URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Submission: On February 13 via manual from US

Summary

This website contacted 54 IPs in 7 countries across 43 domains to perform 238 HTTP transactions. The main IP is 2606:4700::6811:7863, located in United States and belongs to CLOUDFLARENET - Cloudflare, Inc., US. The main domain is www.darkreading.com.
TLS certificate: Issued by COMODO ECC Domain Validation Secure S... on January 18th 2019. Valid for: 6 months.
This is the only time www.darkreading.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 9 2606:4700::68... 13335 (CLOUDFLAR...)
2 2a00:1450:400... 15169 (GOOGLE)
15 2606:4700:30:... 13335 (CLOUDFLAR...)
6 2606:4700:30:... 13335 (CLOUDFLAR...)
3 2606:4700:20:... 13335 (CLOUDFLAR...)
1 151.139.239.5 33438 (HIGHWINDS2)
1 172.217.21.194 15169 (GOOGLE)
42 2606:4700:30:... 13335 (CLOUDFLAR...)
6 2606:2800:234... 15133 (EDGECAST)
2 2600:9000:200... 16509 (AMAZON-02)
1 2 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
2 34.250.76.236 16509 (AMAZON-02)
2 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
7 2a00:1450:400... 15169 (GOOGLE)
12 143.204.212.151 16509 (AMAZON-02)
11 216.58.206.2 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 172.82.228.18 15224 (OMNITURE)
1 1 66.117.28.86 15224 (OMNITURE)
1 23.111.11.217 33438 (HIGHWINDS2)
5 6 2606:4700::68... 13335 (CLOUDFLAR...)
3 3 185.33.223.221 29990 (ASN-APPNEXUS)
2 2 185.64.189.115 62713 (AS-PUBMATIC)
3 3 18.153.11.26 16509 (AMAZON-02)
2 2 18.196.37.19 16509 (AMAZON-02)
2 2 207.244.121.73 30633 (LEASEWEB-...)
1 4 2.18.162.235 16625 (AKAMAI-AS)
5 2a03:2880:f01... 32934 (FACEBOOK)
2 46.105.202.39 16276 (OVH)
6 2a00:1450:400... 15169 (GOOGLE)
1 66.117.29.11 15224 (OMNITURE)
1 54.154.86.186 16509 (AMAZON-02)
1 2a00:1450:401... 15169 (GOOGLE)
2 204.79.197.200 8068 (MICROSOFT...)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
7 2a00:1450:400... 15169 (GOOGLE)
4 2a03:2880:f11... 32934 (FACEBOOK)
1 2 2600:9000:200... 16509 (AMAZON-02)
1 52.59.88.202 16509 (AMAZON-02)
17 143.204.214.4 16509 (AMAZON-02)
1 143.204.214.107 16509 (AMAZON-02)
4 23.211.0.4 16625 (AKAMAI-AS)
1 2620:103::192... 19994 (RACKSPACE)
3 2606:2800:234... 15133 (EDGECAST)
1 184.31.90.134 20940 (AKAMAI-ASN1)
8 2606:2800:134... 15133 (EDGECAST)
1 2 199.16.156.241 13414 (TWITTER)
1 2 142.0.160.13 7160 (NETDYNAMICS)
1 2 209.167.231.17 7160 (NETDYNAMICS)
12 52.202.3.209 14618 (AMAZON-AES)
2 2.18.232.7 16625 (AKAMAI-AS)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
3 2a00:1450:400... 15169 (GOOGLE)
4 2a00:1450:400... 15169 (GOOGLE)
2 2.18.233.40 16625 (AKAMAI-AS)
2 54.220.0.18 16509 (AMAZON-02)
238 54
Apex Domain
Subdomains
Transfer
42 deusm.com
img.deusm.com
290 KB
30 celtra.com
ads.celtra.com
cache-ssl.celtra.com
track.celtra.com
184 KB
15 twimgs.com
twimgs.com
285 KB
12 doubleclick.net
securepubads.g.doubleclick.net
googleads.g.doubleclick.net
104 KB
12 boltdns.net
cf-images.us-east-1.prod.boltdns.net
40 KB
11 twitter.com
platform.twitter.com
syndication.twitter.com
118 KB
10 googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
243 KB
9 darkreading.com
www.darkreading.com
51 KB
8 twimg.com
cdn.syndication.twimg.com
pbs.twimg.com
ton.twimg.com
84 KB
8 adsnative.com
static.adsnative.com
api-cache.adsnative.com
rudy.adsnative.com
21 KB
7 ampproject.org
cdn.ampproject.org
135 KB
7 googletagservices.com
www.googletagservices.com
95 KB
6 teads.tv
a.teads.tv
t.teads.tv
sync.teads.tv
101 KB
6 ubm-us.net
i.ubm-us.net
dsimg.ubm-us.net
116 KB
5 facebook.com
www.facebook.com
staticxx.facebook.com
390 B
4 adroll.com
s.adroll.com
d.adroll.com
79 KB
4 eloqua.com
s657486201.t.eloqua.com
s2150.t.eloqua.com
2 KB
4 facebook.net
connect.facebook.net
115 KB
4 scorecardresearch.com
sb.scorecardresearch.com
2 KB
4 flipboard.com
cdn.flipboard.com
fpn.flipboard.com
5 KB
3 appspot.com
amp-error-reporting.appspot.com
281 B
3 gstatic.com
www.gstatic.com
fonts.gstatic.com
103 KB
3 bidswitch.net
x.bidswitch.net
2 KB
3 adnxs.com
ib.adnxs.com
3 KB
3 omtrdc.net
ubmtech.d3.sc.omtrdc.net
ubm.tt.omtrdc.net
1 KB
3 demdex.net
dpm.demdex.net
ubm.demdex.net
2 KB
3 ubmcanon.com
epromos.ubmcanon.com
67 KB
2 bing.com
bat.bing.com
7 KB
2 heatmap.it
u.heatmap.it
10 KB
2 zemanta.com
b1sync.zemanta.com
961 B
2 mfadsrvr.com
rtb.mfadsrvr.com
1 KB
2 pubmatic.com
image6.pubmatic.com
913 B
2 google.de
adservice.google.de
www.google.de
287 B
2 google-analytics.com
ssl.google-analytics.com
17 KB
2 google.com
www.google.com
685 B
2 linkedin.com
platform.linkedin.com
56 KB
2 googleapis.com
fonts.googleapis.com
912 B
1 consensu.org
cmp.teads.mgr.consensu.org
1 en25.com
img.en25.com
3 KB
1 techweb.com
ng.techweb.com
1 lightreading.com
img.lightreading.com
356 B
1 everesttech.net
cm.everesttech.net
527 B
1 googleadservices.com
www.googleadservices.com
9 KB
238 43
Domain Requested by
42 img.deusm.com www.darkreading.com
securepubads.g.doubleclick.net
www.googletagservices.com
cdn.ampproject.org
17 cache-ssl.celtra.com ads.celtra.com
www.darkreading.com
15 twimgs.com www.darkreading.com
12 track.celtra.com www.darkreading.com
12 cf-images.us-east-1.prod.boltdns.net www.darkreading.com
11 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
www.darkreading.com
9 platform.twitter.com www.darkreading.com
platform.twitter.com
9 www.darkreading.com 1 redirects www.darkreading.com
7 cdn.ampproject.org securepubads.g.doubleclick.net
7 www.googletagservices.com www.darkreading.com
securepubads.g.doubleclick.net
6 tpc.googlesyndication.com securepubads.g.doubleclick.net
www.darkreading.com
6 rudy.adsnative.com 5 redirects www.darkreading.com
4 pagead2.googlesyndication.com www.darkreading.com
4 pbs.twimg.com www.darkreading.com
4 www.facebook.com www.darkreading.com
connect.facebook.net
4 connect.facebook.net www.darkreading.com
connect.facebook.net
4 sb.scorecardresearch.com 1 redirects www.darkreading.com
3 ton.twimg.com platform.twitter.com
www.darkreading.com
3 amp-error-reporting.appspot.com cdn.ampproject.org
3 a.teads.tv securepubads.g.doubleclick.net
a.teads.tv
3 x.bidswitch.net 3 redirects
3 ib.adnxs.com 3 redirects
3 dsimg.ubm-us.net www.darkreading.com
3 epromos.ubmcanon.com www.darkreading.com
3 i.ubm-us.net www.darkreading.com
2 d.adroll.com s.adroll.com
2 s.adroll.com www.darkreading.com
s.adroll.com
2 t.teads.tv www.darkreading.com
2 s2150.t.eloqua.com 1 redirects www.darkreading.com
2 s657486201.t.eloqua.com 1 redirects www.darkreading.com
2 syndication.twitter.com 1 redirects www.darkreading.com
2 fpn.flipboard.com 1 redirects www.darkreading.com
2 fonts.gstatic.com www.darkreading.com
2 bat.bing.com www.darkreading.com
2 u.heatmap.it www.darkreading.com
u.heatmap.it
2 b1sync.zemanta.com 2 redirects
2 rtb.mfadsrvr.com 2 redirects
2 image6.pubmatic.com 2 redirects
2 ubmtech.d3.sc.omtrdc.net epromos.ubmcanon.com
www.darkreading.com
2 ssl.google-analytics.com www.darkreading.com
2 www.google.com dsimg.ubm-us.net
www.darkreading.com
2 dpm.demdex.net epromos.ubmcanon.com
www.darkreading.com
2 platform.linkedin.com 1 redirects www.darkreading.com
2 cdn.flipboard.com www.darkreading.com
2 fonts.googleapis.com www.darkreading.com
1 sync.teads.tv a.teads.tv
1 cmp.teads.mgr.consensu.org a.teads.tv
1 cdn.syndication.twimg.com platform.twitter.com
1 img.en25.com twimgs.com
1 ng.techweb.com twimgs.com
1 img.lightreading.com www.darkreading.com
1 ads.celtra.com www.darkreading.com
1 staticxx.facebook.com connect.facebook.net
1 www.google.de www.darkreading.com
1 www.gstatic.com www.google.com
1 googleads.g.doubleclick.net www.googleadservices.com
1 ubm.demdex.net epromos.ubmcanon.com
1 ubm.tt.omtrdc.net epromos.ubmcanon.com
1 api-cache.adsnative.com static.adsnative.com
1 cm.everesttech.net 1 redirects
1 adservice.google.de www.googletagservices.com
1 www.googleadservices.com www.darkreading.com
1 static.adsnative.com www.darkreading.com
238 63
Subject Issuer Validity Valid
ssl764998.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-01-18 -
2019-07-27
6 months crt.sh
*.googleapis.com
Google Internet Authority G3
2019-01-23 -
2019-04-17
3 months crt.sh
sni136658.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-01-18 -
2019-07-27
6 months crt.sh
sni136530.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-01-13 -
2019-07-22
6 months crt.sh
ssl378091.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-12-28 -
2019-07-06
6 months crt.sh
*.adsnative.com
DigiCert SHA2 Secure Server CA
2018-04-20 -
2019-04-25
a year crt.sh
www.googleadservices.com
Google Internet Authority G3
2019-01-23 -
2019-04-17
3 months crt.sh
sni137786.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-11-26 -
2019-06-04
6 months crt.sh
*.twimg.com
DigiCert SHA2 High Assurance Server CA
2018-11-19 -
2019-11-27
a year crt.sh
*.flipboard.com
DigiCert SHA2 High Assurance Server CA
2017-10-19 -
2019-11-06
2 years crt.sh
platform.linkedin.com
DigiCert SHA2 Secure Server CA
2018-07-11 -
2020-07-15
2 years crt.sh
*.demdex.net
DigiCert SHA2 High Assurance Server CA
2018-01-09 -
2021-02-12
3 years crt.sh
www.google.com
Google Internet Authority G3
2019-01-23 -
2019-04-17
3 months crt.sh
*.google-analytics.com
Google Internet Authority G3
2019-01-23 -
2019-04-17
3 months crt.sh
*.g.doubleclick.net
Google Internet Authority G3
2019-01-23 -
2019-04-17
3 months crt.sh
*.prod.boltdns.net
Amazon
2019-01-02 -
2020-02-02
a year crt.sh
*.google.com
Google Internet Authority G3
2019-01-23 -
2019-04-17
3 months crt.sh
*.d3.sc.omtrdc.net
DigiCert SHA2 High Assurance Server CA
2016-05-04 -
2019-05-23
3 years crt.sh
rudy.adsnative.com
CloudFlare Inc ECC CA-2
2019-01-03 -
2020-01-03
a year crt.sh
*.scorecardresearch.com
COMODO RSA Organization Validation Secure Server CA
2018-11-28 -
2019-12-26
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-01-21 -
2019-04-21
3 months crt.sh
*.heatmap.it
COMODO RSA Domain Validation Secure Server CA
2016-06-05 -
2019-06-27
3 years crt.sh
tpc.googlesyndication.com
Google Internet Authority G3
2019-01-29 -
2019-04-23
3 months crt.sh
*.tt.omtrdc.net
DigiCert SHA2 High Assurance Server CA
2017-10-19 -
2020-11-25
3 years crt.sh
www.bing.com
Microsoft IT TLS CA 5
2017-07-20 -
2019-07-10
2 years crt.sh
www.google.de
Google Internet Authority G3
2019-01-23 -
2019-04-17
3 months crt.sh
misc-sni.google.com
Google Internet Authority G3
2019-01-23 -
2019-04-17
3 months crt.sh
*.celtra.com
Go Daddy Secure Certificate Authority - G2
2018-05-15 -
2020-06-15
2 years crt.sh
img.lightreading.com
Amazon
2018-03-21 -
2019-04-21
a year crt.sh
teads.tv
Let's Encrypt Authority X3
2019-01-02 -
2019-04-02
3 months crt.sh
ng.techweb.com
Let's Encrypt Authority X3
2019-01-17 -
2019-04-17
3 months crt.sh
*.en25.com
DigiCert SHA2 Secure Server CA
2018-04-25 -
2019-07-25
a year crt.sh
syndication.twitter.com
DigiCert SHA2 High Assurance Server CA
2016-06-29 -
2019-09-16
3 years crt.sh
*.t.eloqua.com
DigiCert SHA2 Secure Server CA
2019-01-14 -
2020-03-14
a year crt.sh
teads.mgr.consensu.org
Let's Encrypt Authority X3
2018-11-27 -
2019-02-25
3 months crt.sh
*.appspot.com
Google Internet Authority G3
2019-01-23 -
2019-04-17
3 months crt.sh
*.adroll.com
DigiCert SHA2 Secure Server CA
2018-12-19 -
2020-03-19
a year crt.sh

This page contains 21 frames:

Primary Page: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Frame ID: E22F49BC1D9BBDD7AF89DD1E8ED30242
Requests: 163 HTTP requests in this frame

Frame: https://ubm.demdex.net/dest5.html?d_nsid=0
Frame ID: 536B939B608FAF980E8FB3C345C593D7
Requests: 1 HTTP requests in this frame

Frame: https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Frame ID: FA561A3AB978E0B0B2917978EC8101E5
Requests: 4 HTTP requests in this frame

Frame: https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Frame ID: D020FAD905E2BCE45FC306C94CF094E2
Requests: 4 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js
Frame ID: 8A8D0E6A075C97C29DEFAE66F54CD21F
Requests: 7 HTTP requests in this frame

Frame: https://staticxx.facebook.com/connect/xd_arbiter/r/vy-MhgbfL4v.js?version=44
Frame ID: 62D06FF5938A379FA7E140C1363F304B
Requests: 1 HTTP requests in this frame

Frame: https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Frame ID: A30276332B304B129669237034FB7BEE
Requests: 3 HTTP requests in this frame

Frame: https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Frame ID: D5D5298F880C27203D7EB16F3A38ECF2
Requests: 5 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js
Frame ID: F70CF73906E4CBBDC15A67AC7A31632C
Requests: 7 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js
Frame ID: C466B7D04EC1464D5130A8D953258003
Requests: 6 HTTP requests in this frame

Frame: https://a.teads.tv/page/11512/tag
Frame ID: 8DC85F170501BF57136C669303416914
Requests: 4 HTTP requests in this frame

Frame: https://ng.techweb.com/authds/login/login.jsp?type=iframe&cdsocket_client=https://www.darkreading.com/cdsocket_proxy.html
Frame ID: 2C522E4FAB4EC7B8483B573E7B73D994
Requests: 1 HTTP requests in this frame

Frame: https://www.facebook.com/connect/ping?client_id=640989409269461&domain=www.darkreading.com&origin=1&redirect_uri=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter%2Fr%2Fvy-MhgbfL4v.js%3Fversion%3D44%23cb%3Df16c3c67f99f498%26domain%3Dwww.darkreading.com%26origin%3Dhttps%253A%252F%252Fwww.darkreading.com%252Ff32daf9eb0fe35%26relation%3Dparent&response_type=token%2Csigned_request&sdk=joey
Frame ID: ACEB32D0D5C27CFD8A37044EC43BDCF4
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/widget_iframe.68dbfddc56b3f0522044700c1abcd1dc.html?origin=https%3A%2F%2Fwww.darkreading.com&settingsEndpoint=https%3A%2F%2Fsyndication.twitter.com%2Fsettings
Frame ID: 832B8DDB01EE33C7A246432920EBB72A
Requests: 1 HTTP requests in this frame

Frame: https://www.facebook.com/plugins/like.php?app_id=640989409269461&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter%2Fr%2Fvy-MhgbfL4v.js%3Fversion%3D44%23cb%3Df155c67ad97289c%26domain%3Dwww.darkreading.com%26origin%3Dhttps%253A%252F%252Fwww.darkreading.com%252Ff32daf9eb0fe35%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&layout=button&locale=en_US&sdk=joey&send=false&show_faces=false&width=87
Frame ID: 3B7E1AFD0680BD553DE04CE8F5997453
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/tweet_button.68dbfddc56b3f0522044700c1abcd1dc.en.html
Frame ID: C278B06C60EF58DB20EF5DE5B80AE1E2
Requests: 1 HTTP requests in this frame

Frame: https://cmp.teads.mgr.consensu.org/index.html
Frame ID: FE3DD8D6B4A46CB5586FEC5E27110446
Requests: 1 HTTP requests in this frame

Frame: https://pbs.twimg.com/card_img/1093148778205458432/-9EHMFuI?format=jpg&name=144x144_2
Frame ID: 8E6421716C54779A87007CCD80D3B5CD
Requests: 10 HTTP requests in this frame

Frame: https://fonts.googleapis.com/css?family=Lato:400&text=BCEGLORSU
Frame ID: 2F8725A45408EAF00A318CD087D11653
Requests: 18 HTTP requests in this frame

Frame: https://sync.teads.tv/iframe?pid=21882&userId=f035cc98-086f-40c2-ba0e-c027a97d5f31&gdprIab={%22status%22:22,%22consent%22:%22%22,%22reason%22:220}&1550065852844
Frame ID: 26BF7D1BCE668A10E983C081F422F45F
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/jot.html
Frame ID: BFD15232E25CCF67C83C037FA126ED75
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • script /jit.*\.js/i

Overall confidence: 100%
Detected patterns
  • script /jquery\.mobile(?:-([\d.]+rc\d))?.*\.js(?:\?ver=([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • env /^adroll_/i

Overall confidence: 100%
Detected patterns
  • headers server /cloudflare/i

Overall confidence: 100%
Detected patterns
  • env /^elq(?:SiteID|Load|CurESite)$/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^\/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • env /^__google_ad_/i
  • env /^Goog_AdSense_/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|(analytics))\.js/i
  • env /^gaGlobal$/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Overall confidence: 100%
Detected patterns
  • env /^googletag$/i

Overall confidence: 100%
Detected patterns
  • env /^s_(?:account|objectID|code|INST)$/i

Overall confidence: 100%
Detected patterns
  • script /\/\/platform\.twitter\.com\/widgets\.js/i

Overall confidence: 100%
Detected patterns
  • html /<iframe[^>]* (?:id="comscore"|scr=[^>]+comscore)|\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • script /\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • env /^_?COMSCORE$/i

Overall confidence: 100%
Detected patterns
  • script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
  • script /jquery.*\.js/i
  • env /^jQuery$/i
  • script /jquery\.mobile(?:-([\d.]+rc\d))?.*\.js(?:\?ver=([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • env /^Recaptcha$/i

Page Statistics

238
Requests

97 %
HTTPS

49 %
IPv6

43
Domains

63
Subdomains

54
IPs

7
Countries

2344 kB
Transfer

6585 kB
Size

32
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 45
  • https://platform.linkedin.com/in.js HTTP 302
  • https://platform.linkedin.com/xdoor/scripts/in.js
Request Chain 81
  • https://cm.everesttech.net/cm/dd?d_uuid=55984599095969247600160716791589539836 HTTP 302
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=XGQguwAADuHW6hKk
Request Chain 86
  • https://www.darkreading.com/client_pathlog.asp?p=%2Fdarkreading%2Fsection%2F314&f=%2Fdarkreading%2Fsection%2F314%2F1333825&rndserial=31850 HTTP 302
  • https://img.deusm.com/images/spacer.gif
Request Chain 90
  • https://rudy.adsnative.com/cm.gif HTTP 302
  • https://ib.adnxs.com/getuid?https://rudy.adsnative.com/cm.gif?dspid=1908606746&buid=$UID&smode=1 HTTP 302
  • https://ib.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Frudy.adsnative.com%2Fcm.gif%3Fdspid%3D1908606746%26buid%3D%24UID%26smode%3D1 HTTP 302
  • https://rudy.adsnative.com/cm.gif?dspid=1908606746&buid=8881367182853995428&smode=1 HTTP 302
  • https://ib.adnxs.com/getuid?https://rudy.adsnative.com/cm.gif?dspid=1830491566&buid=$UID&smode=1 HTTP 302
  • https://rudy.adsnative.com/cm.gif?dspid=1830491566&buid=8881367182853995428&smode=1 HTTP 302
  • https://image6.pubmatic.com/AdServer/UCookieSetPug?oid=1&rd=https%3A%2F%2Frudy.adsnative.com%2Fcm.gif%3Fdspid%3D823634934%26buid%3D%23PM_USER_ID HTTP 302
  • https://image6.pubmatic.com/AdServer/UCookieSetPug?oid=1&rd=https%3A%2F%2Frudy.adsnative.com%2Fcm.gif%3Fdspid%3D823634934%26buid%3D%23PM_USER_ID&rdf=1 HTTP 302
  • https://rudy.adsnative.com/cm.gif?dspid=823634934&buid=4BC5BDC5-AB23-4CEE-BB93-8A4517F3E74F HTTP 302
  • https://x.bidswitch.net/sync?ssp=adsnative HTTP 302
  • https://x.bidswitch.net/ul_cb/sync?ssp=adsnative HTTP 302
  • https://rtb.mfadsrvr.com/sync?ssp=bidswitch&bidswitch_ssp_id=adsnative&bsw_user_id=499728ac-2541-4748-a556-8e26b6176e89 HTTP 302
  • https://rtb.mfadsrvr.com/ul_cb/sync?ssp=bidswitch&bidswitch_ssp_id=adsnative&bsw_user_id=499728ac-2541-4748-a556-8e26b6176e89 HTTP 302
  • https://x.bidswitch.net/sync?dsp_id=250&expires=14&user_id=9ec9eb15-7226-4ef9-b155-578f137aab4e&ssp=adsnative HTTP 302
  • https://rudy.adsnative.com/cm.gif?dspid=2015930208&buid=499728ac-2541-4748-a556-8e26b6176e89 HTTP 302
  • https://b1sync.zemanta.com/usersync/adsnative/ HTTP 302
  • https://b1sync.zemanta.com/usersync/adsnative/?s=2 HTTP 302
  • https://rudy.adsnative.com/cm.gif?dspid=2147483647&buid=fn6VTCcvaRQgZpUFa4EA
Request Chain 118
  • https://sb.scorecardresearch.com/b?c1=2&c2=3005435&ns__t=1550065851401&ns_c=windows-1252&cv=3.1&c8=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...&c7=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=3005435&ns__t=1550065851401&ns_c=windows-1252&cv=3.1&c8=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...&c7=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&c9=
Request Chain 135
  • https://fpn.flipboard.com/pix/__fpn.gif?utm_source=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825 HTTP 307
  • https://fpn.flipboard.com/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fattacks-breaches%25252Fransomware-attack-via-msp-locks-customers-out-of-systems%25252Fd%25252Fd-id%25252F1333825&rh=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fransomware-attack-via-msp-locks-customers-out-of-systems%252Fd%252Fd-id%252F1333825
Request Chain 176
  • https://s657486201.t.eloqua.com/visitor/v200/svrGP?pps=3&siteid=657486201&ref2=elqNone&tzo=0&ms=421&optin=disabled HTTP 302
  • https://s657486201.t.eloqua.com/visitor/v200/svrGP.aspx?pps=3&siteid=657486201&ref2=elqNone&tzo=0&ms=421&optin=disabled&elqCookie=1
Request Chain 177
  • https://s2150.t.eloqua.com/visitor/v200/svrGP?pps=3&siteid=2150&ref2=elqNone&tzo=0&ms=421&optin=disabled HTTP 302
  • https://s2150.t.eloqua.com/visitor/v200/svrGP.aspx?pps=3&siteid=2150&ref2=elqNone&tzo=0&ms=421&optin=disabled&elqCookie=1
Request Chain 228
  • https://syndication.twitter.com/i/jot HTTP 302
  • https://platform.twitter.com/jot.html

