www-cultofmac-com.cdn.ampproject.org Open in urlscan Pro
2a00:1450:4001:817::2001  Public Scan

Submitted URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_j...
Effective URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_j...
Submission Tags: falconsandbox
Submission: On October 30 via api from US

Summary

This website contacted 10 IPs in 3 countries across 8 domains to perform 27 HTTP transactions. The main IP is 2a00:1450:4001:817::2001, located in Frankfurt am Main, Germany and belongs to GOOGLE, US. The main domain is www-cultofmac-com.cdn.ampproject.org.
TLS certificate: Issued by GTS CA 1O1 on October 6th 2020. Valid for: 3 months.
This is the only time www-cultofmac-com.cdn.ampproject.org was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

Domain Requested by
11 cdn.ampproject.org www-cultofmac-com.cdn.ampproject.org
cdn.ampproject.org
3 d-8097163591664690529.ampproject.net cdn.ampproject.org
3 cdn-cultofmac-com.cdn.ampproject.org www-cultofmac-com.cdn.ampproject.org
2 www.cultofmac.com cdn.ampproject.org
1 www.google-analytics.com cdn.ampproject.org
1 ping.chartbeat.net
1 secure-gravatar-com.cdn.ampproject.org
1 g.ezoic.net cdn.ampproject.org
1 www.googletagservices.com cdn.ampproject.org
1 3p.ampproject.net cdn.ampproject.org
1 www.facebook.com cdn.ampproject.org
1 www-cultofmac-com.cdn.ampproject.org
27 12
Subject Issuer Validity Valid
misc-sni.google.com
GTS CA 1O1
2020-10-06 -
2020-12-29
3 months crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2020-09-11 -
2020-12-10
3 months crt.sh
*.g.doubleclick.net
GTS CA 1O1
2020-10-06 -
2020-12-29
3 months crt.sh
ezoic.net
Let's Encrypt Authority X3
2020-09-25 -
2020-12-24
3 months crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2020-05-27 -
2021-05-27
a year crt.sh
*.chartbeat.net
Thawte RSA CA 2018
2019-12-16 -
2020-12-30
a year crt.sh
*.google-analytics.com
GTS CA 1O1
2020-10-06 -
2020-12-29
3 months crt.sh

This page contains 4 frames:

Primary Page: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Frame ID: ACFAA89E422D7235EB7B28FB5C475D34
Requests: 26 HTTP requests in this frame

Frame: https://www.facebook.com/plugins/like.php?href=https://www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/&width=152&layout=button_count&action=like&size=large&show_faces=false&share=true&height=32&appId=249151412165931
Frame ID: BEB9B9A91806BBB7F45054833E01FB3F
Requests: 1 HTTP requests in this frame

Frame: https://d-8097163591664690529.ampproject.net/2010132225003/frame.html
Frame ID: A67211B2FA3C251993093EF68D589922
Requests: 1 HTTP requests in this frame

Frame: https://d-8097163591664690529.ampproject.net/2010132225003/frame.html
Frame ID: 74734631FD077C856BA994E81621C826
Requests: 1 HTTP requests in this frame

