 386F
669 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
35463ce93e7c820faa404db98d939ff640ae78ca0e29be043861853c9e07c586

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/ Frame 8A8A
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame 8A8A
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
track
t.teads.tv/
23 B
143 B
Image
General
Full URL
https://t.teads.tv/track?action=adAvailable-success&ts=1585227271127&pageId=11512&pid=21882&env=js-web&pfid=[pfid]&f=1&gid=425587&sid=[connectionId]&slot=native&auctid=76ed9b85-218d-49f2-9cc2-2a7db749ba86&vid=95d9fe91-1fd5-4ce4-9919-66f57bf932db&fv=297&referer=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.124 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-124.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
328e90a318268aea96180cc31666ae6d6f79d90d078c123bc3d98ee08a192fb7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

status
200
date
Thu, 26 Mar 2020 12:54:31 GMT
cache-control
max-age=0, no-cache, no-store
content-type
image/gif
content-length
23
expires
Sat, 26 Jul 1997 05:00:00 GMT
720.mp4
cdn2.teads.tv/scala/414205/7f10bf0a3e2124e805909183d38e0144/ Frame 8A8A
205 KB
0
Media
General
Full URL
https://cdn2.teads.tv/scala/414205/7f10bf0a3e2124e805909183d38e0144/720.mp4
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.248.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-248-12.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Sec-Fetch-Dest
video
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=0-

Response headers

Date
Thu, 26 Mar 2020 12:54:32 GMT
Last-Modified
Wed, 11 Mar 2020 01:10:45 GMT
Server
AmazonS3
x-amz-request-id
2FC69F086A9B8669
ETag
"f75dcd8f826fa5002013072f81b6183d"
Content-Type
video/mp4
Content-Range
bytes 0-5565898/5565899
Connection
keep-alive
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Content-Length
5565899
x-amz-id-2
cMFqSTIuAMkRxnAyjosjNOBieSVwdTnQ9s4FTA4gPG7FaJths2j8HFuDLieB/e5kNt/sVnsFeAo=
imgad
tpc.googlesyndication.com/pagead/
65 KB
65 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/imgad?id=CICAgKDn0rj0AhABGAEyCHhhjJAhJTTf&b2s=false
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
c497c74c1d24ef8b37098caa2c6e8dae7e3eace98e36aff9b508314021e42ba6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

timing-allow-origin
*
date
Tue, 24 Mar 2020 06:05:16 GMT
x-content-type-options
nosniff
server
cafe
age
197355
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=604800
content-disposition
attachment; filename="image.png"
content-type
image/png
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
66779
x-xss-protection
0
expires
Tue, 31 Mar 2020 06:05:16 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F3180686778985860659&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270682&de=922849587863&cu=1585227270682&m=11&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5108&le=1&gm=1&io=1&vv=1&vw=1%3A3%3A0&vp=0&vx=0%3A-%3A-&pe=1%3A1685%3A1717%3A0%3A2210&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&em=0&en=0&st=0&su=1&of=1&oz=0&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=3&cd=0&ah=3&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=21887076%3A2680018979%3A5334439834%3A138307481617&bo=27868836&bp=43863396&bd=rec2&zMoatPS=rec2&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=70109220&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:31 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:31 GMT
news_stroke_v1_78ce5b21fb24a7c7e528d22fc25bd9f9df7f24e2.svg
ton.twimg.com/tfw/assets/ Frame F74C
829 B
576 B
Image
General
Full URL
https://ton.twimg.com/tfw/assets/news_stroke_v1_78ce5b21fb24a7c7e528d22fc25bd9f9df7f24e2.svg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41AC) /
Resource Hash
5c0f79d0286f1fd3db48e1b689358017b302c0f4babde540329e8c644cf119c7
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://ton.twimg.com/tfw/css/syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:31 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
29622
x-ton-expected-size
829
x-cache
HIT
status
200
strict-transport-security
max-age=631138519
content-length
395
x-response-time
10
surrogate-key
tfw
last-modified
Tue, 14 May 2019 18:53:55 GMT
server
ECS (fcn/41AC)
etag
"CTUg6L9PuY+d9h5xpE0zmw=="
vary
Accept-Encoding
warning
110 - "Response is stale"
content-type
image/svg+xml
access-control-allow-origin
*
x-connection-hash
e436d43e70f062c55ff23328988a88c8
accept-ranges
bytes
expires
Thu, 02 Apr 2020 12:54:31 GMT
css
fonts.googleapis.com/ Frame 9F85
263 B
370 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Lato:400&text=BCDEGILORSTUVW
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
7ef62a862e5552e89888b1476224a893a1c06aca73560c03bb4021c15c6c1562
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
x-xss-protection
0
last-modified
Thu, 26 Mar 2020 12:54:31 GMT
server
ESF
date
Thu, 26 Mar 2020 12:54:31 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Thu, 26 Mar 2020 12:54:31 GMT
eSentire%20Threat_Intelligence%20Spotlight.png
cache-ssl.celtra.com/api/blobs/3705b253fbb3330c47a79074dd9debea165b643a17dfc40713e4c67fcb7937ef/ Frame 9F85
2 KB
3 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/3705b253fbb3330c47a79074dd9debea165b643a17dfc40713e4c67fcb7937ef/eSentire%20Threat_Intelligence%20Spotlight.png?transform=crush&quality=256
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
72c5a9a22726626248e18044a3a06bda0c9ef4be9320736fef104eef84bb7a5b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 24 Feb 2020 10:09:28 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
2688302
x-cache
Hit from cloudfront
status
200
content-length
2150
server
Apache
etag
"72c5a9a22726626248e18044a3a06bda0c9ef4be9320736fef104eef84bb7a5b"
x-varnish
5501243
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
jc93nOtyLbrkj6jJq3Iew4wpK3VvaNklvKkU10UtNhvvhmorP0g9pQ==
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1585227270702&de=113754998326&m=0&ar=b63606d9a9-clean&iw=e4a6545&q=23&cb=0&ym=0&cu=1585227270702&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=21887076%3A2677189093%3A5327285441%3A138306663349&zMoatPS=top&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&bo=27868836&bp=43863396&bd=top&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1685%3A1717%3A0%3A2210&fs=177454&na=687463712&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:31 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:31 GMT
self-fulfilling.jpg
cache-ssl.celtra.com/api/blobs/a2f8fdd59ec798bb8ab67251ab035d97266cf9f1b2d63bce5382a1637c28b46c/ Frame 9F85
14 KB
14 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/a2f8fdd59ec798bb8ab67251ab035d97266cf9f1b2d63bce5382a1637c28b46c/self-fulfilling.jpg?transform=crush&quality=85
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
74aa9116f9cd46b91aae44a899609474963fbc74ecdc77120a16ee90bd962773

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 23 Mar 2020 12:59:07 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
258923
x-cache
Hit from cloudfront
status
200
content-length
13829
server
Apache
etag
"74aa9116f9cd46b91aae44a899609474963fbc74ecdc77120a16ee90bd962773"
x-varnish
6327757
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
l2H6Gy4h_FGesH_ZefOIAu8do2nePCKArQsM5s-xM-7qb2Azi33ygw==
font
fonts.gstatic.com/l/ Frame 9F85
2 KB
2 KB
Font
General
Full URL
https://fonts.gstatic.com/l/font?kit=S6uyw4BMUTPHvxw6WQevLimqrplwqb0UmZyWWNr7bw&skey=2d58b92a99e1c086&v=v16
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
fe9d6a7149f9578eeaa23d6b1a90ea1b9baf8740cf7030cf90b32347cc628f4f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/css?family=Lato:400&text=BCDEGILORSTUVW
Origin
https://www.darkreading.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 26 Mar 2020 11:21:49 GMT
x-content-type-options
nosniff
age
5562
status
200
content-disposition
attachment; filename="font.woff2"; filename*=UTF-8''font.woff2
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
1812
x-xss-protection
0
last-modified
Tue, 23 Jul 2019 17:22:44 GMT
server
ESF
x-frame-options
SAMEORIGIN
content-type
font/woff2
access-control-allow-origin
*
cache-control
private, max-age=86400
timing-allow-origin
*
expires
Thu, 26 Mar 2020 11:21:49 GMT
The%20Definitive%20Guide%20to%20Managed%20Detection%20and%20Response%20(MDR).png
cache-ssl.celtra.com/api/blobs/cc7cc2692b5accb9be1f302d5c99c27fc97b60df8a220eebc6725182eaf51d7f/ Frame 9F85
2 KB
3 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/cc7cc2692b5accb9be1f302d5c99c27fc97b60df8a220eebc6725182eaf51d7f/The%20Definitive%20Guide%20to%20Managed%20Detection%20and%20Response%20(MDR).png?transform=crush&quality=256
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
d022636be0687cadaeee353059313ccba068cd3a7c0a58d746276ed359445069

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 19 Mar 2020 06:10:51 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
629020
x-cache
Hit from cloudfront
status
200
content-length
2209
server
Apache
etag
"d022636be0687cadaeee353059313ccba068cd3a7c0a58d746276ed359445069"
x-varnish
1432699
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
GWlpJLNyKW1dZPR02NDCxkxw2LROl_Ekf-iZnNf_5lwywG6xNYL1Og==
tw.png
cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/ Frame 9F85
781 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/tw.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Fri, 14 Feb 2020 13:44:21 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
3539409
x-cache
Hit from cloudfront
status
200
content-length
781
server
Apache
etag
"308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96"
x-varnish
6036561 3973619
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
ss8eRXGpwyIWRU9nAaplGfxBCCXApO_jJQcwc3KLw3yl4G9sD2ql6w==
tw_hover.png
cache-ssl.celtra.com/api/blobs/f0cccd681d168932db801410643c93f0df03370d5c638ab3e4a16e92b80b3aa0/ Frame 9F85
777 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/f0cccd681d168932db801410643c93f0df03370d5c638ab3e4a16e92b80b3aa0/tw_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
1ace1b17e77ec3828eda87eb3fea3671ce2a0f706426fbd158873546c4f9366e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 20 Feb 2020 01:29:44 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
3065087
x-cache
Hit from cloudfront
status
200
content-length
777
server
Apache
etag
"1ace1b17e77ec3828eda87eb3fea3671ce2a0f706426fbd158873546c4f9366e"
x-varnish
8852695
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
lu_zDBKzGthhUsQ9j42Kosrq20NeTCyddtquPkBaF3gzN05HlA4bPw==
li.png
cache-ssl.celtra.com/api/blobs/8abad5101e4e04aaad9758773bd0e6eead30303742f732e5235e7d73be899598/ Frame 9F85
608 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/8abad5101e4e04aaad9758773bd0e6eead30303742f732e5235e7d73be899598/li.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
2e8c15ba0e22d227940fcc5ae790599e1b32a636d9b28e174e864a4884ee7e48

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Sun, 16 Feb 2020 06:38:14 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
3392177
x-cache
Hit from cloudfront
status
200
content-length
608
server
Apache
etag
"2e8c15ba0e22d227940fcc5ae790599e1b32a636d9b28e174e864a4884ee7e48"
x-varnish
6132502
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
1TjtEEc3S7bwoGrmwFTgUmQ7cVtwHOVXZXI0ek3Vs6qrlRiBc4rT7g==
li_hover.png
cache-ssl.celtra.com/api/blobs/b7a1a128e1e4be19257209f345f26c688422071122ed660518782b609158ad7a/ Frame 9F85
612 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/b7a1a128e1e4be19257209f345f26c688422071122ed660518782b609158ad7a/li_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
3bb72e5a3bd7858a708f629dfc7e2f2aa9d87ee8a43b1c22b300e49cd59b09d7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 06 Feb 2020 07:20:19 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
4253652
x-cache
Hit from cloudfront
status
200
content-length
612
server
Apache
etag
"3bb72e5a3bd7858a708f629dfc7e2f2aa9d87ee8a43b1c22b300e49cd59b09d7"
x-varnish
1283940
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
RXEHU0AyHNfjTAjcqGvDzX_Gp_D5WiXy5nf_scTIfFKlVlDfHKFsnw==
fb.png
cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/ Frame 9F85
348 B
862 B
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/fb.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 17 Feb 2020 05:44:27 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
3309003
x-cache
Hit from cloudfront
status
200
content-length
348
server
Apache
etag
"e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395"
x-varnish
2528039 5524949
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
L0x7xIA-XITDSQY4y7y8Qvfa9o4sVJJaxMWiD2rua3pWNp5EqHPVDA==
fb_hover.png
cache-ssl.celtra.com/api/blobs/652ab50d0e331e4269bb4d847fcc5a5a4e3def07bb1ebca4d2d6fda889e52604/ Frame 9F85
348 B
855 B
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/652ab50d0e331e4269bb4d847fcc5a5a4e3def07bb1ebca4d2d6fda889e52604/fb_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
9250f0b586e89674ec647d8dfb6fe7aedcb588be13ebb6aeb1286efa9d3cfb39

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Sat, 15 Feb 2020 04:24:32 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
3486599
x-cache
Hit from cloudfront
status
200
content-length
348
server
Apache
etag
"9250f0b586e89674ec647d8dfb6fe7aedcb588be13ebb6aeb1286efa9d3cfb39"
x-varnish
83703
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
2ab62aeabVOplESlPizrSYzFCc1pG7tKX4bK6aN_7vwmwnwlCslTIw==
Third-party%20cyber%20risk%20to%20the%20nth%20degree.png
cache-ssl.celtra.com/api/blobs/e59d312196328976d476747e8610e97f6c4e77bd6b2e367236b080f990b2d8f9/ Frame 9F85
2 KB
3 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/e59d312196328976d476747e8610e97f6c4e77bd6b2e367236b080f990b2d8f9/Third-party%20cyber%20risk%20to%20the%20nth%20degree.png?transform=crush&quality=256
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
bc0c63f122b15fffed1b24c48017b05b850493997688f574de6c94127c646696