238 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request 1333825
www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/
152 KB
27 KB
Document
General
Full URL
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
7794867083acb0a252429ef952dc146ccb4024768756a63ea656d08c85457f5f
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:method
GET
:authority
www.darkreading.com
:scheme
https
:path
/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
date
Wed, 13 Feb 2019 13:50:50 GMT
content-type
text/html
set-cookie
__cfduid=df05a83b927fc2051de9a57491904c1941550065850; expires=Thu, 13-Feb-20 13:50:50 GMT; path=/; domain=.darkreading.com; HttpOnly darkreading_lastvisit=2/13/2019 8:50:50 AM; expires=Mon, 13-Feb-2034 12:50:50 GMT; path=/; HttpOnly darkreading_lastvisit=2/13/2019 8:50:50 AM; expires=Mon, 13-Feb-2034 12:50:50 GMT; path=/; HttpOnly cplChannelTagID=; path=/ darkreading%2Dmeter=1333825; expires=Thu, 14-Feb-2019 05:00:00 GMT; path=/ darkreading%5Fvisits=2; expires=Mon, 13-Feb-2034 05:00:00 GMT; path=/
vary
Accept-Encoding
cache-control
private
x-pingback
http://www.staging.new.informationweek.com/xmlrpc.asp
x-powered-by
ASP.NET
x-frame-options
SAMEORIGIN
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
4a87c42a8c09c28d-FRA
content-encoding
gzip
css
fonts.googleapis.com/
2 KB
603 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto+Slab:700
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:824::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
0fb0f3abed20c1112a0eb52745ba589a5ec9c2fe0582f82b40c1208a5aebaaf6
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Wed, 13 Feb 2019 13:50:50 GMT
server
ESF
access-control-allow-origin
*
date
Wed, 13 Feb 2019 13:50:50 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
x-xss-protection
1; mode=block
expires
Wed, 13 Feb 2019 13:50:50 GMT
darkreading.css
twimgs.com/nojitter/css/
17 KB
3 KB
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/darkreading.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
cf167be72549318f78f8c03d0d93b923f8e8e290acec47b870a1cede920e859b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 27 Apr 2017 09:38:14 GMT
server
cloudflare
etag
W/"45f8-54e22b7428d80"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=14400
cf-ray
4a87c42f6a7e977a-FRA
expires
Wed, 13 Feb 2019 17:50:50 GMT
pano-framework.css
www.darkreading.com/styles/
124 KB
9 KB
Stylesheet
General
Full URL
https://www.darkreading.com/styles/pano-framework.css?v1.26
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
2466b97bcdbd9ad0e026385c5767a433425243f95012cedb1712925dfe91dcb4
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/styles/pano-framework.css?v1.26
pragma
no-cache
cookie
__cfduid=df05a83b927fc2051de9a57491904c1941550065850; darkreading_lastvisit=2/13/2019 8:50:50 AM; cplChannelTagID=; darkreading%2Dmeter=1333825; darkreading%5Fvisits=2
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
www.darkreading.com
referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
:scheme
https
:method
GET
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
gzip
vary
Accept-Encoding
cf-cache-status
HIT
last-modified
Mon, 26 Nov 2018 11:03:37 GMT
server
cloudflare
x-powered-by
ASP.NET
etag
W/"2a1f41ae7785d41:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
text/css
status
200
cache-control
public, max-age=7200
cf-ray
4a87c42f0afcc28d-FRA
expires
Wed, 13 Feb 2019 15:50:50 GMT
styles.css
www.darkreading.com/styles/
292 B
313 B
Stylesheet
General
Full URL
https://www.darkreading.com/styles/styles.css?v7
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
a8fc74838ba253a4076b8eb46aeed79c10341380609dcfe11bed40d974d1fd10
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/styles/styles.css?v7
pragma
no-cache
cookie
__cfduid=df05a83b927fc2051de9a57491904c1941550065850; darkreading_lastvisit=2/13/2019 8:50:50 AM; cplChannelTagID=; darkreading%2Dmeter=1333825; darkreading%5Fvisits=2
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
www.darkreading.com
referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
:scheme
https
:method
GET
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
gzip
vary
Accept-Encoding
cf-cache-status
HIT
last-modified
Mon, 03 Apr 2017 14:07:44 GMT
server
cloudflare
x-powered-by
ASP.NET
etag
W/"b08d92aa83acd21:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
text/css
status
200
cache-control
public, max-age=7200
cf-ray
4a87c42f0afdc28d-FRA
expires
Wed, 13 Feb 2019 15:50:50 GMT
dr_nativead.css
i.ubm-us.net/oas/nativead/css/
2 KB
944 B
Stylesheet
General
Full URL
https://i.ubm-us.net/oas/nativead/css/dr_nativead.css?v3
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::6818:7975 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
f5932acd6c5f2796f354dedc5e8dfe30e206787365186bbf0f9789d083472a75

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 06 Feb 2019 18:48:56 GMT
server
cloudflare
etag
W/"861-5813e2d913600"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
expires
Wed, 13 Feb 2019 17:50:50 GMT
cache-control
public, max-age=14400
cf-polished
origSize=2145
cf-ray
4a87c42f8ca296f4-FRA
cf-bgj
minify
nativead.js
i.ubm-us.net/oas/nativead/js/
1 KB
464 B
Script
General
Full URL
https://i.ubm-us.net/oas/nativead/js/nativead.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::6818:7975 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
984cd1fa5dd20c2b1b8fd77b6bb876a3a211cdf14aaaed6bc1481e3c98027544

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 30 Jul 2015 14:31:41 GMT
server
cloudflare
cf-polished
origSize=1373
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
expires
Thu, 14 Feb 2019 13:50:50 GMT
cache-control
public, max-age=86400
cf-ray
4a87c42f8ca696f4-FRA
cf-bgj
minify
dr_nativead.js
i.ubm-us.net/oas/nativead/js/
8 KB
1 KB
Script
General
Full URL
https://i.ubm-us.net/oas/nativead/js/dr_nativead.js?v3
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::6818:7975 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
b309c9c4a6c27c7cfc64ab2bc7f545e8d7b41a795c46202ab2a9c633f7128287

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 06 Oct 2017 16:50:20 GMT
server
cloudflare
cf-polished
origSize=8434
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
expires
Thu, 14 Feb 2019 13:50:50 GMT
cache-control
public, max-age=86400
cf-ray
4a87c42f8ca796f4-FRA
cf-bgj
minify
respond.min.js
www.darkreading.com/script/
4 KB
2 KB
Script
General
Full URL
https://www.darkreading.com/script/respond.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
cf7bdb0487590885c13a3cc0a2a1450b3ac649a465de267af12f552be8bcb5fe
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/script/respond.min.js
pragma
no-cache
cookie
__cfduid=df05a83b927fc2051de9a57491904c1941550065850; darkreading_lastvisit=2/13/2019 8:50:50 AM; cplChannelTagID=; darkreading%2Dmeter=1333825; darkreading%5Fvisits=2
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.darkreading.com
referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
:scheme
https
:method
GET
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
gzip
vary
Accept-Encoding
cf-cache-status
HIT
last-modified
Mon, 22 Sep 2014 21:04:30 GMT
server
cloudflare
x-powered-by
ASP.NET
etag
W/"03ccda8d6cf1:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
application/x-javascript
status
200
cache-control
public, max-age=7200
cf-ray
4a87c42f0afec28d-FRA
expires
Wed, 13 Feb 2019 15:50:50 GMT
jquery.mobile.custom.min.js
www.darkreading.com/script/
8 KB
3 KB
Script
General
Full URL
https://www.darkreading.com/script/jquery.mobile.custom.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
b4cf7d6d50b6a36f070f6c49e975198a9a8930838695b64e480bf1f6199f0572
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/script/jquery.mobile.custom.min.js
pragma
no-cache
cookie
__cfduid=df05a83b927fc2051de9a57491904c1941550065850; darkreading_lastvisit=2/13/2019 8:50:50 AM; cplChannelTagID=; darkreading%2Dmeter=1333825; darkreading%5Fvisits=2
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.darkreading.com
referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
:scheme
https
:method
GET
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
gzip
vary
Accept-Encoding
cf-cache-status
HIT
last-modified
Mon, 22 Sep 2014 21:04:30 GMT
server
cloudflare
x-powered-by
ASP.NET
etag
W/"03ccda8d6cf1:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
application/x-javascript
status
200
cache-control
public, max-age=7200
cf-ray
4a87c42f0affc28d-FRA
expires
Wed, 13 Feb 2019 15:50:50 GMT
complete.js
twimgs.com/nojitter/js/
45 KB
9 KB
Script
General
Full URL
https://twimgs.com/nojitter/js/complete.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
8420f59cd348cf0e10e05482724523ad6b83f88467bbfacf6826eaadd3a03985

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 05 May 2017 06:04:53 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
4a87c42f6a82977a-FRA
expires
Thu, 14 Feb 2019 13:50:50 GMT
jquery-1.11.min.js
twimgs.com/nojitter/js/
94 KB
32 KB
Script
General
Full URL
https://twimgs.com/nojitter/js/jquery-1.11.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
b294e973896f8f874e90a8eb1a8908ac790980d034c4c4bdf0fc3d37b8abf682

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 05 May 2017 06:05:04 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
4a87c42f6a83977a-FRA
expires
Thu, 14 Feb 2019 13:50:50 GMT
darkreading.js
twimgs.com/nojitter/darkreading/
27 KB
4 KB
Script
General
Full URL
https://twimgs.com/nojitter/darkreading/darkreading.js?v9
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
c5a37d18a14fb428d01bfe23b0e28db9b7a189e886513a7098683cb01f0929ee

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Mon, 23 Apr 2018 13:44:42 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
4a87c42f6a84977a-FRA
expires
Thu, 14 Feb 2019 13:50:50 GMT
VisitorAPI.js
epromos.ubmcanon.com/
45 KB
15 KB
Script
General
Full URL
https://epromos.ubmcanon.com/VisitorAPI.js?ormzkk
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:552 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
aa92b44ae441805b86a9603ffea3890a8df348fb2269d716c557b6970c11e9f4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Tue, 24 Apr 2018 23:42:00 GMT
server
cloudflare
etag
W/"1010b6-b435-56aa0b35ea1a3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=14400
cf-ray
4a87c42f79c8975c-FRA
expires
Wed, 13 Feb 2019 17:50:50 GMT
at.js
epromos.ubmcanon.com/
106 KB
32 KB
Script
General
Full URL
https://epromos.ubmcanon.com/at.js?ormzkk
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:552 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
42eb48be2f9f6fc91fcda10af9802cb6aa0733e2dd007c224570ae6ece3dac33

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 12 Apr 2018 15:42:52 GMT
server
cloudflare
etag
W/"1000c4-1a7c1-569a89bca3df7"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=14400
cf-ray
4a87c42f79ca975c-FRA
expires
Wed, 13 Feb 2019 17:50:50 GMT
jplayer.blue.monday.css
twimgs.com/nojitter/css/
12 KB
3 KB
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/jplayer.blue.monday.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
0a4f12795a11d0957a7e476cdd2516967e3e00f54841456fbd8c0dd607984d92

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 05 May 2017 07:28:28 GMT
server
cloudflare
etag
W/"2f89-54ec1d5e89f00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=14400
cf-ray
4a87c42f6a80977a-FRA
expires
Wed, 13 Feb 2019 17:50:50 GMT
style.css
twimgs.com/nojitter/css/
912 B
393 B
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/style.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
3a08be5766c0e198ba8171f7decd09065c08a5c850276325cc1792f25e7b356e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 05 May 2017 07:30:36 GMT
server
cloudflare
etag
W/"390-54ec1dd89bf00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=14400
cf-ray
4a87c42f6a81977a-FRA
expires
Wed, 13 Feb 2019 17:50:50 GMT
jquery.jplayer.min.js
twimgs.com/nojitter/js/
48 KB
11 KB
Script
General
Full URL
https://twimgs.com/nojitter/js/jquery.jplayer.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
cddbf405266cd4b3e66229592e63666012dbceaaad02635af5da9d303bfd3ed1

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 27 Apr 2017 11:20:55 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
4a87c42f6a86977a-FRA
expires
Thu, 14 Feb 2019 13:50:50 GMT
jquery.tablesorter.min.js
twimgs.com/nojitter/js/
16 KB
5 KB
Script
General
Full URL
https://twimgs.com/nojitter/js/jquery.tablesorter.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
b90279154254e108748dc80dd226eab336e2c320e4a40569952b46dc5d785536

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 27 Apr 2017 11:21:05 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
4a87c42f6a87977a-FRA
expires
Thu, 14 Feb 2019 13:50:50 GMT
ubm-widget-style.css
dsimg.ubm-us.net/ubm-widget/css/
29 KB
5 KB
Stylesheet
General
Full URL
https://dsimg.ubm-us.net/ubm-widget/css/ubm-widget-style.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::6818:7975 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
1e97210e22581e4b07521a644b8874bf38e72bf51fb77691c4394aecbac3081b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 11 Apr 2018 16:31:21 GMT
server
cloudflare
etag
W/"7393-569952b4c0840"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=14400
cf-ray
4a87c42f8caa96f4-FRA
expires
Wed, 13 Feb 2019 17:50:50 GMT
ubm-widget-min.js
dsimg.ubm-us.net/ubm-widget/js/
192 KB
50 KB
Script
General
Full URL
https://dsimg.ubm-us.net/ubm-widget/js/ubm-widget-min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::6818:7975 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
ffcaeef328a1e67717f714997426aaf936e4b9d378a5fbe1bd2a063dfeb50750

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 11 Apr 2018 17:29:33 GMT
server
cloudflare
etag
W/"2fe99-56995fb6fbbe3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=14400
cf-ray
4a87c42f8cac96f4-FRA
expires
Wed, 13 Feb 2019 17:50:50 GMT
ng_forms.js
www.darkreading.com/script/
31 KB
7 KB
Script
General
Full URL
https://www.darkreading.com/script/ng_forms.js?v7.9
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
c85a0459dea5ca94496b30f7dbd4121bcac56fb77bb48059e3c1906806b33f5c
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/script/ng_forms.js?v7.9
pragma
no-cache
cookie
__cfduid=df05a83b927fc2051de9a57491904c1941550065850; darkreading_lastvisit=2/13/2019 8:50:50 AM; cplChannelTagID=; darkreading%2Dmeter=1333825; darkreading%5Fvisits=2
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.darkreading.com
referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
:scheme
https
:method
GET
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
gzip
vary
Accept-Encoding
cf-cache-status
HIT
last-modified
Wed, 10 Oct 2018 09:37:18 GMT
server
cloudflare
x-powered-by
ASP.NET
etag
W/"5d057d67c60d41:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
application/x-javascript
status
200
cache-control
public, max-age=7200
cf-ray
4a87c42f0b00c28d-FRA
expires
Wed, 13 Feb 2019 15:50:50 GMT
widget-extra.css
twimgs.com/nojitter/css/
443 B
294 B
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/widget-extra.css?v1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
61494fd1b573b217034bef7e22044bda91962797d68efada6726910d32bb995b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 13 Sep 2017 07:28:37 GMT
server
cloudflare
etag
W/"1bb-5590d1ba81340"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=14400
cf-ray
4a87c42f6a7f977a-FRA
expires
Wed, 13 Feb 2019 17:50:50 GMT
render.v1.js
static.adsnative.com/static/js/
58 KB
18 KB
Script
General
Full URL
https://static.adsnative.com/static/js/render.v1.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.139.239.5 Dallas, United States, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
6f15e73a7ab391b586b6f91cc44e85f9263a80183c33a082b42dc018c71a0635

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
gzip
last-modified
Fri, 08 Feb 2019 20:30:09 GMT
server
NetDNA-cache/2.2
x-amz-request-id
2787AC0E36A24F64
etag
W/"5efd1cc923b6d16b380280fb6cfe5bd7"
x-cache
HIT
content-language
en
status
200
content-type
application/javascript
access-control-allow-origin
*
x-amz-version-id
Ifq5xn.ndxora.NMSlERCxvrnLtjLs1b
x-amz-id-2
HztpElOWyxAR5bWbRlH636qNYkyMWHlBpFm9NkdHi5lVM+mvhDWEPecJISUOu2FF0npz968ddgQ=
conversion.js
www.googleadservices.com/pagead/
24 KB
9 KB
Script
General
Full URL
https://www.googleadservices.com/pagead/conversion.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.217.21.194 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s12-in-f2.1e100.net
Software
cafe /
Resource Hash
2d1a995992a738edec851a8b6579e2805f6d4533e97218bf0b5d2da44c804b8b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
9137
x-xss-protection
1; mode=block
server
cafe
etag
11165928448987042972
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Wed, 13 Feb 2019 13:50:50 GMT
iwk-it-network-dr.gif
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/iwk-it-network-dr.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
d6df7d1f2b9c65c06c5ae1e798650b6c388f26f6852b8814f942557d712b9745

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
cf-cache-status
HIT
last-modified
Wed, 02 Nov 2016 13:53:05 GMT
server
cloudflare
etag
"abc-54051c29ab240"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
4a87c43029a8bec1-FRA
content-length
2748
DR_mobile_User_nav.png
img.deusm.com/darkreading/
1 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_mobile_User_nav.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
7b02cdb496b954e874c4b87d48eb1ea16f088258786ed0d2f0771acc3d01649e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:03 GMT
server
cloudflare
etag
"5be-4f2ebd21a06c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c43029a9bec1-FRA
content-length
1470
spacer.gif
img.deusm.com/images/
49 B
169 B
Image
General
Full URL
https://img.deusm.com/images/spacer.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
3c5b83e390d046c3623c4b8e35b58aaf64a7481bb2372fb51ae2e0e7818f7407

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Fri, 13 Oct 2000 01:54:07 GMT
server
cloudflare
etag
"31-3737c29f20dc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
4a87c4319af2bec1-FRA
content-length
49
DR_search.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_search.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
dafb72bcf008c9b9754482b88e8ba8b8e854f1a69483f0753b1c3f12101c1a9f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:03 GMT
server
cloudflare
etag
"7e9-4f2ebd21a06c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4319af3bec1-FRA
content-length
2025
DR_mobile_SM.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_mobile_SM.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
bfc1797e85a0565d0cfba1621eac801dc5ebd78a02f45e0ab8de5c6c2eb3f987

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:03 GMT
server
cloudflare
etag
"864-4f2ebd21a06c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4319af5bec1-FRA
content-length
2148
DR-sections-nav.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-sections-nav.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
4f89a03faa36f0b6eeb92b9a8f0b8d2f9d3e564ba8bf13bb169bf05b126ca81e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:03 GMT
server
cloudflare
etag
"9aa-4f2ebd21a06c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4319af6bec1-FRA
content-length
2474
mobile_close.jpg
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/mobile_close.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
b5c543f59d71e1e4f6b51c896febf86975206dcf9e34757f475b125d64d16ea6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Thu, 13 Mar 2014 12:44:20 GMT
server
cloudflare
etag
"638-4f47c4fdf5100"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
4a87c4319af7bec1-FRA
content-length
1592
DR_logo_314x49.png
img.deusm.com/darkreading/
7 KB
7 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_logo_314x49.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
0615fb751c4db849533b1e432f05428e307591466902876f8ab30d7873b7f38b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Mon, 15 Oct 2018 10:02:43 GMT
server
cloudflare
etag
"1b78-5784189c2b6f8"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4319af8bec1-FRA
content-length
7032
DR_Join_Interop_V2.png
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_Join_Interop_V2.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
d752f713e203c62dbc776dd030354ceb8337f0fc7cb07be2b2f905119b177221

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Thu, 20 Dec 2018 17:34:15 GMT
server
cloudflare
etag
"b2c-57d778a1893c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4319af9bec1-FRA
content-length
2860
Jai-Vijayan.jpg
img.deusm.com/informationweek/
11 KB
11 KB
Image
General
Full URL
https://img.deusm.com/informationweek/Jai-Vijayan.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2e9b6fed568a85ee88f1eb2aa1d51cb2073d907cbb0109a5dd703f0b1e5651d6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Mon, 29 Sep 2014 13:34:14 GMT
server
cloudflare
etag
"2c67-5043452972180"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
4a87c4319afabec1-FRA
content-length
11367
editor-TW.png
img.deusm.com/informationweek/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/editor-TW.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
32821e69d091e71a62b9dbefcd09516c2133b50c50a3f8d597207d9cab5d59b8

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Thu, 14 Nov 2013 19:33:41 GMT
server
cloudflare
etag
"60d-4eb2828b4cf40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4319afcbec1-FRA
content-length
1549
editor-IN.png
img.deusm.com/informationweek/
1 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/editor-IN.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e5cc2027e2da5b3d553fba6a4d2d7276aafa604001e9b0321e18d1fd62b03b3f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
REVALIDATED
last-modified
Thu, 14 Nov 2013 19:33:41 GMT
server
cloudflare
etag
"5b7-4eb2828b4cf40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4319afebec1-FRA
content-length
1463
editor-RSS.png
img.deusm.com/informationweek/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/editor-RSS.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
a8f4fa7376444ffe05d0f7b296439401fb9729bdee84d760ee6286e7b663c753

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Thu, 14 Nov 2013 19:33:41 GMT
server
cloudflare
etag
"6fa-4eb2828b4cf40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4319affbec1-FRA
content-length
1786
editor-email.png
img.deusm.com/informationweek/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/editor-email.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
190f689e0f479324a217a5ea88c1acc132b66d24b16559052d59b892ff5dcba2

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Thu, 14 Nov 2013 19:33:40 GMT
server
cloudflare
etag
"70f-4eb2828a58d00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4319b00bec1-FRA
content-length
1807
DR-comment.png
img.deusm.com/darkreading/
1011 B
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-comment.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
63484bd691450c081b848e5159315bfcd02720741d3f72a69717643d6630e578

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:02 GMT
server
cloudflare
etag
"3f3-4f2ebd20ac480"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4319b02bec1-FRA
content-length
1011
thumbs-up.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/thumbs-up.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
0c9111d9514a49ad97e7c6d5fd97a00f3232b73537e9155726f32f123eb69b5a

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Fri, 14 Mar 2014 16:09:21 GMT
server
cloudflare
etag
"607-4f4934ae90e40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4319b04bec1-FRA
content-length
1543
thumbs-down.png
img.deusm.com/informationweek/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/thumbs-down.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
b19f14d674857362b6e10d0dcb1703b149d9dda6f350d1737562fc36e4e67a81

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Wed, 20 Nov 2013 19:20:31 GMT
server
cloudflare
etag
"624-4eba0acaa9dc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4319b05bec1-FRA
content-length
1572
email-decode.min.js
www.darkreading.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/
1 KB
807 B
Script
General
Full URL
https://www.darkreading.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2595496fe48df6fcf9b1bc57c29a744c121eb4dd11566466bc13d2e52e6bbcc8
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js
pragma
no-cache
cookie
__cfduid=df05a83b927fc2051de9a57491904c1941550065850; darkreading_lastvisit=2/13/2019 8:50:50 AM; cplChannelTagID=; darkreading%2Dmeter=1333825; darkreading%5Fvisits=2; AMCV_77FB1CFE532B22840A490D45%40AdobeOrg=-330454231%7CMCIDTS%7C17941%7CvVersion%7C3.1.2; check=true; piddlNGSiteReferer=/; piddlNGPageReferer=/
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.darkreading.com
referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
:scheme
https
:method
GET
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
gzip
vary
Accept-Encoding
last-modified
Mon, 11 Feb 2019 17:08:51 GMT
server
cloudflare
etag
W/"5c61ac23-4d7"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
application/javascript
status
200
cache-control
max-age=172800 public
cf-ray
4a87c4304fa3c28d-FRA
expires
Fri, 15 Feb 2019 13:50:50 GMT
widgets.js
platform.twitter.com/
93 KB
28 KB
Script
General
Full URL
https://platform.twitter.com/widgets.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40B6) /
Resource Hash
0a2a2e07304fc4451c4a4dd7bd09650439b0068cab74ee916dbd3adfd2597098

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 13 Feb 2019 13:50:50 GMT
Content-Encoding
gzip
Last-Modified
Tue, 12 Feb 2019 18:31:21 GMT
Server
ECS (fcn/40B6)
Etag
"fea26becff163da78dd1cdd52ecc6adc+gzip"
Vary
Accept-Encoding
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Cache-Control
public, max-age=1800
Content-Type
application/javascript; charset=utf-8
Content-Length
28030
flipboard_srsw.png
cdn.flipboard.com/badges/
322 B
743 B
Image
General
Full URL
https://cdn.flipboard.com/badges/flipboard_srsw.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:200d:a00:e:5a70:ca47:86e1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
44fc0a3d10c47ae5aa6c77c76b4b8f81aa08022ca464ef235005ddd86570eb5b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 06:25:34 GMT
via
1.1 d6fa2e1de8f392301c10fd5bb7b263c3.cloudfront.net (CloudFront)
last-modified
Wed, 07 Feb 2018 22:03:59 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
atime:1518040945/ctime:1518040834/gid:20/gname:staff/md5:37351783e1813119a3e0710c16137273/mode:33152/mtime:1518064798/uid:502/uname:jlee
age
45845
etag
"37351783e1813119a3e0710c16137273"
x-cache
Hit from cloudfront
content-type
image/png
status
200
accept-ranges
bytes
content-length
322
x-amz-cf-id
GtX22nVaeBM46gsBnAneQsSGWhG0hoLVvyvZKV69X8lojAiz9yKP9A==
flbuttons.min.js
cdn.flipboard.com/web/buttons/js/
7 KB
4 KB
Script
General
Full URL
https://cdn.flipboard.com/web/buttons/js/flbuttons.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:200d:a00:e:5a70:ca47:86e1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
8e7ad8de87781f6ad65b36a7d3243b44d80dc182df6af076484a2bec85051550