Screenshot


Page Statistics

27
Requests

100 %
HTTPS

78 %
IPv6

8
Domains

12
Subdomains

10
IPs

3
Countries

294 kB
Transfer

952 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

27 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/
72 KB
12 KB
Document
General
Full URL
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
8d2c71ece93b03ab9a6dc90f56f42b5a6d1e12fd67ea540d0da957044a687386
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src 'sha256-5CxqAdDXlHviOy7zxeRpMobzRK/JNpLvkS+k8Zj3L3A=' 'sha256-FIBGC/wl1Qfnh2Fb5NPFHmRty7BHJdDpWW1FZ8egppI=' 'sha256-dKn2nAtwgzaaXC8ZM58hhldxNyeuu4qrzW4H9//9YMA=' blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www-cultofmac-com.cdn.ampproject.org
:scheme
https
:path
/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
nel
{"report_to":"nel","max_age":604800,"success_fraction":0.05}
report-to
{"group":"nel","max_age":604800,"endpoints":[{"url":"https://beacons.gcp.gvt2.com/nel/upload-nel"},{"url":"https://beacons.gvt2.com/nel/upload-nel"}]}
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
br
content-type
text/html
x-page-speed
0.9.10.99-9999
origin-trial
Am+6sz9r0IqtWb9SobKTqHA67MO+9PoMJTQ/Q+eubnkDYkCTxvnAPyt/HDOgBxz0pp2M4ijIadNkPVgnZiBy3AoAAABveyJvcmlnaW4iOiJodHRwczovL2Nkbi5hbXBwcm9qZWN0Lm9yZzo0NDMiLCJmZWF0dXJlIjoiQmVmb3JlTWF0Y2hFdmVudCIsImV4cGlyeSI6MTYwNjMxMTkwOSwiaXNTdWJkb21haW4iOnRydWV9
link
<https://cdn.ampproject.org/rtv/012010132225003/v0.js>; rel=preload; as=script, <https://cdn.ampproject.org/rtv/012010132225003/v0/amp-viewer-integration-0.1.js>; rel=preload; as=script
content-security-policy
default-src * blob: data:; script-src 'sha256-5CxqAdDXlHviOy7zxeRpMobzRK/JNpLvkS+k8Zj3L3A=' 'sha256-FIBGC/wl1Qfnh2Fb5NPFHmRty7BHJdDpWW1FZ8egppI=' 'sha256-dKn2nAtwgzaaXC8ZM58hhldxNyeuu4qrzW4H9//9YMA=' blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-length
10994
date
Fri, 30 Oct 2020 15:21:58 GMT
expires
Fri, 30 Oct 2020 15:21:58 GMT
cache-control
private, max-age=86399
last-modified
Thu, 29 Oct 2020 23:35:41 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
v0.js
cdn.ampproject.org/rtv/012010132225003/
253 KB
68 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012010132225003/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
dfc1b07f86b7370e522c3e728b1c9512cbbbbb39f77b044e4b50d8f73f948bec
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
64195
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
69904
x-xss-protection
0
server
sffe
date
Thu, 29 Oct 2020 21:32:03 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"733074900a2cbbea"
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 29 Oct 2021 21:32:03 GMT
amp-viewer-integration-0.1.js
cdn.ampproject.org/rtv/012010132225003/v0/
31 KB
12 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012010132225003/v0/amp-viewer-integration-0.1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
deadb69642f94ee827b40ac6c353db1ba0cf1ee0d93001ff8e36910d0b6ff7fa
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
64195
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
11128
x-xss-protection
0
server
sffe
date
Thu, 29 Oct 2020 21:32:03 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"26c2f31eb2db25f1"
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 29 Oct 2021 21:32:03 GMT
amp-access-0.1.js
cdn.ampproject.org/rtv/012010132225003/v0/
54 KB
16 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012010132225003/v0/amp-access-0.1.js
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
ff2d3c8223c8a26d92941eeeff822815d1b6a6c5e9c9174f3f21cb409cbfb264
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
64195
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
16366
x-xss-protection
0
server
sffe
date
Thu, 29 Oct 2020 21:32:03 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"babaa31dea3e5657"
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 29 Oct 2021 21:32:03 GMT
amp-ad-0.1.js
cdn.ampproject.org/rtv/012010132225003/v0/
65 KB
19 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012010132225003/v0/amp-ad-0.1.js
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
039f59eea8bd266609f57d106b90f063983050efdeea4e18f9e878d78ef99dff
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
64195
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
19001
x-xss-protection
0
server
sffe
date
Thu, 29 Oct 2020 21:32:03 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"30a757d6778514a1"
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 29 Oct 2021 21:32:03 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012010132225003/v0/
96 KB
29 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012010132225003/v0/amp-analytics-0.1.js
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b7c2b75c973a2411436ad930de34385cfd70ad420785cd6311d04b097245ed3b
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
64195
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29521
x-xss-protection
0
server
sffe
date
Thu, 29 Oct 2020 21:32:03 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"555eb9805d6a4e46"
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 29 Oct 2021 21:32:03 GMT
amp-iframe-0.1.js
cdn.ampproject.org/rtv/012010132225003/v0/
21 KB
8 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012010132225003/v0/amp-iframe-0.1.js
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
be700c1e1628a8191e49db2650a39119025efa9d404a37e9bda613de6cc43b8b
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
64195
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
7685
x-xss-protection
0
server
sffe
date
Thu, 29 Oct 2020 21:32:03 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"a6d40aef7bc78c26"
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 29 Oct 2021 21:32:03 GMT
truncated
/
80 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
885014673b49e09a9421eaae25ce0b95dc2e9c8da50f73b11ac3f531d38fd59e