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 17 Feb 2020 06:15:13 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
3307157
x-cache
Hit from cloudfront
status
200
content-length
2124
server
Apache
etag
"bc0c63f122b15fffed1b24c48017b05b850493997688f574de6c94127c646696"
x-varnish
6796723 6239973
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
lUXbWW7qXrse_oSWrfTJUflDh4G3zhuroKDAI_BbaKoyPInVmPthUQ==
sMvA6z5o
pbs.twimg.com/card_img/1242909366086520838/ Frame F74C
7 KB
7 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1242909366086520838/sMvA6z5o?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41AB) /
Resource Hash
79a349acf01a0cee1c89d28d9406e0ebf55922ddd4d80d9b2081d66f9c396afb
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:31 GMT
x-content-type-options
nosniff
age
59427
x-cache
HIT
status
200
content-length
6844
x-response-time
146
surrogate-key
card_img card_img/bucket/6 card_img/1242909366086520838
last-modified
Wed, 25 Mar 2020 20:18:59 GMT
server
ECS (fcn/41AB)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
e5a7b97c8a6205db8f65bf8511eb4517
accept-ranges
bytes
eSentrie%20Annual%20Threat%20Intelligence%20Report%202019.png
cache-ssl.celtra.com/api/blobs/fb0eb6a163c7fca72595f13b12c42843b34807a43cc3646e671a3ed034078eb6/ Frame 9F85
4 KB
4 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/fb0eb6a163c7fca72595f13b12c42843b34807a43cc3646e671a3ed034078eb6/eSentrie%20Annual%20Threat%20Intelligence%20Report%202019.png?transform=crush&quality=256
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
7c5b92ed4d7afa3c798110c314c4f311ec82e8649261fecd23442c68f600d679

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Fri, 24 Jan 2020 23:25:56 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
5318915
x-cache
Hit from cloudfront
status
200
content-length
3791
server
Apache
etag
"7c5b92ed4d7afa3c798110c314c4f311ec82e8649261fecd23442c68f600d679"
x-varnish
6560782
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
L5T7PHhy3UYplty7Vm6yxQbt_FB_iJErknikIeSYMgyZ53kaQvEGVg==
newlogo_png.png
cache-ssl.celtra.com/api/blobs/61092e2bf056473fed9e0921e7123d085cf07e14d45260c4a1b3e84cb0552268/ Frame 9F85
6 KB
7 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/61092e2bf056473fed9e0921e7123d085cf07e14d45260c4a1b3e84cb0552268/newlogo_png.png?transform=crush&quality=256
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
b37382a10e3d53c8b001ae941f464d5a2fc612996a963ade7626a5e0fe0a1290

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 17 Feb 2020 07:26:55 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
3302856
x-cache
Hit from cloudfront
status
200
content-length
6473
server
Apache
etag
"b37382a10e3d53c8b001ae941f464d5a2fc612996a963ade7626a5e0fe0a1290"
x-varnish
3069681
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
KuQyW7MoTm6o62Zp1u5gaCd5dwmc7nlKjBjzjVb-rn6Nn9k_hYgy7A==
IAHm30Pi
pbs.twimg.com/card_img/1242138468597166085/ Frame F74C
7 KB
8 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1242138468597166085/IAHm30Pi?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40E8) /
Resource Hash
3096df8c138a886695803d3b6eb1061837b63d194ffbbdab834e6afece58d753
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:31 GMT
x-content-type-options
nosniff
age
64758
x-cache
HIT
status
200
content-length
7670
x-response-time
144
surrogate-key
card_img card_img/bucket/0 card_img/1242138468597166085
last-modified
Mon, 23 Mar 2020 17:15:43 GMT
server
ECS (fcn/40E8)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
62ae909906be67c9f9f88d5aed77a56b
accept-ranges
bytes
EXl5uDcp
pbs.twimg.com/card_img/1242199048012156928/ Frame F74C
7 KB
7 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1242199048012156928/EXl5uDcp?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41A4) /
Resource Hash
163a508ae0ef52fc9d295da555959a8064477867164c82ecaed44ed96b0a591c
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:31 GMT
x-content-type-options
nosniff
age
228959
x-cache
HIT
status
200
content-length
6746
x-response-time
147
surrogate-key
card_img card_img/bucket/8 card_img/1242199048012156928
last-modified
Mon, 23 Mar 2020 21:16:26 GMT
server
ECS (fcn/41A4)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
8992401ae21e79cd170658b2773469c5
accept-ranges
bytes
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F15597202546216543198&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270702&de=113754998326&cu=1585227270702&m=18&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5108&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A1685%3A1717%3A0%3A2210&as=0&ag=6&an=0&gf=6&gg=0&ix=6&ic=6&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=6&bx=0&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=0&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=11&cd=0&ah=11&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=21887076%3A2677189093%3A5327285441%3A138306663349&bo=27868836&bp=43863396&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=1602686727&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:31 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:31 GMT
imgad
tpc.googlesyndication.com/pagead/
279 KB
280 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/imgad?id=CICAgKDnlNjGcBABGAEyCFA8T1_6loqx&b2s=false
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/pentonmedia53440730609/moatad.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ac731719905ae620e44a0b9b5e2fecb5155bba8b15ed91b110d87353c38cef25
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

timing-allow-origin
*
date
Tue, 24 Mar 2020 01:39:29 GMT
x-content-type-options
nosniff
server
cafe
age
213302
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=604800
content-type
image/jpeg
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
286082
x-xss-protection
0
expires
Tue, 31 Mar 2020 01:39:29 GMT
newlogo_png.png
cache-ssl.celtra.com/api/blobs/61092e2bf056473fed9e0921e7123d085cf07e14d45260c4a1b3e84cb0552268/ Frame 9F85
6 KB
7 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/61092e2bf056473fed9e0921e7123d085cf07e14d45260c4a1b3e84cb0552268/newlogo_png.png?transform=crush&quality=256
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
b37382a10e3d53c8b001ae941f464d5a2fc612996a963ade7626a5e0fe0a1290

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 17 Feb 2020 07:26:55 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
3302856
x-cache
Hit from cloudfront
status
200
content-length
6473
server
Apache
etag
"b37382a10e3d53c8b001ae941f464d5a2fc612996a963ade7626a5e0fe0a1290"
x-varnish
3069681
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
X2u9nsOydwZJKgB9HyJlCYAYtxvVhAQ9OCwGiHfgqpAstGNNciz9sw==
eSentire%20Threat_Intelligence%20Spotlight.png
cache-ssl.celtra.com/api/blobs/3705b253fbb3330c47a79074dd9debea165b643a17dfc40713e4c67fcb7937ef/ Frame 9F85
2 KB
3 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/3705b253fbb3330c47a79074dd9debea165b643a17dfc40713e4c67fcb7937ef/eSentire%20Threat_Intelligence%20Spotlight.png?transform=crush&quality=256
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
72c5a9a22726626248e18044a3a06bda0c9ef4be9320736fef104eef84bb7a5b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 24 Feb 2020 10:09:28 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
2688302
x-cache
Hit from cloudfront
status
200
content-length
2150
server
Apache
etag
"72c5a9a22726626248e18044a3a06bda0c9ef4be9320736fef104eef84bb7a5b"
x-varnish
5501243
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
mftm820NF7u66H0fgd6otwRyVgOHtMZ1yJYUXKW6WqqNEut-JaikTg==
self-fulfilling.jpg
cache-ssl.celtra.com/api/blobs/a2f8fdd59ec798bb8ab67251ab035d97266cf9f1b2d63bce5382a1637c28b46c/ Frame 9F85
14 KB
14 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/a2f8fdd59ec798bb8ab67251ab035d97266cf9f1b2d63bce5382a1637c28b46c/self-fulfilling.jpg?transform=crush&quality=85
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
74aa9116f9cd46b91aae44a899609474963fbc74ecdc77120a16ee90bd962773

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 23 Mar 2020 12:59:07 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
258923
x-cache
Hit from cloudfront
status
200
content-length
13829
server
Apache
etag
"74aa9116f9cd46b91aae44a899609474963fbc74ecdc77120a16ee90bd962773"
x-varnish
6327757
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
mUVIFQyz-B6HOJYz_UWTdD0fon4gIK_VBku7evUQD7JF7lRpSdvzEA==
The%20Definitive%20Guide%20to%20Managed%20Detection%20and%20Response%20(MDR).png
cache-ssl.celtra.com/api/blobs/cc7cc2692b5accb9be1f302d5c99c27fc97b60df8a220eebc6725182eaf51d7f/ Frame 9F85
2 KB
3 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/cc7cc2692b5accb9be1f302d5c99c27fc97b60df8a220eebc6725182eaf51d7f/The%20Definitive%20Guide%20to%20Managed%20Detection%20and%20Response%20(MDR).png?transform=crush&quality=256
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
d022636be0687cadaeee353059313ccba068cd3a7c0a58d746276ed359445069

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 19 Mar 2020 06:10:51 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
629020
x-cache
Hit from cloudfront
status
200
content-length
2209
server
Apache
etag
"d022636be0687cadaeee353059313ccba068cd3a7c0a58d746276ed359445069"
x-varnish
1432699
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
BXlJ5QYQpEiXUDWEm-ILGVNdJhTsA4iLdzxDBaibTCEOxwkqO0KC3g==
tw.png
cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/ Frame 9F85
781 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/tw.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Fri, 14 Feb 2020 13:44:21 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
3539409
x-cache
Hit from cloudfront
status
200
content-length
781
server
Apache
etag
"308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96"
x-varnish
6036561 3973619
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
pD_trAUbzydPmIMOU2tHXRsADGlfB_g7xwow6zFOt7svT26o5sTqyw==
li.png
cache-ssl.celtra.com/api/blobs/8abad5101e4e04aaad9758773bd0e6eead30303742f732e5235e7d73be899598/ Frame 9F85
608 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/8abad5101e4e04aaad9758773bd0e6eead30303742f732e5235e7d73be899598/li.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
2e8c15ba0e22d227940fcc5ae790599e1b32a636d9b28e174e864a4884ee7e48

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Sun, 16 Feb 2020 06:38:14 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
3392177
x-cache
Hit from cloudfront
status
200
content-length
608
server
Apache
etag
"2e8c15ba0e22d227940fcc5ae790599e1b32a636d9b28e174e864a4884ee7e48"
x-varnish
6132502
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
JrCisPNwMfPpmOppQ2s-4eQmRXy10JXweb3YYcAazcXCu3sRkYzNVg==
fb.png
cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/ Frame 9F85
348 B
856 B
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/fb.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 18 Mar 2020 06:04:20 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
715811
x-cache
Hit from cloudfront
status
200
content-length
348
server
Apache
etag
"e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395"
x-varnish
4596152
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
rDzXfTPSS2GOhmbgRUMj-e09CfE7d68ZrrnXkuueyiuGNw0DKPRUoQ==
Third-party%20cyber%20risk%20to%20the%20nth%20degree.png
cache-ssl.celtra.com/api/blobs/e59d312196328976d476747e8610e97f6c4e77bd6b2e367236b080f990b2d8f9/ Frame 9F85
2 KB
3 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/e59d312196328976d476747e8610e97f6c4e77bd6b2e367236b080f990b2d8f9/Third-party%20cyber%20risk%20to%20the%20nth%20degree.png?transform=crush&quality=256
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
bc0c63f122b15fffed1b24c48017b05b850493997688f574de6c94127c646696

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 17 Feb 2020 06:15:13 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
3307157
x-cache
Hit from cloudfront
status
200
content-length
2124
server
Apache
etag
"bc0c63f122b15fffed1b24c48017b05b850493997688f574de6c94127c646696"
x-varnish
6796723 6239973
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
TB_NlS7wo9GNAsfSGdQzuWKspezEhR7IOZZB2BwMl9873kHN2zFZ6g==
eSentrie%20Annual%20Threat%20Intelligence%20Report%202019.png
cache-ssl.celtra.com/api/blobs/fb0eb6a163c7fca72595f13b12c42843b34807a43cc3646e671a3ed034078eb6/ Frame 9F85
4 KB
4 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/fb0eb6a163c7fca72595f13b12c42843b34807a43cc3646e671a3ed034078eb6/eSentrie%20Annual%20Threat%20Intelligence%20Report%202019.png?transform=crush&quality=256
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
7c5b92ed4d7afa3c798110c314c4f311ec82e8649261fecd23442c68f600d679