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 03:54:50 GMT
content-encoding
gzip
last-modified
Wed, 11 Oct 2017 00:24:00 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:502/gname:staff/uname:alee/gid:20/mode:33188/mtime:1507680760/atime:1507680783/md5:ec6e4306e5e274d25c4f9afde663da81/ctime:1507680760
age
49068
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-id
Oat39eGxKs33fsBLTTrU_jR894pXiNerun-_X5MCJYjbk88QU1wuRA==
via
1.1 d6fa2e1de8f392301c10fd5bb7b263c3.cloudfront.net (CloudFront)
in.js
platform.linkedin.com/xdoor/scripts/
Redirect Chain
  • https://platform.linkedin.com/in.js
  • https://platform.linkedin.com/xdoor/scripts/in.js
181 KB
55 KB
Script
General
Full URL
https://platform.linkedin.com/xdoor/scripts/in.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:2bf::25eb , European Union, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
Play /
Resource Hash
716e923952d922da8287eef6ce8647cedda95148861e0a38e31caf065551764c

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 13 Feb 2019 13:50:51 GMT
Content-Encoding
gzip
Server
Play
X-CDN
AKAM
Vary
Accept-Encoding
Connection
keep-alive
X-Li-Fabric
prod-lsg1
X-LI-Proto
http/1.1
X-Li-Pop
prod-ela1
Content-Type
text/javascript; charset=UTF-8
Content-Length
55949
X-LI-UUID
PIn3Tmy/fxXgqSgpwSoAAA==

Redirect headers

Date
Wed, 13 Feb 2019 13:50:51 GMT
Content-Encoding
gzip
Server
Apache-Coyote/1.1
X-CDN
AKAM
Vary
Accept-Encoding
Connection
keep-alive
P3P
CP="CAO CUR ADM DEV PSA PSD OUR"
Location
https://platform.linkedin.com/xdoor/scripts/in.js
X-LI-Proto
http/1.1
X-Li-Pop
prod-efr5
Content-Length
20
X-LI-UUID
K0Qf0K3wghXgkKOTvyoAAA==
X-Li-Fabric
prod-lva1
INT19-Logo-HorizDates-3035.png
img.deusm.com/darkreading/MarilynCohodas/
7 KB
7 KB
Image
General
Full URL
https://img.deusm.com/darkreading/MarilynCohodas/INT19-Logo-HorizDates-3035.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
f95e67a383d9303db5f3d27bb1e8d0a155f881dbd89edf15cda37fba28e67bc1

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Fri, 01 Feb 2019 18:57:42 GMT
server
cloudflare
etag
"1cc4-580d9b7b67744"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4319b06bec1-FRA
content-length
7364
John-Callahan.png
img.deusm.com/darkreading/authors/
26 KB
26 KB
Image
General
Full URL
https://img.deusm.com/darkreading/authors/John-Callahan.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
bb41afff810be9b376512c29ec49a60368d86d3866bdee6ee6119a024b053ce3

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Fri, 08 Feb 2019 21:46:39 GMT
server
cloudflare
etag
"6946-58168e4d06dc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4319b07bec1-FRA
content-length
26950
Kelly_Jackson_Higgins.jpg
twimgs.com/nojitter/informationweek/resources/images/
23 KB
24 KB
Image
General
Full URL
https://twimgs.com/nojitter/informationweek/resources/images/Kelly_Jackson_Higgins.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
bf298157a19ff06a7b27a36eb4a3be2994016452a5f9c1ad6b480aa7ce3799ff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Wed, 12 Jul 2017 11:38:18 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
cache-control
public, max-age=86400
accept-ranges
bytes
cf-ray
4a87c4319e76977a-FRA
content-length
24037
expires
Thu, 14 Feb 2019 13:50:51 GMT
NL-icon.png
img.deusm.com/informationweek/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/informationweek/NL-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
d8b7ea5cc75abc79d502a95c5ccac8f97aa82fd8c13acc74c84c754eb86cc4c3

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Fri, 08 Nov 2013 15:09:43 GMT
server
cloudflare
etag
"a27-4eaabc5a3dbc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4319b08bec1-FRA
content-length
2599
ubm-tech.png
img.deusm.com/darkreading/
7 KB
7 KB
Image
General
Full URL
https://img.deusm.com/darkreading/ubm-tech.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
7b6908c1ddefad4b526966ba3f51d6e03f1f40747b658fbe64b9e3471ce6faf8

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Tue, 25 Feb 2014 18:55:37 GMT
server
cloudflare
etag
"1cb3-4f33fa2395c40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4319b0bbec1-FRA
content-length
7347
video-arrow_left_off.gif
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/video-arrow_left_off.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
9f61400081191bf755c967c186a8fd356b02010fac3412f84cf83d5dfe10dd5d

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Fri, 14 Mar 2014 16:02:37 GMT
server
cloudflare
etag
"53e-4f49332d48140"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
4a87c4319b0cbec1-FRA
content-length
1342
id
dpm.demdex.net/
362 B
1 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=3.1.2&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_orgid=77FB1CFE532B22840A490D45%40AdobeOrg&d_nsid=0&ts=1550065850880
Requested by
Host: epromos.ubmcanon.com
URL: https://epromos.ubmcanon.com/VisitorAPI.js?ormzkk
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.250.76.236 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-250-76-236.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
8e25d5f3b746891acdb0516a9c8e25d314825e1f82b2e33d8cd27811a77ccb0c

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Origin
https://www.darkreading.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v018-067003a32.edge-irl1.demdex.com 5.47.3.20190129122145 3ms
Pragma
no-cache
Content-Encoding
gzip
X-TID
W9Qu44iFRxU=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://www.darkreading.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
300
Expires
Thu, 01 Jan 1970 00:00:00 GMT
api.js
www.google.com/recaptcha/
833 B
565 B
Script
General
Full URL
https://www.google.com/recaptcha/api.js?onload=rcCallback&render=explicit
Requested by
Host: dsimg.ubm-us.net
URL: https://dsimg.ubm-us.net/ubm-widget/js/ubm-widget-min.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81d::2004 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
GSE /
Resource Hash
7dc493f36acfb1da786b136f37286e72c1207e2e1d8d966586c1cbd2ccce05b1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
GSE
x-frame-options
SAMEORIGIN
content-type
text/javascript; charset=UTF-8
status
200
cache-control
private, max-age=300
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
468
x-xss-protection
1; mode=block
expires
Wed, 13 Feb 2019 13:50:51 GMT
ga.js
ssl.google-analytics.com/
45 KB
17 KB
Script
General
Full URL
https://ssl.google-analytics.com/ga.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81e::2008 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
1259ea99bd76596239bfd3102c679eb0a5052578dc526b0452f4d42f8bcdd45f
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 16 Jan 2019 20:01:45 GMT
server
Golfe2
age
5421
date
Wed, 13 Feb 2019 12:20:30 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
17168
expires
Wed, 13 Feb 2019 14:20:30 GMT
gpt.js
www.googletagservices.com/tag/js/
30 KB
10 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81c::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8917d4a75d0f49ff718e5a39aeea39df6f461bb675fd9f1c323a615e1759db02
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"81 / 960 of 1000 / last-modified: 1549987828"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
10174
x-xss-protection
1; mode=block
expires
Wed, 13 Feb 2019 13:50:50 GMT
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/0ad17f2e-83b0-4817-9f85-83bb523f6066/main/160x90/2m39s29ms/match/
4 KB
5 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/0ad17f2e-83b0-4817-9f85-83bb523f6066/main/160x90/2m39s29ms/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.212.151 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
9c03ac026e206115e0583f90338c9dcb06ea48ad5241067a166a1c394f9ee591

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 13 Feb 2019 04:11:03 GMT
Via
1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
Age
34788
X-Powered-From
us-east-1c
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
wbdFUsZ9EVnx-FyxTQ4qaJAZlUCjywpNunl8B8-iBEh5vXiddDjDlQ==
comment.png
img.deusm.com/informationweek/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/informationweek/comment.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
4f65ccd30d1c95588b51035a804dd49090d7fbe6c2829a576a31d1b6a3e0f86b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Wed, 20 Nov 2013 19:22:53 GMT
server
cloudflare
etag
"446-4eba0b5215d40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4319b0ebec1-FRA
content-length
1094
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/a8e7c148-a432-459e-8181-ba378d8da6c1/1e828d79-2292-4df0-835e-ce200355dc3e/160x90/match/
3 KB
3 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/a8e7c148-a432-459e-8181-ba378d8da6c1/1e828d79-2292-4df0-835e-ce200355dc3e/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.212.151 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
9dc3847fd8d296e1570d5b6752b4d9e3044993257b2f0e4bd5cfdedcf61e0f59

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 15:12:14 GMT
Via
1.1 befe3b8553d90339ecf78e5d7cefa60b.cloudfront.net (CloudFront)
Age
81517
X-Powered-From
us-east-1a
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
oHcQ0bpjGcZVO02FlzTHSWCnsQhswd6fDyQgjJ4F2l_ml0_3NGraAA==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/7882da0f-da1d-4785-96ab-c55ef8ee63de/a3978046-d9ef-4024-aa8d-eae6b8da0f45/160x90/match/
3 KB
3 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/7882da0f-da1d-4785-96ab-c55ef8ee63de/a3978046-d9ef-4024-aa8d-eae6b8da0f45/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.212.151 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
7e92cb972a0c5c33a960ba9135f7542284b23c9e51fba36b3ae77dd170fd65c5

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 15:12:15 GMT
Via
1.1 c90147ea5199ff7ce77981c8da4247c4.cloudfront.net (CloudFront)
Age
81516
X-Powered-From
us-east-1d
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
1JbmSopDY92M115zJdLuwWiEqc-XciKo8SUtdyvY1kTNeaenLg0uuA==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/f2fdd737-6d3e-4c36-a8b8-cdacb607bc8a/5de61e8d-e394-4f66-a277-4278da525064/160x90/match/
3 KB
3 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/f2fdd737-6d3e-4c36-a8b8-cdacb607bc8a/5de61e8d-e394-4f66-a277-4278da525064/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.212.151 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
7bfeae359d7815e91aee4eaa70e8b803b785c2b9ef4fbbda9eca1311274126d4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 15:12:15 GMT
Via
1.1 1f5757b46371746e677236d4fc67d364.cloudfront.net (CloudFront)
Age
81516
X-Powered-From
us-east-1c
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
4CUELIGbE068AvZ5ududPjWg_2Drbui2Ij_9moZX4FK4dPjgO1TL-A==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/dd1f5a44-3ec8-465b-9575-a274ea802b3c/079b60eb-4986-4356-a850-c0cc7167e762/160x90/match/
3 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/dd1f5a44-3ec8-465b-9575-a274ea802b3c/079b60eb-4986-4356-a850-c0cc7167e762/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.212.151 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
132e19a7feb870e59a7fd2266b90a0229d4c0f98479999303f1a5c6a2d13120f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 15:12:15 GMT
Via
1.1 d16428714e022976873ccc980fdc1289.cloudfront.net (CloudFront)
Age
81516
X-Powered-From
us-east-1d
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
jmSBAlb2I4GP3lPDvfmykRtsguWZelOLchjmcyJIo67wuxDacS5IYQ==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/b7a6fca4-04fb-4b07-9017-1025e92ceee0/57da7b4a-c38e-4c02-8d4c-bab6d1d9364e/160x90/match/
2 KB
3 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/b7a6fca4-04fb-4b07-9017-1025e92ceee0/57da7b4a-c38e-4c02-8d4c-bab6d1d9364e/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.212.151 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
4a6857f46af89d2160c950fdacccafa7d00bec93f38c90779708dc0c0625d3ed

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 15:12:15 GMT
Via
1.1 3f6fbf009bb5cf969f92ba2e59576614.cloudfront.net (CloudFront)
Age
81516
X-Powered-From
us-east-1e
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
87pCsRGqq6ev3ZXZk1_TH3J0iyw6sxLtXMnl0QczRdMN4TBkSAXOZw==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/92828275-2d5a-4358-8803-5b8da5885232/d3c87fc5-0a46-495f-b10a-64720cfb95fe/160x90/match/
3 KB
3 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/92828275-2d5a-4358-8803-5b8da5885232/d3c87fc5-0a46-495f-b10a-64720cfb95fe/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.212.151 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
e4a73b26661f72b70c74a515c07c380f9cd673b037fd0def630c9d6ac8229fce

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 15:12:15 GMT
Via
1.1 c90147ea5199ff7ce77981c8da4247c4.cloudfront.net (CloudFront)
Age
81515
X-Powered-From
us-east-1c
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
5qSzpdD5HfxhQs6b08xnsxFInbVozBjXOrzjc_MVCeUK1z5WltfOTg==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/ecfa4cdd-511e-40f8-8c90-ea48f3c490b0/4f7f5dd1-0228-42ce-b696-155d552e5288/160x90/match/
3 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/ecfa4cdd-511e-40f8-8c90-ea48f3c490b0/4f7f5dd1-0228-42ce-b696-155d552e5288/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.212.151 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
60f84e180d9241f98dfaac54fc319fff8be52a2977f9959b564d842ee8bc04c6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 15:12:16 GMT
Via
1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
Age
81515
X-Powered-From
us-east-1d
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
0B_1MWRqS0p2WPJcLZWLgoxKOY4tjxDM1vq9VE0fZIOudduJbcuKDA==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/177ffcf5-f5e4-4b90-b127-872357b2d82d/8bfde697-77bd-4f22-8796-7f222e0b216f/160x90/match/
3 KB
3 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/177ffcf5-f5e4-4b90-b127-872357b2d82d/8bfde697-77bd-4f22-8796-7f222e0b216f/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.212.151 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
f114c01e65a025ba9b36cecae835b7d85bfaf27100a49d225b27414ca14a0bae

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 13 Feb 2019 05:32:24 GMT
Via
1.1 d16428714e022976873ccc980fdc1289.cloudfront.net (CloudFront)
Age
29907
X-Powered-From
us-east-1a
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
lX_kpU-GQJxygWeIJG9NQPtVmz1EOTcwP9epV2v9OuOgErzT0ndexg==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/987ef41f-4071-4272-8ebc-7f113239e5d4/f022d7c9-b480-4a31-a4fc-af5ba23c8a30/160x90/match/
3 KB
3 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/987ef41f-4071-4272-8ebc-7f113239e5d4/f022d7c9-b480-4a31-a4fc-af5ba23c8a30/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.212.151 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
e7c11470406c01438564eeb2d76119d52470d572f5ae04b39cea9cc4e5ee6022

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 14:35:15 GMT
Via
1.1 3f6fbf009bb5cf969f92ba2e59576614.cloudfront.net (CloudFront)
Age
83736
X-Powered-From
us-east-1c
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
YjR0WAGs-NlT69bqQBhkkpXddZN6pmSFOVqgDeI4Uz03jFY_ov8zLg==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/c5a884f5-d10e-4b06-8f7e-6bc54379fe32/92db0e1c-64d8-428c-95ed-6066339ada8e/160x90/match/
3 KB
3 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/c5a884f5-d10e-4b06-8f7e-6bc54379fe32/92db0e1c-64d8-428c-95ed-6066339ada8e/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.212.151 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
9860a8d4dad7b5dcc531c5ec839274a273a05786ad6b74d08d8199259bfa4509

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 14:35:15 GMT
Via
1.1 befe3b8553d90339ecf78e5d7cefa60b.cloudfront.net (CloudFront)
Age
83736
X-Powered-From
us-east-1d
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
UPheVZ6ruWBvn4FibNZ8AlhqSbqApk2XO0LIH5oFc8QWbfiLKuvoNA==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/c5023478-5b52-410d-866c-439728d041a1/main/160x90/1m22s389ms/match/
3 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/c5023478-5b52-410d-866c-439728d041a1/main/160x90/1m22s389ms/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.212.151 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
9b25230c2a3962d55b1535f6f8aa484d04b5d9f9164c0b9b698ab319604ec778

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 19:03:15 GMT
Via
1.1 1f5757b46371746e677236d4fc67d364.cloudfront.net (CloudFront)
Age
67656
X-Powered-From
us-east-1a
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
rU5fzAMLhPgLPQsvnamwtYK3dZn8E3LxaAliW-LU6G0wCTZrxqVQow==
video-arrow_right_on.gif
img.deusm.com/darkreading/
2 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/video-arrow_right_on.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
c7d1ee4f5a608fa05b8f9c6cbd47e3eab7516facc3380d704b7332805877afff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Fri, 14 Mar 2014 15:55:19 GMT
server
cloudflare
etag
"9f7-4f49318b927c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
4a87c4319b0fbec1-FRA
content-length
2551
JK-February-self-drivingcar.jpg
img.deusm.com/darkreading/MarilynCohodas/
172 KB
172 KB
Image
General
Full URL
https://img.deusm.com/darkreading/MarilynCohodas/JK-February-self-drivingcar.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
5580503887258e90db4ce59e8a65c69e07b63a92ec91286b9fd29bc3dd0be4c6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Fri, 08 Feb 2019 13:40:24 GMT
server
cloudflare
etag
"2af2a-5816219d94200"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
4a87c4319b10bec1-FRA
content-length
175914
DR19_Feb1_Thumbnail.JPG
dsimg.ubm-us.net/asset/405503/591693/
58 KB
59 KB
Image
General
Full URL
https://dsimg.ubm-us.net/asset/405503/591693/DR19_Feb1_Thumbnail.JPG
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::6818:7975 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
46b2c6207ab97c409fe0e2713f0d83551beb7f71a827ccd96a1efea231b08874

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Thu, 07 Feb 2019 19:38:02 GMT
server
cloudflare
etag
"e9a3-58152fb00faea"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
cache-control
public, max-age=14400
accept-ranges
bytes
cf-ray
4a87c4319fd896f4-FRA
content-length
59811
expires
Wed, 13 Feb 2019 17:50:51 GMT
survey_jspage.asp
www.darkreading.com/
7 KB
1 KB
Script
General
Full URL
https://www.darkreading.com/survey_jspage.asp?survey_id=130&cbust=45494
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
3f425dd0b2d02d28484158627724fd7f108100abed86656ae430d3f820f3068c
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/survey_jspage.asp?survey_id=130&cbust=45494
pragma
no-cache
cookie
__cfduid=df05a83b927fc2051de9a57491904c1941550065850; darkreading_lastvisit=2/13/2019 8:50:50 AM; cplChannelTagID=; darkreading%2Dmeter=1333825; darkreading%5Fvisits=2; check=true; piddlNGSiteReferer=/; piddlNGPageReferer=/; AMCVS_77FB1CFE532B22840A490D45%40AdobeOrg=1; AMCV_77FB1CFE532B22840A490D45%40AdobeOrg=-330454231%7CMCIDTS%7C17941%7CMCMID%7C48465313890171263150921289782209655055%7CMCAAMLH-1550670651%7C6%7CMCAAMB-1550670651%7C6G1ynYcLPuiQxYZrsz_pkqfLG9yMXBpb2zX5dvJdYQJzPXImdj0y%7CMCOPTOUT-1550073051s%7CNONE%7CvVersion%7C3.1.2
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.darkreading.com
referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
:scheme
https
:method
GET
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
content-encoding
gzip
server
cloudflare
x-frame-options
SAMEORIGIN
x-powered-by
ASP.NET
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/html
status
200
cache-control
private
set-cookie
darkreading_lastvisit=2/13/2019 8:50:51 AM; expires=Mon, 13-Feb-2034 12:50:51 GMT; path=/; HttpOnly darkreading%5Fvisits=3; expires=Mon, 13-Feb-2034 05:00:00 GMT; path=/
cf-ray
4a87c4311a62c28d-FRA
DRR_ENT.JPG
twimgs.com/custom_content/
191 KB
191 KB
Image
General
Full URL
https://twimgs.com/custom_content/DRR_ENT.JPG
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
d07f1ea820b5b946f4baf83c9ca81fda8b8f43d3271ae124caf04572352fa806

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Fri, 30 Nov 2018 14:18:47 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
cache-control
public, max-age=86400
accept-ranges
bytes
cf-ray
4a87c4319e78977a-FRA
content-length
195490
expires
Thu, 14 Feb 2019 13:50:51 GMT
DR-bug.png
img.deusm.com/darkreading/
1 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-bug.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
f30d5c0433d74c8224a2343a3c6c08468015909c22315b8693f9bdee33f48217

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:01 GMT
server
cloudflare
etag
"5d2-4f2ebd1fb8240"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4319b12bec1-FRA
content-length
1490
dr-footer-logo-new.jpg
img.deusm.com/darkreading/
5 KB
5 KB
Image
General
Full URL
https://img.deusm.com/darkreading/dr-footer-logo-new.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
04f784c83e6dde0588704c7fcc52d62e657f5b09012bb62a1d309d3adc774306

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Wed, 09 Nov 2016 07:03:32 GMT
server
cloudflare
etag
"125e-540d8dad41900"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
4a87c4319b14bec1-FRA
content-length
4702
footergreyblack.css
twimgs.com/nojitter/css/
3 KB
756 B
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/footergreyblack.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
4587735e3d5dc5ef5149eae835aeb69f971575da9d4a293d9bffbb1dc25afa6b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 27 Apr 2017 10:50:58 GMT
server
cloudflare
etag
W/"d11-54e23bb5fe880"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=14400
cf-ray
4a87c4305c3c977a-FRA
expires
Wed, 13 Feb 2019 17:50:50 GMT
UBM_Logo_PMS669.png
img.deusm.com/images/
1 KB
2 KB
Image
General
Full URL
https://img.deusm.com/images/UBM_Logo_PMS669.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
902118c5436b3d46d79f44c3f8e7012eb9acc9b4b341e034e7bf0259aca4b425

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Thu, 16 Feb 2017 13:10:17 GMT
server
cloudflare
etag
"5c4-548a584b7e040"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4319b19bec1-FRA
content-length
1476
pubads_impl_304.js
securepubads.g.doubleclick.net/gpt/
181 KB
62 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_304.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
sffe /
Resource Hash
6061ca4458ac2c7a98079ea2a806a90e8e497424a3526158c6685920eb44defe
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 04 Feb 2019 18:27:59 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
63419
x-xss-protection
1; mode=block
expires
Wed, 13 Feb 2019 13:50:51 GMT
integrator.sync.js
adservice.google.de/adsid/
113 B
178 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.sync.js?domain=www.darkreading.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81a::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ea03bfd7fdda1eac185ebc3e8e74b33065b04c8e0adc48cbbd4136748dbd2742
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:50 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
108
x-xss-protection
1; mode=block
id
ubmtech.d3.sc.omtrdc.net/
3 B
344 B
XHR
General
Full URL
https://ubmtech.d3.sc.omtrdc.net/id?d_visid_ver=3.1.2&d_fieldgroup=A&mcorgid=77FB1CFE532B22840A490D45%40AdobeOrg&mid=48465313890171263150921289782209655055&ts=1550065851012
Requested by
Host: epromos.ubmcanon.com
URL: https://epromos.ubmcanon.com/VisitorAPI.js?ormzkk
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.82.228.18 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
*.d3.sc.omtrdc.net
Software
Omniture DC /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Origin
https://www.darkreading.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Date
Wed, 13 Feb 2019 13:50:51 GMT
Server
Omniture DC
xserver
www7155
Vary
Origin
X-C
ms-6.6.0
P3P
CP="This is not a P3P policy"
Access-Control-Allow-Origin
https://www.darkreading.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/x-javascript
Content-Length
3
ibs:dpid=411&dpuuid=XGQguwAADuHW6hKk
dpm.demdex.net/
Redirect Chain
  • https://cm.everesttech.net/cm/dd?d_uuid=55984599095969247600160716791589539836
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=XGQguwAADuHW6hKk
42 B
769 B
Image
General
Full URL
https://dpm.demdex.net/ibs:dpid=411&dpuuid=XGQguwAADuHW6hKk
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.250.76.236 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-250-76-236.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

DCS
dcs-prod-irl1-v018-007c886b8.edge-irl1.demdex.com 5.47.3.20190129122145 4ms
Pragma
no-cache
X-TID
Q19M8V85SfE=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT

Redirect headers

Date
Wed, 13 Feb 2019 13:50:51 GMT
Server
AMO-cookiemap/1.1
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Location
https://dpm.demdex.net/ibs:dpid=411&dpuuid=XGQguwAADuHW6hKk
Cache-Control
no-cache
Connection
Keep-Alive
Keep-Alive
timeout=15,max=100
Content-Length
0
elqCfg.js
twimgs.com/informationweek/elqNow/
3 KB
1 KB
Script
General
Full URL
https://twimgs.com/informationweek/elqNow/elqCfg.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
45e31bcb4f072d9f442333ad139c3085bcf881955711d866035342f3028f4558

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 04 May 2011 21:27:53 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
4a87c4319e70977a-FRA
expires
Thu, 14 Feb 2019 13:50:51 GMT
elqImg.js
twimgs.com/informationweek/elqNow/
713 B
397 B
Script
General
Full URL
https://twimgs.com/informationweek/elqNow/elqImg.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
c94ad448b05002218551938d40e2baf3617a3d56a4455729d84993a5b7b311cf

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Mon, 28 Oct 2013 20:43:21 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
4a87c4319e73977a-FRA
expires
Thu, 14 Feb 2019 13:50:51 GMT
dev_adBlockerTrack.js
twimgs.com/nojitter/js/
2 KB
763 B
Script
General
Full URL
https://twimgs.com/nojitter/js/dev_adBlockerTrack.js?v1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
d9053ec3a7a0bdbdcb96173299c0ba89bc15f3134849fff570e37d6322676304

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 14 Feb 2018 09:08:10 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
4a87c4319e74977a-FRA
expires
Thu, 14 Feb 2019 13:50:51 GMT
ubm-tech-global-app-measurement.js
epromos.ubmcanon.com/s_code/
56 KB
20 KB
Script
General
Full URL
https://epromos.ubmcanon.com/s_code/ubm-tech-global-app-measurement.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:552 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
924b3a471d549de6251aea0e74fe6eb136141d3f0a8bf001906fff933dec45d4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Sat, 14 Jul 2018 00:08:25 GMT
server
cloudflare
etag
W/"180789-df4a-570ea6525b8fa"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=14400
cf-ray
4a87c4319d22975c-FRA
expires
Wed, 13 Feb 2019 17:50:51 GMT
spacer.gif
img.deusm.com/images/
Redirect Chain
  • https://www.darkreading.com/client_pathlog.asp?p=%2Fdarkreading%2Fsection%2F314&f=%2Fdarkreading%2Fsection%2F314%2F1333825&rndserial=31850
  • https://img.deusm.com/images/spacer.gif
49 B
151 B
Image
General
Full URL
https://img.deusm.com/images/spacer.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
3c5b83e390d046c3623c4b8e35b58aaf64a7481bb2372fb51ae2e0e7818f7407