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
79 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a45f008c935886524c2d85d415e7350c070a05bfbd953899ea762c1ef0da2638

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/svg+xml
placeholder-icon.png
cdn-cultofmac-com.cdn.ampproject.org/i/s/cdn.cultofmac.com/wp-content/plugins/amp/assets/images/
243 B
420 B
Image
General
Full URL
https://cdn-cultofmac-com.cdn.ampproject.org/i/s/cdn.cultofmac.com/wp-content/plugins/amp/assets/images/placeholder-icon.png
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b40d96971087e509167aecb1c6b4d5f2e43d7521c0b938ea4b4329b89ff322b9
Security Headers
Name Value
Content-Security-Policy default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
x-content-type-options
nosniff
last-modified
Thu, 29 Oct 2020 09:10:56 GMT
server
sffe
date
Fri, 30 Oct 2020 15:21:58 GMT
content-type
image/png
status
200
cache-control
private, max-age=31536000
content-disposition
attachment
accept-ranges
bytes
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
243
x-xss-protection
0
expires
Fri, 30 Oct 2020 15:21:58 GMT
like.php
www.facebook.com/plugins/ Frame BEB9
0
0
Document
General
Full URL
https://www.facebook.com/plugins/like.php?href=https://www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/&width=152&layout=button_count&action=like&size=large&show_faces=false&share=true&height=32&appId=249151412165931
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012010132225003/v0/amp-iframe-0.1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;block-all-mixed-content;upgrade-insecure-requests;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www.facebook.com
:scheme
https
:path
/plugins/like.php?href=https://www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/&width=152&layout=button_count&action=like&size=large&show_faces=false&share=true&height=32&appId=249151412165931
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D

Response headers

status
200
vary
Accept-Encoding
pragma
no-cache
content-security-policy
default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;block-all-mixed-content;upgrade-insecure-requests;
cache-control
private, no-cache, no-store, must-revalidate
content-encoding
br
strict-transport-security
max-age=15552000; preload
x-content-type-options
nosniff
x-xss-protection
0
expires
Sat, 01 Jan 2000 00:00:00 GMT
content-type
text/html; charset="utf-8"
x-fb-debug
Mdnb313RFu79b98GqJU4/Gm9GwdKLC9hEO57MTcPC0BuyRjHugj8YDnISNTNGRs0Jo8cD3M5s3aEdzlTjwr3qg==
date
Fri, 30 Oct 2020 15:21:59 GMT
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
frame.html
d-8097163591664690529.ampproject.net/2010132225003/
0
0
Other
General
Full URL
https://d-8097163591664690529.ampproject.net/2010132225003/frame.html
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012010132225003/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:802::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

access-control-allow-origin
*
f.js
3p.ampproject.net/2010132225003/
190 KB
50 KB
Other
General
Full URL
https://3p.ampproject.net/2010132225003/f.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012010132225003/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c405c993db23df1a1d8cc7aa0c7352ee5def0bec15adaa06a18e20f739c9b2e5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 29 Oct 2020 21:32:06 GMT
content-encoding
br
x-content-type-options
nosniff
age
64193
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
51284
x-xss-protection
0
last-modified
Thu, 29 Oct 2020 20:45:00 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
expires
Fri, 29 Oct 2021 21:32:06 GMT
gpt.js
www.googletagservices.com/tag/js/
53 KB
18 KB
Other
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012010132225003/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:802::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
cc583b22fd998d0d6d0a6648c2269c3a3a4f96eb6d413bb2ca2f6edaf33bbdbd
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 30 Oct 2020 15:21:59 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"678 / 405 of 1000 / last-modified: 1604056334"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
17895
x-xss-protection
0
expires
Fri, 30 Oct 2020 15:21:59 GMT
ampad.js
g.ezoic.net/ezoic/
1 KB
564 B
Other
General
Full URL
https://g.ezoic.net/ezoic/ampad.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012010132225003/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
3.126.196.163 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-126-196-163.eu-central-1.compute.amazonaws.com
Software
nginx/1.16.0 /
Resource Hash
eea9c54783f4fadc9b6de90cae6aed2e33b84318c5756c903315d45aee1adc90

