www-cultofmac-com.cdn.ampproject.org Open in urlscan Pro
2a00:1450:4001:800::2001  Public Scan

Submitted URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_j...
Effective URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_j...
Submission: On September 18 via api from US

Summary

This website contacted 10 IPs in 3 countries across 8 domains to perform 29 HTTP transactions. The main IP is 2a00:1450:4001:800::2001, located in Frankfurt am Main, Germany and belongs to GOOGLE, US. The main domain is www-cultofmac-com.cdn.ampproject.org.
TLS certificate: Issued by GTS CA 1O1 on September 3rd 2020. Valid for: 3 months.
This is the only time www-cultofmac-com.cdn.ampproject.org was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

Domain Requested by
12 cdn.ampproject.org www-cultofmac-com.cdn.ampproject.org
cdn.ampproject.org
4 d-22602162363957534852.ampproject.net cdn.ampproject.org
3 cdn-cultofmac-com.cdn.ampproject.org www-cultofmac-com.cdn.ampproject.org
2 www.cultofmac.com cdn.ampproject.org
1 www.google-analytics.com cdn.ampproject.org
1 ping.chartbeat.net
1 g.ezoic.net cdn.ampproject.org
1 www.googletagservices.com cdn.ampproject.org
1 3p.ampproject.net cdn.ampproject.org
1 secure-gravatar-com.cdn.ampproject.org www-cultofmac-com.cdn.ampproject.org
1 www.facebook.com cdn.ampproject.org
1 www-cultofmac-com.cdn.ampproject.org
29 12
Subject Issuer Validity Valid
misc-sni.google.com
GTS CA 1O1
2020-09-03 -
2020-11-26
3 months crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2020-07-21 -
2020-10-12
3 months crt.sh
*.g.doubleclick.net
GTS CA 1O1
2020-08-26 -
2020-11-18
3 months crt.sh
ezoic.net
Let's Encrypt Authority X3
2020-07-27 -
2020-10-25
3 months crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2020-05-27 -
2021-05-27
a year crt.sh
*.chartbeat.net
Thawte RSA CA 2018
2019-12-16 -
2020-12-30
a year crt.sh
*.google-analytics.com
GTS CA 1O1
2020-08-26 -
2020-11-18
3 months crt.sh

This page contains 5 frames:

Primary Page: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Frame ID: BD0F571A865F5BEF416D85D69D86184B
Requests: 27 HTTP requests in this frame

Frame: https://www.facebook.com/plugins/like.php?href=https://www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/&width=152&layout=button_count&action=like&size=large&show_faces=false&share=true&height=32&appId=249151412165931
Frame ID: 6C10AE0BA63FFC6B491A007DE2804004
Requests: 1 HTTP requests in this frame

Frame: https://d-22602162363957534852.ampproject.net/2009040024003/frame.html
Frame ID: 5D7EB2DDF116EF685F81F0047F05E5B3
Requests: 1 HTTP requests in this frame

Frame: https://d-22602162363957534852.ampproject.net/2009040024003/frame.html
Frame ID: C7BFEFB0D119F13D42DD51B50692B0A2
Requests: 1 HTTP requests in this frame

Frame: https://d-22602162363957534852.ampproject.net/2009040024003/frame.html
Frame ID: 3979F2440544A2479447EDA09BE30B0E
Requests: 1 HTTP requests in this frame