Request headers

:path
/images/spacer.gif
pragma
no-cache
cookie
__cfduid=dab6ea075fb8c655ace85d8e32cb5a5571550065850
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
img.deusm.com
referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
:scheme
https
:method
GET
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Fri, 13 Oct 2000 01:54:07 GMT
server
cloudflare
etag
"31-3737c29f20dc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
4a87c4355f87bec1-FRA
content-length
49

Redirect headers

date
Wed, 13 Feb 2019 13:50:51 GMT
server
cloudflare
status
302
x-powered-by
ASP.NET
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
text/html
location
https://img.deusm.com/images/spacer.gif
cache-control
private
set-cookie
darkreading_lastvisit=2/13/2019 8:50:51 AM; expires=Mon, 13-Feb-2034 12:50:51 GMT; path=/; HttpOnly darkreading%5Fvisits=3; expires=Mon, 13-Feb-2034 05:00:00 GMT; path=/
cf-ray
4a87c4319bf4c28d-FRA
lightreading_rating_dot_10x7.gif
img.deusm.com/lightreading/
49 B
146 B
Image
General
Full URL
https://img.deusm.com/lightreading/lightreading_rating_dot_10x7.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
3c5b83e390d046c3623c4b8e35b58aaf64a7481bb2372fb51ae2e0e7818f7407

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Wed, 25 Sep 2013 21:21:36 GMT
server
cloudflare
etag
"31-4e73bd694b800"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
4a87c4319b1abec1-FRA
content-length
49
twitter_intevol_18x18.gif
img.deusm.com/darkreading/
619 B
718 B
Image
General
Full URL
https://img.deusm.com/darkreading/twitter_intevol_18x18.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
ebe3a0272a317857bf566a0deec42181bf0e89d280bb3143bba14da1ae1ddb10

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Fri, 09 Feb 2018 10:56:35 GMT
server
cloudflare
etag
"26b-564c561c21ec0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
4a87c4319b1bbec1-FRA
content-length
619
/
api-cache.adsnative.com/v1/host/www.darkreading.com/
23 B
1016 B
Script
General
Full URL
https://api-cache.adsnative.com/v1/host/www.darkreading.com/?&callback=an_callback_lookup
Requested by
Host: static.adsnative.com
URL: https://static.adsnative.com/static/js/render.v1.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.111.11.217 Phoenix, United States, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
bec4f2f082be46c47ba8f2398813bb3c90495d69405fa0981506b1fd13ba29d6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 13 Feb 2019 13:50:51 GMT
Content-Encoding
gzip
Transfer-Encoding
chunked
X-Cache
EXPIRED
Connection
keep-alive
CF-RAY
4a87c432027b643f-FRA
Server
NetDNA-cache/2.2
Vary
Accept-Encoding, Accept-Language
Access-Control-Allow-Methods
GET, PUT, POST, DELETE, PATCH, OPTIONS
Content-Language
en
Access-Control-Allow-Origin
*
Cache-Control
max-age=900, no-cache, must-revalidate
Access-Control-Allow-Credentials
true
X-From
frontline-production-5cc6f645fd-5tn99
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Authorization
cm.gif
rudy.adsnative.com/
Redirect Chain
  • https://rudy.adsnative.com/cm.gif
  • https://ib.adnxs.com/getuid?https://rudy.adsnative.com/cm.gif?dspid=1908606746&buid=$UID&smode=1
  • https://ib.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Frudy.adsnative.com%2Fcm.gif%3Fdspid%3D1908606746%26buid%3D%24UID%26smode%3D1
  • https://rudy.adsnative.com/cm.gif?dspid=1908606746&buid=8881367182853995428&smode=1
  • https://ib.adnxs.com/getuid?https://rudy.adsnative.com/cm.gif?dspid=1830491566&buid=$UID&smode=1
  • https://rudy.adsnative.com/cm.gif?dspid=1830491566&buid=8881367182853995428&smode=1
  • https://image6.pubmatic.com/AdServer/UCookieSetPug?oid=1&rd=https%3A%2F%2Frudy.adsnative.com%2Fcm.gif%3Fdspid%3D823634934%26buid%3D%23PM_USER_ID
  • https://image6.pubmatic.com/AdServer/UCookieSetPug?oid=1&rd=https%3A%2F%2Frudy.adsnative.com%2Fcm.gif%3Fdspid%3D823634934%26buid%3D%23PM_USER_ID&rdf=1
  • https://rudy.adsnative.com/cm.gif?dspid=823634934&buid=4BC5BDC5-AB23-4CEE-BB93-8A4517F3E74F
  • https://x.bidswitch.net/sync?ssp=adsnative
  • https://x.bidswitch.net/ul_cb/sync?ssp=adsnative
  • https://rtb.mfadsrvr.com/sync?ssp=bidswitch&bidswitch_ssp_id=adsnative&bsw_user_id=499728ac-2541-4748-a556-8e26b6176e89
  • https://rtb.mfadsrvr.com/ul_cb/sync?ssp=bidswitch&bidswitch_ssp_id=adsnative&bsw_user_id=499728ac-2541-4748-a556-8e26b6176e89
  • https://x.bidswitch.net/sync?dsp_id=250&expires=14&user_id=9ec9eb15-7226-4ef9-b155-578f137aab4e&ssp=adsnative
  • https://rudy.adsnative.com/cm.gif?dspid=2015930208&buid=499728ac-2541-4748-a556-8e26b6176e89
  • https://b1sync.zemanta.com/usersync/adsnative/
  • https://b1sync.zemanta.com/usersync/adsnative/?s=2
  • https://rudy.adsnative.com/cm.gif?dspid=2147483647&buid=fn6VTCcvaRQgZpUFa4EA
42 B
308 B
Image
General
Full URL
https://rudy.adsnative.com/cm.gif?dspid=2147483647&buid=fn6VTCcvaRQgZpUFa4EA
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:f408 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:53 GMT
server
cloudflare
access-control-allow-origin
*
etag
"d5fceb6532643d0d84ffe09c40c481ecdf59e15a"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, PUT, POST, DELETE, PATCH, OPTIONS
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
cf-ray
4a87c43e3efc63b5-FRA
access-control-allow-headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Authorization
content-length
42

Redirect headers

Pragma
no-cache
Date
Wed, 13 Feb 2019 13:50:53 GMT
P3p
CP="We do not support P3P header."
Location
https://rudy.adsnative.com/cm.gif?dspid=2147483647&buid=fn6VTCcvaRQgZpUFa4EA
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
103
Expires
Thu, 01 Dec 1994 16:00:00 GMT
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.162.235 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-162-235.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d0fd74148f4cbe78bd0e6328dc5ce5955f0a0ecdb1eb2919da4a7e596ac65912

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 13 Feb 2019 13:50:51 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
901
Expires
Thu, 14 Feb 2019 13:50:51 GMT
fbevents.js
connect.facebook.net/en_US/
52 KB
16 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:216:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
222d6a37b66b79384926caa02c4dd11d56ab1d64ffb239fd5db9ebf1abfaf6b5
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
15892
x-xss-protection
0
pragma
public
x-fb-debug
LNJHLBIbWbgtbDQ9wU4G3AQVTHKf/BwW1hLDS1xI/900OWnVLGqMq9QJpbH4ZObmUDay6mkArTJO40qAPnQqkQ==
date
Wed, 13 Feb 2019 13:50:51 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
log.js
u.heatmap.it/
26 KB
10 KB
Script
General
Full URL
https://u.heatmap.it/log.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
46.105.202.39 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
/
Resource Hash
ecded18536426e30f5af01e39779ff4f66c52fd762ba75729188b80e37f7cfac

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
content-encoding
br
last-modified
Thu, 25 Oct 2018 10:53:36 GMT
x-cdn-pop-ip
137.74.120.0/27
etag
W/"5bd1a0b0-6804"
x-cacheable
Matched cache
vary
Accept-Encoding
content-type
application/x-javascript; charset=UTF-8
status
200
cache-control
max-age=2592000
x-cdn-pop
sbg
accept-ranges
bytes
content-length
10194
expires
Sat, 02 Feb 2019 04:37:22 GMT
background-pattern.png
img.deusm.com/darkreading/
493 B
569 B
Image
General
Full URL
https://img.deusm.com/darkreading/background-pattern.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_304.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
98fb88ec226feae902fb7f98528a41db7abd7de155a6d7b65658c6ab7f2b95f4

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.26
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:01 GMT
server
cloudflare
etag
"1ed-4f2ebd1fb8240"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4319b1cbec1-FRA
content-length
493
ads
securepubads.g.doubleclick.net/gampad/
82 KB
16 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3215045918303481&correlator=646962796401199&output=ldjh&callback=googletag.impl.pubads.callbackProxy1&impl=fifs&adsid=NT&json_a=1&eid=21062855%2C21062886&vrg=304&guci=1.2.0.0.2.2.0.0&plat=1%3A32776%2C2%3A32776&sc=1&sfv=1-0-32&iu_parts=2441%2Cdarkreading%2Cattacks_breaches&enc_prev_ius=%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2&prev_iu_szs=2x2%2C5x5%2C300x250%7C336x280%7C300x600%7C336x850%2C6x6%2C1x2%2C728x90%7C970x250%2C336x27%2C300x250%7C336x280%7C300x600%7C336x850%2C300x60%2C3x3%2C4x4%2C8x2%2C8x4&prev_scp=pos%3Dwelcome%7Cpos%3DTAPunit%7Cpos%3Drec1%7Cpos%3Dpromo%7Cpos%3Dwallpaper%7Cpos%3Dtop%7Cpos%3Dlogo%7Cpos%3Drec2%7Cpos%3Deventpromo%7Cpos%3Dribbon%7Cpos%3Dvideo%7Cpos%3Dnative%7Cpos%3Dinsight&cust_params=kw%3DAdvanced_Threats%252CApplications%252CAttacks%252CAttacks-Breaches%252CBreaches%26aid%3D1333825&cookie_enabled=1&bc=15&abxe=1&lmt=1550065851&dt=1550065851138&dlt=1550065850711&idt=366&frm=20&biw=1600&bih=1200&oid=2&adxs=0%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9&adys=0%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9&adks=770981021%2C2285942263%2C4220632109%2C4159207384%2C2332965166%2C2966194094%2C2269036440%2C4220632108%2C1032152201%2C885452677%2C693593060%2C929715771%2C3939335409&ucis=1%7C2%7C3%7C4%7C5%7C6%7C7%7C8%7C9%7Ca%7Cb%7Cc%7Cd&ifi=1&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&dssz=38&icsg=16106140320&std=0&csl=93&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1600x1200%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1&msz=1600x2%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1&blev=1&bisch=1&ga_vid=1059710520.1550065851&ga_sid=1550065851&ga_hid=1809966786&fws=0%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_304.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
35116dfb9cb4c6653bba64eff728e2ab6f569c3bd4ac1635e66a27f470adccaf
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Origin
https://www.darkreading.com

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
16001
x-xss-protection
1; mode=block
google-lineitem-id
140048676,4938874978,4938874978,-2,4938874978,4934390146,-2,4934824694,-2,-2,42403476,4922138532,-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
96102516636,138258449462,138258449468,-2,138258449465,138258373162,-2,138258279572,-2,-2,138212589663,138257253305,-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.darkreading.com
access-control-expose-headers
x-google-amp-ad-validated-version
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_304.js
securepubads.g.doubleclick.net/gpt/
64 KB
24 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_304.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_304.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
sffe /
Resource Hash
a29076d19205f3207fa88c9b2b7c7c2688777a7add0134ff63cd0ee4615a4a46
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 04 Feb 2019 18:27:59 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
24163
x-xss-protection
1; mode=block
expires
Wed, 13 Feb 2019 13:50:51 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-32/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-32/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_304.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Purpose
prefetch
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

json
ubm.tt.omtrdc.net/m2/ubm/mbox/
96 B
602 B
XHR
General
Full URL
https://ubm.tt.omtrdc.net/m2/ubm/mbox/json?mbox=target-global-mbox&mboxSession=2ab5af8425774a4c8b97cef434438da0&mboxPC=&mboxPage=91f2f487f84c4cc28c8315d2b45f3df2&mboxVersion=1.0.0&mboxCount=1&mboxTime=1550065851241&mboxHost=www.darkreading.com&mboxURL=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&mboxReferrer=&mboxXDomain=enabled&browserHeight=1200&browserWidth=1600&browserTimeOffset=0&screenHeight=1200&screenWidth=1600&colorDepth=24&mboxMCGVID=48465313890171263150921289782209655055&mboxAAMB=6G1ynYcLPuiQxYZrsz_pkqfLG9yMXBpb2zX5dvJdYQJzPXImdj0y&mboxMCAVID=&mboxMCGLH=6&vst.trk=ubmtech.d3.sc.omtrdc.net&vst.trks=ubmtech.d3.sc.omtrdc.net&mboxMCSDID=106FD07C4784DFBA-3A49DEA5959C00F8
Requested by
Host: epromos.ubmcanon.com
URL: https://epromos.ubmcanon.com/at.js?ormzkk
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
66.117.29.11 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
Software
/
Resource Hash
ff0c768c02b55cab739f583e1149b9199adea77cfb8b7786690bcc7562821a25

Request headers

Accept
application/json
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Origin
https://www.darkreading.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 13 Feb 2019 13:50:50 GMT
content-type
application/json;charset=UTF-8
status
200
vary
Origin, Access-Control-Request-Method, Access-Control-Request-Headers
p3p
CP="NOI DSP CURa OUR STP COM", CP="NOI DSP CURa OUR STP COM"
access-control-allow-origin
https://www.darkreading.com
cache-control
no-cache
access-control-allow-credentials
true
timing-allow-origin
*
content-length
96
x-request-id
e0315000-fb21-4481-b9c6-a0a5b4b2002e
Cookie set dest5.html
ubm.demdex.net/ Frame 536B
0
0
Document
General
Full URL
https://ubm.demdex.net/dest5.html?d_nsid=0
Requested by
Host: epromos.ubmcanon.com
URL: https://epromos.ubmcanon.com/VisitorAPI.js?ormzkk
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.86.186 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-86-186.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash

Request headers

Host
ubm.demdex.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Accept-Encoding
gzip, deflate, br
Cookie
demdex=55984599095969247600160716791589539836
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825

Response headers

Accept-Ranges
bytes
Cache-Control
max-age=21600
Content-Encoding
gzip
Content-Type
text/html
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified
Fri, 01 Feb 2019 14:36:25 GMT
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Pragma
no-cache
Set-Cookie
demdex=55984599095969247600160716791589539836;Path=/;Domain=.demdex.net;Expires=Mon, 12-Aug-2019 13:50:51 GMT;Max-Age=15552000
Vary
Accept-Encoding, User-Agent
X-TID
ZC/cmPGvR3Q=
Content-Length
2764
Connection
keep-alive
/
googleads.g.doubleclick.net/pagead/viewthroughconversion/1007530244/
2 KB
1 KB
Script
General
Full URL
https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1007530244/?random=1550065851272&cv=9&fst=1550065851272&num=1&guid=ON&resp=GooglemKTybQhCsO&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=0&u_java=false&u_nplug=0&u_nmime=0&sendb=1&frm=0&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&tiba=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...&rfmt=3&fmt=4
Requested by
Host: www.googleadservices.com
URL: https://www.googleadservices.com/pagead/conversion.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4016:80d::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
d97409cd5db877b44008db7ccf3edb51fa846c9a4648682368cf441b4061c93f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 13 Feb 2019 13:50:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
text/javascript; charset=UTF-8
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
no-cache, must-revalidate
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
988
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
bat.js
bat.bing.com/
22 KB
7 KB
Script
General
Full URL
https://bat.bing.com/bat.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
204.79.197.200 Redmond, United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
a-0001.a-msedge.net
Software
/
Resource Hash
9e03d610493a32cfa7a9750ac0c194f807c46926270e565fc8b41ee71053a52d

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
content-encoding
gzip
last-modified
Fri, 04 Jan 2019 00:35:47 GMT
x-msedge-ref
Ref A: 58D3E97B19CD425AA2EE13E666F0076A Ref B: FRAEDGE0221 Ref C: 2019-02-13T13:50:51Z
access-control-allow-origin
*
etag
"80b3316fc5a3d41:0"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
private,max-age=1800
accept-ranges
bytes
content-length
6891
all.js
connect.facebook.net/en_US/
3 KB
2 KB
Script
General
Full URL
https://connect.facebook.net/en_US/all.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:216:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
239b69061d79018b752b7216ea00585bbaf71069f1cc4059c8c6f24710291bee
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
gU/R6loO/O56lm6AMjffIQ==
status
200
vary
Accept-Encoding
content-length
1746
x-xss-protection
0
x-fb-debug
2Fxh1h2T0Pbf9k2c7tjwddNzo6ptd+1dqV5WcQskx1Dbx6XGk+IPo7YrOucZwZa7fA+agFiOIw6qCQ9mKvGlAw==
x-fb-content-md5
a8135dc59ba175376a2698a53d754ffb
date
Wed, 13 Feb 2019 13:50:51 GMT
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-FB-Content-MD5
cache-control
public,max-age=1200,stale-while-revalidate=3600
access-control-allow-credentials
true
etag
"54671989b9f8070a047bc17b88b3a714"
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
timing-allow-origin
*
expires
Wed, 13 Feb 2019 13:52:04 GMT
__utm.gif
ssl.google-analytics.com/r/
35 B
101 B
Image
General
Full URL
https://ssl.google-analytics.com/r/__utm.gif?utmwv=5.7.2&utms=1&utmn=763934328&utmhn=www.darkreading.com&utmcs=windows-1252&utmsr=1600x1200&utmvp=1585x1200&utmsc=24-bit&utmul=en-us&utmje=0&utmfl=-&utmdt=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...&utmhid=1809966786&utmr=-&utmp=%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&utmht=1550065851305&utmac=UA-30302365-1&utmcc=__utma%3D199458747.1059710520.1550065851.1550065851.1550065851.1%3B%2B__utmz%3D199458747.1550065851.1.1.utmcsr%3D(direct)%7Cutmccn%3D(direct)%7Cutmcmd%3D(none)%3B&utmjid=1062295800&utmredir=1&utmu=qBAAAAAAAAAAAAAAAAQAAAAE~
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81e::2008 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 13 Feb 2019 13:50:51 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
*
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
recaptcha__en.js
www.gstatic.com/recaptcha/api2/v1549298964057/
260 KB
90 KB
Script
General
Full URL
https://www.gstatic.com/recaptcha/api2/v1549298964057/recaptcha__en.js
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api.js?onload=rcCallback&render=explicit
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81e::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
0fa7af06f58b3f97160c0b7a1255156e5794747fb7ff51d0319b25fc0d800ec8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 10:07:31 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 05 Feb 2019 23:15:00 GMT
server
sffe
age
13400
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
92244
x-xss-protection
1; mode=block
expires
Thu, 13 Feb 2020 10:07:31 GMT
832000476880185
connect.facebook.net/signals/config/
185 KB
44 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/832000476880185?v=2.8.40&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:216:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
506dc59882896de7d75860940a7e4c3490cac59d233466f6ff4e54ad71b21434
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
45053
x-xss-protection
0
pragma
public
x-fb-debug
ZPe8c3WLAJcXkHiQo+PPw2eaoJE02cncefJb92Vf3LCRp5LLDm3ujQP7xHvkRC3q40knyNDwoX+KfynHbBthPg==
date
Wed, 13 Feb 2019 13:50:51 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
rss-icon.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/rss-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
7bb0d75d42e3ccf1a9d1a055bcddfbc23003ed3ab75bb0eb49c05ba747bce8c9

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Mon, 24 Feb 2014 16:00:47 GMT
server
cloudflare
etag
"649-4f329132149c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4330ccdbec1-FRA
content-length
1609
tw-icon.png
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/tw-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
48d211ee8f54e0f314ee98a2b63e6e470b33fb1de29d326c742be16125bda71a

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Mon, 24 Feb 2014 16:00:47 GMT
server
cloudflare
etag
"56e-4f329132149c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4330ccebec1-FRA
content-length
1390
flipboard-icon.png
img.deusm.com/darkreading/
425 B
532 B
Image
General
Full URL
https://img.deusm.com/darkreading/flipboard-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
22c53eeed2c33c21657590793b89fed83648ee555686c0e9ff90b39c1dab406f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Fri, 30 Nov 2018 12:31:36 GMT
server
cloudflare
etag
"1a9-57be0fae8ba00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4330ccfbec1-FRA
content-length
425
facebook-icon.png
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/facebook-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
4e19e8f9902a8b9ec4840aaf54110d6f502c5fb500303dc605f8776c40f7fb67

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Mon, 24 Feb 2014 16:00:47 GMT
server
cloudflare
etag
"4a9-4f329132149c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4330cd0bec1-FRA
content-length
1193
li-icon.png
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/li-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
976aabc512994a6ecc5981a85c489d1bb242ba6734b746a964d69db615f72875

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Mon, 24 Feb 2014 16:00:47 GMT
server
cloudflare
etag
"54b-4f329132149c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4330cd1bec1-FRA
content-length
1355
reb-border.png
img.deusm.com/darkreading/
331 B
453 B
Image
General
Full URL
https://img.deusm.com/darkreading/reb-border.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
523296d1a2c9a67ee707b5e0bc582f488e5786ec9b343c7b3da58a0d162d643b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Thu, 03 Nov 2016 06:29:01 GMT
server
cloudflare
etag
"14b-5405fac56e540"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4330cd3bec1-FRA
content-length
331
nav-background.png
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/nav-background.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
a6595372db2688a9dfb0991bc6cea16343042dd3caa33483b393d21a77d1c4be

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.26
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Sat, 22 Feb 2014 17:43:38 GMT
server
cloudflare
etag
"af8-4f30247448680"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c4330cd4bec1-FRA
content-length
2808
BngRUXZYTXPIvIBgJJSb6u92w7CGwR2oefDo.woff2
fonts.gstatic.com/s/robotoslab/v7/
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/robotoslab/v7/BngRUXZYTXPIvIBgJJSb6u92w7CGwR2oefDo.woff2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:817::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8c055f4fc89b73bc480ac07d607782cb3482fc98cbec6f89135ff76ce5512280
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Roboto+Slab:700
Origin
https://www.darkreading.com