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 30 Oct 2020 15:21:59 GMT
content-encoding
br
server
nginx/1.16.0
vary
Accept-Encoding, Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=31536000
content-length
428
expires
Sat, 30 Oct 2021 15:21:59 GMT
amp-auto-lightbox-0.1.js
cdn.ampproject.org/rtv/012010132225003/v0/
5 KB
3 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012010132225003/v0/amp-auto-lightbox-0.1.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012010132225003/v0.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:817::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
1b484c1e44854a259eeb23d62c7d10122fdaca24f529c60a7f1e392a257b89c2
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Origin
https://www-cultofmac-com.cdn.ampproject.org
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
64196
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1979
x-xss-protection
0
server
sffe
date
Thu, 29 Oct 2020 21:32:03 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"185cfc30c6ae9e96"
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 29 Oct 2021 21:32:03 GMT
ezampdata
www.cultofmac.com/
19 B
921 B
Fetch
General
Full URL
https://www.cultofmac.com/ezampdata?url=https%3A%2F%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2Famp%2F&cid=9ECyk5JnXe16QhLITaS8_TBRw13It_9Q6Fs0nB07AexV85CQNAQabAg_oiWhbukS&pid=9060&d=e340,e340,i340,h340,e341,e341,i341,h341,e342,e342,i342,h342,e260,e260,i260,h260,o611,h611,e611,e611,i611,o605,h605,e605,e605,i605,o607,h607,e607,e607,i607,o608,h608,e608,e608,i608,o609,h609,e609,e609,i609,o610,h610,e610,e610,i610,i111&wc=452&tid=167&__amp_source_origin=https%3A%2F%2Fwww.cultofmac.com
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012010132225003/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:e4::ac40:af1b , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
fa065bdea2de73f740f204a112ab7ec324dde474d00469c5fcdd90ee5dbecc30

Request headers

Accept
application/json
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 30 Oct 2020 15:21:59 GMT
access-control-allow-methods
GET
vary
Accept-Encoding, Accept-Encoding
cf-cache-status
DYNAMIC
nel
{"report_to":"cf-nel","max_age":604800}
status
200
content-length
19
cf-request-id
061bb2fe270000d70d508c4000000001
amp-access-control-allow-source-origin
https://www.cultofmac.com
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
1728000
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=m9IaLdHztcUUzZsnqh0I4agASmQGtXUqUcNdsx2Ux8AINi2k45M3WuFX8EVzrj4f8xrOmS0Znm2WLLkQOPKx3KllAFZ99m9WKKPJ60Ma23kYj2eY4d%2Bixu2WJKLq0g%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
application/json
access-control-allow-origin
https://www-cultofmac-com.cdn.ampproject.org
access-control-expose-headers
AMP-Access-Control-Allow-Source-Origin
cache-control
max-age=0, must-revalidate, no-cache, no-store
access-control-allow-credentials
true
cf-ray
5ea621103b70d70d-FRA
access-control-allow-headers
Content-Type
expires
Thu, 29 Oct 2020 15:21:59 GMT
com-logo.png
cdn-cultofmac-com.cdn.ampproject.org/ii/w39/s/cdn.cultofmac.com/wp-content/plugins/com2014-custom//img/
0
0
Image
General
Full URL
https://cdn-cultofmac-com.cdn.ampproject.org/ii/w39/s/cdn.cultofmac.com/wp-content/plugins/com2014-custom//img/com-logo.png
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:817::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