Screenshot


Page Statistics

29
Requests

100 %
HTTPS

78 %
IPv6

8
Domains

12
Subdomains

10
IPs

3
Countries

303 kB
Transfer

982 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

29 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/
75 KB
12 KB
Document
General
Full URL
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
d80a7700fac3fc18e26ef532c0daa2d3eec2f38964ee107e92ffab3a080f8340
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src 'sha256-5CxqAdDXlHviOy7zxeRpMobzRK/JNpLvkS+k8Zj3L3A=' 'sha256-FIBGC/wl1Qfnh2Fb5NPFHmRty7BHJdDpWW1FZ8egppI=' 'sha256-dKn2nAtwgzaaXC8ZM58hhldxNyeuu4qrzW4H9//9YMA=' blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www-cultofmac-com.cdn.ampproject.org
:scheme
https
:path
/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
nel
{"report_to":"nel","max_age":604800,"success_fraction":0.05}
report-to
{"group":"nel","max_age":604800,"endpoints":[{"url":"https://beacons.gcp.gvt2.com/nel/upload-nel"},{"url":"https://beacons.gvt2.com/nel/upload-nel"}]}
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
br
content-type
text/html
x-page-speed
0.9.10.99-9999
origin-trial
AqTkI1+jjCR2Guei1LcgWFtDrZgW172ockSrlyLy1CAFddrs7sRS4iO9XC1EZUK0bMDO8QDsVQKD+GPD9L9/uw8AAABveyJvcmlnaW4iOiJodHRwczovL2Nkbi5hbXBwcm9qZWN0Lm9yZzo0NDMiLCJmZWF0dXJlIjoiQmVmb3JlTWF0Y2hFdmVudCIsImV4cGlyeSI6MTYwMzIyODQ3NywiaXNTdWJkb21haW4iOnRydWV9
link
<https://cdn.ampproject.org/rtv/012009040024003/v0.js>; rel=preload; as=script, <https://cdn.ampproject.org/rtv/012009040024003/v0/amp-viewer-integration-0.1.js>; rel=preload; as=script
content-security-policy
default-src * blob: data:; script-src 'sha256-5CxqAdDXlHviOy7zxeRpMobzRK/JNpLvkS+k8Zj3L3A=' 'sha256-FIBGC/wl1Qfnh2Fb5NPFHmRty7BHJdDpWW1FZ8egppI=' 'sha256-dKn2nAtwgzaaXC8ZM58hhldxNyeuu4qrzW4H9//9YMA=' blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-length
11035
date
Fri, 18 Sep 2020 07:36:32 GMT
expires
Fri, 18 Sep 2020 07:36:32 GMT
cache-control
private, max-age=86400
last-modified
Thu, 17 Sep 2020 23:29:47 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
v0.js
cdn.ampproject.org/rtv/012009040024003/
255 KB
69 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012009040024003/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
14d3a3edba777dd30af364ff533484def79d12355d2b7239d4ae1520274ce474
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
127888
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
70291
x-xss-protection
0
server
sffe
date
Wed, 16 Sep 2020 20:05:04 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"b347fa6e24942ec8"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 16 Sep 2021 20:05:04 GMT
amp-viewer-integration-0.1.js
cdn.ampproject.org/rtv/012009040024003/v0/
29 KB
11 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012009040024003/v0/amp-viewer-integration-0.1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
0dc905d1c453a05515f8c22edf1440f78388f52639448c2527af3a9829894e62
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
127888
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
10246
x-xss-protection
0
server
sffe
date
Wed, 16 Sep 2020 20:05:04 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"fb5ff813ca3bc6c1"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 16 Sep 2021 20:05:04 GMT
amp-access-0.1.js
cdn.ampproject.org/rtv/012009040024003/v0/
54 KB
16 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012009040024003/v0/amp-access-0.1.js
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f1895fa8c98f44d42e63b5d258d2d44090dd53450b830889c92a7224d17d4081
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
127877
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
16406
x-xss-protection
0
server
sffe
date
Wed, 16 Sep 2020 20:05:15 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"9c773bc0be0c284d"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 16 Sep 2021 20:05:15 GMT
amp-ad-0.1.js
cdn.ampproject.org/rtv/012009040024003/v0/
63 KB
18 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012009040024003/v0/amp-ad-0.1.js
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
6e0c7efd3479cce1ed919110aadacf610f2a570c2cfb149ba7f841ebe0fa33ca
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
127888
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18769
x-xss-protection
0
server
sffe
date
Wed, 16 Sep 2020 20:05:04 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"83c633964f5491be"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 16 Sep 2021 20:05:04 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012009040024003/v0/
95 KB
30 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012009040024003/v0/amp-analytics-0.1.js
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
01d63da28f9f29db6757b358cc5823d601a2ece845f0fac96e066cb1428cb4ec
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
127888
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29256
x-xss-protection
0
server
sffe
date
Wed, 16 Sep 2020 20:05:04 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"16240493175402d5"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 16 Sep 2021 20:05:04 GMT
amp-iframe-0.1.js
cdn.ampproject.org/rtv/012009040024003/v0/
20 KB
7 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012009040024003/v0/amp-iframe-0.1.js
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
4ad6f64aa2bab48b03162ca63269dc3cf6eb75aef913218c9d9480e36a7cf34f
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
127888
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
7360
x-xss-protection
0
server
sffe
date
Wed, 16 Sep 2020 20:05:04 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"0135948f1bcd2e3e"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 16 Sep 2021 20:05:04 GMT
amp-sticky-ad-1.0.js
cdn.ampproject.org/rtv/012009040024003/v0/
32 KB
8 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012009040024003/v0/amp-sticky-ad-1.0.js
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5e99dd8367c799ec571c62a81088489a6a94052f8d0eb364234fa3fe891c219a
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
127887
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
8396
x-xss-protection
0
server
sffe
date
Wed, 16 Sep 2020 20:05:05 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"052cd9a2a732caf2"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 16 Sep 2021 20:05:05 GMT
Backlit_keyboard-780x439.jpg
cdn-cultofmac-com.cdn.ampproject.org/i/s/cdn.cultofmac.com/wp-content/uploads/2016/01/
34 KB
34 KB
Image
General
Full URL
https://cdn-cultofmac-com.cdn.ampproject.org/i/s/cdn.cultofmac.com/wp-content/uploads/2016/01/Backlit_keyboard-780x439.jpg
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
885eea92a107f8a4a4f6f36df6861dcb1390351cf4f5a13f19614ff6be67ab8b
Security Headers
Name Value
Content-Security-Policy default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
x-content-type-options
nosniff
last-modified
Sun, 13 Sep 2020 19:42:28 GMT
server
sffe
date
Fri, 18 Sep 2020 07:36:32 GMT
vary
Accept,Save-Data
content-type
image/webp
status
200
cache-control
private, max-age=31536000
content-disposition
attachment
accept-ranges
bytes
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
34692
x-xss-protection
0
expires
Fri, 18 Sep 2020 07:36:32 GMT
truncated
/
80 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
885014673b49e09a9421eaae25ce0b95dc2e9c8da50f73b11ac3f531d38fd59e