Response headers

date
Tue, 12 Feb 2019 14:48:48 GMT
x-content-type-options
nosniff
last-modified
Wed, 11 Oct 2017 18:32:29 GMT
server
sffe
age
82923
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
11096
x-xss-protection
1; mode=block
expires
Wed, 12 Feb 2020 14:48:48 GMT
www.darkreading.com.js
u.heatmap.it/conf/
0
138 B
Script
General
Full URL
https://u.heatmap.it/conf/www.darkreading.com.js
Requested by
Host: u.heatmap.it
URL: https://u.heatmap.it/log.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
46.105.202.39 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
date
Wed, 13 Feb 2019 13:50:51 GMT
cache-control
max-age=60
x-cdn-pop
sbg
x-cacheable
Cacheable
x-cdn-pop-ip
137.74.120.0/27
expires
Wed, 13 Feb 2019 13:55:51 GMT
all.js
connect.facebook.net/en_US/
171 KB
53 KB
Script
General
Full URL
https://connect.facebook.net/en_US/all.js?hash=e8b83e2cd3344d6c36415d646cb6b927&ua=modern_es6
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/all.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:216:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
f14e1e926cf169699b70680a12c79825d93502e399ff668b041a666acb26c748
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
HC7GyXhH9PczdHVR9M90hA==
status
200
vary
Accept-Encoding
content-length
54387
x-xss-protection
0
x-fb-debug
LL5wrmNwcyOpKXUFcsqfB8oLo6t1vXDdfK7eBiRtai8xSiUp6ftAJ/WbzVqKcSsvFb61Z7Ijljj5gCG1OmDOqQ==
x-fb-content-md5
66fe637827c66cdc592d9f1967412462
date
Wed, 13 Feb 2019 13:50:51 GMT
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-FB-Content-MD5
cache-control
public,max-age=31536000,stale-while-revalidate=3600,immutable
access-control-allow-credentials
true
etag
"ba38bddda56fff7367bd0b3d558df9dc"
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
timing-allow-origin
*
expires
Thu, 13 Feb 2020 12:55:31 GMT
/
www.google.com/pagead/1p-user-list/1007530244/
42 B
120 B
Image
General
Full URL
https://www.google.com/pagead/1p-user-list/1007530244/?random=1550065851272&cv=9&fst=1550062800000&num=1&guid=ON&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=0&u_java=false&u_nplug=0&u_nmime=0&sendb=1&frm=0&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&tiba=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...&fmt=3&cdct=2&is_vtc=1&random=1138352440&resp=GooglemKTybQhCsO&rmt_tld=0&ipr=y
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81d::2004 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 13 Feb 2019 13:50:51 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
www.google.de/pagead/1p-user-list/1007530244/
42 B
109 B
Image
General
Full URL
https://www.google.de/pagead/1p-user-list/1007530244/?random=1550065851272&cv=9&fst=1550062800000&num=1&guid=ON&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=0&u_java=false&u_nplug=0&u_nmime=0&sendb=1&frm=0&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&tiba=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...&fmt=3&cdct=2&is_vtc=1&random=1138352440&resp=GooglemKTybQhCsO&rmt_tld=1&ipr=y
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:824::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 13 Feb 2019 13:50:51 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=3005435&ns__t=1550065851401&ns_c=windows-1252&cv=3.1&c8=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...&c7=https%3A%2F%2Fwww.darkread...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=3005435&ns__t=1550065851401&ns_c=windows-1252&cv=3.1&c8=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...&c7=https%3A%2F%2Fwww.darkrea...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=3005435&ns__t=1550065851401&ns_c=windows-1252&cv=3.1&c8=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...&c7=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&c9=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.162.235 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-162-235.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 13 Feb 2019 13:50:51 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=3005435&ns__t=1550065851401&ns_c=windows-1252&cv=3.1&c8=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...&c7=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&c9=
Pragma
no-cache
Date
Wed, 13 Feb 2019 13:50:51 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
0
bat.bing.com/action/
0
94 B
Image
General
Full URL
https://bat.bing.com/action/0?ti=5476211&Ver=2&mid=bc56ad8c-6f2d-bca2-d101-3815d6df1fe2&pi=0&lg=en-US&sw=1600&sh=1200&sc=24&tl=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...&p=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&r=&evt=pageLoad&msclkid=N&rn=556315
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
204.79.197.200 Redmond, United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
a-0001.a-msedge.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
pragma
no-cache
date
Wed, 13 Feb 2019 13:50:51 GMT
cache-control
no-cache, must-revalidate
x-msedge-ref
Ref A: FBD7EBC0C34C41D8ACB7A3EE2D2CF936 Ref B: FRAEDGE0221 Ref C: 2019-02-13T13:50:51Z
access-control-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame FA56
78 KB
29 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_304.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81c::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
ee1aa009d10739151d5d518289782456ca3e667471452e343d4cf3bc4b7a49f8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1549887464363732"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
29149
x-xss-protection
1; mode=block
expires
Wed, 13 Feb 2019 13:50:51 GMT
osd.js
www.googletagservices.com/activeview/js/current/
77 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_304.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81c::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
0cae673cc7b73e2cb3da0602cda9173bfced55705c4943460534cef380a84e7a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1549887464363732"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
28626
x-xss-protection
1; mode=block
expires
Wed, 13 Feb 2019 13:50:51 GMT
amp4ads-host-v0.js
cdn.ampproject.org/rtv/011901312147090/
19 KB
8 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011901312147090/amp4ads-host-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_304.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:825::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
c8827cfb183f6fb4c662749cbbbf49e9ed9121ffb9c812d647f1e53303bcd0ee
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
gzip
x-content-type-options
nosniff
age
402118
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
7801
x-xss-protection
1; mode=block
server
sffe
date
Fri, 08 Feb 2019 22:08:53 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"5393078a0ee95cc6"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 08 Feb 2020 22:08:53 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame D020
78 KB
29 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_304.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81c::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
ee1aa009d10739151d5d518289782456ca3e667471452e343d4cf3bc4b7a49f8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1549887464363732"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
29149
x-xss-protection
1; mode=block
expires
Wed, 13 Feb 2019 13:50:51 GMT
imgad
tpc.googlesyndication.com/pagead/
136 KB
137 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/imgad?id=CICAgKDbgNapPxABGAEyCKtedBFX23IE
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_304.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
8f55c5880399a332a42658b1de622a67bbe2c2cd4df5a748e5dfc72a2957655a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 06 Feb 2019 23:14:21 GMT
x-content-type-options
nosniff
server
cafe
age
570990
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=604800
content-disposition
attachment; filename="image.png"
content-type
image/png
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
139607
x-xss-protection
1; mode=block
expires
Wed, 13 Feb 2019 23:14:21 GMT
amp4ads-v0.js
cdn.ampproject.org/rtv/011901312147090/ Frame 8A8D
265 KB
84 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_304.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:825::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
9e9fd1ea171323698595c75eadd7c5a895e8ad172540b01fa60b5271c46acdeb
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
gzip
x-content-type-options
nosniff
age
402117
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
86206
x-xss-protection
1; mode=block
server
sffe
date
Fri, 08 Feb 2019 22:08:54 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"7f6b514b400edf5e"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 08 Feb 2020 22:08:54 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/011901312147090/v0/ Frame 8A8D
134 KB
43 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011901312147090/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_304.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:825::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
0caac85ee3e9f457831709c810d2e45f0990693126e01b38e771e99b54cf9837
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
gzip
x-content-type-options
nosniff
age
82874
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
42909
x-xss-protection
1; mode=block
server
sffe
date
Tue, 12 Feb 2019 14:49:37 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"8445f9d34b1cbd0a"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 12 Feb 2020 14:49:37 GMT
truncated
/ Frame 8A8D
213 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7468169d7feac488a4a9864b3a98f283fbae70ed2a2d27e871f90dedcb875a84

Request headers

Response headers

Content-Type
image/png
view
securepubads.g.doubleclick.net/pcs/ Frame FA56
0
261 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuTr6OLLaqhhS0XcJZTS41o_YTI2Bb-vDWCemIkH6ntnWesnyOyRlESGaHm6rUvQ45MM_F34xt1ly2cp-WZVZwUy7eqaac5DeqJYKTVBM7VL4KjHdxV0-jrMs_Nf07l8ccsAQs4-4I6XdcOtKNV0I0zzrNJsVPUANeJwWEjhcPOZJIYvbzEOXMnUBGkjAjBzl3X1SVn4OpxHKdIJFe8nyN7y0YskiUaWE16lH6ksig82v0h2IqCiSCWxSB5pCzD54VdI1cN303iw7jLgk5-Auj8i9lQVItAC41ezqrde-W97wI78XOzLDQ7YADg-w&sai=AMfl-YQsSK-PPbOnLEprqTkWzIOjG_c06IHesncSJHB-W4oHaMp_TeK7ZoeSwtTjcmO7TOjC0zrvW5L8rlnXgZb3jTCY3f1fWax7iKN-Hmr9OA&sig=Cg0ArKJSzL5V_WIRH7YqEAE&urlfix=1&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
0
x-xss-protection
1; mode=block
expires
Wed, 13 Feb 2019 13:50:51 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame D020
0
254 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstRVKef8W2H94HNnAxDuauipl6aH8vKWU-txve3r-tEEIBUeWu63DyTsUs0c7VWF4UMnRsDRtQD6UI1e37jTI4DdsRleQyffMNjCSL-CQyPJQbPzd-D9irRxFMJ26vGox6-JIsa4LxCRghrv7-v-OMSbsVkkksK3GAhVVURcbOwgj9ETgU0qbfx90XnCDttL7gHioNSBdIBNnvjNHhGiXhFeYM5BYOUq8SHJ4JIysZ3z2O353xK1PSDK0ctj4zh2DYbMmJikAdMntkrIaB2vJB-H3cWn2m7&sai=AMfl-YQaJDGCRwAnbystqyrFs-Dn715kwFqJtW45dRwRZgZN1RHU2ktd2hJ95DvNjKg_x5wS4Iw4JFBrVTeSLrUjdo5EVKboa-5GCqMl2D62pQ&sig=Cg0ArKJSzOOiArOVKOZeEAE&urlfix=1&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
0
x-xss-protection
1; mode=block
expires
Wed, 13 Feb 2019 13:50:51 GMT
13657187190995966019
tpc.googlesyndication.com/simgad/ Frame 8A8D
19 KB
20 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/13657187190995966019
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
fc031b7df0b1c33cab340f6065dad819ab323a090dae0d5dbc90c089312460cf
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 10:59:52 GMT
x-content-type-options
nosniff
age
10259
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
19847
x-xss-protection
1; mode=block
last-modified
Fri, 25 Jan 2019 16:17:36 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 13 Feb 2020 10:59:52 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 8A8D
0
244 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvAWBHU1HrjzY1uSC5NUno0HDm8Q0FNrkF_aEodhsMf1ASZkLyUDap0chHvFMtjpGW990h3WX6qiwp-_APchS1AhPGi2zNuxb0waNDYO0X20o_3-wjs0HpYeTDL0fd_0UsmQu-FI8GxewTq24YXlhYIiOghru9OieqU0lEff3lGnzqovh52_lcylARO_hT8TdBcvNm9aO6s7_Tko8IkLo4V0RB9-QAPQ07uogRg6AqsGWNGsZp61Fc879qQ8Ekrnp9EqyuIMxYL6oQ6ArpmW6o&sai=AMfl-YTfKLj3dDQKuVuHepznW6WajRtwEtnRV7ku9KycbrxP6tFSHim-kWreOHOGLkfThdFc8MyKO1VUGNdPmJaVXF_mxbTWwGq8uAqDVjsfkQ&sig=Cg0ArKJSzIVs_TFSsRSfEAE&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
0
x-xss-protection
1; mode=block
expires
Wed, 13 Feb 2019 13:50:51 GMT
/
www.facebook.com/tr/
44 B
246 B
Image
General
Full URL
https://www.facebook.com/tr/?id=832000476880185&ev=PageView&dl=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&rl=&if=false&ts=1550065851532&sw=1600&sh=1200&v=2.8.40&r=stable&ec=0&o=30&fbp=fb.1.1550065851531.1009155306&it=1550065851331&coo=false&rqm=GET
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8083:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
content-length
44
expires
Wed, 13 Feb 2019 13:50:51 GMT
truncated
/ Frame FA56
209 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d3bde9db87e3715690cf660c52c3e3594b679b4a13586721597dc8e5631bce1c

Request headers

Response headers

Content-Type
image/png
truncated
/ Frame D020
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
baeb46796929f181bdefbd77a1404a9c21f6bd3adcd0a9dbbed3da8850340872

Request headers

Response headers

Content-Type
image/png
__fpn.gif
fpn.flipboard.com/tr/
Redirect Chain
  • https://fpn.flipboard.com/pix/__fpn.gif?utm_source=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825
  • https://fpn.flipboard.com/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fattacks-breaches%25252Fransomware-attack-via-msp-locks-customers-out-of-systems%25252Fd%...
35 B
341 B
Image
General
Full URL
https://fpn.flipboard.com/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fattacks-breaches%25252Fransomware-attack-via-msp-locks-customers-out-of-systems%25252Fd%25252Fd-id%25252F1333825&rh=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fransomware-attack-via-msp-locks-customers-out-of-systems%252Fd%252Fd-id%252F1333825
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:200d:5200:14:85db:2b40:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 15:18:42 GMT
via
1.1 a034346227db119f7e0813186ca2d2c2.cloudfront.net (CloudFront)
last-modified
Thu, 12 Oct 2017 18:19:12 GMT
server
AmazonS3
age
81205
etag
"28d6814f309ea289f847c69cf91194c6"
x-cache
Hit from cloudfront
content-type
image/gif
status
200
accept-ranges
bytes
content-length
35
x-amz-cf-id
4FUqILNXWJNhWOx3-x-U6XgW_acSFdWgQKs_BHWfvh1MVI0WL94Ozw==

Redirect headers

pragma
no-cache
date
Wed, 13 Feb 2019 13:50:51 GMT
via
1.1 a034346227db119f7e0813186ca2d2c2.cloudfront.net (CloudFront)
server
CloudFront
location
/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fattacks-breaches%25252Fransomware-attack-via-msp-locks-customers-out-of-systems%25252Fd%25252Fd-id%25252F1333825&rh=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fransomware-attack-via-msp-locks-customers-out-of-systems%252Fd%252Fd-id%252F1333825
x-cache
LambdaGeneratedResponse from cloudfront
status
307
cache-control
no-cache, no-store, must-revalidate
content-length
0
x-amz-cf-id
nd06QXvkoAOJtMcz26zdoyztzVk0_z7hzzU4Jj68kYgScFWyYLSxtg==
expires
Thu, 01 Dec 1994 16:00:00 GMT
vy-MhgbfL4v.js
staticxx.facebook.com/connect/xd_arbiter/r/ Frame 62D0
0
0
Document
General
Full URL
https://staticxx.facebook.com/connect/xd_arbiter/r/vy-MhgbfL4v.js?version=44
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/all.js?hash=e8b83e2cd3344d6c36415d646cb6b927&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:216:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
staticxx.facebook.com
:scheme
https
:path
/connect/xd_arbiter/r/vy-MhgbfL4v.js?version=44
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
accept-encoding
gzip, deflate, br
cookie
fr=04uX9Xfpqnk14A0Jd..BcZCC7...1.0.BcZCC7.
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825

Response headers

status
200
content-type
text/html; charset=utf-8
expires
Tue, 11 Feb 2020 19:24:26 GMT
cache-control
public,max-age=31536000,immutable
strict-transport-security
max-age=15552000; preload
content-encoding
br
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
expect-ct
max-age=86400, report-uri="https://reports.fb.com/expectct/"
x-fb-debug
YHkgunyvJpYTiTvbB9vddIsCDPDoxp47UliZHJfrZD5qa6YxiAz8jcW1Wf078ujK3gS+HsuKALTGl+Pf/zV7hg==
content-length
11040
date
Wed, 13 Feb 2019 13:50:51 GMT
bullet.png
img.deusm.com/informationweek/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/informationweek/bullet.png
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
9e0e2ad3a93ec78d016efee0993b5856ba9b4acafcee3aa4d6f7162f039fcce4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Sat, 02 Nov 2013 00:57:26 GMT
server
cloudflare
etag
"41e-4ea272a96e980"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c435a800bec1-FRA
content-length
1054
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame A302
78 KB
0
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_304.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81c::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
ee1aa009d10739151d5d518289782456ca3e667471452e343d4cf3bc4b7a49f8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1549887464363732"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
29149
x-xss-protection
1; mode=block
expires
Wed, 13 Feb 2019 13:50:51 GMT
truncated
/ Frame A302
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a81b8fec2317a55dabf4255527021dcdb0fa9d2c577910335cf396c42a924c26

Request headers

Response headers

Content-Type
image/png
view
securepubads.g.doubleclick.net/pcs/ Frame A302
0
56 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsscH2XLh6RXZkWatsCvwu2I5eQl4ymQ0xjGKFIvfLtRgXTO8upr2C7rS-Ju7wpudvleq8tnNVVvzjv1jrfh6EC8UTEl1JWQstQqfHe7rDuipNPTy75W7C6yAD96KaxiqIJ55H6fCliasvty-lY6p5bYTLq2ywc_-BukrObadWW3Z7sCyXpjaaGkFfTLXObJAoXI589jR6hAj53omLC7jvDUa-geEcwsbTJXEI5ngYgjjJN8nT6McXSB4-3vud8WBcDIwTe6yrNypCd_EtX4cDYqmDM&sai=AMfl-YTRr3Qfb1JF0V9VHkhk8lOpv60fKiETNsjeD4QAU7eiTKHfc12cnhStvEomuWBGjnFw2lJZM8UvppFdCCfRtzvfgDaUyDpAwO_wf1Q2lw&sig=Cg0ArKJSzJoMnzvgD_p7EAE&urlfix=1&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
0
x-xss-protection
1; mode=block
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame D5D5
78 KB
0
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_304.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81c::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
ee1aa009d10739151d5d518289782456ca3e667471452e343d4cf3bc4b7a49f8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1549887464363732"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
29149
x-xss-protection
1; mode=block
expires
Wed, 13 Feb 2019 13:50:51 GMT
truncated
/ Frame D5D5
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
64b7258228c0cd88f3352a04a62e42c495b2dff52c8c5cf642f7ac598077e753

Request headers

Response headers

Content-Type
image/png
view
securepubads.g.doubleclick.net/pcs/ Frame D5D5
0
56 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssmN5vv8ReGR6UM21yN11DyXDP7FJcry-7N4ekdjCkrImj0UbHZbyNy_HNRHo6pmWX3kWj0IGx_-m63FNVnn65Z7GTnF9qoke-lZkxUcvyKY0COg1HLtnmjzZso3ruvpYSW6es-bVQcdjYDBXQ6BL9qbUp7jidha_JX-Bl94-Gyn9HI4EpjmUIAYcapdKDCPTKSjSDuzN-Wb4JUxXCi9GjKZVVxPHWX9uOvcqarg2AP54scFcC75h7dEracl2kNHq8xWlPaAqt1ZV0rmwe3RKsZL-90&sai=AMfl-YR-TE4iJUTHQiw_B2Ze8yxTGDu3ryXk2zYXwBzYP14o5bUC0Upq_PRE1a4UlzXMWPol_dHJHdR20DCWLkIMcmvj5hoB84jkOiv0iAsx5w&sig=Cg0ArKJSzKDVABi-7f2XEAE&urlfix=1&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
0
x-xss-protection
1; mode=block
amp4ads-v0.js
cdn.ampproject.org/rtv/011901312147090/ Frame F70C
265 KB
0
Script
General
Full URL
https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_304.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:825::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
9e9fd1ea171323698595c75eadd7c5a895e8ad172540b01fa60b5271c46acdeb
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
gzip
x-content-type-options
nosniff
age
402117
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
86206
x-xss-protection
1; mode=block
server
sffe
date
Fri, 08 Feb 2019 22:08:54 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"7f6b514b400edf5e"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 08 Feb 2020 22:08:54 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/011901312147090/v0/ Frame F70C
134 KB
0
Script
General
Full URL
https://cdn.ampproject.org/rtv/011901312147090/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_304.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:825::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
0caac85ee3e9f457831709c810d2e45f0990693126e01b38e771e99b54cf9837
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
gzip
x-content-type-options
nosniff
age
82874
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
42909
x-xss-protection
1; mode=block
server
sffe
date
Tue, 12 Feb 2019 14:49:37 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"8445f9d34b1cbd0a"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 12 Feb 2020 14:49:37 GMT
truncated
/ Frame F70C
213 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4b620cecd85eadfd5810c5725017a968e729b29d880d070c0f415c59fc4affe3

Request headers

Response headers

Content-Type
image/png
5690421336190341249
tpc.googlesyndication.com/simgad/ Frame F70C
49 KB
49 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/5690421336190341249
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8c43d751c2fe563f427c4c20376d0dcbe49df5e64865937fb27c62fdabd7966a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 25 Jan 2019 15:45:58 GMT
x-content-type-options
nosniff
age
1634693
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
49921
x-xss-protection
1; mode=block
last-modified
Mon, 01 Oct 2018 15:14:01 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 25 Jan 2020 15:45:58 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame F70C
0
56 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssCWMUQJcG-1LyfxWDTvwXrZypWd2Bh03hvDFy9Irg2THhBpc0iLe0X6X78of0TWcs_ICT1W4mM5uwW5_pLXa9H4IiC7TkYb_bUJwZf8I5TsWD5icpDYmQ613-lEjJBb5yspNtjUVyPmJe0zTW03GkIZPf-m8sP14-ewxcPspfPp3XtW74yVj01OpcEQcAJGdPU4Zy0OGlMpe1mhb5y_9MvoV1jXy7eAYL_158qy4kaTiytGIRGr3BQzvFyj6WZje7oDMGndy_l-VxXs3l6NQOSQzwc&sai=AMfl-YTmug2wuxUQyq-zVUyNCVj2gxUC1fiTBExGXXwCBhsjtkbLlvMbTlykxOAioWSW1LZR2On-7nCoTFrCgIrPMPMygnnwRS8u4t37qrMBtw&sig=Cg0ArKJSzCiJLjj7qg_OEAE&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
0
x-xss-protection
1; mode=block
DR-hot-topics-comment.png
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-hot-topics-comment.png
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
9182e8a1e20a5437d2f311b096b2a98a33d54e94d4d9d6d01c5db3861460d04e

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.26
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:02 GMT
server
cloudflare
etag
"4a5-4f2ebd20ac480"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c43668a0bec1-FRA
content-length
1189
web.js
ads.celtra.com/4278f865/ Frame D5D5
12 KB
4 KB
Script
General
Full URL
https://ads.celtra.com/4278f865/web.js?&clickUrl=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsvBeALDtYNyOGumr7dUXCGFOfI9OVUpaHkYo72fYTTQbCZfIjEuXiCY7r2sd7bUFsr3xhVYcHZa6xfCdKDOnjmn_vd9_9-nec6eJR8ACwVkLP3GmVsby22Pj8dugiDe8ofE9QhtKMN9YtlTrVFyfuJW82c7qH9H0fhI0fT8yFEazruRnN76wx2jHR3cb_co9hWIXIAfdjPYZAI6LgZsMcvKFasHyB6AnsumERMlQWK72A-cUaDDhSDA4D0nKgw0B-JrikdOT0Mx3pJTusqfXtZ0%26sai%3DAMfl-YQzqnWd3vcr3jzXQJGBLhzzx_meuCX9L3mn8dJjd3bpKe-5yBTq-Vh17F0T8kd1rlumGITtGtujMzewb7CyTiyjrdc8x5BzS-_UDvFXzQ%26sig%3DCg0ArKJSzM5eLsq3IZCJEAE%26urlfix%3D1%26adurl%3D&expandDirection=undefined&clickEvent=advertiser&iosAdvId=&androidAdvId=&externalAdServer=DFPPremium&tagVersion=6&externalCreativeId=138258449462&externalPlacementId=43863396&externalSiteId=27868836&externalSiteName=darkreading.com&externalLineItemId=4938874978&externalCampaignId=2478571085&scriptId=celtra-script-1&clientTimestamp=1550065851.941&clientTimeZoneOffsetInMinutes=0&hostPageLoadId=25913484818222154
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.59.88.202 Frankfurt, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-59-88-202.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
f4168c0891d63be381ff5404de12b0c04ffc7f7fb593fd538fbdd54a98233d45

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 13 Feb 2019 13:50:52 GMT
Content-Encoding
gzip
Content-Type
application/javascript; charset=UTF-8
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Length
3949
Expires
0
NL-button.png
img.deusm.com/informationweek/
2 KB
3 KB
Image
General
Full URL
https://img.deusm.com/informationweek/NL-button.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_304.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8b16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
7b5688f8b168e06251901442c4f2f72b30c4477cb472833cde7979a8dca0a862

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.26
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
cf-cache-status
HIT
last-modified
Fri, 08 Nov 2013 15:09:43 GMT
server
cloudflare
etag
"9c6-4eaabc5a3dbc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a87c436d924bec1-FRA
content-length
2502
amp4ads-v0.js
cdn.ampproject.org/rtv/011901312147090/ Frame C466
265 KB
0
Script
General
Full URL
https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_304.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:825::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
9e9fd1ea171323698595c75eadd7c5a895e8ad172540b01fa60b5271c46acdeb
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
gzip
x-content-type-options
nosniff
age
402117
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
86206
x-xss-protection
1; mode=block
server
sffe
date
Fri, 08 Feb 2019 22:08:54 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"7f6b514b400edf5e"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 08 Feb 2020 22:08:54 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/011901312147090/v0/ Frame C466
134 KB
0
Script
General
Full URL
https://cdn.ampproject.org/rtv/011901312147090/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_304.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:825::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
0caac85ee3e9f457831709c810d2e45f0990693126e01b38e771e99b54cf9837
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
gzip
x-content-type-options
nosniff
age
82874
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
42909
x-xss-protection
1; mode=block
server
sffe
date
Tue, 12 Feb 2019 14:49:37 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"8445f9d34b1cbd0a"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 12 Feb 2020 14:49:37 GMT
truncated
/ Frame C466
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ec805a91fc10e3d0433734e035e09898d36afe8eab7e08415a24f20363bbd6df