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Fri, 24 Jan 2020 23:25:56 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
5318915
x-cache
Hit from cloudfront
status
200
content-length
3791
server
Apache
etag
"7c5b92ed4d7afa3c798110c314c4f311ec82e8649261fecd23442c68f600d679"
x-varnish
6560782
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
N7uVRf-mXtzW4qU9lR3Jv1ClmI3Mh8oBbN4eWWqPgS41iTpDeiorJw==
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg1MjI3MjcweGMxOTJmY2M2NWE4YTNleDcyNjg0NzY2IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4Nzg4MjA5OTA4ODg4ODIyIiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.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?crc32c=1094697892
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.227.6.166 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-227-6-166.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Thu, 26 Mar 2020 12:54:32 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
activeview
pagead2.googlesyndication.com/pcs/ Frame 8608
42 B
122 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjstsF14kA5DPtTs0RdInRtlIuKgLIIyt9akQ0b_AyyouMHgsIZUynaGSXg4NaLeqfyfO60GfCFU8cjh7OPJUmxs8DtUXLzdAiIqk45ZjijM&sig=Cg0ArKJSzOLNaZ5AYT6JEAE&adk=4220632109&tt=-1&bs=1585%2C1200&mtos=1044,1044,1044,1044,1044&tos=1044,0,0,0,0&p=459,953,709,1253&mcvt=1044&rs=0&ht=0&tfs=459&tls=1503&mc=1&lte=0&bas=0&bac=0&met=mue&avms=nio&exg=1&md=2&btr=0&lm=2&rst=1585227270256&dlt&rpt=337&isd=0&msd=0&ext&xdi=0&ps=1585%2C5503&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-9-1-8-8-0-0-0&tvt=1503&is=300%2C250&invis=1&iframe_loc=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&r=v&id=osdim&vs=4&uc=9&upc=1&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=300x250&itpl=3&v=20200325
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:31 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1585227270763&de=683561537363&m=0&ar=b63606d9a9-clean&iw=e4a6545&q=27&cb=0&ym=0&cu=1585227270763&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=4855605286%3A2675923598%3A5324259748%3A138305900297&zMoatPS=insight&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&bo=27868836&bp=43863396&bd=insight&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1685%3A1717%3A0%3A2210&fs=177454&na=1861694457&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:31 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:31 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 83ED
42 B
122 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjssCrJLFobbp7i8m5BJL00ElOiJQp3wDsqQ7xG1vpRULkZOCsegACI6fNYwsd7vAmXaTS9hpsxt0AKd7C1BdlrzXXwsaOy8RolFnvNZyrvA&sig=Cg0ArKJSzMnH-O6TDvLVEAE&adk=2966194094&tt=-1&bs=1585%2C1200&mtos=1049,1049,1049,1049,1049&tos=1049,0,0,0,0&p=96,428,186,1156&mcvt=1049&rs=0&ht=0&tfs=458&tls=1507&mc=1&lte=0&bas=0&bac=0&met=mue&avms=nio&exg=1&md=2&btr=0&lm=2&rst=1585227270263&dlt&rpt=486&isd=0&msd=0&ext&xdi=0&ps=1585%2C5503&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-9-2-8-8-0-0-0&tvt=1506&is=728%2C90&invis=1&iframe_loc=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&r=v&id=osdim&vs=4&uc=9&upc=1&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=728x90&itpl=3&v=20200325
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:31 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
iframe_api
www.youtube.com/ Frame 9F85
859 B
931 B
Script
General
Full URL
https://www.youtube.com/iframe_api
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
YouTube Frontend Proxy /
Resource Hash
e58e3ba0256ad5d310af7fe3fb0b642602d53aa4b8ba45ab117abe8f3fd2c087
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:31 GMT
x-content-type-options
nosniff
server
YouTube Frontend Proxy
content-type
application/javascript
status
200
cache-control
no-cache
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
859
x-xss-protection
0
expires
Tue, 27 Apr 1971 19:44:06 GMT
user_timeline
cache-ssl.celtra.com/api/twitter/statuses/ Frame 9F85
73 KB
7 KB
Script
General
Full URL
https://cache-ssl.celtra.com/api/twitter/statuses/user_timeline?screen_name=esentire&jsonp=jsonp_celtra_twitter_proxy_9949
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
a7da942c9c7b2dd8a960a67435c775b27a24d4c7edc45ad160f38dcc3cc295a7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:41:03 GMT
content-encoding
gzip
age
809
x-cache
Miss from cloudfront
status
200
content-length
6869
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
server
Apache
etag
"872446abf325c9eab1fba681630168539e18bd847af5725f7aa678bd18a47b9a"
vary
Accept-Encoding
x-varnish
233654 1313179
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=900
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
29np0PrDnBz63cEEX3wrivjRtZAapMg-7sVROVZrmNy4XQXA44x8yg==
activeview
pagead2.googlesyndication.com/pcs/ Frame E7B6
42 B
122 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsski-hmeJ9-0W1P9L-krM-hCMjZ_FWUi2AemAhqStnDXtRexkiX6DbgjPCtxoGA7rPcQ_7kdoTaEkw-MqbLE_TSxi4j7pcOzaWx7wFdKz8&sig=Cg0ArKJSzJBMUkHAo7k8EAE&adk=2332965166&tt=-1&bs=1585%2C1200&mtos=0,0,1056,1056,1056&tos=0,0,1056,0,0&p=358,293,360,294&mcvt=1056&rs=0&ht=0&tfs=533&tls=1589&mc=0.5&lte=0&bas=0&bac=0&met=ce&avms=nio&exg=1&md=2&btr=0&lm=2&rst=1585227270259&dlt&rpt=343&isd=0&msd=0&ext&xdi=0&ps=1585%2C5503&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-10-6-9-9-0-0-0&tvt=1584&is=1%2C2&invis=1&iframe_loc=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&r=v&id=osdim&vs=4&uc=10&upc=1&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=0x0&itpl=19&v=20200325
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:32 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg1MjI3MjcweGMxOTJmY2M2NWE4YTNleDcyNjg0NzY2IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4Nzg4MjA5OTA4ODg4ODIyIiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg1MjI3MjcweGMxOTJmY2M2NWE4YTNleDcyNjg0NzY2IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4Nzg4MjA5OTA4ODg4ODIyIiwiaW5kZXgiOjcsImNsaWVudFRpbWVzdGFtcCI6MTU4NTIyNzI3MS45NzIsIm5hbWUiOiJ2aWV3YWJsZVRpbWUiLCJmcm9tIjoxNTg1MjI3MjcxLjg4OSwidG8iOjE1ODUyMjcyNzEuODg5fV19?crc32c=1782828666
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.227.6.166 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-227-6-166.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Thu, 26 Mar 2020 12:54:32 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
tw.png
cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/ Frame 9F85
781 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/tw.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Fri, 14 Feb 2020 13:44:21 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
3539410
x-cache
Hit from cloudfront
status
200
content-length
781
server
Apache
etag
"308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96"
x-varnish
6036561 3973619
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
ihgJQxQ_LDx3U2XXXfcrB6BIgLRNV8kn2P7yW_LXmT-DkDqh6dZEMw==
tw_hover.png
cache-ssl.celtra.com/api/blobs/f0cccd681d168932db801410643c93f0df03370d5c638ab3e4a16e92b80b3aa0/ Frame 9F85
777 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/f0cccd681d168932db801410643c93f0df03370d5c638ab3e4a16e92b80b3aa0/tw_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
1ace1b17e77ec3828eda87eb3fea3671ce2a0f706426fbd158873546c4f9366e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 20 Feb 2020 01:29:44 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
3065088
x-cache
Hit from cloudfront
status
200
content-length
777
server
Apache
etag
"1ace1b17e77ec3828eda87eb3fea3671ce2a0f706426fbd158873546c4f9366e"
x-varnish
8852695
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
buEG_MocQgzRst5ADj6JI2kdbhwc0QNJV40Hk-NdljslM4_Cz_K1wg==
li.png
cache-ssl.celtra.com/api/blobs/8abad5101e4e04aaad9758773bd0e6eead30303742f732e5235e7d73be899598/ Frame 9F85
608 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/8abad5101e4e04aaad9758773bd0e6eead30303742f732e5235e7d73be899598/li.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
2e8c15ba0e22d227940fcc5ae790599e1b32a636d9b28e174e864a4884ee7e48

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Sun, 16 Feb 2020 06:38:14 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
3392178
x-cache
Hit from cloudfront
status
200
content-length
608
server
Apache
etag
"2e8c15ba0e22d227940fcc5ae790599e1b32a636d9b28e174e864a4884ee7e48"
x-varnish
6132502
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
ivY7QfwdbeVIIt-p_DN9fZ53wlrDNETtn7GLApF91s5F--6n1oo-Og==
li_hover.png
cache-ssl.celtra.com/api/blobs/b7a1a128e1e4be19257209f345f26c688422071122ed660518782b609158ad7a/ Frame 9F85
612 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/b7a1a128e1e4be19257209f345f26c688422071122ed660518782b609158ad7a/li_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
3bb72e5a3bd7858a708f629dfc7e2f2aa9d87ee8a43b1c22b300e49cd59b09d7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 06 Feb 2020 07:20:19 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
4253653
x-cache
Hit from cloudfront
status
200
content-length
612
server
Apache
etag
"3bb72e5a3bd7858a708f629dfc7e2f2aa9d87ee8a43b1c22b300e49cd59b09d7"
x-varnish
1283940
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
Qsh3tF76GJcTFZR--KiF-uButI20_qzJ8QTt98_AkbwEYDfvQzwKvQ==
fb.png
cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/ Frame 9F85
348 B
856 B
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/fb.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 18 Mar 2020 06:04:20 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
715812
x-cache
Hit from cloudfront
status
200
content-length
348
server
Apache
etag
"e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395"
x-varnish
4596152
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
KelkXdBTvas-SetaO0jI8TKBVWDYOAQH1NEQxqepNhrj72SFgbxHcw==
fb_hover.png
cache-ssl.celtra.com/api/blobs/652ab50d0e331e4269bb4d847fcc5a5a4e3def07bb1ebca4d2d6fda889e52604/ Frame 9F85
348 B
861 B
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/652ab50d0e331e4269bb4d847fcc5a5a4e3def07bb1ebca4d2d6fda889e52604/fb_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.81 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-97-81.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
9250f0b586e89674ec647d8dfb6fe7aedcb588be13ebb6aeb1286efa9d3cfb39