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
79 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a45f008c935886524c2d85d415e7350c070a05bfbd953899ea762c1ef0da2638

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/svg+xml
placeholder-icon.png
cdn-cultofmac-com.cdn.ampproject.org/i/s/cdn.cultofmac.com/wp-content/plugins/amp/assets/images/
243 B
420 B
Image
General
Full URL
https://cdn-cultofmac-com.cdn.ampproject.org/i/s/cdn.cultofmac.com/wp-content/plugins/amp/assets/images/placeholder-icon.png
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
42e6220dff25baa367692a306a16bd96bc87c84e03baecd065519914aa41c48d
Security Headers
Name Value
Content-Security-Policy default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
x-content-type-options
nosniff
last-modified
Wed, 09 Sep 2020 09:03:45 GMT
server
sffe
date
Fri, 18 Sep 2020 07:36:32 GMT
content-type
image/png
status
200
cache-control
private, max-age=31536000
content-disposition
attachment
accept-ranges
bytes
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
243
x-xss-protection
0
expires
Fri, 18 Sep 2020 07:36:32 GMT
like.php
www.facebook.com/plugins/ Frame 6C10
0
0
Document
General
Full URL
https://www.facebook.com/plugins/like.php?href=https://www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/&width=152&layout=button_count&action=like&size=large&show_faces=false&share=true&height=32&appId=249151412165931
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012009040024003/v0/amp-iframe-0.1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;block-all-mixed-content;upgrade-insecure-requests;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www.facebook.com
:scheme
https
:path
/plugins/like.php?href=https://www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/&width=152&layout=button_count&action=like&size=large&show_faces=false&share=true&height=32&appId=249151412165931
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D