1f42e583825bf8b1907851f7c9866f21
secure-gravatar-com.cdn.ampproject.org/ii/w39/s/secure.gravatar.com/avatar/
446 B
600 B
Image
General
Full URL
https://secure-gravatar-com.cdn.ampproject.org/ii/w39/s/secure.gravatar.com/avatar/1f42e583825bf8b1907851f7c9866f21?s=24&d=mm&r=g
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a8ae18d4d6bc25dbc021c9dee26ead02629778c7ed32d8c51159d5dabc91a75c
Security Headers
Name Value
Content-Security-Policy default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
x-content-type-options
nosniff
last-modified
Tue, 20 Oct 2020 12:22:58 GMT
server
sffe
date
Fri, 30 Oct 2020 15:21:59 GMT
vary
Accept,Save-Data
content-type
image/webp
status
200
cache-control
private, max-age=299
content-disposition
attachment
accept-ranges
bytes
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
446
x-xss-protection
0
expires
Fri, 30 Oct 2020 15:21:59 GMT
Backlit_keyboard-780x439.jpg
cdn-cultofmac-com.cdn.ampproject.org/i/s/cdn.cultofmac.com/wp-content/uploads/2016/01/
34 KB
34 KB
Image
General
Full URL
https://cdn-cultofmac-com.cdn.ampproject.org/i/s/cdn.cultofmac.com/wp-content/uploads/2016/01/Backlit_keyboard-780x439.jpg
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:817::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
885eea92a107f8a4a4f6f36df6861dcb1390351cf4f5a13f19614ff6be67ab8b
Security Headers
Name Value
Content-Security-Policy default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
x-content-type-options
nosniff
last-modified
Sat, 17 Oct 2020 07:57:59 GMT
server
sffe
date
Fri, 30 Oct 2020 15:21:59 GMT
vary
Accept,Save-Data
content-type
image/webp
status
200
cache-control
private, max-age=31536000
content-disposition
attachment
accept-ranges
bytes
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
34692
x-xss-protection
0
expires
Fri, 30 Oct 2020 15:21:59 GMT
amp-lightbox-gallery-0.1.js
cdn.ampproject.org/rtv/012010132225003/v0/
58 KB
18 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012010132225003/v0/amp-lightbox-gallery-0.1.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012010132225003/v0.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:817::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
df4c365fe87f379c051998e08e24d4caaeb394ad0d012bb910b557ef185a4337
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Origin
https://www-cultofmac-com.cdn.ampproject.org
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
64195
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
17893
x-xss-protection
0
server
sffe
date
Thu, 29 Oct 2020 21:32:04 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"be7886d3594a2e32"
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 29 Oct 2021 21:32:04 GMT
amp-loader-0.1.js
cdn.ampproject.org/rtv/012010132225003/v0/
15 KB
4 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012010132225003/v0/amp-loader-0.1.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012010132225003/v0.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:817::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
fb0fb6b5b52ccae14b07b0fd72b3b295256afd4e399142876dc0bf61409cfa80
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Origin
https://www-cultofmac-com.cdn.ampproject.org
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
64195
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
3735
x-xss-protection
0
server
sffe
date
Thu, 29 Oct 2020 21:32:04 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"914a3d258c3734ce"
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 29 Oct 2021 21:32:04 GMT
googleanalytics.json
cdn.ampproject.org/rtv/012010132225003/v0/analytics-vendors/
2 KB
837 B
Fetch
General
Full URL
https://cdn.ampproject.org/rtv/012010132225003/v0/analytics-vendors/googleanalytics.json
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012010132225003/v0.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:817::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
6f53945eda017435c600f05df250c86a4788653b8e2e4c17aa7d647b4ce35bdd
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept