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 18 Mar 2020 02:53:05 GMT
via
1.1 varnish (Varnish/5.0), 1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
age
727287
x-cache
Hit from cloudfront
status
200
content-length
348
server
Apache
etag
"9250f0b586e89674ec647d8dfb6fe7aedcb588be13ebb6aeb1286efa9d3cfb39"
x-varnish
4582843 5789065
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
aKghpZtVTxFpRBUoqf8IezwL7j_cmbJ_MngxcW92Kj6orx2iVplmYw==
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1585227270814&de=624144677647&m=0&ar=b63606d9a9-clean&iw=e4a6545&q=31&cb=0&ym=0&cu=1585227270814&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=17527716%3A193997916%3A42403476%3A138212589663&zMoatPS=video&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&bo=27868836&bp=43863396&bd=video&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1685%3A1717%3A0%3A2210&fs=177454&na=763968753&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:32 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:32 GMT
www-widgetapi.js
s.ytimg.com/yts/jsbin/www-widgetapi-vfl13pyi5/ Frame 9F85
38 KB
14 KB
Script
General
Full URL
https://s.ytimg.com/yts/jsbin/www-widgetapi-vfl13pyi5/www-widgetapi.js
Requested by
Host: www.youtube.com
URL: https://www.youtube.com/iframe_api
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
4734405c034b81eddf4f6a932437523f5ab8ba90e80182371c75736d0f3679fd
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:54:40 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
151192
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
13922
x-xss-protection
0
last-modified
Tue, 24 Mar 2020 18:50:41 GMT
server
sffe
vary
Accept-Encoding, Origin
content-type
text/javascript
cache-control
public, max-age=691200
accept-ranges
bytes
timing-allow-origin
https://www.youtube.com
expires
Wed, 01 Apr 2020 18:54:40 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 0467
42 B
122 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsuG8DT1IIW_2_PryOLTP-AevwHmmWIWpI8W35Laq6IivkmVLJySzmRL5GYUcCOznkC6m-1stlGt7TzDqAqVBfk8j3k4C30ZfGWupvzsG68&sig=Cg0ArKJSzKWuUjdV-dUKEAE&adk=1417865500&tt=-1&bs=1585%2C1200&mtos=1096,1096,1096,1096,1096&tos=1096,0,0,0,0&p=0,0,1200,1585&mcvt=1096&rs=3&ht=0&tfs=104&tls=1200&mc=1&lte=1&bas=0&bac=0&met=ce&la=1&avms=nio&exg=1&md=2&btr=0&lm=2&rst=1585227270246&dlt&rpt=647&isd=0&msd=0&ext&xdi=0&ps=1585%2C6103&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-7-3-6-6-0-0-0&tvt=1198&is=1585%2C1200&iframe_loc=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&r=v&id=osdim&vs=4&uc=7&upc=1&tgt=DIV&cl=1&cec=2&wf=0&cac=1&cd=0x0&itpl=19&v=20200325
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:32 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1585227270860&de=19695549941&m=0&ar=b63606d9a9-clean&iw=e4a6545&q=35&cb=0&ym=0&cu=1585227270860&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=39395676%3A2668869784%3A5307825743%3A138306474687&zMoatPS=welcome&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&bo=27868836&bp=43863396&bd=welcome&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1685%3A1717%3A0%3A2210&fs=177454&na=1151120682&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:32 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:32 GMT
fmnNZsnD
pbs.twimg.com/card_img/1242480066069700608/ Frame F74C
8 KB
8 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1242480066069700608/fmnNZsnD?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40FB) /
Resource Hash
27c6237a14abbf4ca473b4036c4c94b39c43a78b4ef567cd9dbee365689427fb
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:32 GMT
x-content-type-options
nosniff
age
161952
x-cache
HIT
status
200
content-length
7999
x-response-time
200
surrogate-key
card_img card_img/bucket/3 card_img/1242480066069700608
last-modified
Tue, 24 Mar 2020 15:53:06 GMT
server
ECS (fcn/40FB)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
cec807f02feefece1c7bf64e471027c1
accept-ranges
bytes
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&vb=13&kq=1&lo=1&uk=null&pk=0&wk=1&rk=1&tk=1&ak=https%3A%2F%2Fs0.2mdn.net%2F9812475%2FMWB_Brand_Secure_AF_B2B_r2_v1_640x480.jpg&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=480&w=640&fy=472.5&gp=358&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270860&de=19695549941&cu=1585227270860&m=564&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=358&lb=5503&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A1685%3A1717%3A0%3A2210&as=0&ag=61&an=0&gf=61&gg=0&ix=61&ic=61&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=61&bx=0&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=121&cd=0&ah=121&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=39395676%3A2668869784%3A5307825743%3A138306474687&bo=27868836&bp=43863396&bd=welcome&zMoatPS=welcome&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=DOMSEARCH&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=368892848&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:32 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:32 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270574&de=12780450735&cu=1585227270574&m=1127&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5503&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1685%3A1717%3A0%3A0&as=1&ag=1120&an=4&gi=1&gf=1120&gg=4&ix=1120&ic=1120&ez=1&ck=1120&kw=726&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1120&bx=4&ci=1120&jz=726&dj=1&aa=0&ad=987&cn=0&gk=987&gl=0&ik=987&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=726&cd=7&ah=726&am=7&rf=0&re=1&ft=987&fv=0&fw=987&wb=1&cl=0&at=0&d=4655091588%3A2664366423%3A5296245972%3A138304213647&bo=27868836&bp=43863396&bd=rec1&zMoatPS=rec1&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=2042270486&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:32 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:32 GMT
kBvA-E-R_normal.png
pbs.twimg.com/profile_images/1140629272186544129/ Frame 9F85
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/1140629272186544129/kBvA-E-R_normal.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41A7) /
Resource Hash
69c94f6c48a59cca7345536ff9faee5580fcfd78421ef0f247e01b871e8d0ea4
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Mar 2020 12:54:32 GMT
x-content-type-options
nosniff
age
24633
x-cache
HIT
status
200
content-length
2187
x-response-time
124
surrogate-key
profile_images profile_images/bucket/0 profile_images/1140629272186544129
last-modified
Mon, 17 Jun 2019 14:34:25 GMT
server
ECS (fcn/41A7)
strict-transport-security
max-age=631138519
content-type
image/png
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
c48f7ef857903b3f0373b6ff3b40fe25
accept-ranges
bytes
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270574&de=12780450735&cu=1585227270574&m=1128&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5503&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1685%3A1717%3A0%3A0&as=1&ag=1120&an=1120&gi=1&gf=1120&gg=1120&ix=1120&ic=1120&ez=1&ck=1120&kw=726&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1120&bx=1120&ci=1120&jz=726&dj=1&aa=0&ad=987&cn=987&gk=987&gl=987&ik=987&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=726&cd=726&ah=726&am=726&rf=0&re=1&ft=987&fv=987&fw=987&wb=1&cl=0&at=0&d=4655091588%3A2664366423%3A5296245972%3A138304213647&bo=27868836&bp=43863396&bd=rec1&zMoatPS=rec1&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=775413415&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:32 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:32 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&bq=0&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270574&de=12780450735&cu=1585227270574&m=1129&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5503&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1685%3A1717%3A0%3A0&as=1&ag=1120&an=1120&gi=1&gf=1120&gg=1120&ix=1120&ic=1120&ez=1&ck=1120&kw=726&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1120&bx=1120&ci=1120&jz=726&dj=1&aa=0&ad=987&cn=987&gk=987&gl=987&ik=987&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=726&cd=726&ah=726&am=726&rf=0&re=1&ft=987&fv=987&fw=987&wb=1&cl=0&at=0&d=4655091588%3A2664366423%3A5296245972%3A138304213647&bo=27868836&bp=43863396&bd=rec1&zMoatPS=rec1&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=1065689275&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:32 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:32 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=1&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270574&de=12780450735&cu=1585227270574&m=1431&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6103&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=58&vx=58%3A58%3A-&pe=1%3A1685%3A1717%3A0%3A0&as=1&ag=1424&an=1120&gi=1&gf=1272&gg=1120&ix=1272&ic=1272&ez=1&ck=1120&kw=726&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1424&bx=1120&ci=1120&jz=726&dj=1&aa=1&ad=1291&cn=987&gn=1&gk=1139&gl=987&ik=1139&co=1291&cp=1123&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1123&cd=726&ah=1123&am=726&rf=0&re=1&ft=1291&fv=987&fw=987&wb=1&cl=0&at=0&d=4655091588%3A2664366423%3A5296245972%3A138304213647&bo=27868836&bp=43863396&bd=rec1&zMoatPS=rec1&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=1783427542&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:32 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:32 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270702&de=113754998326&cu=1585227270702&m=1306&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6103&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1685%3A1717%3A0%3A2210&as=1&ag=1298&an=6&gi=1&gf=1298&gg=6&ix=1298&ic=1298&ez=1&ck=1298&kw=1004&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1298&bx=6&ci=1298&jz=1004&dj=1&aa=1&ad=1192&cn=0&gn=1&gk=1192&gl=0&ik=1192&co=1192&cp=1004&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1004&cd=11&ah=1004&am=11&rf=0&re=1&ft=1192&fv=0&fw=1192&wb=1&cl=0&at=0&d=21887076%3A2677189093%3A5327285441%3A138306663349&bo=27868836&bp=43863396&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=390034416&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:32 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:32 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270702&de=113754998326&cu=1585227270702&m=1307&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6103&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1685%3A1717%3A0%3A2210&as=1&ag=1298&an=1298&gi=1&gf=1298&gg=1298&ix=1298&ic=1298&ez=1&ck=1298&kw=1004&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1298&bx=1298&ci=1298&jz=1004&dj=1&aa=1&ad=1192&cn=1192&gn=1&gk=1192&gl=1192&ik=1192&co=1192&cp=1004&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1004&cd=1004&ah=1004&am=1004&rf=0&re=1&ft=1192&fv=1192&fw=1192&wb=1&cl=0&at=0&d=21887076%3A2677189093%3A5327285441%3A138306663349&bo=27868836&bp=43863396&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=1122862576&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:32 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:32 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270702&de=113754998326&cu=1585227270702&m=1308&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6103&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1685%3A1717%3A0%3A2210&as=1&ag=1298&an=1298&gi=1&gf=1298&gg=1298&ix=1298&ic=1298&ez=1&ck=1298&kw=1004&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1298&bx=1298&ci=1298&jz=1004&dj=1&aa=1&ad=1192&cn=1192&gn=1&gk=1192&gl=1192&ik=1192&co=1192&cp=1004&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1004&cd=1004&ah=1004&am=1004&rf=0&re=1&ft=1192&fv=1192&fw=1192&wb=1&cl=0&at=0&d=21887076%3A2677189093%3A5327285441%3A138306663349&bo=27868836&bp=43863396&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=514322190&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:32 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:32 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&vb=13&kq=1&lo=4&uk=null&pk=0&wk=1&rk=1&tk=1&ak=https%3A%2F%2Fwww.darkreading.com%2F%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270497&de=215926730750&cu=1585227270497&m=1686&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6103&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A1685%3A1717%3A0%3A0&as=0&ag=9&an=0&gf=9&gg=0&ix=9&ic=9&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=9&bx=0&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=0&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=17&cd=0&ah=17&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=4655091588%3A2664366423%3A5296245972%3A138304748693&bo=27868836&bp=43863396&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=522326247&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:32 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:32 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&vb=13&kq=1&lo=1&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=480&w=640&fy=472.5&gp=358&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270860&de=19695549941&cu=1585227270860&m=1549&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=358&lb=6103&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1685%3A1717%3A0%3A2210&as=1&ag=1049&an=61&gi=1&gf=1049&gg=61&ix=1049&ic=1049&ez=1&ck=1049&kw=908&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1049&bx=61&ci=1049&jz=908&dj=1&aa=0&ad=846&cn=0&gk=846&gl=0&ik=846&cq=1&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=908&cd=121&ah=908&am=121&rf=0&re=0&wb=1&cl=0&at=0&d=39395676%3A2668869784%3A5307825743%3A138306474687&bo=27868836&bp=43863396&bd=welcome&zMoatPS=welcome&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=1068496918&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:32 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:32 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&vb=13&kq=1&lo=1&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=480&w=640&fy=472.5&gp=358&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270860&de=19695549941&cu=1585227270860&m=1551&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=358&lb=6103&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1685%3A1717%3A0%3A2210&as=1&ag=1049&an=1049&gi=1&gf=1049&gg=1049&ix=1049&ic=1049&ez=1&ck=1049&kw=908&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1049&bx=1049&ci=1049&jz=908&dj=1&aa=0&ad=846&cn=846&gk=846&gl=846&ik=846&cq=1&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=908&cd=908&ah=908&am=908&rf=0&re=0&wb=1&cl=0&at=0&d=39395676%3A2668869784%3A5307825743%3A138306474687&bo=27868836&bp=43863396&bd=welcome&zMoatPS=welcome&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=105059250&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:32 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:32 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&vb=13&kq=1&lo=1&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=480&w=640&fy=472.5&gp=358&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270860&de=19695549941&cu=1585227270860&m=1552&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=358&lb=6103&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1685%3A1717%3A0%3A2210&as=1&ag=1049&an=1049&gi=1&gf=1049&gg=1049&ix=1049&ic=1049&ez=1&ck=1049&kw=908&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1049&bx=1049&ci=1049&jz=908&dj=1&aa=0&ad=846&cn=846&gk=846&gl=846&ik=846&cq=1&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=908&cd=908&ah=908&am=908&rf=0&re=0&wb=1&cl=0&at=0&d=39395676%3A2668869784%3A5307825743%3A138306474687&bo=27868836&bp=43863396&bd=welcome&zMoatPS=welcome&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=676962544&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:32 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:32 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=1&hp=1&wf=1&vb=13&kq=1&lo=1&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=480&w=640&fy=472.5&gp=358&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270860&de=19695549941&cu=1585227270860&m=1754&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=358&lb=6103&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1685%3A1717%3A0%3A2210&as=1&ag=1254&an=1049&gi=1&gf=1254&gg=1049&ix=1254&ic=1254&ez=1&ck=1049&kw=908&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1254&bx=1049&ci=1049&jz=908&dj=1&aa=1&ad=1051&cn=846&gn=1&gk=1051&gl=846&ik=1051&co=1051&cp=1109&cq=1&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1109&cd=908&ah=1109&am=908&rf=0&re=0&wb=1&cl=0&at=0&d=39395676%3A2668869784%3A5307825743%3A138306474687&bo=27868836&bp=43863396&bd=welcome&zMoatPS=welcome&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=1985430248&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:32 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:32 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 0467
42 B
122 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsuaddWbkrMEgsx74xqCWirDS3vMEYvZkMoK7qi8dVathT3gP-wtP7KMLRB8-Tmav7cFhObX13Y2mGYD5Rnslys&sig=Cg0ArKJSzIzw70uUAYKCEAE&id=lidar2&adk=2097677786&p=358,473,842,1113&tos=1062,0,0,0,0&mtos=1062,1062,1062,1062,1062&mcvt=1062&rs=5&tfs=765&tls=1827&mc=1&lte=-1&bas=0&bac=0&met=no&la=1&avms=nio&niot_obs=516&niot_cbk=536&btr=0&lm=4&bs=1585,1200&ps=1585,6103&ss=1600,1200&tt=1318&pt=512&bin=2&deb=1-1-1-10-0-0-10-0-0-0&tvt=1314&iframe_loc=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%252Fd%252Fd-id%252F1336729&is=1585,1200&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&itpl=32&r=v&v=20200325
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:32 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg1MjI3MjcweGMxOTJmY2M2NWE4YTNleDcyNjg0NzY2IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4Nzg4MjA5OTA4ODg4ODIyIiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg1MjI3MjcweGMxOTJmY2M2NWE4YTNleDcyNjg0NzY2IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4Nzg4MjA5OTA4ODg4ODIyIiwiaW5kZXgiOjgsImNsaWVudFRpbWVzdGFtcCI6MTU4NTIyNzI3Mi45MDYsIm5hbWUiOiJ2aWV3YWJsZTUwMSIsImNyaXRlcmlvbiI6eyJuYW1lIjoiNTAvMSIsInJhdGlvIjowLjUsInRpbWUiOjEwMDB9fV19?crc32c=3090632579
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.227.6.166 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-227-6-166.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Thu, 26 Mar 2020 12:54:32 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg1MjI3MjcweGMxOTJmY2M2NWE4YTNleDcyNjg0NzY2IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4Nzg4MjA5OTA4ODg4ODIyIiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg1MjI3MjcweGMxOTJmY2M2NWE4YTNleDcyNjg0NzY2IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4Nzg4MjA5OTA4ODg4ODIyIiwiaW5kZXgiOjksImNsaWVudFRpbWVzdGFtcCI6MTU4NTIyNzI3Mi45ODQsIm5hbWUiOiJ2aWV3YWJsZVRpbWUiLCJmcm9tIjoxNTg1MjI3MjcxLjg4OSwidG8iOjE1ODUyMjcyNzIuOTcyfV19?crc32c=3555813542
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.227.6.166 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-227-6-166.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Thu, 26 Mar 2020 12:54:33 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
jot.html
platform.twitter.com/ Frame 90CC
Redirect Chain
  • https://syndication.twitter.com/i/jot
  • https://platform.twitter.com/jot.html
0
0
Document
General
Full URL
https://platform.twitter.com/jot.html
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/4196) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
Origin
https://www.darkreading.com
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe

Response headers

Accept-Ranges
bytes
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Age
572182
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Thu, 26 Mar 2020 12:54:33 GMT
Etag
"d9592a6c704736fa4da218d4357976dd"
Last-Modified
Thu, 19 Mar 2020 21:21:20 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/4196)
X-Cache
HIT
Content-Length
80