Response headers

status
200
cache-control
private, no-cache, no-store, must-revalidate
pragma
no-cache
strict-transport-security
max-age=15552000; preload
content-encoding
br
timing-allow-origin
*
content-security-policy
default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;block-all-mixed-content;upgrade-insecure-requests;
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
expires
Sat, 01 Jan 2000 00:00:00 GMT
content-type
text/html; charset="utf-8"
x-fb-debug
uTp5pnpV4uiPtYGoou8lA4tOVULa2R09sDUt4v+YRU9U8N+J3dI4KJ4WexH0grcSaGM2a0iBGMox2r8HtDn3pw==
date
Fri, 18 Sep 2020 07:36:32 GMT
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
com-logo.png
cdn-cultofmac-com.cdn.ampproject.org/ii/w39/s/cdn.cultofmac.com/wp-content/plugins/com2014-custom//img/
0
0
Image
General
Full URL
https://cdn-cultofmac-com.cdn.ampproject.org/ii/w39/s/cdn.cultofmac.com/wp-content/plugins/com2014-custom//img/com-logo.png
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

1f42e583825bf8b1907851f7c9866f21
secure-gravatar-com.cdn.ampproject.org/ii/w39/s/secure.gravatar.com/avatar/
446 B
555 B
Image
General
Full URL
https://secure-gravatar-com.cdn.ampproject.org/ii/w39/s/secure.gravatar.com/avatar/1f42e583825bf8b1907851f7c9866f21?s=24&d=mm&r=g
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a8ae18d4d6bc25dbc021c9dee26ead02629778c7ed32d8c51159d5dabc91a75c
Security Headers
Name Value
Content-Security-Policy default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
x-content-type-options
nosniff
last-modified
Thu, 20 Aug 2020 03:44:17 GMT
server
sffe
date
Fri, 18 Sep 2020 07:36:32 GMT
vary
Accept,Save-Data
content-type
image/webp
status
200
cache-control
private, max-age=299
content-disposition
attachment
accept-ranges
bytes
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
446
x-xss-protection
0
expires
Fri, 18 Sep 2020 07:36:32 GMT
frame.html
d-22602162363957534852.ampproject.net/2009040024003/
0
0
Other
General
Full URL
https://d-22602162363957534852.ampproject.net/2009040024003/frame.html
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012009040024003/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

access-control-allow-origin
*
f.js
3p.ampproject.net/2009040024003/
188 KB
50 KB
Other
General
Full URL
https://3p.ampproject.net/2009040024003/f.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012009040024003/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
0b1f8d54f7857251f83caceefc156a6b7a61bf2d49215f7af86af955acdac346
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 16 Sep 2020 20:05:08 GMT
content-encoding
br
x-content-type-options
nosniff
age
127884
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
50956
x-xss-protection
0
last-modified
Wed, 16 Sep 2020 17:15:00 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
expires
Thu, 16 Sep 2021 20:05:08 GMT
gpt.js
www.googletagservices.com/tag/js/
52 KB
18 KB
Other
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012009040024003/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
42c6fc1929fb12d013406498cecf0b18aad8a24fd5628e658cf7851521675d44
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 18 Sep 2020 07:36:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"636 / 400 of 1000 / last-modified: 1600380743"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
17774
x-xss-protection
0
expires
Fri, 18 Sep 2020 07:36:32 GMT
ampad.js
g.ezoic.net/ezoic/
1 KB
564 B
Other
General
Full URL
https://g.ezoic.net/ezoic/ampad.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012009040024003/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
18.156.95.187 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-18-156-95-187.eu-central-1.compute.amazonaws.com
Software
nginx/1.16.0 /
Resource Hash
eea9c54783f4fadc9b6de90cae6aed2e33b84318c5756c903315d45aee1adc90

