svoservice.ru
Open in
urlscan Pro
95.128.240.54
Malicious Activity!
Public Scan
Effective URL: https://svoservice.ru/grandgas/
Submission: On March 30 via api from US — Scanned from US
Summary
TLS certificate: Issued by R3 on February 19th 2023. Valid for: 3 months.
This is the only time svoservice.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banque Postale (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2a00:7ee0:1:0... 2a00:7ee0:1:0:3:38:0:e1a | 16347 (ADISTA-SAS) (ADISTA-SAS) | |
2 | 95.128.240.54 95.128.240.54 | 48781 (AVK-COM-AS) (AVK-COM-AS) | |
1 | 2606:4700:303... 2606:4700:3030::6815:3b81 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 185.16.252.161 185.16.252.161 | 35676 (LA-POSTE) (LA-POSTE) | |
4 | 4 |
ASN48781 (AVK-COM-AS, RU)
PTR: 95-128-240-54.wiseweb.ru
svoservice.ru |
ASN35676 (LA-POSTE, FR)
PTR: www.labanquepostale.fr
www.labanquepostale.fr |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
svoservice.ru
svoservice.ru |
181 KB |
1 |
labanquepostale.fr
www.labanquepostale.fr — Cisco Umbrella Rank: 415236 |
9 KB |
1 |
aqua-e.it
aqua-e.it |
37 KB |
1 |
okiuyt.fr
1 redirects
okiuyt.fr |
219 B |
4 | 4 |
Domain | Requested by | |
---|---|---|
2 | svoservice.ru |
svoservice.ru
|
1 | www.labanquepostale.fr |
svoservice.ru
|
1 | aqua-e.it |
svoservice.ru
|
1 | okiuyt.fr | 1 redirects |
4 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
svoservice.ru R3 |
2023-02-19 - 2023-05-20 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-03-11 - 2024-03-09 |
a year | crt.sh |
www.labanquepostale.fr DigiCert SHA2 Extended Validation Server CA |
2022-06-08 - 2023-07-09 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://svoservice.ru/grandgas/
Frame ID: 2F7DA529FB0C9B7694E0ACE4C81C913E
Requests: 5 HTTP requests in this frame
Screenshot
Page Title
Connexion à l'espace client - La Banque PostaleConnexion à l'espace client - La Banque PostalePage URL History Show full URLs
-
http://okiuyt.fr/
HTTP 301
https://svoservice.ru/grandgas/ Page URL
Detected technologies
Adobe Experience Manager (CMS) ExpandDetected patterns
- /etc\.clientlibs/
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://okiuyt.fr/
HTTP 301
https://svoservice.ru/grandgas/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
svoservice.ru/grandgas/ Redirect Chain
|
94 KB 95 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
b.css
aqua-e.it//tools/htbnposta/ |
223 KB 37 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo-lbp.png
www.labanquepostale.fr/etc.clientlibs/labanquepostale/commons/clientlibs/base/resources/ |
8 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
10 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
svoservice.ru/grandgas/xzaz/ |
86 KB 86 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banque Postale (Banking)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
svoservice.ru/ | Name: PHPSESSID Value: a8a514b1e4742eb007d3a3c525f13615 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aqua-e.it
okiuyt.fr
svoservice.ru
www.labanquepostale.fr
185.16.252.161
2606:4700:3030::6815:3b81
2a00:7ee0:1:0:3:38:0:e1a
95.128.240.54
2b381363dda049f2d49a59037b228bc865d51ffb977c8f5c3547d5c28de48e3a
34617b8b79ab72327ab44554d08caa05232abfa85199cd9a246d6189530fddfc
8bb31c6c96080e30206dcbbe492b39d250011166b8fc63ea27a74190fad98542
a079710e67a906296308d3f4e23f6e8a1bfb326e926af1cf4feeec723c8d4674
c6573f8959e56e6a621715af791a527f3da7dc0c1abd9377b83f991ccc85a91c