Request headers

Response headers

Content-Type
image/png
4896704045357084479
tpc.googlesyndication.com/simgad/ Frame C466
27 KB
27 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/4896704045357084479
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
2990af02a362e14df871ae5357c062165c09eb3f23f930f0caf166e467f572df
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 10:09:02 GMT
x-content-type-options
nosniff
age
13310
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
27784
x-xss-protection
1; mode=block
last-modified
Mon, 28 Jan 2019 14:28:52 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 13 Feb 2020 10:09:02 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame C466
0
47 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstM5PRj22F7B1YcoECmcxNRl91lyXVSrqmvxvys1tWeRmLpUNNKwwcgC5zj3V2HSYapoVrfpn5xtVOj1QC8ooFqlrkDoR4-DAwmnLtHE3QxN9EQ6_ixXIN8P-WiCDstWBprW6Q5vcrkK4mGhmt6J6qOSVKzlIu2HdmstGuDc0-RzARAFJ5508GnenthOrWOYXf-X9-oAMlPnmJPBMth7ZmtObh2iGV7PxMzsYLKeu61yz72G9QFXK_HSjjDbrS_e21misiPJ8MlgLPqdYBmN2k&sai=AMfl-YT6zUSxwb-X6Pfy0PppuSyRxx_zN5YBYliaZBJQxPDSBp1sp81QA8uhWINw3z9gCLaRdLKWl6izNSU6IOOBKA5vDGWlqsjTpgpnpzuWkQ&sig=Cg0ArKJSzML8YFjaMiAHEAE&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:52 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
0
x-xss-protection
1; mode=block
/
www.facebook.com/tr/
44 B
144 B
Image
General
Full URL
https://www.facebook.com/tr/?id=832000476880185&ev=Microdata&dl=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&rl=&if=false&ts=1550065852091&cd[Schema.org]=%5B%5D&cd[OpenGraph]=%7B%22og%3Atitle%22%3A%22Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20Systems%22%2C%22og%3Atype%22%3A%22article%22%2C%22og%3Aimage%22%3A%22https%3A%2F%2Ftwimgs.com%2Fnojitter%2Fdarkreading%2Fdr-logo.jpg%22%2C%22og%3Aurl%22%3A%22https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825%22%2C%22og%3Asite_name%22%3A%22Dark%20Reading%22%2C%22og%3Adescription%22%3A%22Vulnerable%20plugin%20for%20a%20remote%20management%20tool%20gave%20attackers%20a%20way%20to%20encrypt%20systems%20belonging%20to%20all%20customers%20of%20a%20US-based%20MSP.%22%7D&cd[Meta]=%7B%22title%22%3A%22Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...%22%2C%22meta%3Adescription%22%3A%22Vulnerable%20plugin%20for%20a%20remote%20management%20tool%20gave%20attackers%20a%20way%20to%20encrypt%20systems%20belonging%20to%20all%20customers%20of%20a%20US-based%20MSP.%22%7D&cd[DataLayer]=%5B%5D&cd[JSON-LD]=%5B%5D&sw=1600&sh=1200&v=2.8.40&r=stable&ec=1&o=30&fbp=fb.1.1550065851531.1009155306&it=1550065851331&coo=false&es=automatic&rqm=GET
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8083:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:52 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
content-length
44
expires
Wed, 13 Feb 2019 13:50:52 GMT
web.js
cache-ssl.celtra.com/api/creatives/2650a6f3/compiled/ Frame D5D5
524 KB
115 KB
Script
General
Full URL
https://cache-ssl.celtra.com/api/creatives/2650a6f3/compiled/web.js?v=18-6cf1ac5419&secure=1&cachedVariantChoices=W10-&inmobi=0
Requested by
Host: ads.celtra.com
URL: https://ads.celtra.com/4278f865/web.js?&clickUrl=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsvBeALDtYNyOGumr7dUXCGFOfI9OVUpaHkYo72fYTTQbCZfIjEuXiCY7r2sd7bUFsr3xhVYcHZa6xfCdKDOnjmn_vd9_9-nec6eJR8ACwVkLP3GmVsby22Pj8dugiDe8ofE9QhtKMN9YtlTrVFyfuJW82c7qH9H0fhI0fT8yFEazruRnN76wx2jHR3cb_co9hWIXIAfdjPYZAI6LgZsMcvKFasHyB6AnsumERMlQWK72A-cUaDDhSDA4D0nKgw0B-JrikdOT0Mx3pJTusqfXtZ0%26sai%3DAMfl-YQzqnWd3vcr3jzXQJGBLhzzx_meuCX9L3mn8dJjd3bpKe-5yBTq-Vh17F0T8kd1rlumGITtGtujMzewb7CyTiyjrdc8x5BzS-_UDvFXzQ%26sig%3DCg0ArKJSzM5eLsq3IZCJEAE%26urlfix%3D1%26adurl%3D&expandDirection=undefined&clickEvent=advertiser&iosAdvId=&androidAdvId=&externalAdServer=DFPPremium&tagVersion=6&externalCreativeId=138258449462&externalPlacementId=43863396&externalSiteId=27868836&externalSiteName=darkreading.com&externalLineItemId=4938874978&externalCampaignId=2478571085&scriptId=celtra-script-1&clientTimestamp=1550065851.941&clientTimeZoneOffsetInMinutes=0&hostPageLoadId=25913484818222154
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.4 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-4.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
f6681da54e7147af3a011239a537acd8cf8bc423e2844cc0fe55182a663ebf75

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 05 Feb 2019 09:44:27 GMT
content-encoding
gzip
age
705984
x-cache
Hit from cloudfront
status
200
content-length
116998
via
1.1 varnish (Varnish/5.0), 1.1 d7524ff4a82155dd51a24800cf39deec.cloudfront.net (CloudFront)
server
Apache
etag
"6e4e13e045bb4413c33fa14cec54337920a74a1e104c182b0a7dd74051c391ca"
vary
Accept-Encoding
x-varnish
8161015
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
XnrbGP9xZzhn6QutWyKRUzWeqCvf_ZM_Z2SFDTJ_7jKCKeGem2wUnA==
spacer.gif
img.lightreading.com/images/
49 B
356 B
Image
General
Full URL
https://img.lightreading.com/images/spacer.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.107 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-107.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
3c5b83e390d046c3623c4b8e35b58aaf64a7481bb2372fb51ae2e0e7818f7407

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 07:43:42 GMT
via
1.1 8d31bbd9d6638cdacab37047b8045da4.cloudfront.net (CloudFront)
last-modified
Fri, 20 Jun 2014 19:05:53 GMT
server
AmazonS3
age
22031
etag
"4909631c93ffa90e65247e3fd4454f2d"
x-cache
Hit from cloudfront
content-type
image/gif
status
200
accept-ranges
bytes
content-length
49
x-amz-cf-id
hf5mVTkuXkaoHS-RwFhe4YelZvhpnDGQGCv37U8MjTNdT0U4EWxMAw==
tag
a.teads.tv/page/11512/ Frame 8DC8
1 KB
858 B
Script
General
Full URL
https://a.teads.tv/page/11512/tag
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_304.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.211.0.4 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-211-0-4.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c5cfc527894a919282ef88af933d000c2acd9c82ff1ba41701feed18119e66ee

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:52 GMT
content-encoding
gzip
access-control-allow-origin
*
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200
cache-control
private, must-revalidate, max-age=3600
access-control-allow-credentials
true
content-length
592
expires
Wed, 13 Feb 2019 14:50:52 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 8DC8
78 KB
0
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_304.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81c::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
ee1aa009d10739151d5d518289782456ca3e667471452e343d4cf3bc4b7a49f8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

date
Wed, 13 Feb 2019 13:50:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1549887464363732"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
29149
x-xss-protection
1; mode=block
expires
Wed, 13 Feb 2019 13:50:51 GMT
truncated
/ Frame 8DC8
213 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b8309f45b7662d2ea05a01a4f06e5f1069cc3f35776c896c4a2da11eecc7702c

Request headers

Response headers

Content-Type
image/png
view
securepubads.g.doubleclick.net/pcs/ Frame 8DC8
0
56 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssaqMdngtevdsQlVfl-C0pBZp84558zYeRwDpEOIHxWW_H6dvQb3SSZf8cajrzJb2Cj5AfVZ_FpvM5jHBYgfMi95unzLmMm_rHcI5yW1hWhU77YoIS7JyfvOUHbBDo03cPMdKCRdJvfdLdhrZzdjW9fdLuFTmfci_CtLlfc_fdCh2b-MdbPHWuWylU4Z1Pg4d4YqZMTSesTK3tPr2vQPoGhggQc7Q_ZZ2gA0zFDQaMH2qyWDJXJF0Q-gXN8XIz38dU8Lph27ksu9CnRY37cWQ&sai=AMfl-YQoYcQP47L1IEkTxuLaaUAetXqKi2JAGEvMTxD98BNqQM_hLvhGwdgFjU8CLzaZO2Ti3JwwkgzoDT2yid3oTr3x7uIg8NGPxgE7Ii6Zvg&sig=Cg0ArKJSzKlRcIDAuh7tEAE&urlfix=1&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:52 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
0
x-xss-protection
1; mode=block
s48745736994293
ubmtech.d3.sc.omtrdc.net/b/ss/cmpglobalvista/1/JS-2.8.2/
43 B
521 B
Image
General
Full URL
https://ubmtech.d3.sc.omtrdc.net/b/ss/cmpglobalvista/1/JS-2.8.2/s48745736994293?AQB=1&ndh=1&pf=1&t=13%2F1%2F2019%2013%3A50%3A52%203%200&sdid=106FD07C4784DFBA-3A49DEA5959C00F8&mid=48465313890171263150921289782209655055&aamlh=6&ce=UTF-8&ns=ubmtech&pageName=darkreading.com%20attacks%2Fbreaches%20jai%20vijayan%20ransomware%20attack%20via%20msp%20locks%20customers%20out%20of%20systems&g=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&cc=USD&events=event5&aamb=6G1ynYcLPuiQxYZrsz_pkqfLG9yMXBpb2zX5dvJdYQJzPXImdj0y&h1=Dark%20Reading%7CAttacks%2FBreaches&c2=1333825&v2=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...&c3=Dark%20Reading%20%7C%201333825%20%7C%20Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20Systems&c4=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20Systems&c5=Attacks%2FBreaches%20-%20Attacks%2FBreaches&c7=Jai%20Vijayan&c8=2a01%3A4f8%3A202%3Aa9%3A0%3A0%3A0%3A2%20%7C%20Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_13_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F67.0.3396.87%20Safari%2F537.36&v10=wednesday%7C8%3A30am&c11=News%20Analysis&v12=1333825&c13=wednesday%7C8%3A30am&v13=www.darkreading.com&v15=First%20Visit&c17=New&v17=New&c19=Un-Registered&c20=20190207&c22=First%20Visit&c23=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&v28=Jai%20Vijayan&v37=News%20Analysis&c41=3&c48=1&v48=1&c50=2.8.2&v61=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&s=1600x1200&c=24&j=1.6&v=N&k=Y&bw=1600&bh=1200&mcorgid=77FB1CFE532B22840A490D45%40AdobeOrg&AQE=1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.82.228.18 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
*.d3.sc.omtrdc.net
Software
Omniture DC /
Resource Hash
a1ecbaed793a1f564c49c671f2dd0ce36f858534ef6d26b55783a06b884cc506

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 13 Feb 2019 13:50:52 GMT
Last-Modified
Thu, 14 Feb 2019 13:50:52 GMT
Server
Omniture DC
xserver
www7155
ETag
"3328741070580285440-5149129034567506197"
Vary
*
X-C
ms-6.6.0
P3P
CP="This is not a P3P policy"
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Tue, 12 Feb 2019 13:50:52 GMT
Cookie set login.jsp
ng.techweb.com/authds/login/ Frame 2C52
0
0
Document
General
Full URL
https://ng.techweb.com/authds/login/login.jsp?type=iframe&cdsocket_client=https://www.darkreading.com/cdsocket_proxy.html
Requested by
Host: twimgs.com
URL: https://twimgs.com/nojitter/js/jquery-1.11.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
2620:103::192:155:48:119 , United States, ASN19994 (RACKSPACE - Rackspace Hosting, US),
Reverse DNS
Software
NG /
Resource Hash

Request headers

Host
ng.techweb.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825

Response headers

Set-Cookie
JSESSIONID=80DF0D3E5ACD864015A7F53399B559B3; Path=/; Secure; HttpOnly
vary
accept-encoding
Content-Type
text/html;charset=ISO-8859-1
Content-Length
755
Date
Wed, 13 Feb 2019 13:50:52 GMT
Server
NG
Content-Encoding
gzip
Connection
Keep-Alive
ping
www.facebook.com/connect/ Frame ACEB
0
0
Document
General
Full URL
https://www.facebook.com/connect/ping?client_id=640989409269461&domain=www.darkreading.com&origin=1&redirect_uri=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter%2Fr%2Fvy-MhgbfL4v.js%3Fversion%3D44%23cb%3Df16c3c67f99f498%26domain%3Dwww.darkreading.com%26origin%3Dhttps%253A%252F%252Fwww.darkreading.com%252Ff32daf9eb0fe35%26relation%3Dparent&response_type=token%2Csigned_request&sdk=joey
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/all.js?hash=e8b83e2cd3344d6c36415d646cb6b927&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8083:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www.facebook.com
:scheme
https
:path
/connect/ping?client_id=640989409269461&domain=www.darkreading.com&origin=1&redirect_uri=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter%2Fr%2Fvy-MhgbfL4v.js%3Fversion%3D44%23cb%3Df16c3c67f99f498%26domain%3Dwww.darkreading.com%26origin%3Dhttps%253A%252F%252Fwww.darkreading.com%252Ff32daf9eb0fe35%26relation%3Dparent&response_type=token%2Csigned_request&sdk=joey
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
accept-encoding
gzip, deflate, br
cookie
fr=04uX9Xfpqnk14A0Jd..BcZCC7...1.0.BcZCC7.
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825

Response headers

status
200
cache-control
private, no-cache, no-store, must-revalidate
expires
Sat, 01 Jan 2000 00:00:00 GMT
pragma
no-cache
strict-transport-security
max-age=15552000; preload
content-encoding
br
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
expect-ct
max-age=86400, report-uri="https://reports.fb.com/expectct/"
content-type
text/html; charset="utf-8"
x-fb-debug
aE2AAx+6dD4j9jasJ6uvW35BP9xPfBMWcjJHNIfdxR85HAHu0B65NQWjciAnbPeEeujIAtBuV3yzdPvGca2aqg==
date
Wed, 13 Feb 2019 13:50:55 GMT
widget_iframe.68dbfddc56b3f0522044700c1abcd1dc.html
platform.twitter.com/widgets/ Frame 832B
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/widget_iframe.68dbfddc56b3f0522044700c1abcd1dc.html?origin=https%3A%2F%2Fwww.darkreading.com&settingsEndpoint=https%3A%2F%2Fsyndication.twitter.com%2Fsettings
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41AD) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825

Response headers

Content-Encoding
gzip
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Wed, 13 Feb 2019 13:50:52 GMT
Etag
"347ce5de96d97a02c18244967b8b6532+gzip"
Last-Modified
Tue, 12 Feb 2019 18:30:42 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/41AD)
Vary
Accept-Encoding
X-Cache
HIT
Content-Length
5783
moment~timeline~tweet.6e5b62723488aee38af0c77681396a5b.js
platform.twitter.com/js/
24 KB
8 KB
Script
General
Full URL
https://platform.twitter.com/js/moment~timeline~tweet.6e5b62723488aee38af0c77681396a5b.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/4186) /
Resource Hash
e26fdccb214e020f70cf2aede7b77d5dc51854e23b3acbb4bcff0018773a636f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 13 Feb 2019 13:50:52 GMT
Content-Encoding
gzip
Last-Modified
Tue, 12 Feb 2019 18:30:35 GMT
Server
ECS (fcn/4186)
Etag
"da3e8002f83d92efe615008a56f12f48+gzip"
Vary
Accept-Encoding
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Cache-Control
public, max-age=315360000
Content-Type
application/javascript; charset=utf-8
Content-Length
7925
timeline.14c5ee028329690d75f16b0683f2cb52.js
platform.twitter.com/js/
37 KB
11 KB
Script
General
Full URL
https://platform.twitter.com/js/timeline.14c5ee028329690d75f16b0683f2cb52.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40E1) /
Resource Hash
3953e3ecba74220edbea8db564d2eb1934257dade2320b4d21d67172c6d910a0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 13 Feb 2019 13:50:52 GMT
Content-Encoding
gzip
Last-Modified
Tue, 12 Feb 2019 18:30:35 GMT
Server
ECS (fcn/40E1)
Etag
"0039b79a67a365d0a8935c8f37d9192b+gzip"
Vary
Accept-Encoding
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Cache-Control
public, max-age=315360000
Content-Type
application/javascript; charset=utf-8
Content-Length
11191
button.dd024c345fc26f7c7a8d9938b67e5d3d.js
platform.twitter.com/js/
7 KB
3 KB
Script
General
Full URL
https://platform.twitter.com/js/button.dd024c345fc26f7c7a8d9938b67e5d3d.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/4187) /
Resource Hash
bec117b5be8f22e9305be68965e3734a5135357a3ac88cda5814b7069a1c62dc

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 13 Feb 2019 13:50:52 GMT
Content-Encoding
gzip
Last-Modified
Tue, 12 Feb 2019 18:30:34 GMT
Server
ECS (fcn/4187)
Etag
"481d209bbcd2464884d57a77bc64e947+gzip"
Vary
Accept-Encoding
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Cache-Control
public, max-age=315360000
Content-Type
application/javascript; charset=utf-8
Content-Length
2293
elqCfg.min.js
img.en25.com/i/
6 KB
3 KB
Script
General
Full URL
https://img.en25.com/i/elqCfg.min.js
Requested by
Host: twimgs.com
URL: https://twimgs.com/informationweek/elqNow/elqImg.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.31.90.134 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-31-90-134.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
23818277c974e4ed1d48a04077c6a133bde3435f3d0bafe8dcca49150ebcb986
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Last-Modified
Fri, 26 Oct 2018 07:42:47 GMT
ETag
"2185547dff6cd41:0"
Vary
Accept-Encoding
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Cache-Control
no-cache, no-store
Date
Wed, 13 Feb 2019 13:50:52 GMT
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
application/x-javascript
Content-Length
2118
Expires
Wed, 13 Feb 2019 13:50:52 GMT
like.php
www.facebook.com/plugins/ Frame 3B7E
0
0
Document
General
Full URL
https://www.facebook.com/plugins/like.php?app_id=640989409269461&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter%2Fr%2Fvy-MhgbfL4v.js%3Fversion%3D44%23cb%3Df155c67ad97289c%26domain%3Dwww.darkreading.com%26origin%3Dhttps%253A%252F%252Fwww.darkreading.com%252Ff32daf9eb0fe35%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&layout=button&locale=en_US&sdk=joey&send=false&show_faces=false&width=87
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/all.js?hash=e8b83e2cd3344d6c36415d646cb6b927&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8083:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www.facebook.com
:scheme
https
:path
/plugins/like.php?app_id=640989409269461&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter%2Fr%2Fvy-MhgbfL4v.js%3Fversion%3D44%23cb%3Df155c67ad97289c%26domain%3Dwww.darkreading.com%26origin%3Dhttps%253A%252F%252Fwww.darkreading.com%252Ff32daf9eb0fe35%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&layout=button&locale=en_US&sdk=joey&send=false&show_faces=false&width=87
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
accept-encoding
gzip, deflate, br
cookie
fr=04uX9Xfpqnk14A0Jd..BcZCC7...1.0.BcZCC7.
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825

Response headers

status
200
cache-control
private, no-cache, no-store, must-revalidate
expires
Sat, 01 Jan 2000 00:00:00 GMT
pragma
no-cache
strict-transport-security
max-age=15552000; preload
content-encoding
br
timing-allow-origin
*
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
expect-ct
max-age=86400, report-uri="https://reports.fb.com/expectct/"
content-type
text/html; charset="utf-8"
x-fb-debug
9Hy59CNnVwNxDT3cWlUV/CyTVT09aK8dYWb/TfAfivHzp0g0S1XJ9Uk3uF9fA/YCZuNwQ9wQyTjbUad+goW+oA==
date
Wed, 13 Feb 2019 13:50:55 GMT
teads-format.min.js
a.teads.tv/media/format/v3/
374 KB
100 KB
Script
General
Full URL
https://a.teads.tv/media/format/v3/teads-format.min.js
Requested by
Host: a.teads.tv
URL: https://a.teads.tv/page/11512/tag
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.211.0.4 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-211-0-4.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
8cc8b5d61e1c69c7179e452907f931a48c42ff50edadfc1e9fc28e7c4a1b68b6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:52 GMT
content-encoding
gzip
last-modified
Wed, 13 Feb 2019 12:27:33 GMT
x-amz-request-id
F7310A474CE6D269
etag
"4f24fb113d795152ff394136982cc6d2"
vary
Accept-Encoding
content-type
text/javascript;charset=utf-8
status
200
cache-control
private, must-revalidate, max-age=600
x-bucket
c
accept-ranges
bytes
content-length
101540
x-amz-id-2
3idIjQSxUpmRQjmVz34PmV1nswiD2lQhdOPm9Glc/WI6whTE0tbQ/b6c1wR4WjIkHFWPZq5IP9s=
expires
Wed, 13 Feb 2019 14:00:52 GMT
profile
cdn.syndication.twimg.com/timeline/
164 KB
11 KB
Script
General
Full URL
https://cdn.syndication.twimg.com/timeline/profile?callback=__twttr.callbacks.tl_i0_profile_DarkReading_old&dnt=true&domain=www.darkreading.com&lang=en&screen_name=DarkReading&suppress_response_codes=true&t=1722295&tz=GMT%2B0000&with_replies=false
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40F7) /
Resource Hash
bce5ef5450e6c7684954176319e9e04f2a79fe965c1935be484f0c3e305817f4
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block; report=https://twitter.com/i/xss_report

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:52 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-cache
HIT
status
200
content-disposition
attachment; filename=jsonp.jsonp
strict-transport-security
max-age=631138519
content-length
10881
x-xss-protection
1; mode=block; report=https://twitter.com/i/xss_report
x-response-time
183
last-modified
Wed, 13 Feb 2019 13:48:40 GMT
server
ECS (fcn/40F7)
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/javascript;charset=utf-8
cache-control
must-revalidate, max-age=300
x-connection-hash
31dbdf66482054bae769d82c9bbb4f0e
accept-ranges
bytes
timing-allow-origin
*
x-transaction
00111fc60069f7ee
expires
Wed, 13 Feb 2019 13:55:52 GMT
syndication
syndication.twitter.com/i/jot/
43 B
124 B
Image
General
Full URL
https://syndication.twitter.com/i/jot/syndication?dnt=1&l=%7B%22_category_%22%3A%22syndicated_impression%22%2C%22triggered_on%22%3A1550065852370%2C%22dnt%22%3Atrue%2C%22event_namespace%22%3A%7B%22client%22%3A%22tfw%22%2C%22page%22%3A%22timeline%22%2C%22action%22%3A%22impression%22%7D%7D
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.16.156.241 San Francisco, United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_b /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block; report=https://twitter.com/i/xss_report

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:52 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
strict-transport-security
max-age=631138519
content-length
65
x-xss-protection
1; mode=block; report=https://twitter.com/i/xss_report
x-response-time
7
pragma
no-cache
last-modified
Wed, 13 Feb 2019 13:50:52 GMT
server
tsa_b
x-frame-options
SAMEORIGIN
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
bd36b40c6e770db1d05cf95f6a41fed0
x-transaction
0003849d004f9d33
expires
Tue, 31 Mar 1981 05:00:00 GMT
svrGP.aspx
s657486201.t.eloqua.com/visitor/v200/
Redirect Chain
  • https://s657486201.t.eloqua.com/visitor/v200/svrGP?pps=3&siteid=657486201&ref2=elqNone&tzo=0&ms=421&optin=disabled
  • https://s657486201.t.eloqua.com/visitor/v200/svrGP.aspx?pps=3&siteid=657486201&ref2=elqNone&tzo=0&ms=421&optin=disabled&elqCookie=1
49 B
373 B
Image
General
Full URL
https://s657486201.t.eloqua.com/visitor/v200/svrGP.aspx?pps=3&siteid=657486201&ref2=elqNone&tzo=0&ms=421&optin=disabled&elqCookie=1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
142.0.160.13 Redwood City, United States, ASN7160 (NETDYNAMICS - Oracle Corporation, US),
Reverse DNS
Software
/
Resource Hash
f1ccea6b7204d9f7913ab45e1afa51d79f83bd4f0319de937b0132e6e02b1aab
Security Headers
Name Value
Strict-Transport-Security max-age=31536000;
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
X-Content-Type-Options
nosniff
Date
Wed, 13 Feb 2019 13:50:52 GMT
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Cache-Control
private,no-cache, no-store
Content-Type
image/gif
Content-Length
49
Expires
-1

Redirect headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
X-Content-Type-Options
nosniff
Date
Wed, 13 Feb 2019 13:50:52 GMT
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Location
//s657486201.t.eloqua.com/visitor/v200/svrGP.aspx?pps=3&siteid=657486201&ref2=elqNone&tzo=0&ms=421&optin=disabled&elqCookie=1
Cache-Control
private,no-cache, no-store
Content-Type
text/html; charset=utf-8
Content-Length
266
Expires
-1
svrGP.aspx
s2150.t.eloqua.com/visitor/v200/
Redirect Chain
  • https://s2150.t.eloqua.com/visitor/v200/svrGP?pps=3&siteid=2150&ref2=elqNone&tzo=0&ms=421&optin=disabled
  • https://s2150.t.eloqua.com/visitor/v200/svrGP.aspx?pps=3&siteid=2150&ref2=elqNone&tzo=0&ms=421&optin=disabled&elqCookie=1
49 B
373 B
Image
General
Full URL
https://s2150.t.eloqua.com/visitor/v200/svrGP.aspx?pps=3&siteid=2150&ref2=elqNone&tzo=0&ms=421&optin=disabled&elqCookie=1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
209.167.231.17 , United States, ASN7160 (NETDYNAMICS - Oracle Corporation, US),
Reverse DNS
e017.en25.com
Software
/
Resource Hash
f1ccea6b7204d9f7913ab45e1afa51d79f83bd4f0319de937b0132e6e02b1aab
Security Headers
Name Value
Strict-Transport-Security max-age=31536000;
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
X-Content-Type-Options
nosniff
Date
Wed, 13 Feb 2019 13:50:53 GMT
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Cache-Control
private,no-cache, no-store
Content-Type
image/gif
Content-Length
49
Expires
-1

Redirect headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
X-Content-Type-Options
nosniff
Date
Wed, 13 Feb 2019 13:50:53 GMT
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Location
//s2150.t.eloqua.com/visitor/v200/svrGP.aspx?pps=3&siteid=2150&ref2=elqNone&tzo=0&ms=421&optin=disabled&elqCookie=1
Cache-Control
private,no-cache, no-store
Content-Type
text/html; charset=utf-8
Content-Length
256
Expires
-1
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTUwMDY1ODUyeDBjNTY1ZDFiMzVhNjk5eDQ2NjU2NDYyIiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1NTUwODE5NTcwNzE3MzY5IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTUwMDY1ODUyeDBjNTY1ZDFiMzVhNjk5eDQ2NjU2NDYyIiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1NTUwODE5NTcwNzE3MzY5IiwiaW5kZXgiOjAsImNsaWVudFRpbWVzdGFtcCI6MTU1MDA2NTg1Mi4zNzQsIm5hbWUiOiJjb250YWluZXJCZWNhbWVWaWV3YWJsZSJ9XX0=?crc32c=1435276590
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.3.209 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-3-209.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 13 Feb 2019 13:50:52 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
tweet_button.68dbfddc56b3f0522044700c1abcd1dc.en.html
platform.twitter.com/widgets/ Frame C278
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/tweet_button.68dbfddc56b3f0522044700c1abcd1dc.en.html
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/418F) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825