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 18 Sep 2020 07:36:32 GMT
content-encoding
br
server
nginx/1.16.0
vary
Accept-Encoding, Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=31536000
content-length
428
expires
Sat, 18 Sep 2021 07:36:32 GMT
amp-auto-lightbox-0.1.js
cdn.ampproject.org/rtv/012009040024003/v0/
6 KB
3 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012009040024003/v0/amp-auto-lightbox-0.1.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012009040024003/v0.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
de33471c9ee3c22d455e2a189db0f9bab0c7d075a2b67396cff0d605fce081e3
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Origin
https://www-cultofmac-com.cdn.ampproject.org
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
127888
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2581
x-xss-protection
0
server
sffe
date
Wed, 16 Sep 2020 20:05:04 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"460923c3cd247ed5"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 16 Sep 2021 20:05:04 GMT
ezampdata
www.cultofmac.com/
28 B
681 B
Fetch
General
Full URL
https://www.cultofmac.com/ezampdata?url=https%3A%2F%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2Famp%2F&cid=Uc8so62pk-zINbXkkvyzVi_WkP4Zpmkk32z8KLitLv9X3GFx8UT4Nu3CeVNcgUBm&pid=1977&d=e220,e220,i220,h220,e340,e340,i340,h340,e341,e341,i341,h341,e342,e342,i342,h342,e260,e260,i260,h260,o611,h611,e611,e611,i611,o605,h605,e605,e605,i605,o607,h607,e607,e607,i607,o608,h608,e608,e608,i608,o609,h609,e609,e609,i609,o610,h610,e610,e610,i610,i111&wc=452&tid=167&__amp_source_origin=https%3A%2F%2Fwww.cultofmac.com
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012009040024003/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:e6::ac40:c70f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3b0e094bcbe9546a8bcf6e324760ac500a7a568f6bafdcfe36d4c9c6e2fc30cc