Redirect headers

status
302 302 Found
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
content-length
0
content-type
text/html;charset=utf-8
date
Thu, 26 Mar 2020 12:54:33 GMT
expires
Tue, 31 Mar 1981 05:00:00 GMT
last-modified
Thu, 26 Mar 2020 12:54:33 GMT
location
https://platform.twitter.com/jot.html
pragma
no-cache
server
tsa_f
strict-transport-security
max-age=631138519
x-connection-hash
5b2e30183ef4bea390cb9f02e7b68a66
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-response-time
121
x-transaction
00a753310060fdd8
x-tsa-request-body-time
20
x-twitter-response-tags
BouncerCompliant
x-xss-protection
0
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&vb=13&kq=1&lo=4&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270497&de=215926730750&cu=1585227270497&m=2872&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6088&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1685%3A1717%3A0%3A0&as=1&ag=1197&an=9&gi=1&gf=1197&gg=9&ix=1197&ic=1197&ez=1&ck=1197&kw=1004&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1197&bx=9&ci=1197&jz=1004&dj=1&aa=1&ad=1097&cn=0&gn=1&gk=1097&gl=0&ik=1097&co=1097&cp=1004&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1004&cd=17&ah=1004&am=17&rf=0&re=0&wb=1&cl=0&at=0&d=4655091588%3A2664366423%3A5296245972%3A138304748693&bo=27868836&bp=43863396&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Exps%3A%20Celtra%20Banner%2FVideo%20%7C%20Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=1913391014&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:33 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:33 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&vb=13&kq=1&lo=4&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270497&de=215926730750&cu=1585227270497&m=2874&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6088&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1685%3A1717%3A0%3A0&as=1&ag=1197&an=1197&gi=1&gf=1197&gg=1197&ix=1197&ic=1197&ez=1&ck=1197&kw=1004&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1197&bx=1197&ci=1197&jz=1004&dj=1&aa=1&ad=1097&cn=1097&gn=1&gk=1097&gl=1097&ik=1097&co=1097&cp=1004&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1004&cd=1004&ah=1004&am=1004&rf=0&re=0&wb=1&cl=0&at=0&d=4655091588%3A2664366423%3A5296245972%3A138304748693&bo=27868836&bp=43863396&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Exps%3A%20Celtra%20Banner%2FVideo%20%7C%20Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=1086375333&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:33 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:33 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&vb=13&kq=1&lo=4&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270497&de=215926730750&cu=1585227270497&m=2875&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6088&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1685%3A1717%3A0%3A0&as=1&ag=1197&an=1197&gi=1&gf=1197&gg=1197&ix=1197&ic=1197&ez=1&ck=1197&kw=1004&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1197&bx=1197&ci=1197&jz=1004&dj=1&aa=1&ad=1097&cn=1097&gn=1&gk=1097&gl=1097&ik=1097&co=1097&cp=1004&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1004&cd=1004&ah=1004&am=1004&rf=0&re=0&wb=1&cl=0&at=0&d=4655091588%3A2664366423%3A5296245972%3A138304748693&bo=27868836&bp=43863396&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Exps%3A%20Celtra%20Banner%2FVideo%20%7C%20Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=1348353987&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:33 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:33 GMT
svrGP
s2150.t.eloqua.com/visitor/v200/
0
404 B
Script
General
Full URL
https://s2150.t.eloqua.com/visitor/v200/svrGP?pps=50&siteid=2150&DLKey=f09b5473ef7642a085c28ad29c30c1d2&DLLookup=&ms=919&firstPartyCookieDomain=trk.darkreading.com
Requested by
Host: img.en25.com
URL: https://img.en25.com/i/elqCfg.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
209.167.231.17 , United States, ASN7160 (NETDYNAMICS, US),
Reverse DNS
e017.en25.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000;
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Date
Thu, 26 Mar 2020 12:54:34 GMT
Vary
Accept-Encoding
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Cache-Control
private,no-cache, no-store
Content-Type
application/javascript
Content-Length
20
Expires
-1
utsync.ashx
ml314.com/ Frame D0EB
733 B
1 KB
Script
General
Full URL
https://ml314.com/utsync.ashx?pub=&adv=&et=0&eid=62439&ct=js&pi=&fp=&clid=&if=1&ps=&cl=&mlt=&data=&&cp=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&pv=1585227270901_amdhi4xso&bl=en-us&cb=5585978&return=&ht=&d=&dc=&si=1585227270901_amdhi4xso&cid=&s=1600x1200&rp=
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?2622020
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.16.75.38 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-16-75-38.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
28a653f0ecb8d2f1087d9d588b494a79e336cf299bb781cd2b57c14f6faa94c1

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Pragma
no-cache
Date
Thu, 26 Mar 2020 12:54:33 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
p3P
CP="NON DSP COR ADMo PSAo DEVo BUS COM UNI NAV DEM STA"
Cache-Control
private
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Content-Length
503
Expires
0
ud.ashx
in.ml314.com/ Frame D0EB
20 B
481 B
Script
General
Full URL
https://in.ml314.com/ud.ashx?topiclimit=&cb=2622020
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?2622020
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.44.39.89 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-44-39-89.compute-1.amazonaws.com
Software
Microsoft-IIS/8.5 / ASP.NET
Resource Hash
d0e4a6372d6fb5ffe9505dbe9e94aee8f1b9b96ec8e5e20684cce8b4c5a88fa7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 26 Mar 2020 12:54:34 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/8.5
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public
Connection
keep-alive
Content-Length
138
Expires
Fri, 27 Mar 2020 12:54:34 GMT
20486
tags.bluekai.com/site/ Frame D0EB
0
0
Image
General
Full URL
https://tags.bluekai.com/site/20486?limit=0&id=3609131046399901769&redir=https://ml314.com/csync.ashx%3Ffp=$_BK_UUID%26person_id=3609131046399901769%26eid=50056
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.45.237.36 , United States, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-237-36.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

csync.ashx
ml314.com/ Frame D0EB
Redirect Chain
  • https://idsync.rlcdn.com/395886.gif?partner_uid=3609131046399901769
  • https://idsync.rlcdn.com/1000.gif?memo=CO6UGBIeChoIARCuXxoTMzYwOTEzMTA0NjM5OTkwMTc2ORAAGg0Iiszy8wUSBQjoBxAAQgBKAA
  • https://ml314.com/csync.ashx?fp=04a8f4b3c7bb2a52593cdda2e6cb963729f45129ec909c4319bd432ec2fdf1c2f4cb09cee1a4f8eb&person_id=3609131046399901769&eid=50082
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=04a8f4b3c7bb2a52593cdda2e6cb963729f45129ec909c4319bd432ec2fdf1c2f4cb09cee1a4f8eb&person_id=3609131046399901769&eid=50082
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.16.75.38 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-16-75-38.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 26 Mar 2020 12:54:33 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Fri, 27 Mar 2020 08:54:34 GMT

Redirect headers

date
Thu, 26 Mar 2020 12:54:34 GMT
via
1.1 google
location
https://ml314.com/csync.ashx?fp=04a8f4b3c7bb2a52593cdda2e6cb963729f45129ec909c4319bd432ec2fdf1c2f4cb09cee1a4f8eb&person_id=3609131046399901769&eid=50082
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
status
307
cache-control
no-cache, no-store
timing-allow-origin
*
alt-svc
clear
content-length
0
csync.ashx
ml314.com/ Frame D0EB
Redirect Chain
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=d0tro1j&ttd_tpi=1
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=d0tro1j&ttd_tpi=1
  • https://ml314.com/utsync.ashx?eid=53819&et=0&fp=f2215868-7d37-4c1a-8e6d-a03ca9987b24
  • https://ml314.com/csync.ashx?fp=f2215868-7d37-4c1a-8e6d-a03ca9987b24&person_id=3609131046399901769&eid=53819
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=f2215868-7d37-4c1a-8e6d-a03ca9987b24&person_id=3609131046399901769&eid=53819
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.16.75.38 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-16-75-38.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 26 Mar 2020 12:54:33 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Fri, 27 Mar 2020 08:54:34 GMT

Redirect headers

Pragma
no-cache
Date
Thu, 26 Mar 2020 12:54:33 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
p3P
CP="NON DSP COR ADMo PSAo DEVo BUS COM UNI NAV DEM STA"
Location
https://ml314.com/csync.ashx?fp=f2215868-7d37-4c1a-8e6d-a03ca9987b24&person_id=3609131046399901769&eid=53819
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
0,Fri, 27 Mar 2020 08:54:34 GMT
csync.ashx
ml314.com/ Frame D0EB
Redirect Chain
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3609131046399901769
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3609131046399901769
  • https://ml314.com/csync.ashx?fp=4011677290683f63baa053dc76f0998b&eid=50146&person_id=3609131046399901769
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=4011677290683f63baa053dc76f0998b&eid=50146&person_id=3609131046399901769
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.16.75.38 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-16-75-38.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 26 Mar 2020 12:54:33 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Fri, 27 Mar 2020 08:54:34 GMT

Redirect headers

Pragma
no-cache
Date
Thu, 26 Mar 2020 12:54:34 GMT
P3P
CP=NOI DSP COR NID PSAa PSDa OUR UNI COM NAV
Location
https://ml314.com/csync.ashx?fp=4011677290683f63baa053dc76f0998b&eid=50146&person_id=3609131046399901769
Cache-Control
no-cache
X-Server
10.45.27.122
Connection
keep-alive
Content-Length
0
Expires
0
pixel
ps.eyeota.net/ Frame D0EB
0
344 B
Image
General
Full URL
https://ps.eyeota.net/pixel?pid=r8hrb20&t=gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
3.122.214.165 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-122-214-165.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 26 Mar 2020 12:54:34 GMT
Content-Length
0
P3P
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR SAMo BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR", policyref="http://ps.eyeota.net/w3c/p3p.xml"
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg1MjI3MjcweGMxOTJmY2M2NWE4YTNleDcyNjg0NzY2IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4Nzg4MjA5OTA4ODg4ODIyIiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg1MjI3MjcweGMxOTJmY2M2NWE4YTNleDcyNjg0NzY2IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4Nzg4MjA5OTA4ODg4ODIyIiwiaW5kZXgiOjEwLCJjbGllbnRUaW1lc3RhbXAiOjE1ODUyMjcyNzQsIm5hbWUiOiJ2aWV3YWJsZVRpbWUiLCJmcm9tIjoxNTg1MjI3MjcyLjk3MiwidG8iOjE1ODUyMjcyNzMuOTg0fV19?crc32c=3002060841
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.227.6.166 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-227-6-166.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Thu, 26 Mar 2020 12:54:34 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
roundtrip.js
s.adroll.com/j/
34 KB
11 KB
Script
General
Full URL
https://s.adroll.com/j/roundtrip.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.101.184.154 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-184-154.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
8939fc82cf413debf8dabe238f5a087d7a9de4034302b3e1900519330d1ef2c2

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

x-amz-version-id
fE06Fv6CigOvPEvMP5lqB.kXTt2sg1Al
Content-Encoding
gzip
x-amz-request-id
FD513016009CFFD0
x-amz-server-side-encryption
AES256
Access-Control-Max-Age
600
Date
Thu, 26 Mar 2020 12:54:34 GMT
Connection
keep-alive
Content-Length
10924
x-amz-id-2
1lnWnDaJajk12FY6ae35NmAjkofe3E1GL2VZQf/G+akzIQmi0b7WLESmcq+eOHgyYT5DGT7Ff7M=
Last-Modified
Tue, 17 Mar 2020 21:20:33 GMT
Server
AmazonS3
ETag
"f17c6c4e250f21b7329649297b5575d2"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=3600, must-revalidate
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
ng_initgatewaycheck.asp
www.darkreading.com/ Frame A162
Redirect Chain
  • https://www.darkreading.com/ng_initgatewaycheck.asp
  • https://ng.techweb.com/authds/gateway?gateway=true&return=https%3A%2F%2Fwww%2Edarkreading%2Ecom%2Fng%5Finitgatewaycheck%2Easp%3Finit%5Fgateway%3Dtrue%26httpscheck%3Dtrue
  • https://www.darkreading.com/ng_initgatewaycheck.asp?init_gateway=true&httpscheck=true
0
159 B
Document
General
Full URL
https://www.darkreading.com/ng_initgatewaycheck.asp?init_gateway=true&httpscheck=true
Requested by
Host: img.deusm.com
URL: https://img.deusm.com/darkreading/JQuery_Library/Jquery_3.4.1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7763 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains

Request headers

:method
GET
:authority
www.darkreading.com
:scheme
https
:path
/ng_initgatewaycheck.asp?init_gateway=true&httpscheck=true
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
_ccmsi=1585227270901_amdhi4xso|1585227273902; _ccmaid=3609131046399901769; __cfduid=d7113de126f40597f5e5a230a2152de581585227274; darkreading_lastvisit=3/26/2020 8:54:34 AM; darkreading%5Fvisits=1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729

Response headers

status
200
date
Thu, 26 Mar 2020 12:54:34 GMT
content-type
text/html
cache-control
no-store, no-cache, must-revalidate,private
pragma
no-store
expires
Wed, 25 Mar 2020 12:54:34 GMT
set-cookie
darkreading_lastvisit=3/26/2020 8:54:34 AM; expires=Mon, 26-Mar-2035 12:54:34 GMT; path=/; HttpOnly gatewayChecked=true; HttpOnly darkreading%5Fvisits=2; expires=Mon, 26-Mar-2035 04:00:00 GMT; path=/
x-powered-by
ASP.NET
strict-transport-security
max-age=63072000; includeSubDomains
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
57a10560edc3c2fe-FRA
content-encoding
gzip

Redirect headers

P3P
CP='IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT'
Location
https://www.darkreading.com/ng_initgatewaycheck.asp?init_gateway=true&httpscheck=true
Content-Length
0
Date
Thu, 26 Mar 2020 12:54:34 GMT
Server
NG
sodar
pagead2.googlesyndication.com/getconfig/
7 KB
5 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gpt&tv=2020030501&st=env
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
872925e3537035bd976a90e2f54ab415f9927639a746612566f25fb936bdaa0f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
Origin
https://www.darkreading.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 26 Mar 2020 12:54:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5303
x-xss-protection
0
sodar2.js
tpc.googlesyndication.com/sodar/
14 KB
5 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a47f17d6ebbf4621d8fe87ab790d8d8fb5c3086629194d9ff2d64faaa6e46ab6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 26 Mar 2020 12:54:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1582746470043195"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5456
x-xss-protection
0
expires
Thu, 26 Mar 2020 12:54:34 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/209/ Frame 4D83
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/209/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
5727
date
Thu, 26 Mar 2020 12:05:20 GMT
expires
Fri, 26 Mar 2021 12:05:20 GMT
last-modified
Tue, 25 Feb 2020 17:32:01 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
2954
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
index.js
s.adroll.com/j/exp/
Redirect Chain
  • https://s.adroll.com/j/exp/TQSV74R4GVCSJITSZC2MCP/index.js
  • https://s.adroll.com/j/exp/index.js
28 B
747 B
Script
General
Full URL
https://s.adroll.com/j/exp/index.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.101.184.154 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-184-154.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
f59e5f34a941183aacaed25322ac0856628493c2cfd936ded3fddc0a49510e52