application/json
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
64196
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
778
x-xss-protection
0
server
sffe
date
Thu, 29 Oct 2020 21:32:04 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/json
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"57e6f4f73ef1675c"
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 29 Oct 2021 21:32:04 GMT
chartbeat.json
cdn.ampproject.org/rtv/012010132225003/v0/analytics-vendors/
924 B
512 B
Fetch
General
Full URL
https://cdn.ampproject.org/rtv/012010132225003/v0/analytics-vendors/chartbeat.json
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012010132225003/v0.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:817::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
bc1fe280f4dc2e9d3b3a0eabec7a4cab25847e67aa1f9eef4b9dd1352a798b62
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept
application/json
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
64192
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
414
x-xss-protection
0
server
sffe
date
Thu, 29 Oct 2020 21:32:08 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/json
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"9cdd600fab479be5"
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 29 Oct 2021 21:32:08 GMT
imp.gif
www.cultofmac.com/detroitchicago/
43 B
622 B
Other
General
Full URL
https://www.cultofmac.com/detroitchicago/imp.gif?amp=1&backgrounded=0&requestCount=1&url=https%3A%2F%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2Famp%2F&pid=9060&cid=9ECyk5JnXe16QhLITaS8_TBRw13It_9Q6Fs0nB07AexV85CQNAQabAg_oiWhbukS&referrer=&tstart=1604071320042&pnv=34&pcrs=119&prt=2&pi=76&pcl=76&pc=134&pnt=0&prc=0&cu=https%3A%2F%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2F&e=%7B%22ad_cache_level%22%3A1%2C%22ad_count_adjustment%22%3A2%2C%22ad_lazyload_version%22%3A-1%2C%22ad_location_ids%22%3A%22%22%2C%22ad_transform_level%22%3A0%2C%22adx_ad_count%22%3A0%2C%22author%22%3A%22https%3A%2F%2Fwww.facebook.com%2Froblefwrites%22%2C%22bidder_method%22%3A1%2C%22bidder_version%22%3A3%2C%22days_since_last_visit%22%3A-1%2C%22display_ad_count%22%3A0%2C%22domain_id%22%3A27792%2C%22domain_test_group%22%3A20200401%2C%22ds_adsize_opt_id%22%3A-1%2C%22engaged_time_visit%22%3A0%2C%22ezcache_level%22%3A1%2C%22forensiq_score%22%3A-1%2C%22form_factor_id%22%3A2%2C%22framework_id%22%3A4%2C%22has_bad_image%22%3A0%2C%22has_bad_words%22%3A0%2C%22iab_category%22%3A%22%22%2C%22iab_category_0%22%3A%22596%22%2C%22iab_category_1%22%3A%22602%22%2C%22is_from_recommended_pages%22%3Afalse%2C%22is_return_visitor%22%3Afalse%2C%22is_sitespeed%22%3A1%2C%22last_page_load%22%3A%22%22%2C%22last_pageview_id%22%3A%22%22%2C%22lt_cache_level%22%3A0%2C%22max_ads%22%3A5%2C%22optimization_version%22%3A1%2C%22page_ad_positions%22%3A%22%22%2C%22page_view_count%22%3A0%2C%22page_view_id%22%3A%22b1d7032a-955d-43e2-5392-c146198408f4%22%2C%22position_selection_id%22%3A39%2C%22publish_date%22%3A%222016-03-16%22%2C%22pv_event_count%22%3A0%2C%22response_time_orig%22%3A321%2C%22serverid%22%3A%2254.152.185.147%3A24398%22%2C%22sub_page_ad_positions%22%3A%22%22%2C%22t_epoch%22%3A1604014539%2C%22template_id%22%3A167%2C%22time_on_site_visit%22%3A0%2C%22url%22%3A%22https%3A%2F%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2Famp%2F%22%2C%22user_id%22%3A0%2C%22weather_precipitation%22%3A0%2C%22weather_summary%22%3A%22%22%2C%22weather_temperature%22%3A0%2C%22word_count%22%3A452%2C%22worst_bad_word_level%22%3A0%7D
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012010132225003/v0/amp-analytics-0.1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:e4::ac40:af1b , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Fri, 30 Oct 2020 15:22:00 GMT
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
cf-cache-status
DYNAMIC
nel
{"report_to":"cf-nel","max_age":604800}
status
200
x-middleton-display
imp_sol
content-length
43
cf-request-id
061bb301f50000d70dba0b6000000001
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