Request headers

Accept
application/json
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 18 Sep 2020 07:36:32 GMT
vary
Accept-Encoding, Accept-Encoding
cf-cache-status
DYNAMIC
status
200
content-length
28
cf-request-id
0541bdc65300002b7d1110b200000001
amp-access-control-allow-source-origin
https://www.cultofmac.com
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
1728000
access-control-allow-methods
GET
content-type
application/json
access-control-allow-origin
https://www-cultofmac-com.cdn.ampproject.org
access-control-expose-headers
AMP-Access-Control-Allow-Source-Origin
cache-control
max-age=0, must-revalidate, no-cache, no-store
access-control-allow-credentials
true
cf-ray
5d496583bc982b7d-FRA
access-control-allow-headers
Content-Type
expires
Thu, 17 Sep 2020 07:36:32 GMT
amp-lightbox-gallery-0.1.js
cdn.ampproject.org/rtv/012009040024003/v0/
59 KB
18 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012009040024003/v0/amp-lightbox-gallery-0.1.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012009040024003/v0.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
2c9af9ae3154b082527baa254ba6ff018d802d2d8f241e988ecf80272572c58a
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Origin
https://www-cultofmac-com.cdn.ampproject.org
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
127886
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
17915
x-xss-protection
0
server
sffe
date
Wed, 16 Sep 2020 20:05:06 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"123233ad8f206a61"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 16 Sep 2021 20:05:06 GMT
amp-loader-0.1.js
cdn.ampproject.org/rtv/012009040024003/v0/
15 KB
4 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012009040024003/v0/amp-loader-0.1.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012009040024003/v0.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
725e9ba8fd97b364f1108f5889033791d2fe90d5aed5fcce38fa0842ae942522
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Origin
https://www-cultofmac-com.cdn.ampproject.org
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
127885
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
3733
x-xss-protection
0
server
sffe
date
Wed, 16 Sep 2020 20:05:07 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"92b19b6083f3a48b"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 16 Sep 2021 20:05:07 GMT
googleanalytics.json
cdn.ampproject.org/rtv/012009040024003/v0/analytics-vendors/
2 KB
837 B
Fetch
General
Full URL
https://cdn.ampproject.org/rtv/012009040024003/v0/analytics-vendors/googleanalytics.json
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012009040024003/v0.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
6f53945eda017435c600f05df250c86a4788653b8e2e4c17aa7d647b4ce35bdd
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept
application/json
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
127886
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
778
x-xss-protection
0
server
sffe
date
Wed, 16 Sep 2020 20:05:07 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/json
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"d3280a61dae0e064"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 16 Sep 2021 20:05:07 GMT
chartbeat.json
cdn.ampproject.org/rtv/012009040024003/v0/analytics-vendors/
924 B
513 B
Fetch
General
Full URL
https://cdn.ampproject.org/rtv/012009040024003/v0/analytics-vendors/chartbeat.json
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012009040024003/v0.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
bc1fe280f4dc2e9d3b3a0eabec7a4cab25847e67aa1f9eef4b9dd1352a798b62
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept
application/json
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
127879
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
414
x-xss-protection
0
server
sffe
date
Wed, 16 Sep 2020 20:05:14 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/json
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"e9b91f3ce6e22ea3"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 16 Sep 2021 20:05:14 GMT
imp.gif
www.cultofmac.com/detroitchicago/
43 B
417 B
Other
General
Full URL
https://www.cultofmac.com/detroitchicago/imp.gif?amp=1&backgrounded=0&requestCount=1&url=https%3A%2F%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2Famp%2F&pid=1977&cid=Uc8so62pk-zINbXkkvyzVi_WkP4Zpmkk32z8KLitLv9X3GFx8UT4Nu3CeVNcgUBm&referrer=&tstart=1600414593549&pnv=35&pcrs=120&prt=5&pi=96&pcl=96&pc=300&pnt=0&prc=0&cu=https%3A%2F%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2F&e=%7B%22ad_cache_level%22%3A2%2C%22ad_count_adjustment%22%3A0%2C%22ad_lazyload_version%22%3A-1%2C%22ad_location_ids%22%3A%22%22%2C%22ad_transform_level%22%3A0%2C%22adx_ad_count%22%3A0%2C%22author%22%3A%22https%3A%2F%2Fwww.facebook.com%2Froblefwrites%22%2C%22bidder_method%22%3A1%2C%22bidder_version%22%3A3%2C%22days_since_last_visit%22%3A-1%2C%22display_ad_count%22%3A0%2C%22domain_id%22%3A27792%2C%22domain_test_group%22%3A20200401%2C%22ds_adsize_opt_id%22%3A-1%2C%22engaged_time_visit%22%3A0%2C%22ezcache_level%22%3A1%2C%22forensiq_score%22%3A-1%2C%22form_factor_id%22%3A2%2C%22framework_id%22%3A4%2C%22has_bad_image%22%3A0%2C%22has_bad_words%22%3A0%2C%22iab_category%22%3A%22%22%2C%22iab_category_0%22%3A%22596%22%2C%22iab_category_1%22%3A%22602%22%2C%22is_from_recommended_pages%22%3Afalse%2C%22is_return_visitor%22%3Afalse%2C%22is_sitespeed%22%3A1%2C%22last_page_load%22%3A%22%22%2C%22last_pageview_id%22%3A%22%22%2C%22lt_cache_level%22%3A0%2C%22max_ads%22%3A5%2C%22optimization_version%22%3A1%2C%22page_ad_positions%22%3A%22%22%2C%22page_view_count%22%3A0%2C%22page_view_id%22%3A%2247459938-9c08-4993-595d-fde3193158da%22%2C%22position_selection_id%22%3A39%2C%22publish_date%22%3A%222016-03-16%22%2C%22pv_event_count%22%3A0%2C%22response_time_orig%22%3A102%2C%22serverid%22%3A%2254.184.29.69%3A20774%22%2C%22sub_page_ad_positions%22%3A%22%22%2C%22t_epoch%22%3A1600385386%2C%22template_id%22%3A167%2C%22time_on_site_visit%22%3A0%2C%22url%22%3A%22https%3A%2F%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2Famp%2F%22%2C%22user_id%22%3A0%2C%22weather_precipitation%22%3A0%2C%22weather_summary%22%3A%22%22%2C%22weather_temperature%22%3A0%2C%22word_count%22%3A452%2C%22worst_bad_word_level%22%3A0%7D