Response headers

Content-Encoding
gzip
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Wed, 13 Feb 2019 13:50:52 GMT
Etag
"7b9b94c58e14dbf379e14ca28678af79+gzip"
Last-Modified
Tue, 12 Feb 2019 18:30:40 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/418F)
Vary
Accept-Encoding
X-Cache
HIT
Content-Length
12256
p
sb.scorecardresearch.com/
43 B
309 B
Image
General
Full URL
https://sb.scorecardresearch.com/p?c1=2&c2=17198971&ns_ap_sv=2.1511.10&ns_type=hidden&ns_st_it=a&ns_st_sv=4.0.0&ns_st_ad=1&ns_st_sq=1&ns_st_id=1550065852512&ns_st_ec=1&ns_st_cn=1&ns_st_ev=play&ns_st_ct=va00&ns_st_cl=0&ns_st_pt=0&c3=*null&c4=*null&c6=*null&ns_ts=75338765&cs_ucfr=1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.162.235 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-162-235.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 13 Feb 2019 13:50:52 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Expires
Mon, 01 Jan 1990 00:00:00 GMT
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
track
t.teads.tv/
23 B
157 B
Image
General
Full URL
https://t.teads.tv/track?action=placementCall&pageId=11512&pid=21882&gid=[insertionId]&slot=native&env=js-web&f=1&ts=1550065852510&fv=2.21.25-for-3052
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.7 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-7.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
328e90a318268aea96180cc31666ae6d6f79d90d078c123bc3d98ee08a192fb7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
pragma
no-cache
date
Wed, 13 Feb 2019 13:50:52 GMT
cache-control
max-age=0, no-cache, no-store
content-type
image/gif
content-length
23
expires
Wed, 13 Feb 2019 13:50:52 GMT
track
t.teads.tv/
23 B
157 B
Image
General
Full URL
https://t.teads.tv/track?action=slotAvailable&pageId=11512&pid=21882&gid=[insertionId]&slot=native&env=js-web&f=1&ts=1550065852511&fv=2.21.25-for-3052
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.7 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-7.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
328e90a318268aea96180cc31666ae6d6f79d90d078c123bc3d98ee08a192fb7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
pragma
no-cache
date
Wed, 13 Feb 2019 13:50:52 GMT
cache-control
max-age=0, no-cache, no-store
content-type
image/gif
content-length
23
expires
Wed, 13 Feb 2019 13:50:52 GMT
index.html
cmp.teads.mgr.consensu.org/ Frame FE3D
0
0
Document
General
Full URL
https://cmp.teads.mgr.consensu.org/index.html
Requested by
Host: a.teads.tv
URL: https://a.teads.tv/media/format/v3/teads-format.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:293::2c92 , European Union, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash

Request headers

Host
cmp.teads.mgr.consensu.org
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825

Response headers

x-amz-id-2
kGI/LkmsIcd2daPyZ44T91Tgh3nqFBaPCP2I5Rt/ZLlg5M5DrVepYy/Ac/ZfkFjnOAPn7svobKA=
x-amz-request-id
B87A212102411FA1
Last-Modified
Fri, 14 Sep 2018 07:42:32 GMT
ETag
"e7d6c2974a38b7ff77a560e83789f66a"
Accept-Ranges
bytes
Content-Type
text/html
Content-Length
583
Server
AmazonS3
Cache-Control
max-age=300
Expires
Wed, 13 Feb 2019 13:55:52 GMT
Date
Wed, 13 Feb 2019 13:50:52 GMT
Connection
keep-alive
-9EHMFuI
pbs.twimg.com/card_img/1093148778205458432/ Frame 8E64
7 KB
7 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1093148778205458432/-9EHMFuI?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FB) /
Resource Hash
f0ef03bb309a7d870e3f6b5f4438b1aeb59e749e98fc0e152e1225c7bd8bcffc
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-response-time
326
date
Wed, 13 Feb 2019 13:50:52 GMT
x-content-type-options
nosniff
surrogate-key
card_img card_img/bucket/1 card_img/1093148778205458432
last-modified
Wed, 06 Feb 2019 14:03:53 GMT
server
ECS (fcn/40FB)
access-control-allow-origin
*
x-cache
HIT
content-type
image/jpeg
status
200
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
25868cffa2f764fcd13185bb0c465bbe
accept-ranges
bytes
content-length
7364
xKpbWBHq
pbs.twimg.com/card_img/1095322822560366592/ Frame 8E64
7 KB
7 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1095322822560366592/xKpbWBHq?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41A4) /
Resource Hash
c1ba095f1ecd3931eaac726c19f603f2bcb7288a8fab26582637297b9c5530a3
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-response-time
148
date
Wed, 13 Feb 2019 13:50:52 GMT
x-content-type-options
nosniff
surrogate-key
card_img card_img/bucket/2 card_img/1095322822560366592
last-modified
Tue, 12 Feb 2019 14:02:45 GMT
server
ECS (fcn/41A4)
access-control-allow-origin
*
x-cache
HIT
content-type
image/jpeg
status
200
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
e78961e178943af3020ae9cb3ea5524d
accept-ranges
bytes
content-length
7361
UMyLDx5n
pbs.twimg.com/card_img/1093170163103555584/ Frame 8E64
5 KB
5 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1093170163103555584/UMyLDx5n?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40EB) /
Resource Hash
ca705f9fbe328fd29b4a61cde0d13806ff4d508c24ca9f49a8884a9016656ef6
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-response-time
140
date
Wed, 13 Feb 2019 13:50:52 GMT
x-content-type-options
nosniff
surrogate-key
card_img card_img/bucket/7 card_img/1093170163103555584
last-modified
Wed, 06 Feb 2019 15:28:51 GMT
server
ECS (fcn/40EB)
access-control-allow-origin
*
x-cache
HIT
content-type
image/jpeg
status
200
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
8225c325d68ef14e092c3a803098d06c
accept-ranges
bytes
content-length
4819
timeline.0940efb0bc0eb82a2de893b3e7b414bf.light.ltr.css
platform.twitter.com/css/ Frame 8E64
55 KB
13 KB
Stylesheet
General
Full URL
https://platform.twitter.com/css/timeline.0940efb0bc0eb82a2de893b3e7b414bf.light.ltr.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41A4) /
Resource Hash
7cbb0e141a91d2c3c30c06148c1a32c2437ea6452f107a4e1fb0c032708a1295

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 13 Feb 2019 13:50:52 GMT
Content-Encoding
gzip
Last-Modified
Tue, 12 Feb 2019 18:30:32 GMT
Server
ECS (fcn/41A4)
Etag
"db7cf7a65ee339eb82d0f17892ef631f+gzip"
Vary
Accept-Encoding
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Cache-Control
public, max-age=315360000
Content-Type
text/css; charset=utf-8
Content-Length
12542
timeline.0940efb0bc0eb82a2de893b3e7b414bf.light.ltr.css
platform.twitter.com/css/
55 KB
55 KB
Image
General
Full URL
https://platform.twitter.com/css/timeline.0940efb0bc0eb82a2de893b3e7b414bf.light.ltr.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41A4) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 13 Feb 2019 13:50:52 GMT
Content-Encoding
gzip
Last-Modified
Tue, 12 Feb 2019 18:30:32 GMT
Server
ECS (fcn/41A4)
Etag
"db7cf7a65ee339eb82d0f17892ef631f+gzip"
Vary
Accept-Encoding
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Cache-Control
public, max-age=315360000
Content-Type
text/css; charset=utf-8
Content-Length
12542
r
amp-error-reporting.appspot.com/ Frame 8A8D
2 B
153 B
XHR
General
Full URL
https://amp-error-reporting.appspot.com/r
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:820::2014 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/ Express
Resource Hash
565339bc4d33d72817b583024112eb7f5cdf3e5eef0252d6ec1b9c9a94e12bb3

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Origin
https://www.darkreading.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Wed, 13 Feb 2019 13:50:52 GMT
via
1.1 google
x-powered-by
Express
status
200
content-type
text/plain; charset=utf-8
access-control-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
2
ad
a.teads.tv/page/11512/
118 B
338 B
XHR
General
Full URL
https://a.teads.tv/page/11512/ad?windowWidth=1600&windowHeight=1200&windowDepth=1&windowReferrerUrl=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&page=%7B%22id%22%3A11512%2C%22placements%22%3A%5B%7B%22id%22%3A21882%2C%22validity%22%3A%7B%22status%22%3Atrue%2C%22reasons%22%3A%5B%5D%7D%2C%22player%22%3A%7B%22width%22%3A489%2C%22height%22%3A275%7D%2C%22slotType%22%3A%22native%22%7D%5D%2C%22gdpr_iab%22%3A%7B%22status%22%3A22%2C%22consent%22%3A%22%22%2C%22reason%22%3A220%7D%7D&userId=f035cc98-086f-40c2-ba0e-c027a97d5f31&formatVersion=2.21.25&env=js-web&netBw=9.4
Requested by
Host: a.teads.tv
URL: https://a.teads.tv/media/format/v3/teads-format.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.211.0.4 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-211-0-4.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
f50167bee40cd7fdd6c623efb794e0edddec7de87ef71f48c8b1b1413e1dfc4a

Request headers

Accept
application/json; charset=UTF-8
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Origin
https://www.darkreading.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 13 Feb 2019 13:50:52 GMT
content-encoding
gzip
status
200
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
https://www.darkreading.com
cache-control
max-age=0, no-cache, no-store
access-control-allow-credentials
true
content-length
129
expires
Wed, 13 Feb 2019 13:50:52 GMT
A4mG0U5P_normal.jpg
pbs.twimg.com/profile_images/885169621795565573/ Frame 8E64
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/885169621795565573/A4mG0U5P_normal.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40B4) /
Resource Hash
25b438de3e944547e69c6de98e403f46a9aa4fb98e6d1bb34954fd30ebc19b56
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-response-time
228
date
Wed, 13 Feb 2019 13:50:52 GMT
x-content-type-options
nosniff
surrogate-key
profile_images profile_images/bucket/8 profile_images/885169621795565573
last-modified
Wed, 12 Jul 2017 16:08:58 GMT
server
ECS (fcn/40B4)
access-control-allow-origin
*
x-cache
HIT
content-type
image/jpeg
status
200
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
6f20ab40467a67fba2a8c4cd252665ef
accept-ranges
bytes
content-length
1883
syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
ton.twimg.com/tfw/css/ Frame 8E64
44 KB
7 KB
Stylesheet
General
Full URL
https://ton.twimg.com/tfw/css/syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/418C) /
Resource Hash
a549034009f79ead18a2154a8b730d8acb61e2f36c0434c0f9cff0f73df5d8cf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:52 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-ton-expected-size
45170
x-cache
HIT
status
200
content-length
6944
x-response-time
119
surrogate-key
tfw
last-modified
Fri, 25 Jan 2019 15:01:44 GMT
server
ECS (fcn/418C)
etag
"4mhImCFS9rptiUICNnLD1g=="
vary
Accept-Encoding
content-type
text/css
access-control-allow-origin
https://twitter.com
x-connection-hash
c5f043b60b3bffbbd5e1bad6ae48e89e
accept-ranges
bytes
expires
Wed, 20 Feb 2019 13:50:52 GMT
syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
ton.twimg.com/tfw/css/
44 KB
44 KB
Image
General
Full URL
https://ton.twimg.com/tfw/css/syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/418C) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:52 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-ton-expected-size
45170
x-cache
HIT
status
200
content-length
6944
x-response-time
119
surrogate-key
tfw
last-modified
Fri, 25 Jan 2019 15:01:44 GMT
server
ECS (fcn/418C)
etag
"4mhImCFS9rptiUICNnLD1g=="
vary
Accept-Encoding
content-type
text/css
access-control-allow-origin
https://twitter.com
x-connection-hash
c5f043b60b3bffbbd5e1bad6ae48e89e
accept-ranges
bytes
expires
Wed, 20 Feb 2019 13:50:52 GMT
truncated
/ Frame 8E64
825 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
45055babdbc02ea34c7baa53f33fc68389c4c5f73afe0bfafd6c9bc5733399bc

Request headers

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/ Frame 8E64
572 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
abd2a457215e60ab60b2a6b4f25a17583c5d80e13935f76e097236f729c5dcd6

Request headers

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/ Frame 8E64
644 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a87f4fd815fc95288f2da6efc536c950ef940bd9eb52176fd9e8e56107cc65e2

Request headers

Response headers

Content-Type
image/svg+xml;charset=utf-8
css
fonts.googleapis.com/ Frame 2F87
256 B
309 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Lato:400&text=BCEGLORSU
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:824::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
8254dea6b4037a79f8cd6e5352d2d19084ac2057211fb88a5f15c55df0da351e
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Wed, 13 Feb 2019 13:50:52 GMT
server
ESF
access-control-allow-origin
*
date
Wed, 13 Feb 2019 13:50:52 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
x-xss-protection
1; mode=block
expires
Wed, 13 Feb 2019 13:50:52 GMT
iframe
sync.teads.tv/ Frame 26BF
0
0
Document
General
Full URL
https://sync.teads.tv/iframe?pid=21882&userId=f035cc98-086f-40c2-ba0e-c027a97d5f31&gdprIab={%22status%22:22,%22consent%22:%22%22,%22reason%22:220}&1550065852844
Requested by
Host: a.teads.tv
URL: https://a.teads.tv/media/format/v3/teads-format.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.211.0.4 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-211-0-4.deploy.static.akamaitechnologies.com
Software
akka-http/10.1.5 /
Resource Hash

Request headers

:method
GET
:authority
sync.teads.tv
:scheme
https
:path
/iframe?pid=21882&userId=f035cc98-086f-40c2-ba0e-c027a97d5f31&gdprIab={%22status%22:22,%22consent%22:%22%22,%22reason%22:220}&1550065852844
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
accept-encoding
gzip, deflate, br
cookie
tt_viewer=cbecedb8-4716-4985-8640-b1669ddd5989
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825

Response headers

status
200
content-type
text/html; charset=UTF-8
server
akka-http/10.1.5
content-length
1368
expires
Wed, 13 Feb 2019 13:50:52 GMT
cache-control
max-age=0, no-cache, no-store
pragma
no-cache
date
Wed, 13 Feb 2019 13:50:52 GMT
set-cookie
tt_exelate=; Expires=Thu, 14 Feb 2019 13:50:52 GMT; Domain=.teads.tv tt_bluekai=; Expires=Thu, 14 Feb 2019 13:50:52 GMT; Domain=.teads.tv tt_emetriq=; Expires=Thu, 14 Feb 2019 13:50:52 GMT; Domain=.teads.tv tt_liveramp=; Expires=Thu, 14 Feb 2019 13:50:52 GMT; Domain=.teads.tv tt_neustar=; Expires=Thu, 14 Feb 2019 13:50:52 GMT; Domain=.teads.tv
Left_Of_Breach.jpg
cache-ssl.celtra.com/api/blobs/a5ff4deb516e26d838de499235f2aa0e35d7ed1726f8311a711eaba3f4049566/ Frame 2F87
7 KB
7 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/a5ff4deb516e26d838de499235f2aa0e35d7ed1726f8311a711eaba3f4049566/Left_Of_Breach.jpg?transform=crush&quality=85
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.4 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-4.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
f2e29a56942dadb86e7f5efb6355eef7c24c481cfe719cfb480f633c44657aa8

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 14 Dec 2018 11:30:11 GMT
via
1.1 varnish (Varnish/5.0), 1.1 d7524ff4a82155dd51a24800cf39deec.cloudfront.net (CloudFront)
age
5278841
x-cache
Hit from cloudfront
status
200
content-length
6979
server
Apache
etag
"f2e29a56942dadb86e7f5efb6355eef7c24c481cfe719cfb480f633c44657aa8"
x-varnish
15379868 15660159
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
PkAAeFurFqUE88a6f1eAZKrZeEXJCmdQ92lTohe5dTxe8L56CufEQw==
6%20Keys%20to%20Faster%20Phishing%20Mitigation.jpg
cache-ssl.celtra.com/api/blobs/378b73192923fef1a5427d9e288a201ce4418f63daf4c08d41edd1bbb2924a16/ Frame 2F87
9 KB
10 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/378b73192923fef1a5427d9e288a201ce4418f63daf4c08d41edd1bbb2924a16/6%20Keys%20to%20Faster%20Phishing%20Mitigation.jpg?transform=crush&quality=85
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.4 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-4.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
1ebb51de1d2f3a2375e2670a67c1f8a0bff44c63d15989850db4d38df7909830

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 14 Dec 2018 11:37:57 GMT
via
1.1 varnish (Varnish/5.0), 1.1 d7524ff4a82155dd51a24800cf39deec.cloudfront.net (CloudFront)
age
5278374
x-cache
Hit from cloudfront
status
200
content-length
9669
server
Apache
etag
"1ebb51de1d2f3a2375e2670a67c1f8a0bff44c63d15989850db4d38df7909830"
x-varnish
15984456
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
s_F1732WejJNfRQhmVAqT9oohuLyTe0TRouOU7YQNHKqG0wsLc4d_Q==
Cofense-Industry-Brief_Healthcare.jpg
cache-ssl.celtra.com/api/blobs/35347c482ceec5bfd4eb6bfe542bfdf4471e029eb9f9d04bcf4806a4646b98f9/ Frame 2F87
10 KB
10 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/35347c482ceec5bfd4eb6bfe542bfdf4471e029eb9f9d04bcf4806a4646b98f9/Cofense-Industry-Brief_Healthcare.jpg?transform=crush&quality=85
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.4 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-4.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
0eccfee0ec7d8c1c489979adb6412501abbc4e157ba0da02797847df5bba2b2a

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 14 Dec 2018 11:30:11 GMT
via
1.1 varnish (Varnish/5.0), 1.1 d7524ff4a82155dd51a24800cf39deec.cloudfront.net (CloudFront)
age
5278841
x-cache
Hit from cloudfront
status
200
content-length
10188
server
Apache
etag
"0eccfee0ec7d8c1c489979adb6412501abbc4e157ba0da02797847df5bba2b2a"
x-varnish
17558204 19630607
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
I1zUy1TJ-U6vZvoOuDH1jEDiKDN3ATd6kNPo4UZwbYYo7CXEQ4J25g==
19-Minutes%20eBook.jpg
cache-ssl.celtra.com/api/blobs/03f7bf90e12bbc372f1581074f6ad2b0c7ca66fbe470785c12f2d05dbda6ed93/ Frame 2F87
12 KB
13 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/03f7bf90e12bbc372f1581074f6ad2b0c7ca66fbe470785c12f2d05dbda6ed93/19-Minutes%20eBook.jpg?transform=crush&quality=85
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.4 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-4.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
df8db2b027a322ba9edcf09d3c147c69266789cead4d5560c2fe8ca8e715c80d

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 14 Dec 2018 11:30:11 GMT
via
1.1 varnish (Varnish/5.0), 1.1 d7524ff4a82155dd51a24800cf39deec.cloudfront.net (CloudFront)
age
5278841
x-cache
Hit from cloudfront
status
200
content-length
12415
server
Apache
etag
"df8db2b027a322ba9edcf09d3c147c69266789cead4d5560c2fe8ca8e715c80d"
x-varnish
12920723 10632567
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
7JnLE_ab2qGk3j5Hp713heEgTnx5ACD7G9MagUXdDaOEPOMWauvJLA==
imgad
tpc.googlesyndication.com/pagead/
10 KB
10 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/imgad?id=CICAgKDrwaDuWRABGAEyCKhs-fY_ofWG
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
1c7e2ae00c94ed9688c61c6924bfd8c8b2a3bfc350559756342dcb61aa993f98
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 13 Feb 2019 11:05:16 GMT
x-content-type-options
nosniff
server
cafe
age
9936
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=604800
content-type
image/jpeg
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
9768
x-xss-protection
1; mode=block
expires
Wed, 20 Feb 2019 11:05:16 GMT
yt_hover.png
cache-ssl.celtra.com/api/blobs/05c871534a66ba01deefbc75b6ed2f9281993581e903223785a6f6a7ff82bebb/ Frame 2F87
918 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/05c871534a66ba01deefbc75b6ed2f9281993581e903223785a6f6a7ff82bebb/yt_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.4 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-4.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
6e504d72d0b8fe63b71774d746594a7d13607ee5313241cc546a1bcd47909677

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 08 Dec 2017 20:26:37 GMT
via
1.1 varnish (Varnish/5.0), 1.1 d7524ff4a82155dd51a24800cf39deec.cloudfront.net (CloudFront)
age
5764949
x-cache
Hit from cloudfront
status
200
content-length
918
server
Apache
etag
"6e504d72d0b8fe63b71774d746594a7d13607ee5313241cc546a1bcd47909677"
x-varnish
77243550
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
0GoRfBLWXVURwqozmBnvAb-ZWtGUzvKjxjCFHG_2hkLYXBzvuU5AQw==
yt.png
cache-ssl.celtra.com/api/blobs/13d77e3befd746d58356da2f0b0d1d20af11ba13ea0ca8cd7b73871ef1d40edd/ Frame 2F87
914 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/13d77e3befd746d58356da2f0b0d1d20af11ba13ea0ca8cd7b73871ef1d40edd/yt.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.4 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-4.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
8c792dc2527753d5f758a812c5de2225dba619ecd83b05713ce68b0db858fa28

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 09 Nov 2017 02:40:03 GMT
via
1.1 varnish, 1.1 d7524ff4a82155dd51a24800cf39deec.cloudfront.net (CloudFront)
age
8334533
x-cache
Hit from cloudfront
status
200
content-length
914
server
Apache
etag
"8c792dc2527753d5f758a812c5de2225dba619ecd83b05713ce68b0db858fa28"
x-varnish
1057753892
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
0xExctZO8HIxZTMP8j0NvYYULc9f0fJ-23Qj1lrNfuU-3VL_Z2frIA==
li_hover.png
cache-ssl.celtra.com/api/blobs/e3228348fc17573d7db7d135ba5cf60985157f70dae6643939d3a6686b2aa699/ Frame 2F87
591 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/e3228348fc17573d7db7d135ba5cf60985157f70dae6643939d3a6686b2aa699/li_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.4 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-4.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
c19345a03fed44d267abbe2f427bdcd261aa86a447320f15f3eef8e121690794

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 07 Nov 2017 16:35:20 GMT
via
1.1 varnish, 1.1 d7524ff4a82155dd51a24800cf39deec.cloudfront.net (CloudFront)
age
8457232
x-cache
Hit from cloudfront
status
200
content-length
591
server
Apache
etag
"c19345a03fed44d267abbe2f427bdcd261aa86a447320f15f3eef8e121690794"
x-varnish
2142134884
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
9S7zx0UXTuYwSjY5w_vX22BPlAbl6Rd2axndIC6XR5J2v5XRrobNPw==
li.png
cache-ssl.celtra.com/api/blobs/2e1d1ae5940fbdaa5f95c1c17393175faf02b27a8c6b37dca2419c70113760ab/ Frame 2F87
585 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/2e1d1ae5940fbdaa5f95c1c17393175faf02b27a8c6b37dca2419c70113760ab/li.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.4 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-4.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
d10a2d03c9fb4943f449b97d333b8d22990200afa70d13d5c1c23ad4d783200c

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 18 Dec 2017 08:12:27 GMT
via
1.1 varnish (Varnish/5.0), 1.1 d7524ff4a82155dd51a24800cf39deec.cloudfront.net (CloudFront)
age
4890246
x-cache
Hit from cloudfront
status
200
content-length
585
server
Apache
etag
"d10a2d03c9fb4943f449b97d333b8d22990200afa70d13d5c1c23ad4d783200c"
x-varnish
768925
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
7YRF2FbvEtL013EwhOdpTnjw_WFbcj_gDPf1DEzW-Ed5bx6FTVCYMw==
fb_hover.png
cache-ssl.celtra.com/api/blobs/652ab50d0e331e4269bb4d847fcc5a5a4e3def07bb1ebca4d2d6fda889e52604/ Frame 2F87
348 B
814 B
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/652ab50d0e331e4269bb4d847fcc5a5a4e3def07bb1ebca4d2d6fda889e52604/fb_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.4 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-4.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
9250f0b586e89674ec647d8dfb6fe7aedcb588be13ebb6aeb1286efa9d3cfb39

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 09 Nov 2017 10:59:07 GMT
via
1.1 varnish, 1.1 d7524ff4a82155dd51a24800cf39deec.cloudfront.net (CloudFront)
age
8304657
x-cache
Hit from cloudfront
status
200
content-length
348
server
Apache
etag
"9250f0b586e89674ec647d8dfb6fe7aedcb588be13ebb6aeb1286efa9d3cfb39"
x-varnish
2142601760
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
odR647hU13WjWGIu9sG1fqGlD5CsEVcZhQhKGWxYdjLezcTwMxutww==
fb.png
cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/ Frame 2F87
348 B
816 B
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/fb.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.4 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-4.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 09 Nov 2017 02:12:32 GMT
via
1.1 varnish, 1.1 d7524ff4a82155dd51a24800cf39deec.cloudfront.net (CloudFront)
age
8335371
x-cache
Hit from cloudfront
status
200
content-length
348
server
Apache
etag
"e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395"
x-varnish
1596235338
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
O7rnJM3QNHD3GSfctLakxqIyrnfJz4yl1klYAQk5VKiAG5zHlGVBvA==
tw.png
cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/ Frame 2F87
781 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/tw.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.4 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-4.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 18 Dec 2017 08:12:27 GMT
via
1.1 varnish (Varnish/5.0), 1.1 d7524ff4a82155dd51a24800cf39deec.cloudfront.net (CloudFront)
age
4890245
x-cache
Hit from cloudfront
status
200
content-length
781
server
Apache
etag
"308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96"
x-varnish
5839833
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
D93kawA5SDb-wRc_WliE4v1WX0r1njoM3PQ8j2osw51xSUNINS9HOw==
tw_hover.png
cache-ssl.celtra.com/api/blobs/f0cccd681d168932db801410643c93f0df03370d5c638ab3e4a16e92b80b3aa0/ Frame 2F87
777 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/f0cccd681d168932db801410643c93f0df03370d5c638ab3e4a16e92b80b3aa0/tw_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.4 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-4.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
1ace1b17e77ec3828eda87eb3fea3671ce2a0f706426fbd158873546c4f9366e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Sep 2017 05:30:55 GMT
via
1.1 varnish, 1.1 d7524ff4a82155dd51a24800cf39deec.cloudfront.net (CloudFront)
age
12125405
x-cache
Hit from cloudfront
status
200
content-length
777
server
Apache
etag
"1ace1b17e77ec3828eda87eb3fea3671ce2a0f706426fbd158873546c4f9366e"
x-varnish
1188842914
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
1U_WsHa96W3ImGM96QFYdbSjolILWShP0tVLU28Rr09rlx_n-cdzmA==
rss.png
cache-ssl.celtra.com/api/blobs/b1cdc0ecb51975dba9ab6759d0985f34bf971d517bb87e169f46d806ce108101/ Frame 2F87
988 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/b1cdc0ecb51975dba9ab6759d0985f34bf971d517bb87e169f46d806ce108101/rss.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.4 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-4.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
4e668c3c5ead2707062c31387d0b2fc6883cbff5895585e08d923f3759a33140