1728000
access-control-allow-methods
HEAD, PUT, POST, GET, OPTIONS
content-type
image/gif
access-control-allow-origin
https://www-cultofmac-com.cdn.ampproject.org
cache-control
no-cache, no-store, must-revalidate, max-age=0
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=kNmszeXJgChAm3UmabdUsjQ8y8ITDcNmTo7iGL8RrM392IIQUfbNxenr4OviAYjd3%2F1YX0QsljC%2F0t1xw%2F0cSMCWdTuCjmQ6F3S%2FYnRlPd4xHFzpZMpP0oKKAvaVfw%3D%3D"}],"group":"cf-nel","max_age":604800}
cf-ray
5ea62116591fd70d-FRA
access-control-allow-headers
Content-Type
ping
ping.chartbeat.net/
43 B
169 B
Image
General
Full URL
https://ping.chartbeat.net/ping?h=cultofmac.com&p=%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2F&u=MPnVqVRom15sc-9w39UdK9jNnbOlOGi5ASnod9Plzuf0fC7__ENA9vomvT0zLRF6&d=www.cultofmac.com&g=54946&g0=News%2C%20Newsstand%2C%20Top%20stories&g1=Rob%20LeFebvre&g2=&g3=&g4=&c=&x=0&m=&y=2730&o=1600&w=1200&j=30&R=1&W=0&I=0&E=1&r=&t=9060MPnVqVRom15sc-9w39UdK9jNnbOlOGi5ASnod9Plzuf0fC7__ENA9vomvT0zLRF6&b=289&i=Malware%20uses%20Apple%E2%80%99s%20FairPlay%20DRM%20to%20attack%20iOS%20users%20%7C%20Cult%20of%20Mac&T=1604071320068&tz=-60&sn=1&C=2&_
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.73.221.227 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-73-221-227.compute-1.amazonaws.com
Software
/
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
pragma
no-cache
date
Fri, 30 Oct 2020 15:22:00 GMT
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
content-length
43
expires
0
collect
www.google-analytics.com/r/
35 B
133 B
Other
General
Full URL
https://www.google-analytics.com/r/collect?v=1&_v=a1&ds=AMP&aip&_s=1&dt=Malware%20uses%20Apple%E2%80%99s%20FairPlay%20DRM%20to%20attack%20iOS%20users%20%7C%20Cult%20of%20Mac&sr=1600x1200&_utmht=1604071320071&cid=3LH2eNTS8wt0HN69N_2LEVNB_lNhaqegtgdpjfwnbqD1Dr57oD3zfL3Ime44EwFA&tid=UA-84038529-45&dl=https%3A%2F%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2Famp%2F&dr=&sd=24&ul=en-us&de=UTF-8&t=pageview&jid=0.7074133005567189&_r=1&a=9060&z=0.5053814323000227&cd1=pub_site_mobile_amp&cd2=167&cd3=0
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012010132225003/v0/amp-analytics-0.1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Fri, 30 Oct 2020 15:22:00 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
200
content-type
image/gif
access-control-allow-origin
https://www-cultofmac-com.cdn.ampproject.org
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
frame.html
d-8097163591664690529.ampproject.net/2010132225003/ Frame A672
0
0
Document
General
Full URL
https://d-8097163591664690529.ampproject.net/2010132225003/frame.html
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012010132225003/v0/amp-ad-0.1.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:802::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
d-8097163591664690529.ampproject.net
:scheme
https
:path
/2010132225003/frame.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
br
content-type
text/html
access-control-allow-origin
*
content-length
149
date
Fri, 30 Oct 2020 15:21:59 GMT
expires
Sat, 30 Oct 2021 15:21:59 GMT
last-modified
Thu, 29 Oct 2020 20:45:00 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
1
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
frame.html
d-8097163591664690529.ampproject.net/2010132225003/ Frame 7473
0
0
Document
General
Full URL
https://d-8097163591664690529.ampproject.net/2010132225003/frame.html
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012010132225003/v0/amp-ad-0.1.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:802::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
d-8097163591664690529.ampproject.net
:scheme
https
:path
/2010132225003/frame.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
br
content-type
text/html
access-control-allow-origin
*
content-length
149
date
Fri, 30 Oct 2020 15:21:59 GMT
expires
Sat, 30 Oct 2021 15:21:59 GMT
last-modified
Thu, 29 Oct 2020 20:45:00 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
1
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"