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012009040024003/v0/amp-analytics-0.1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:e6::ac40:c70f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Fri, 18 Sep 2020 07:36:33 GMT
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
cf-cache-status
DYNAMIC
status
200
x-middleton-display
imp_sol
content-length
43
cf-request-id
0541bdca1400002b7d1113b200000001
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
1728000
access-control-allow-methods
HEAD, PUT, POST, GET, OPTIONS
content-type
image/gif
access-control-allow-origin
https://www-cultofmac-com.cdn.ampproject.org
cache-control
no-cache, no-store, must-revalidate, max-age=0
cf-ray
5d496589bbfa2b7d-FRA
access-control-allow-headers
Content-Type
ping
ping.chartbeat.net/
43 B
168 B
Image
General
Full URL
https://ping.chartbeat.net/ping?h=cultofmac.com&p=%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2F&u=bNNm3gBZ5XvN9L3k3Zw7FdIB5a5VDO9qh3lfOvJX1Bm5gViO7YRn7bufEwGkmEgb&d=www.cultofmac.com&g=54946&g0=News%2C%20Newsstand%2C%20Top%20stories&g1=Rob%20LeFebvre&g2=&g3=&g4=&c=&x=0&m=&y=2985&o=1600&w=1200&j=30&R=1&W=0&I=0&E=1&r=&t=1977bNNm3gBZ5XvN9L3k3Zw7FdIB5a5VDO9qh3lfOvJX1Bm5gViO7YRn7bufEwGkmEgb&b=460&i=Malware%20uses%20Apple%E2%80%99s%20FairPlay%20DRM%20to%20attack%20iOS%20users%20%7C%20Cult%20of%20Mac&T=1600414593565&tz=-120&sn=1&C=2&_
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.73.105.22 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-73-105-22.compute-1.amazonaws.com
Software
/
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
pragma
no-cache
date
Fri, 18 Sep 2020 07:36:33 GMT
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
content-length
43
expires
0
collect
www.google-analytics.com/r/
35 B
255 B
Other
General
Full URL
https://www.google-analytics.com/r/collect?v=1&_v=a1&ds=AMP&aip&_s=1&dt=Malware%20uses%20Apple%E2%80%99s%20FairPlay%20DRM%20to%20attack%20iOS%20users%20%7C%20Cult%20of%20Mac&sr=1600x1200&_utmht=1600414593568&cid=-z7kx8bsnOt4sV3-tzmM4MOpZk-c8mljzBUYXrT53r2Qd9WiVsLb7SC_W3XfuoMN&tid=UA-84038529-45&dl=https%3A%2F%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2Famp%2F&dr=&sd=24&ul=en-us&de=UTF-8&t=pageview&jid=0.901951446461281&_r=1&a=1977&z=0.23713947348635767&cd1=pub_site_mobile_amp&cd2=167&cd3=0
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012009040024003/v0/amp-analytics-0.1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Fri, 18 Sep 2020 07:36:33 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
200
content-type
image/gif
access-control-allow-origin
https://www-cultofmac-com.cdn.ampproject.org
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
frame.html
d-22602162363957534852.ampproject.net/2009040024003/ Frame 5D7E
0
0
Document
General
Full URL
https://d-22602162363957534852.ampproject.net/2009040024003/frame.html
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012009040024003/v0/amp-ad-0.1.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:81c::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
d-22602162363957534852.ampproject.net
:scheme
https
:path
/2009040024003/frame.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
br
content-type
text/html
access-control-allow-origin
*
content-length
160
date
Fri, 18 Sep 2020 07:36:32 GMT
expires
Sat, 18 Sep 2021 07:36:32 GMT
last-modified
Wed, 16 Sep 2020 17:15:00 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
2
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
frame.html
d-22602162363957534852.ampproject.net/2009040024003/ Frame C7BF
0
0
Document
General
Full URL
https://d-22602162363957534852.ampproject.net/2009040024003/frame.html
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012009040024003/v0/amp-ad-0.1.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:81c::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
d-22602162363957534852.ampproject.net
:scheme
https
:path
/2009040024003/frame.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
br
content-type
text/html
access-control-allow-origin
*
content-length
160
date
Fri, 18 Sep 2020 07:36:32 GMT
expires
Sat, 18 Sep 2021 07:36:32 GMT
last-modified
Wed, 16 Sep 2020 17:15:00 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
2
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
frame.html
d-22602162363957534852.ampproject.net/2009040024003/ Frame 3979
0
0
Document
General
Full URL
https://d-22602162363957534852.ampproject.net/2009040024003/frame.html
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012009040024003/v0/amp-ad-0.1.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:81c::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
d-22602162363957534852.ampproject.net
:scheme
https
:path
/2009040024003/frame.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
br
content-type
text/html
access-control-allow-origin
*
content-length
160
date
Fri, 18 Sep 2020 07:36:32 GMT
expires
Sat, 18 Sep 2021 07:36:32 GMT
last-modified
Wed, 16 Sep 2020 17:15:00 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
2
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"