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
paRT1mZ6uFF2DctZlU2CZQr6ztEFf0gh
Content-Encoding
gzip
x-amz-request-id
BFB756C27922A83E
x-amz-server-side-encryption
AES256
Access-Control-Max-Age
600
Date
Thu, 26 Mar 2020 12:54:34 GMT
Connection
keep-alive
Content-Length
48
x-amz-id-2
q8seDYsnPWjEy0hlZjdHleMC6CqXXyyXpFkqIFst+5FeBLk7v1mLxWodzYFK6rj41PoNoNGwR7A=
Last-Modified
Thu, 19 Mar 2020 22:39:43 GMT
Server
AmazonS3
ETag
"5816cced8568d223aa09d889f300692b"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript
Access-Control-Allow-Origin
*
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*

Redirect headers

Date
Thu, 26 Mar 2020 12:54:34 GMT
Server
AkamaiGHost
Access-Control-Allow-Origin
*
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Location
https://s.adroll.com/j/exp/index.js
Access-Control-Allow-Credentials
false
Connection
keep-alive
Access-Control-Allow-Headers
*
Content-Length
0
index.js
s.adroll.com/j/pre/TQSV74R4GVCSJITSZC2MCP/ACPJ7LN56VBITNNAUDPDMG/
1 KB
1 KB
Script
General
Full URL
https://s.adroll.com/j/pre/TQSV74R4GVCSJITSZC2MCP/ACPJ7LN56VBITNNAUDPDMG/index.js
Requested by
Host: s.adroll.com
URL: https://s.adroll.com/j/roundtrip.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.101.184.154 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-184-154.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
cbce85e96b7752208ce15a09ea4d5a58b792edc9e77f1c5ccf46c01935970f9d

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

x-amz-version-id
x9VWUSqKNmW0Jl6FH6mvpmnb89c57EaF
Content-Encoding
gzip
x-amz-request-id
4ED66E8150D01E2F
x-amz-server-side-encryption
AES256
Access-Control-Max-Age
600
Date
Thu, 26 Mar 2020 12:54:34 GMT
Connection
keep-alive
Content-Length
635
x-amz-id-2
2UOtea8XHcT2CeANcy72H7asnLAVN5nJ1Y8uDZRurc45gXQIC639vPScjiX/bzWnIq+1kBmixCI=
Last-Modified
Thu, 26 Mar 2020 02:40:22 GMT
Server
AmazonS3
ETag
"3996d65282dd996ee0d7d4c90c139158"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
text/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=3600, must-revalidate
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
/
d.adroll.com/consent/check/TQSV74R4GVCSJITSZC2MCP/
Redirect Chain
  • https://d.adroll.mgr.consensu.org/consent/iabcheck/TQSV74R4GVCSJITSZC2MCP?_s=4b6153849a44cc3c25f30b24df882d85&_b=2
  • https://d.adroll.com/consent/check/TQSV74R4GVCSJITSZC2MCP/?_s=4b6153849a44cc3c25f30b24df882d85&_b=2
106 B
198 B
Script
General
Full URL
https://d.adroll.com/consent/check/TQSV74R4GVCSJITSZC2MCP/?_s=4b6153849a44cc3c25f30b24df882d85&_b=2
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.30.34.11 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-30-34-11.eu-west-1.compute.amazonaws.com
Software
nginx/1.16.1 /
Resource Hash
4b953b3749ad49b9718da49ab6330f9df0f2ac41d39a268e2f918fc650e11c29

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Thu, 26 Mar 2020 12:54:35 GMT
server
nginx/1.16.1
content-length
106
content-type
application/javascript

Redirect headers

status
302
date
Thu, 26 Mar 2020 12:54:35 GMT
server
nginx/1.16.1
content-length
105
location
https://d.adroll.com/consent/check/TQSV74R4GVCSJITSZC2MCP/?_s=4b6153849a44cc3c25f30b24df882d85&_b=2
gen_204
pagead2.googlesyndication.com/pagead/
0
69 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=209&t=2&li=gpt_2020030501&jk=1335525645972433&bg=!WFulW0NYC0X2kif--tkCAAAAOlIAAAAKmQFfPfvWk57gAo6KD7Ey9n0br1zj1nyH3P5TJfLmKiFCU9dOPoGci273bL0I4chu3EaZo6f773z2THZN8HtqTLRjkeG-8fdEgH_LFjksmhXkMEhtJaj55UuNTG_Al3RJOd3fB6te0sXmjA1dzClFteRPiED4K9H--TJ9zqREF0sc8SaLahFEJpRonT3ukv3xxTys55GLf1e8Vv3VnlQJc7fMMtOUO0zdegiXtjVHwAPLZxrMK0DGbMzNJADTASrHa9ZAT-ikkvVQ2tww02NG0DoxAQPyzOK9mbEirfeARuFXGB3CwRIF9hHumv-WAdaM5wvjm26yFO3PVXv4fC6GYmTqrQMRrQ2Lzxuh43EFX7UCZpH09WYvXB97fgrDvQiMFqXVwjzM28Hf3UgtBYhcgporaBBU6zLOIsWTPRx0nmy0FvrSXregkCaPHH0nrEvfNgiXwSjSKCUKC_qqvfdkAp12
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:34 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg1MjI3MjcweGMxOTJmY2M2NWE4YTNleDcyNjg0NzY2IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4Nzg4MjA5OTA4ODg4ODIyIiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg1MjI3MjcweGMxOTJmY2M2NWE4YTNleDcyNjg0NzY2IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4Nzg4MjA5OTA4ODg4ODIyIiwiaW5kZXgiOjExLCJjbGllbnRUaW1lc3RhbXAiOjE1ODUyMjcyNzUuMDE3LCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU4NTIyNzI3My45ODQsInRvIjoxNTg1MjI3Mjc1LjAwMX1dfQ==?crc32c=2246647410
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.227.6.166 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-227-6-166.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Thu, 26 Mar 2020 12:54:35 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
consent.js
s.adroll.com/j/
243 KB
33 KB
Script
General
Full URL
https://s.adroll.com/j/consent.js
Requested by
Host: s.adroll.com
URL: https://s.adroll.com/j/roundtrip.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.101.184.154 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-184-154.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
f82c9f099656346f543c66ba009bd5f18010c7b41ad43d47a7f762121ad4496d

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

x-amz-version-id
W7pJTDq0578OcjyRZxtRH_BjDuWCGgRc
Content-Encoding
gzip
x-amz-request-id
BFDDD219E02D63AA
x-amz-server-side-encryption
AES256
Access-Control-Max-Age
600
Date
Thu, 26 Mar 2020 12:54:35 GMT
Connection
keep-alive
Content-Length
33195
x-amz-id-2
0vEYWSNr8BIWIFx+Vt855bKM9PGQi1O3TTl+RSbaQgK2eZJeo3lhhvwHGpfanAseKG0Oz2obOWc=
Last-Modified
Tue, 19 Nov 2019 20:42:26 GMT
Server
AmazonS3
ETag
"2f9f76c2d377be42af05cdf34c632618"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=300, must-revalidate
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
hod
d.adroll.com/consent/
42 B
180 B
Image
General
Full URL
https://d.adroll.com/consent/hod?_e=view_banner&_s=4b6153849a44cc3c25f30b24df882d85&_b=2.1&_a=TQSV74R4GVCSJITSZC2MCP
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.30.34.11 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-30-34-11.eu-west-1.compute.amazonaws.com
Software
nginx/1.16.1 /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