Verdicts & Comments Add Verdict or Comment

25 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| 1 object| 2 function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes object| AMP object| global object| AMP_CONFIG object| __AMP_LOG object| __AMP_ERRORS object| __AMP_MODE function| __AMP_REPORT_ERROR object| __AMP_TOP object| __AMP_SERVICES object| __AMP_URL_CACHE object| __AMP__EXPERIMENT_TOGGLES boolean| __AMP_TAG object| __AMP_EXTENDED_ELEMENTS function| __AMP_BASE_CE_CLASS object| listeningFors number| ampAdSlotIdCounter string| __AMP_DEFAULT_BOOTSTRAP_SUBDOMAIN number| 3pla

0 Cookies

2 Console Messages

Source Level URL
Text
console-api info URL: https://cdn.ampproject.org/rtv/012010132225003/v0.js(Line 521)
Message:
Powered by AMP ⚡ HTML – Version 2010132225003 https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D#origin%3Dhttps%3A%2F%2Fwww.google.co.uk%26prerenderSize%3D1%26visibilityState%3Dprerender%26paddingTop%3D32%26p2r%3D0%26horizontalScrolling%3D0%26csi%3D1%26aoh%3D15661572839977%26viewerUrl%3Dhttps%3A%2F%2Fwww.google.co.uk%2Famp%2Fs%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2Famp%2F%26history%3D1%26storage%3D1%26cid%3D1%26cap%3DnavigateTo%2Ccid%2CfullReplaceHistory%2Cfragment%2CreplaceUrl
console-api error URL: https://cdn.ampproject.org/rtv/012010132225003/v0.js(Line 103)
Message:
Failed to load: https://cdn-cultofmac-com.cdn.ampproject.org/i/s/cdn.cultofmac.com/wp-content/plugins/com2014-custom//img/com-logo.png​​​

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src * blob: data:; script-src 'sha256-5CxqAdDXlHviOy7zxeRpMobzRK/JNpLvkS+k8Zj3L3A=' 'sha256-FIBGC/wl1Qfnh2Fb5NPFHmRty7BHJdDpWW1FZ8egppI=' 'sha256-dKn2nAtwgzaaXC8ZM58hhldxNyeuu4qrzW4H9//9YMA=' blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

3p.ampproject.net
cdn-cultofmac-com.cdn.ampproject.org
cdn.ampproject.org
d-8097163591664690529.ampproject.net
g.ezoic.net
ping.chartbeat.net
secure-gravatar-com.cdn.ampproject.org
www-cultofmac-com.cdn.ampproject.org
www.cultofmac.com
www.facebook.com
www.google-analytics.com
www.googletagservices.com
2606:4700:e4::ac40:af1b
2a00:1450:4001:802::2002
2a00:1450:4001:802::2003
2a00:1450:4001:814::2003
2a00:1450:4001:816::200e
2a00:1450:4001:817::2001
2a03:2880:f12d:83:face:b00c:0:25de
3.126.196.163
52.73.221.227
039f59eea8bd266609f57d106b90f063983050efdeea4e18f9e878d78ef99dff
1b484c1e44854a259eeb23d62c7d10122fdaca24f529c60a7f1e392a257b89c2
6f53945eda017435c600f05df250c86a4788653b8e2e4c17aa7d647b4ce35bdd
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
885014673b49e09a9421eaae25ce0b95dc2e9c8da50f73b11ac3f531d38fd59e
885eea92a107f8a4a4f6f36df6861dcb1390351cf4f5a13f19614ff6be67ab8b
8d2c71ece93b03ab9a6dc90f56f42b5a6d1e12fd67ea540d0da957044a687386
a45f008c935886524c2d85d415e7350c070a05bfbd953899ea762c1ef0da2638
a8ae18d4d6bc25dbc021c9dee26ead02629778c7ed32d8c51159d5dabc91a75c
b40d96971087e509167aecb1c6b4d5f2e43d7521c0b938ea4b4329b89ff322b9
b7c2b75c973a2411436ad930de34385cfd70ad420785cd6311d04b097245ed3b
bc1fe280f4dc2e9d3b3a0eabec7a4cab25847e67aa1f9eef4b9dd1352a798b62
be700c1e1628a8191e49db2650a39119025efa9d404a37e9bda613de6cc43b8b
c405c993db23df1a1d8cc7aa0c7352ee5def0bec15adaa06a18e20f739c9b2e5
cc583b22fd998d0d6d0a6648c2269c3a3a4f96eb6d413bb2ca2f6edaf33bbdbd
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
deadb69642f94ee827b40ac6c353db1ba0cf1ee0d93001ff8e36910d0b6ff7fa
df4c365fe87f379c051998e08e24d4caaeb394ad0d012bb910b557ef185a4337
dfc1b07f86b7370e522c3e728b1c9512cbbbbb39f77b044e4b50d8f73f948bec
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
eea9c54783f4fadc9b6de90cae6aed2e33b84318c5756c903315d45aee1adc90
fa065bdea2de73f740f204a112ab7ec324dde474d00469c5fcdd90ee5dbecc30
fb0fb6b5b52ccae14b07b0fd72b3b295256afd4e399142876dc0bf61409cfa80
ff2d3c8223c8a26d92941eeeff822815d1b6a6c5e9c9174f3f21cb409cbfb264