Verdicts & Comments Add Verdict or Comment

20 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| trustedTypes object| AMP object| global object| AMP_CONFIG object| __AMP_LOG object| __AMP_ERRORS object| __AMP_MODE function| __AMP_REPORT_ERROR object| __AMP_TOP object| __AMP_SERVICES object| __AMP__EXPERIMENT_TOGGLES object| __AMP_URL_CACHE boolean| __AMP_TAG object| __AMP_EXTENDED_ELEMENTS function| __AMP_BASE_CE_CLASS object| __AMP_EXPERIMENT_BRANCHES number| ampAdSlotIdCounter object| listeningFors string| __AMP_DEFAULT_BOOTSTRAP_SUBDOMAIN number| 3pla

0 Cookies

2 Console Messages

Source Level URL
Text
console-api info URL: https://cdn.ampproject.org/rtv/012009040024003/v0.js(Line 529)
Message:
Powered by AMP ⚡ HTML – Version 2009040024003 https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D#origin%3Dhttps%3A%2F%2Fwww.google.co.uk%26prerenderSize%3D1%26visibilityState%3Dprerender%26paddingTop%3D32%26p2r%3D0%26horizontalScrolling%3D0%26csi%3D1%26aoh%3D15661572839977%26viewerUrl%3Dhttps%3A%2F%2Fwww.google.co.uk%2Famp%2Fs%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2Famp%2F%26history%3D1%26storage%3D1%26cid%3D1%26cap%3DnavigateTo%2Ccid%2CfullReplaceHistory%2Cfragment%2CreplaceUrl
console-api error URL: https://cdn.ampproject.org/rtv/012009040024003/v0.js(Line 111)
Message:
Failed to load: https://cdn-cultofmac-com.cdn.ampproject.org/i/s/cdn.cultofmac.com/wp-content/plugins/com2014-custom//img/com-logo.png​​​

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src * blob: data:; script-src 'sha256-5CxqAdDXlHviOy7zxeRpMobzRK/JNpLvkS+k8Zj3L3A=' 'sha256-FIBGC/wl1Qfnh2Fb5NPFHmRty7BHJdDpWW1FZ8egppI=' 'sha256-dKn2nAtwgzaaXC8ZM58hhldxNyeuu4qrzW4H9//9YMA=' blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

3p.ampproject.net
cdn-cultofmac-com.cdn.ampproject.org
cdn.ampproject.org
d-22602162363957534852.ampproject.net
g.ezoic.net
ping.chartbeat.net
secure-gravatar-com.cdn.ampproject.org
www-cultofmac-com.cdn.ampproject.org
www.cultofmac.com
www.facebook.com
www.google-analytics.com
www.googletagservices.com
18.156.95.187
2606:4700:e6::ac40:c70f
2a00:1450:4001:800::2001
2a00:1450:4001:801::2002
2a00:1450:4001:81a::200e
2a00:1450:4001:81c::2003
2a00:1450:4001:81d::2003
2a03:2880:f12d:83:face:b00c:0:25de
52.73.105.22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