status
200
date
Thu, 26 Mar 2020 12:54:35 GMT
cache-control
no-transform,public,max-age=300,s-maxage=900
server
nginx/1.16.1
content-length
42
vary
Cookie
content-type
image/gif
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&vb=13&kq=1&lo=4&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270497&de=215926730750&cu=1585227270497&m=4887&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6088&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1685%3A1717%3A0%3A0&as=1&ag=3212&an=1197&gi=1&gf=3212&gg=1197&ix=3212&ic=3212&ez=1&ck=1197&kw=1004&aj=1&pg=100&pf=100&ib=0&cc=1&bw=3212&bx=1197&ci=1197&jz=1004&dj=1&aa=1&ad=3112&cn=1097&gn=1&gk=3112&gl=1097&ik=3112&co=1097&cp=1004&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=3220&cd=1004&ah=3220&am=1004&rf=0&re=0&wb=2&cl=0&at=0&d=4655091588%3A2664366423%3A5296245972%3A138304748693&bo=27868836&bp=43863396&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Exps%3A%20Celtra%20Banner%2FVideo%20%7C%20Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=681568935&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:35 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:35 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270574&de=12780450735&cu=1585227270574&m=5078&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6088&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=58&vx=58%3A58%3A-&pe=1%3A1685%3A1717%3A0%3A0&as=1&ag=5072&an=1424&gi=1&gf=1272&gg=1272&ix=1272&ic=1272&ez=1&ck=1120&kw=726&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5072&bx=1424&ci=1120&jz=726&dj=1&aa=1&ad=4939&cn=1291&gn=1&gk=1139&gl=1139&ik=1139&co=1291&cp=1123&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4850&cd=1123&ah=4850&am=1123&rf=0&re=1&ft=4827&fv=1291&fw=987&wb=1&cl=0&at=0&d=4655091588%3A2664366423%3A5296245972%3A138304213647&bo=27868836&bp=43863396&bd=rec1&zMoatPS=rec1&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=1486889565&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:35 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:35 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=6&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270574&de=12780450735&cu=1585227270574&m=5280&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6088&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=58&vx=58%3A58%3A-&pe=1%3A1685%3A1717%3A0%3A0&as=1&ag=5274&an=5072&gi=1&gf=1272&gg=1272&ix=1272&ic=1272&ez=1&ck=1120&kw=726&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5274&bx=5072&ci=1120&jz=726&dj=1&aa=1&ad=5141&cn=4939&gn=1&gk=1139&gl=1139&ik=1139&co=1291&cp=1123&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5277&cd=4850&ah=5277&am=4850&rf=0&re=1&ft=4827&fv=4827&fw=987&wb=1&cl=0&at=0&d=4655091588%3A2664366423%3A5296245972%3A138304213647&bo=27868836&bp=43863396&bd=rec1&zMoatPS=rec1&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=2031787083&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:35 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:35 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270702&de=113754998326&cu=1585227270702&m=5158&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6088&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1685%3A1717%3A0%3A2210&as=1&ag=5150&an=1298&gi=1&gf=5150&gg=1298&ix=5150&ic=5150&ez=1&ck=1298&kw=1004&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5150&bx=1298&ci=1298&jz=1004&dj=1&aa=1&ad=5044&cn=1192&gn=1&gk=5044&gl=1192&ik=5044&co=1192&cp=1004&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4954&cd=1004&ah=4954&am=1004&rf=0&re=1&ft=4944&fv=1192&fw=1192&wb=2&cl=0&at=0&d=21887076%3A2677189093%3A5327285441%3A138306663349&bo=27868836&bp=43863396&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=599771766&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:35 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:35 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270682&de=922849587863&cu=1585227270682&m=5181&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6088&le=1&gm=1&io=1&vv=1&vw=1%3A3%3A0&vp=0&vx=0%3A0%3A-&pe=1%3A1685%3A1717%3A0%3A2210&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&aj=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&dj=0&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&cq=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5177&cd=3&ah=5177&am=3&rf=0&re=1&wb=1&cl=0&at=0&d=21887076%3A2680018979%3A5334439834%3A138307481617&bo=27868836&bp=43863396&bd=rec2&zMoatPS=rec2&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=538925224&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:35 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:35 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270702&de=113754998326&cu=1585227270702&m=5361&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6088&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1685%3A1717%3A0%3A2210&as=1&ag=5352&an=5150&gi=1&gf=5352&gg=5150&ix=5352&ic=5352&ez=1&ck=1298&kw=1004&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5352&bx=5150&ci=1298&jz=1004&dj=1&aa=1&ad=5246&cn=5044&gn=1&gk=5246&gl=5044&ik=5246&co=1192&cp=1004&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5357&cd=4954&ah=5357&am=4954&rf=0&re=1&ft=4944&fv=4944&fw=1192&wb=2&cl=0&at=0&d=21887076%3A2677189093%3A5327285441%3A138306663349&bo=27868836&bp=43863396&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=294922058&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:36 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:36 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270682&de=922849587863&cu=1585227270682&m=5383&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6088&le=1&gm=1&io=1&vv=1&vw=1%3A3%3A0&vp=0&vx=0%3A0%3A-&pe=1%3A1685%3A1717%3A0%3A2210&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&aj=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&dj=0&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&cq=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5177&cd=5177&ah=5177&am=5177&rf=0&re=1&wb=1&cl=0&at=0&d=21887076%3A2680018979%3A5334439834%3A138307481617&bo=27868836&bp=43863396&bd=rec2&zMoatPS=rec2&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=945068778&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:38 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:38 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg1MjI3MjcweGMxOTJmY2M2NWE4YTNleDcyNjg0NzY2IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4Nzg4MjA5OTA4ODg4ODIyIiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg1MjI3MjcweGMxOTJmY2M2NWE4YTNleDcyNjg0NzY2IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4Nzg4MjA5OTA4ODg4ODIyIiwiaW5kZXgiOjEyLCJjbGllbnRUaW1lc3RhbXAiOjE1ODUyMjcyNzcuMDM0LCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU4NTIyNzI3NS4wMDEsInRvIjoxNTg1MjI3Mjc3LjAyfV19?crc32c=2502608162
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.227.6.166 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-227-6-166.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Thu, 26 Mar 2020 12:54:38 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&vb=13&kq=1&lo=1&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=480&w=640&fy=472.5&gp=358&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270860&de=19695549941&cu=1585227270860&m=5601&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=358&lb=6088&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1685%3A1717%3A0%3A2210&as=1&ag=5101&an=1254&gi=1&gf=5101&gg=1254&ix=5101&ic=5101&ez=1&ck=1049&kw=908&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5101&bx=1254&ci=1049&jz=908&dj=1&aa=1&ad=4898&cn=1051&gn=1&gk=4898&gl=1051&ik=4898&co=1051&cp=1109&cq=1&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4960&cd=1109&ah=4960&am=1109&rf=0&re=0&wb=2&cl=0&at=0&d=39395676%3A2668869784%3A5307825743%3A138306474687&bo=27868836&bp=43863396&bd=welcome&zMoatPS=welcome&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=129079489&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:38 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:38 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&vb=13&kq=1&lo=4&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270497&de=215926730750&cu=1585227270497&m=6702&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6088&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1685%3A1717%3A0%3A0&as=1&ag=5025&an=3212&gi=1&gf=5025&gg=3212&ix=5025&ic=5025&ez=1&ck=1197&kw=1004&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5025&bx=3212&ci=1197&jz=1004&dj=1&aa=1&ad=4925&cn=3112&gn=1&gk=4925&gl=3112&ik=4925&co=1097&cp=1004&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4833&cd=3220&ah=4833&am=3220&rf=0&re=0&wb=2&cl=0&at=0&d=4655091588%3A2664366423%3A5296245972%3A138304748693&bo=27868836&bp=43863396&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Exps%3A%20Celtra%20Banner%2FVideo%20%7C%20Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=1695875562&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:38 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:38 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg1MjI3MjcweGMxOTJmY2M2NWE4YTNleDcyNjg0NzY2IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4Nzg4MjA5OTA4ODg4ODIyIiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg1MjI3MjcweGMxOTJmY2M2NWE4YTNleDcyNjg0NzY2IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4Nzg4MjA5OTA4ODg4ODIyIiwiaW5kZXgiOjEzLCJjbGllbnRUaW1lc3RhbXAiOjE1ODUyMjcyNzkuMDUsIm5hbWUiOiJ2aWV3YWJsZVRpbWUiLCJmcm9tIjoxNTg1MjI3Mjc3LjAyLCJ0byI6MTU4NTIyNzI3OS4wMzR9XX0=?crc32c=2857990063
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.227.6.166 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-227-6-166.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Thu, 26 Mar 2020 12:54:39 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=11&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&k=&bq=0&f=0&j=&t=1585227270596&de=545077868720&m=0&ar=b63606d9a9-clean&iw=e4a6545&q=36&cb=0&ym=0&cu=1585227270596&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=4655091588%3A2664366423%3A5296245972%3A138304147575&zMoatPS=wallpaper&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&bo=27868836&bp=43863396&bd=wallpaper&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1685%3A1717%3A0%3A0&fs=177454&na=471857886&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:40 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:40 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=11&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&k=&bq=0&f=0&j=&t=1585227270670&de=854099274091&m=0&ar=b63606d9a9-clean&iw=e4a6545&q=37&cb=0&ym=0&cu=1585227270670&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=4655091588%3A2668166299%3A5327424477%3A138306392388&zMoatPS=native&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&bo=27868836&bp=43863396&bd=native&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1685%3A1717%3A0%3A2210&fs=177454&na=297327138&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:40 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:40 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=25&q=2&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F9835165613398450709&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=7&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270574&de=12780450735&cu=1585227270574&m=10106&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6088&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=58&vx=58%3A58%3A-&pe=1%3A1685%3A1717%3A0%3A0&as=1&ag=10099&an=5274&gi=1&gf=1272&gg=1272&ix=1272&ic=1272&ez=1&ck=1120&kw=726&aj=1&pg=100&pf=100&ib=0&cc=1&bw=10099&bx=5274&ci=1120&jz=726&dj=1&aa=1&ad=9966&cn=5141&gn=1&gk=1139&gl=1139&ik=1139&co=1291&cp=1123&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=9899&cd=5277&ah=9899&am=5277&rf=0&re=1&ft=4827&fv=4827&fw=987&wb=1&cl=0&at=0&d=4655091588%3A2664366423%3A5296245972%3A138304213647&bo=27868836&bp=43863396&bd=rec1&zMoatPS=rec1&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=1864063941&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:40 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:40 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=11&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&k=&bq=0&f=0&j=&t=1585227270763&de=683561537363&m=0&ar=b63606d9a9-clean&iw=e4a6545&q=38&cb=0&ym=0&cu=1585227270763&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=4855605286%3A2675923598%3A5324259748%3A138305900297&zMoatPS=insight&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&bo=27868836&bp=43863396&bd=insight&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1685%3A1717%3A0%3A2210&fs=177454&na=811595537&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:40 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:40 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=11&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&k=&bq=0&f=0&j=&t=1585227270814&de=624144677647&m=0&ar=b63606d9a9-clean&iw=e4a6545&q=39&cb=0&ym=0&cu=1585227270814&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=17527716%3A193997916%3A42403476%3A138212589663&zMoatPS=video&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&bo=27868836&bp=43863396&bd=video&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1685%3A1717%3A0%3A2210&fs=177454&na=465654819&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:40 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:40 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=25&q=2&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F15597202546216543198&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=6&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270702&de=113754998326&cu=1585227270702&m=10186&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6088&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1685%3A1717%3A0%3A2210&as=1&ag=10177&an=5352&gi=1&gf=10177&gg=5352&ix=10177&ic=10177&ez=1&ck=1298&kw=1004&aj=1&pg=100&pf=100&ib=0&cc=1&bw=10177&bx=5352&ci=1298&jz=1004&dj=1&aa=1&ad=10071&cn=5246&gn=1&gk=10071&gl=5246&ik=10071&co=1192&cp=1004&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=9981&cd=5357&ah=9981&am=5357&rf=0&re=1&ft=4944&fv=4944&fw=1192&wb=2&cl=0&at=0&d=21887076%3A2677189093%3A5327285441%3A138306663349&bo=27868836&bp=43863396&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=1006989449&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:40 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:40 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg1MjI3MjcweGMxOTJmY2M2NWE4YTNleDcyNjg0NzY2IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4Nzg4MjA5OTA4ODg4ODIyIiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg1MjI3MjcweGMxOTJmY2M2NWE4YTNleDcyNjg0NzY2IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4Nzg4MjA5OTA4ODg4ODIyIiwiaW5kZXgiOjE0LCJjbGllbnRUaW1lc3RhbXAiOjE1ODUyMjcyODEuMDUxLCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU4NTIyNzI3OS4wMzQsInRvIjoxNTg1MjI3MjgxLjA1fV19?crc32c=1659234938
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.227.6.166 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-227-6-166.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Thu, 26 Mar 2020 12:54:41 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&vb=13&kq=1&lo=1&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=6&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=480&w=640&fy=472.5&gp=358&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270860&de=19695549941&cu=1585227270860&m=10631&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=358&lb=6088&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1685%3A1717%3A0%3A2210&as=1&ag=10130&an=5101&gi=1&gf=10130&gg=5101&ix=10130&ic=10130&ez=1&ck=1049&kw=908&aj=1&pg=100&pf=100&ib=0&cc=1&bw=10130&bx=5101&ci=1049&jz=908&dj=1&aa=1&ad=9927&cn=4898&gn=1&gk=9927&gl=4898&ik=9927&co=1051&cp=1109&cq=1&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=9989&cd=4960&ah=9989&am=4960&rf=0&re=0&wb=2&cl=0&at=0&d=39395676%3A2668869784%3A5307825743%3A138306474687&bo=27868836&bp=43863396&bd=welcome&zMoatPS=welcome&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=1426887561&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:41 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:41 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=25&q=2&hp=1&wf=1&vb=13&kq=1&lo=4&uk=null&pk=0&wk=1&rk=1&tk=1&ak=https%3A%2F%2Fwww.darkreading.com%2F%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=6&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&id=1&f=0&j=&t=1585227270497&de=215926730750&cu=1585227270497&m=11794&ar=b63606d9a9-clean&iw=e4a6545&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6088&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1685%3A1717%3A0%3A0&as=1&ag=10118&an=5025&gi=1&gf=10118&gg=5025&ix=10118&ic=10118&ez=1&ck=1197&kw=1004&aj=1&pg=100&pf=100&ib=0&cc=1&bw=10118&bx=5025&ci=1197&jz=1004&dj=1&aa=1&ad=10018&cn=4925&gn=1&gk=10018&gl=4925&ik=10018&co=1097&cp=1004&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=9924&cd=4833&ah=9924&am=4833&rf=0&re=0&wb=2&cl=0&at=0&d=4655091588%3A2664366423%3A5296245972%3A138304748693&bo=27868836&bp=43863396&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Exps%3A%20Celtra%20Banner%2FVideo%20%7C%20Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=177454&na=445718499&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 26 Mar 2020 12:54:42 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 26 Mar 2020 12:54:42 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg1MjI3MjcweGMxOTJmY2M2NWE4YTNleDcyNjg0NzY2IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4Nzg4MjA5OTA4ODg4ODIyIiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTg1MjI3MjcweGMxOTJmY2M2NWE4YTNleDcyNjg0NzY2IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4Nzg4MjA5OTA4ODg4ODIyIiwiaW5kZXgiOjE1LCJjbGllbnRUaW1lc3RhbXAiOjE1ODUyMjcyODMuMDY3LCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU4NTIyNzI4MS4wNSwidG8iOjE1ODUyMjcyODMuMDUxfV19?crc32c=3739695175
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.227.6.166 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-227-6-166.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Thu, 26 Mar 2020 12:54:43 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0

Verdicts & Comments Add Verdict or Comment

435 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| displayDefaultNativeAd function| displayNativeAd function| displayLandingPageNativeAd function| displaySecondLandingPageNativeAd function| displayArticleNativeAd function| displayInsightAd function| displaySASInsightAd object| respond string| theSiteDomain string| theMsgChatQueueInclude string| theChatStatusInclude boolean| doHideShowDivOpacityFade function| MM_swapImgRestore function| MM_preloadImages function| MM_findObj function| MM_swapImage function| MM_openBrWindow function| SwitchColor function| MakeDark function| MakeLight string| pop_collection string| pop_styleObj function| GetObject function| SwitchHTML function| SwitchDivs function| HideDiv function| ShowDiv function| URLEncodeString object| opacitySliderTimeouts function| SlideObjOpacity function| ChangeObjOpacity object| heightSliderTimeouts function| SlideObjHeight function| ChangeObjHeight function| ClearTimeoutArray function| AttachEventFunctionToObject function| RemoveEventFunctionFromObject function| SetCookie function| GetCookie function| AlignObject function| MoveObject function| MoveDivToColTop function| AddEventListenerToObj function| ContentNotifyPrefsShortSubmit function| ContentNotifyPrefsShortGenerateAndDisplayRSSFeed function| RedirectConfirm function| blend function| returnPosYofObj function| returnPosXofObj function| returnCurrentWindowYOffset function| returnCurrentWindowXOffset object| menuMoverTimeouts number| menuMoverTimeoutCounter number| menuMaxOpacity function| ShowMenu function| ChangeObjectLeft function| ChangeObjectTop function| NumStepsToMove function| AddPopMenuEventListener boolean| lockPoppedMenu string| lockedPoppedMenuObjName function| PopMenu object| closeMenuTimeouts number| closeMenuTimeoutCounter function| PopMenuOff number| globalPopXDiff number| globalPopYDiff function| createSubmenu function| LRSliderHandler string| active_pop_collection string| active_pop_styleObj function| GetActiveObject function| PrintActiveContent function| LoadScript function| RemoveScript string| theRateLink function| ShowRateMenu function| ShowSaveInfo function| HideSaveInfo function| HideRateMenu function| RateThis function| ChangeRateMenuFormParam function| BuildAndLoadRateMenuScript function| ClearRateMenuForm function| ClearRateLink function| ContentConsumptionLoggedSuccess function| ContentSignUpLoggedSuccess function| ObjectFader function| PageEffectPopUp function| returnWidthofObj function| cookiesEnabled boolean| pop_ns4 boolean| pop_dom boolean| active_pop_ns4 boolean| active_pop_dom function| $ function| jQuery function| displayWhatsThisBox function| displayPartnerPerspectivesBox function| displayMalwareBytesPartnerPerspectivesBox function| displayEvidentioPartnerPerspectivesBox function| displayF5PartnerPerspectivesBox function| displayBitdefenderPartnerPerspectivesBox function| displayGeneralDynamicsFidelisPartnerPerspectivesBox function| displayPartnerPerspectivesBoxArticle function| displayMalwareBytesPartnerPerspectivesBoxArticle function| displayGigamonPartnerPerspectivesBoxArticle function| displayAuthorInfoBox function| highlightTopStory function| showMobileIconOverlay function| closeMobileOverlayMenu function| goToByScroll function| ToggleNavButtonMenu function| ToggleNavButton object| designlinesSliderHandler string| designlinesLeftArrowButtonMouseoutImgSrc string| designlinesRightArrowButtonMouseoutImgSrc number| oneScrollHeight number| currentTickerItem number| numberOfTickerItems boolean| tickerIsPopulated undefined| tickerTimeout boolean| tickerStopped function| InitializeNewsTicker function| RotateNewsTicker function| StartNewsTicker function| StopNewsTicker boolean| superNavEventsMenuOpen function| ToggleSuperNavEventsMenu function| swipeleftHandler function| swiperightHandler function| tapholdHandler function| tapholdOutHandler function| sizeAnyBrightcoveObjects function| sizeDocImageClass object| visitor function| Visitor object| s_c_il number| s_c_in object| adobe function| mboxCreate function| mboxDefine function| mboxUpdate function| getCookie function| setCookie string| thePageTitle string| ngenv string| ngserv string| omn_regtrackproduct string| omn_nltrackproduct function| CSBJs_Core function| CSBJs_OOP function| CSBJs_Resources function| CSBJs_ServiceRequest function| CSBJs_Exception function| CSBJs_Ajax function| CSBJs_Decorator function| CSBJs_Decorator_HtmlNode function| CSBJs_App function| CSBJs_App_Window function| CSBJs_App_Window_Modal function| CSBJs_App_Window_Alert function| CSBJs_App_Button function| CSBJs_App_Html function| CSBJs_App_Field function| CSBJs_App_Field_File function| CSBJs_App_Field_TextArea function| CSBJs_Timer function| CSBJs_Form function| CSBJs_Form_Group function| CSBJs_Form_Step function| CSBJs_Form_Element function| CSBJs_Form_Element_Html function| CSBJs_Form_Element_Image function| CSBJs_Form_Element_TextField function| CSBJs_Form_Element_OtherTextField function| CSBJs_Form_Element_Submit function| CSBJs_Form_Element_NextStep function| CSBJs_Form_Element_PreviousStep function| CSBJs_Form_Element_Reset function| CSBJs_Form_Element_Multi function| CSBJs_Form_Element_Select function| CSBJs_Form_Element_Password function| CSBJs_Form_Element_Dynamic function| CSBJs_Form_Element_Hidden function| CSBJs_Form_Element_Checkbox function| CSBJs_Form_Element_Checkboxes function| CSBJs_Form_Element_Radio function| CSBJs_Form_Element_TextArea function| CSBJs_Form_Validation function| CSBJs_Form_Validation_Regex function| CSBJs_Form_Validation_CompareEqual function| CSBJs_Form_Validation_Required function| CSBJs_Form_Validation_JsFunction function| CSBJs_Form_Validation_Ajax function| CSBJs_Form_Validation_JsonP function| CSBJs_Form_Observer function| CSBJs_Form_Observer_Action function| CSBJs_Form_Observer_Action_Hide function| CSBJs_Form_Observer_Action_ChangeDynamic function| CSBJs_Form_Filter function| CSBJs_Form_Filter_Replace function| UBM function| rcCallback string| siteLogo string| privacyLogo string| privacyText string| loginRedirectURL string| loginNextAction string| securityJobAction boolean| reloadOnClose object| ngconfig string| regHeaderContent string| regAction string| ngRegAsset object| loginWidget object| registrationWidget object| updateWidget object| optoutWidget object| newsletterWidget object| newsletterSignupWidget object| externalAuthSuppWidget function| openRegisterThanks function| login function| verifyToken function| securityJobsFromUpdate function| securityJobs function| loginWithMessage function| changePassword function| openForm function| updateForm function| newsletterForm function| newsletterSignupForm function| extAuthSuppForm function| ngLogoutUser function| ngCreateCookie function| ngRreadCookie function| ngEraseCookie function| trackShortRegistrationOpen function| trackSocialMediaBasicRegistration function| trackLongRegistrationOpen function| trackLoginOpen function| trackLoginSuccess function| trackPasswordResetOpen function| trackNewsletterPrefsOpen function| trackNewsletterPrefsConfirm function| trackShortRegistrationConfirm function| trackRegistrationThankYou object| welcomeLinks number| loginCheck string| loginHTML string| loginHTMLMobile function| initGatewayCheck function| setNGReg function| SubmitInPageSurvey number| _doubleclickRand function| jobalert object| _AdsNativeOpts object| googletag object| gptadslots object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleTokenSync number| google_srt undefined| google_measure_js_timing object| _comscore function| fbq function| _fbq function| gtag object| dataLayer number| __google_ad_urls_id number| google_unique_id object| gaGlobal object| google_conversion_id object| google_custom_params object| google_remarketing_only function| GooglemKTybQhCsO object| google_conversion_date object| google_conversion_time number| google_conversion_snippets number| google_conversion_first_time object| google_conversion_js_version object| google_conversion_format object| google_enable_display_cookie_match object| google_conversion_type object| google_conversion_order_id object| google_conversion_language object| google_conversion_value object| google_conversion_evaluemrc object| google_conversion_currency object| google_conversion_domain object| google_conversion_label object| google_conversion_color object| google_disable_viewthrough object| google_gtag_event_data object| google_conversion_linker object| google_tag_for_child_directed_treatment object| google_tag_for_under_age_of_consent object| google_allow_ad_personalization_signals object| google_restricted_data_processing object| google_conversion_items object| google_conversion_merchant_id object| google_user_id object| onload_callback object| opt_image_generator object| google_conversion_page_url object| google_conversion_referrer_url object| google_gtm object| google_gcl_cookie_prefix object| google_read_gcl_cookie_opt_out object| google_basket_feed_country object| google_basket_feed_language object| google_basket_discount object| google_basket_transaction_type object| google_disable_merchant_reported_conversions object| google_additional_conversion_params object| google_transport_url object| uetq object| google_tag_manager object| ab string| isblocked function| unhideMainContent string| GoogleAnalyticsObject function| ga object| _elqQ object| ___grecaptcha_cfg object| grecaptcha boolean| __google_recaptcha_client object| _sf_async_config object| Bibblio object| BibblioActivity object| BibblioUtils object| BibblioEvents object| BibblioTemplates object| __twttrll object| twttr object| __twttr function| FlipboardWidgets object| __core-js_shared__ object| Sslac object| IN function| udm_ object| ns_p object| COMSCORE object| heatmap function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter function| Togglehottopicseditorschoice object| ube object| FB object| google_tag_data object| gaplugins object| gaData function| Toggleliveeventswebinarslive object| __google_ad_urls object| ampInaboxIframes object| ampInaboxPendingMessages boolean| google_osd_loaded boolean| google_onload_fired object| recaptcha function| UET object| pSUPERFLY_mab object| _cbq object| pSUPERFLY object| video_reportsSliderHandler string| video_reportsLeftArrowButtonMouseoutImgSrc string| video_reportsRightArrowButtonMouseoutImgSrc function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb string| s_account object| s string| SCCodeVersion function| s_doPlugins function| getHier function| s_getLoadTime function| AppMeasurement_Module_ActivityMap function| AppMeasurement function| s_gi function| s_pgicq number| s_objectID number| s_giq undefined| s_code string| s_hour string| s_day string| s_timepart number| s_loadT string| x number| y number| d object| eo string| f0 object| s_i_cmpglobalvista object| Moat#G26 boolean| Moat#EVA object| MoatSuperV26 boolean| attachedML object| MoatDataJsonpRequest_90632637 string| thispage_sharelink object| beacon object| GetElqContentPersonalizationValue string| adroll_adv_id string| adroll_pix_id string| adroll_segments object| _cb_shared boolean| recaptchaReady object| teadsscript object| elqCookieValue object| _elq object| __CELTRA object| teads boolean| __adroll_loaded object| GoogleGcLKhOms string| adroll_sid object| __adroll boolean| adroll_optout object| adroll_ext_network object| adroll_callbacks function| adroll_tpc_callback object| google_image_requests function| __cmp object| adroll_exp_list object| __adroll_consent boolean| __adroll_consent_is_gdpr object| __adroll_consent_data string| __adroll_consent_user_country string| __adroll_consent_adv_country object| $jscomp string| BANNER_VERSION object| __adroll_consent_banner

2 Cookies

Domain/Path Name / Value
www.darkreading.com/ Name: _ccmaid
Value: 3609131046399901769
www.darkreading.com/ Name: _ccmsi
Value: 1585227270901_amdhi4xso|1585227273902

16 Console Messages

Source Level URL
Text
console-api warning URL: https://i.cmpnet.com/s_code/at.js(Line 9)
Message:
AT: Adobe Target content delivery is disabled. Update your DOCTYPE to support Standards mode.
console-api log URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729(Line 500)
Message:
lpage==>notblocked
console-api log (Line 2)
Message:
step 1
console-api log (Line 4)
Message:
step 2
console-api log (Line 6)
Message:
step 3
console-api log (Line 8)
Message:
step 4
console-api log (Line 10)
Message:
step 5
console-api log (Line 12)
Message:
step 6
console-api log (Line 14)
Message:
step 7
console-api log URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729(Line 508)
Message:
interstitial unit found
console-api log URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729(Line 513)
Message:
not empty Interstitial
console-api info URL: https://platform.twitter.com/widgets.js(Line 1)
Message:
You may have been affected by an update to settings in embedded timelines. See https://twittercommunity.com/t/deprecating-widget-settings/102295. [object HTMLAnchorElement]
console-api info URL: https://cdn.bibblio.org/rcm/4.9/bib-related-content.min.js(Line 1)
Message:
Bibblio: This page has been queued for ingestion. Please note that a 404 response to GET /recommendations is normal. This tells us that the item does not exist and should be ingested. The 422 on POST /url-ingestions is also normal. It tells us that the item has already been queued for ingestion by a prior page load.
console-api log URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729(Line 91)
Message:
in welcomeAD img
console-api log URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729(Line 503)
Message:
5 second timeout
console-api log URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729(Line 522)
Message:
unhide main content

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=63072000; includeSubDomains

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

6600d6d98e534115970f9529a45f3195.js.ubembed.com
a.teads.tv
ad.doubleclick.net
ads.celtra.com
adservice.google.de
api.bibblio.org
assets.informa.com
assets.ubembed.com
bat.bing.com
cache-ssl.celtra.com
cdn.bibblio.org
cdn.flipboard.com
cdn.syndication.twimg.com
cdn2.teads.tv
cf-images.us-east-1.prod.boltdns.net
cm.everesttech.net
code.jquery.com
connect.facebook.net
d.adroll.com
d.adroll.mgr.consensu.org
dpm.demdex.net
dsimg.ubm-us.net
fonts.googleapis.com
fonts.gstatic.com
fpn.flipboard.com
geo.moatads.com
googleads.g.doubleclick.net
googleads4.g.doubleclick.net
i.cmpnet.com
i.ubm-us.net
idsync.rlcdn.com
img.deusm.com
img.en25.com
img.lightreading.com
in.ml314.com
ins.techweb.com
match.adsrvr.org
maxcdn.bootstrapcdn.com
ml314.com
ng.techweb.com
pagead2.googlesyndication.com
pbs.twimg.com
ping.chartbeat.net
platform.linkedin.com
platform.twitter.com
ps.eyeota.net
px.moatads.com
s.adroll.com
s.ytimg.com
s0.2mdn.net
s2150.t.eloqua.com
s657486201.t.eloqua.com
sb.scorecardresearch.com
securepubads.g.doubleclick.net
static.chartbeat.com
stats.g.doubleclick.net
sync.crwdcntrl.net
sync.teads.tv
syndication.twitter.com
t.teads.tv
tags.bluekai.com
ton.twimg.com
tpc.googlesyndication.com
track.celtra.com
trk.darkreading.com
twimgs.com
u.heatmap.it
ubm.demdex.net
ubmtech.d3.sc.omtrdc.net
www.darkreading.com
www.facebook.com
www.google-analytics.com
www.google.com
www.google.de
www.googleadservices.com
www.googletagmanager.com
www.googletagservices.com
www.gstatic.com
www.youtube.com
z.moatads.com
104.244.42.200
107.23.162.230
13.224.194.118
13.224.194.122
13.224.194.146
13.225.73.50
13.227.156.115
142.0.160.13
142.0.173.134
143.204.97.81
15.188.105.205
151.101.13.131
172.217.16.194
172.217.18.166
172.217.23.162
172.227.85.103
18.195.112.151
2001:4de0:ac19::1:b:3b
209.167.231.17
216.58.206.2
23.210.248.12
23.45.237.36
2600:9000:20eb:6800:18:1fcd:349:ca21
2600:9000:20eb:b800:e:5a70:ca47:86e1
2600:9000:21f3:9c00:14:85db:2b40:93a1
2606:2800:134:1a0d:1429:742:782:b6
2606:2800:134:fa2:1627:1fe:edb:1665
2606:2800:233:66b5:799a:7cd3:f74d:7071
2606:2800:234:59:254c:406:2366:268c
2606:4700:3031::681f:449e
2606:4700:3032::681b:9174
2606:4700:3033::6818:7975
2606:4700:3035::6818:7875
2606:4700:3036::681c:3e5
2606:4700:3037::6812:29f2
2606:4700::6811:7763
2620:103::192:155:48:119
2620:1ec:c11::200
2a00:1450:4001:800::2008
2a00:1450:4001:806::2004
2a00:1450:4001:809::2006
2a00:1450:4001:814::2003
2a00:1450:4001:817::2002
2a00:1450:4001:817::200e
2a00:1450:4001:818::2002
2a00:1450:4001:81b::2001
2a00:1450:4001:820::2003
2a00:1450:4001:820::200e
2a00:1450:4001:821::200a
2a00:1450:4001:821::200e
2a00:1450:4001:825::2003
2a00:1450:400c:c00::9a
2a03:2880:f02d:12:face:b00c:0:3
2a03:2880:f12d:83:face:b00c:0:25de
3.122.214.165
34.227.6.166
34.241.125.133
34.254.71.178
35.190.72.21
46.105.202.39
52.16.75.38
52.19.214.236
52.212.4.209
52.215.109.156
52.30.34.11
52.44.39.89
54.172.119.91
66.117.28.86
95.100.78.166
95.101.184.154
95.101.185.124
95.101.185.246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