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 08 Dec 2017 10:16:54 GMT
via
1.1 varnish (Varnish/5.0), 1.1 d7524ff4a82155dd51a24800cf39deec.cloudfront.net (CloudFront)
age
5799658
x-cache
Hit from cloudfront
status
200
content-length
988
server
Apache
etag
"4e668c3c5ead2707062c31387d0b2fc6883cbff5895585e08d923f3759a33140"
x-varnish
46114625
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
f7bYyKQj7YvMNc1_L_JWAWUtZ2eXrpQ1Cr4rECT3xFpd0ANAKJjIYg==
rss_hover.png
cache-ssl.celtra.com/api/blobs/82a3278077b1fa57b623faca8218253948280aafcfffcf15d53c579aeff15a03/ Frame 2F87
990 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/82a3278077b1fa57b623faca8218253948280aafcfffcf15d53c579aeff15a03/rss_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.4 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-4.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
2b8322bfccaa5c0aa4a37e06b916b11d517b7a2974ce3cd810ea57ba3a1ffd68

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 18 Dec 2017 09:06:42 GMT
via
1.1 varnish (Varnish/5.0), 1.1 d7524ff4a82155dd51a24800cf39deec.cloudfront.net (CloudFront)
age
4941785
x-cache
Hit from cloudfront
status
200
content-length
990
server
Apache
etag
"2b8322bfccaa5c0aa4a37e06b916b11d517b7a2974ce3cd810ea57ba3a1ffd68"
x-varnish
2571162
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
OsId82UN5-85Htc81dV16V1G-rtPtlBAHrxm6p8PY6vVgnHZlokIEw==
If%20It%20Ain%E2%80%99t%20Broke%2C%20Don%E2%80%99t%20Fix%20It.jpg
cache-ssl.celtra.com/api/blobs/7d58a56cbea63adf7496d899d065b6c0e59ff41df9b1268005fb2a360b01a3a4/ Frame 2F87
5 KB
6 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/7d58a56cbea63adf7496d899d065b6c0e59ff41df9b1268005fb2a360b01a3a4/If%20It%20Ain%E2%80%99t%20Broke%2C%20Don%E2%80%99t%20Fix%20It.jpg?transform=crush&quality=85
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.4 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-4.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
1cb67d73df5216ff625f07baa6deed245e6bebbc54cf70067a104cbec915870b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 14 Dec 2018 11:31:38 GMT
via
1.1 varnish (Varnish/5.0), 1.1 d7524ff4a82155dd51a24800cf39deec.cloudfront.net (CloudFront)
age
5278754
x-cache
Hit from cloudfront
status
200
content-length
5474
server
Apache
etag
"1cb67d73df5216ff625f07baa6deed245e6bebbc54cf70067a104cbec915870b"
x-varnish
19466324 15998263
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
QfEUlADHP6Xt8PpT1HytXYkuhYAfe2Tn130Zv47gMgSvd8EEdqEIag==
CofenseLogo.jpg
cache-ssl.celtra.com/api/blobs/8db61dd4d959e8560b4d34f23ec5fbe46c9261ef0a2b7432c2f64e41569b2f0f/ Frame 2F87
4 KB
5 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/8db61dd4d959e8560b4d34f23ec5fbe46c9261ef0a2b7432c2f64e41569b2f0f/CofenseLogo.jpg?transform=crush&quality=85
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.4 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-4.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
69a8898361de3dce6489d6d698d64d9351af0fa0f680300fd97af3b6db377ec6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 03 May 2018 21:11:11 GMT
via
1.1 varnish (Varnish/5.0), 1.1 d7524ff4a82155dd51a24800cf39deec.cloudfront.net (CloudFront)
age
24683981
x-cache
Hit from cloudfront
status
200
content-length
4458
server
Apache
etag
"69a8898361de3dce6489d6d698d64d9351af0fa0f680300fd97af3b6db377ec6"
x-varnish
70386675
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
iVPWNcoOXziHjjJAjYJBOjPICMhhHyrj-xyCkxd6w6zuA44LKQ2RKw==
activeview
pagead2.googlesyndication.com/pcs/ Frame FA56
42 B
291 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsvxVx3mIEZmfBE3efIMgwzm5rDzTODl0g2Iphm1truNnX5syNhJ8D_Wu_VGKg56EIpQA2dD5d1-9ucgHj2cISaYgbyc7yAsjm7wIWo&sig=Cg0ArKJSzJr5z1By3nxXEAE&adk=770981021&tt=-1&bs=1585%2C1200&mtos=1020,1020,1020,1020,1020&tos=1020,0,0,0,0&p=13,0,15,2&mcvt=1020&rs=3&ht=0&tfs=181&tls=1201&mc=1&lte=1&bas=0&bac=0&avms=geo&rst=1550065851427&rpt=249&isd=0&msd=0&lm=2&oseid=2&xdi=0&ps=1585%2C1215&ss=1600%2C1200&pt=-1&deb=1-3-8-12-9-23-60-7&tvt=1189&r=v&id=osdim&uc=9&upc=9&tgt=DIV&cl=1&cec=7&clc=0&cac=0&cd=2x2&v=20190211
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:820::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 13 Feb 2019 13:50:52 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame D020
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsuzLiU5C1UfQYJZf9edWn2ovAl5XySvlS78qRH1RzizmyqAQiDDexYQIS96icTYK-Kgj_6wFopcCyoO6BsLURrZefdUi-xZsgLEQ7A&sig=Cg0ArKJSzOfc_cnqE9pIEAE&adk=2332965166&tt=-1&bs=1585%2C1200&mtos=1182,1182,1182,1182,1182&tos=1182,0,0,0,0&p=351,293,353,294&mcvt=1182&rs=3&ht=0&tfs=19&tls=1201&mc=1&lte=1&bas=0&bac=0&avms=geo&rst=1550065851445&rpt=224&isd=0&msd=0&lm=2&oseid=2&xdi=0&ps=1585%2C1215&ss=1600%2C1200&pt=-1&deb=1-3-8-12-9-23-60-7&tvt=1189&r=v&id=osdim&uc=9&upc=8&tgt=DIV&cl=1&cec=8&clc=0&cac=0&cd=1x2&v=20190211
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:820::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 13 Feb 2019 13:50:52 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
font
fonts.gstatic.com/l/ Frame 2F87
1 KB
2 KB
Font
General
Full URL
https://fonts.gstatic.com/l/font?kit=S6uyw4BMUTPHvxw6WQevLi6qrphyorsKhZs&skey=2d58b92a99e1c086&v=v14
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:817::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
94196d918d14891a0809d303fe709c1e28dd1827657d92e40244832999528aa3
Security Headers
Name Value
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Lato:400&text=BCEGLORSU
Origin
https://www.darkreading.com

Response headers

date
Tue, 12 Feb 2019 16:08:16 GMT
last-modified
Wed, 11 Oct 2017 18:44:21 GMT
server
ESF
age
78156
x-frame-options
SAMEORIGIN
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
cache-control
private, max-age=86400
content-disposition
attachment; filename="font.woff2"; filename*=UTF-8''font.woff2
timing-allow-origin
*
access-control-allow-origin
*
content-length
1512
x-xss-protection
1; mode=block
expires
Tue, 12 Feb 2019 16:08:16 GMT
r
amp-error-reporting.appspot.com/ Frame C466
2 B
64 B
XHR
General
Full URL
https://amp-error-reporting.appspot.com/r
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:820::2014 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/ Express
Resource Hash
565339bc4d33d72817b583024112eb7f5cdf3e5eef0252d6ec1b9c9a94e12bb3

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Origin
https://www.darkreading.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Wed, 13 Feb 2019 13:50:53 GMT
via
1.1 google
x-powered-by
Express
status
200
content-type
text/plain; charset=utf-8
access-control-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
2
r
amp-error-reporting.appspot.com/ Frame F70C
2 B
64 B
XHR
General
Full URL
https://amp-error-reporting.appspot.com/r
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:820::2014 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/ Express
Resource Hash
565339bc4d33d72817b583024112eb7f5cdf3e5eef0252d6ec1b9c9a94e12bb3

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Origin
https://www.darkreading.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Wed, 13 Feb 2019 13:50:53 GMT
via
1.1 google
x-powered-by
Express
status
200
content-type
text/plain; charset=utf-8
access-control-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
2
activeview
pagead2.googlesyndication.com/pcs/ Frame 8A8D
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsvnE1HyzCqOq0ZvscFXu9wuMuHl29aRKCZQ9xzpJULlGMsA65i4XLYaqJNFbQ53kwnGELea_ktz4EuIf0_utH6S3WgrE4yWgiBMFDQ&sig=Cg0ArKJSzNmnqkCA_-lXEAE&id=ampim&o=428,76&d=728,90&ss=1600,1200&bs=1600,1200&mcvt=1031&mtos=0,0,1031,1031,1031&tos=0,0,1031,0,0&tfs=183&tls=1214&g=100&h=100&pt=532&tt=1215&rpt=532&rst=1550065851450&r=v&adk=2966194094&avms=ampa
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:820::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 13 Feb 2019 13:50:53 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame F70C
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjssEM6_VMp4VjXTi0LZ-O_91ogqhDdDpeilnCMdBZ_flnCYtTfmmsT-M2fZsMsPxa1n1YYBXtrh04mW0kC-lXVasKS1a1rA0FF043W8&sig=Cg0ArKJSzMyrQAr3fHSUEAE&id=ampim&o=952,468&d=301,251&ss=1600,1200&bs=1600,1200&mcvt=1020&mtos=0,0,1020,1020,1020&tos=0,0,1020,0,0&tfs=172&tls=1192&g=100&h=100&pt=146&tt=1192&rpt=146&rst=1550065851872&r=v&adk=4220632109&avms=ampa
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:820::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 13 Feb 2019 13:50:53 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
news_stroke_v1_78ce5b21fb24a7c7e528d22fc25bd9f9df7f24e2.svg
ton.twimg.com/tfw/assets/ Frame 8E64
829 B
566 B
Image
General
Full URL
https://ton.twimg.com/tfw/assets/news_stroke_v1_78ce5b21fb24a7c7e528d22fc25bd9f9df7f24e2.svg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41AC) /
Resource Hash
5c0f79d0286f1fd3db48e1b689358017b302c0f4babde540329e8c644cf119c7
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://ton.twimg.com/tfw/css/syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 13:50:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-ton-expected-size
829
x-cache
HIT
status
200
content-length
395
x-response-time
132
surrogate-key
tfw
last-modified
Fri, 25 Jan 2019 15:01:44 GMT
server
ECS (fcn/41AC)
etag
"CTUg6L9PuY+d9h5xpE0zmw=="
vary
Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
https://twitter.com
x-connection-hash
102560b0527b48d88137c5b7e834a1f2
accept-ranges
bytes
expires
Wed, 20 Feb 2019 13:50:53 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTUwMDY1ODUyeDBjNTY1ZDFiMzVhNjk5eDQ2NjU2NDYyIiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1NTUwODE5NTcwNzE3MzY5IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.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?crc32c=943124334
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.3.209 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-3-209.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 13 Feb 2019 13:50:53 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTUwMDY1ODUyeDBjNTY1ZDFiMzVhNjk5eDQ2NjU2NDYyIiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1NTUwODE5NTcwNzE3MzY5IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTUwMDY1ODUyeDBjNTY1ZDFiMzVhNjk5eDQ2NjU2NDYyIiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1NTUwODE5NTcwNzE3MzY5IiwiaW5kZXgiOjQsImNsaWVudFRpbWVzdGFtcCI6MTU1MDA2NTg1My4yODEsIm5hbWUiOiJ2aWV3YWJsZTAwIiwiY3JpdGVyaW9uIjp7Im5hbWUiOiJDb3JlIiwicmF0aW8iOjAsInRpbWUiOjB9fSx7InNlc3Npb25JZCI6InMxNTUwMDY1ODUyeDBjNTY1ZDFiMzVhNjk5eDQ2NjU2NDYyIiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1NTUwODE5NTcwNzE3MzY5IiwiaW5kZXgiOjUsImNsaWVudFRpbWVzdGFtcCI6MTU1MDA2NTg1My4yODcsInVuaXROYW1lIjoiYmFubmVyIiwidW5pdFZhcmlhbnRMb2NhbElkIjpudWxsLCJzY3JlZW5Mb2NhbElkIjoxMzY4LCJzY3JlZW5UaXRsZSI6IlJlc291cmNlcyIsInNjcmVlbklzTWFzdGVyIjpmYWxzZSwib2JqZWN0TG9jYWxJZCI6bnVsbCwib2JqZWN0TmFtZSI6bnVsbCwib2JqZWN0Q2xhenoiOm51bGwsImluaXRpYXRpb25UaW1lc3RhbXAiOjE1NTAwNjU4NTMuMjg2LCJuYW1lIjoic2NyZWVuU2hvd24ifSx7InNlc3Npb25JZCI6InMxNTUwMDY1ODUyeDBjNTY1ZDFiMzVhNjk5eDQ2NjU2NDYyIiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1NTUwODE5NTcwNzE3MzY5IiwiaW5kZXgiOjYsImNsaWVudFRpbWVzdGFtcCI6MTU1MDA2NTg1My4yODcsIm5hbWUiOiJjcmVhdGl2ZVJlbmRlcmVkIn1dfQ==?crc32c=2106231280
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.3.209 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-3-209.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 13 Feb 2019 13:50:53 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTUwMDY1ODUyeDBjNTY1ZDFiMzVhNjk5eDQ2NjU2NDYyIiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1NTUwODE5NTcwNzE3MzY5IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTUwMDY1ODUyeDBjNTY1ZDFiMzVhNjk5eDQ2NjU2NDYyIiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1NTUwODE5NTcwNzE3MzY5IiwiaW5kZXgiOjcsImNsaWVudFRpbWVzdGFtcCI6MTU1MDA2NTg1My40MDgsIm5hbWUiOiJ2aWV3YWJsZVRpbWUiLCJmcm9tIjoxNTUwMDY1ODUzLjI4NCwidG8iOjE1NTAwNjU4NTMuMjg0fV19?crc32c=3173198272
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.3.209 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-3-209.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 13 Feb 2019 13:50:53 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTUwMDY1ODUyeDBjNTY1ZDFiMzVhNjk5eDQ2NjU2NDYyIiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1NTUwODE5NTcwNzE3MzY5IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTUwMDY1ODUyeDBjNTY1ZDFiMzVhNjk5eDQ2NjU2NDYyIiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1NTUwODE5NTcwNzE3MzY5IiwiaW5kZXgiOjgsImNsaWVudFRpbWVzdGFtcCI6MTU1MDA2NTg1NC4yOTEsIm5hbWUiOiJ2aWV3YWJsZTUwMSIsImNyaXRlcmlvbiI6eyJuYW1lIjoiNTAvMSIsInJhdGlvIjowLjUsInRpbWUiOjEwMDB9fV19?crc32c=633796522
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.3.209 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-3-209.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 13 Feb 2019 13:50:54 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
jot.html
platform.twitter.com/ Frame BFD1
Redirect Chain
  • https://syndication.twitter.com/i/jot
  • https://platform.twitter.com/jot.html
0
0
Document
General
Full URL
https://platform.twitter.com/jot.html
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40B3) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
Origin
null
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Accept-Ranges
bytes
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Wed, 13 Feb 2019 13:50:54 GMT
Etag
"d9592a6c704736fa4da218d4357976dd"
Last-Modified
Tue, 12 Feb 2019 18:31:21 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/40B3)
X-Cache
HIT
Content-Length
80

Redirect headers

status
302 302 Found
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
content-length
0
content-type
text/html;charset=utf-8
date
Wed, 13 Feb 2019 13:50:54 GMT
expires
Tue, 31 Mar 1981 05:00:00 GMT
last-modified
Wed, 13 Feb 2019 13:50:54 GMT
location
https://platform.twitter.com/jot.html
pragma
no-cache
server
tsa_b
strict-transport-security
max-age=631138519
x-connection-hash
bd36b40c6e770db1d05cf95f6a41fed0
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-response-time
15
x-transaction
004f49a200bc0b04
x-tsa-request-body-time
123
x-twitter-response-tags
BouncerCompliant
x-xss-protection
0
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTUwMDY1ODUyeDBjNTY1ZDFiMzVhNjk5eDQ2NjU2NDYyIiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1NTUwODE5NTcwNzE3MzY5IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTUwMDY1ODUyeDBjNTY1ZDFiMzVhNjk5eDQ2NjU2NDYyIiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1NTUwODE5NTcwNzE3MzY5IiwiaW5kZXgiOjksImNsaWVudFRpbWVzdGFtcCI6MTU1MDA2NTg1NC40MjIsIm5hbWUiOiJ2aWV3YWJsZVRpbWUiLCJmcm9tIjoxNTUwMDY1ODUzLjI4NCwidG8iOjE1NTAwNjU4NTQuNDA5fV19?crc32c=1692651970
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.3.209 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-3-209.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 13 Feb 2019 13:50:54 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
roundtrip.js
s.adroll.com/j/
32 KB
11 KB
Script
General
Full URL
https://s.adroll.com/j/roundtrip.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
1683cc734667c1dfc51beef0720d8bc1d085ffc37ad67f0bf02d41ba25ef7551

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
WKgVGNXri8HlRMKT77dpRv7GtBpB06oM
Content-Encoding
gzip
x-amz-request-id
E45FAC093259B4ED
x-amz-server-side-encryption
AES256
Access-Control-Max-Age
600
Date
Wed, 13 Feb 2019 13:50:55 GMT
Connection
keep-alive
Content-Length
10234
x-amz-id-2
gWy/Ko+L5djlHBjSp5/MNfA6hwpkBsfri5oWW9IYSpTX79YdRt9tpfLUmTl40PbLvnTM8RLILZE=
Last-Modified
Mon, 14 Jan 2019 20:17:40 GMT
Server
AmazonS3
ETag
"52bb7d50a9e1537cfef675909b897d91"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=3600, must-revalidate
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
TQSV74R4GVCSJITSZC2MCP
d.adroll.com/consent/check/
40 B
200 B
Script
General
Full URL
https://d.adroll.com/consent/check/TQSV74R4GVCSJITSZC2MCP?_s=557480291692868c10f067ad2c8d5cfe
Requested by
Host: s.adroll.com
URL: https://s.adroll.com/j/roundtrip.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.220.0.18 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-220-0-18.eu-west-1.compute.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
6f43e1e85c42d5e449308701054501d9867a7254c9a8734406afbc89b3dfe5b4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 13 Feb 2019 13:50:55 GMT
Server
nginx/1.12.1
Connection
keep-alive
Content-Length
40
Content-Type
application/javascript
consent.js
s.adroll.com/j/
67 KB
68 KB
Script
General
Full URL
https://s.adroll.com/j/consent.js
Requested by
Host: s.adroll.com
URL: https://s.adroll.com/j/roundtrip.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
4983cd18419e417077dcc013922828394049ce6c65db6a782d2d73f225d46089

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
yvF3y5OARyGYjZyuW4BqgiCbPvLhhPrH
x-amz-request-id
7EBD99F69567301D
x-amz-server-side-encryption
AES256
Date
Wed, 13 Feb 2019 13:50:55 GMT
Connection
keep-alive
Content-Length
68722
x-amz-id-2
ZAMLcakp6pamVvhjTbjoBOeKm/lFBqsh3HyHLH8XDul6YO1D/T5bOMFfxhZ5XZIR3NTSb8PhK6U=
Last-Modified
Thu, 06 Dec 2018 16:37:43 GMT
Server
AmazonS3
ETag
"53cd26585ff224c6851303016ec98536"
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Content-Type
application/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=300, must-revalidate
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTUwMDY1ODUyeDBjNTY1ZDFiMzVhNjk5eDQ2NjU2NDYyIiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1NTUwODE5NTcwNzE3MzY5IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTUwMDY1ODUyeDBjNTY1ZDFiMzVhNjk5eDQ2NjU2NDYyIiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1NTUwODE5NTcwNzE3MzY5IiwiaW5kZXgiOjEwLCJjbGllbnRUaW1lc3RhbXAiOjE1NTAwNjU4NTUuNDM4LCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU1MDA2NTg1NC40MDksInRvIjoxNTUwMDY1ODU1LjQyMn1dfQ==?crc32c=2563545296
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.3.209 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-3-209.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 13 Feb 2019 13:50:55 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
hod
d.adroll.com/consent/
42 B
264 B
Image
General
Full URL
https://d.adroll.com/consent/hod?_e=view_banner&_s=557480291692868c10f067ad2c8d5cfe&_b=626d9f6089ce68&_a=TQSV74R4GVCSJITSZC2MCP
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.220.0.18 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-220-0-18.eu-west-1.compute.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 13 Feb 2019 13:50:55 GMT
Cache-Control
no-transform,public,max-age=300,s-maxage=900
Server
nginx/1.12.1
Connection
keep-alive
Content-Length
42
Vary
Cookie
Content-Type
image/gif
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTUwMDY1ODUyeDBjNTY1ZDFiMzVhNjk5eDQ2NjU2NDYyIiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1NTUwODE5NTcwNzE3MzY5IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTUwMDY1ODUyeDBjNTY1ZDFiMzVhNjk5eDQ2NjU2NDYyIiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1NTUwODE5NTcwNzE3MzY5IiwiaW5kZXgiOjExLCJjbGllbnRUaW1lc3RhbXAiOjE1NTAwNjU4NTYuNDU1LCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU1MDA2NTg1NS40MjIsInRvIjoxNTUwMDY1ODU2LjQzOX1dfQ==?crc32c=1061379993
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.3.209 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-3-209.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 13 Feb 2019 13:50:56 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTUwMDY1ODUyeDBjNTY1ZDFiMzVhNjk5eDQ2NjU2NDYyIiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1NTUwODE5NTcwNzE3MzY5IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTUwMDY1ODUyeDBjNTY1ZDFiMzVhNjk5eDQ2NjU2NDYyIiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1NTUwODE5NTcwNzE3MzY5IiwiaW5kZXgiOjEyLCJjbGllbnRUaW1lc3RhbXAiOjE1NTAwNjU4NTguNDcyLCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU1MDA2NTg1Ni40MzksInRvIjoxNTUwMDY1ODU4LjQ1Nn1dfQ==?crc32c=2070653092
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.3.209 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-3-209.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 13 Feb 2019 13:50:58 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTUwMDY1ODUyeDBjNTY1ZDFiMzVhNjk5eDQ2NjU2NDYyIiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1NTUwODE5NTcwNzE3MzY5IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTUwMDY1ODUyeDBjNTY1ZDFiMzVhNjk5eDQ2NjU2NDYyIiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1NTUwODE5NTcwNzE3MzY5IiwiaW5kZXgiOjEzLCJjbGllbnRUaW1lc3RhbXAiOjE1NTAwNjU4NjAuNDg4LCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU1MDA2NTg1OC40NTYsInRvIjoxNTUwMDY1ODYwLjQ3Mn1dfQ==?crc32c=3296794651
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.3.209 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-3-209.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 13 Feb 2019 13:51:00 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTUwMDY1ODUyeDBjNTY1ZDFiMzVhNjk5eDQ2NjU2NDYyIiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1NTUwODE5NTcwNzE3MzY5IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTUwMDY1ODUyeDBjNTY1ZDFiMzVhNjk5eDQ2NjU2NDYyIiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1NTUwODE5NTcwNzE3MzY5IiwiaW5kZXgiOjE0LCJjbGllbnRUaW1lc3RhbXAiOjE1NTAwNjU4NjIuNTA1LCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU1MDA2NTg2MC40NzIsInRvIjoxNTUwMDY1ODYyLjQ4OH1dfQ==?crc32c=3858681295
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.3.209 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-3-209.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 13 Feb 2019 13:51:02 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTUwMDY1ODUyeDBjNTY1ZDFiMzVhNjk5eDQ2NjU2NDYyIiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1NTUwODE5NTcwNzE3MzY5IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTUwMDY1ODUyeDBjNTY1ZDFiMzVhNjk5eDQ2NjU2NDYyIiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI1NTUwODE5NTcwNzE3MzY5IiwiaW5kZXgiOjE1LCJjbGllbnRUaW1lc3RhbXAiOjE1NTAwNjU4NjQuNTIxLCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU1MDA2NTg2Mi40ODgsInRvIjoxNTUwMDY1ODY0LjUwNX1dfQ==?crc32c=3225879452
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.3.209 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-3-209.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 13 Feb 2019 13:51:04 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0

Verdicts & Comments Add Verdict or Comment

442 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask function| displayDefaultNativeAd function| displayNativeAd function| displayLandingPageNativeAd function| displaySecondLandingPageNativeAd function| displayArticleNativeAd function| displayInsightAd function| displaySASInsightAd object| respond string| theSiteDomain string| theMsgChatQueueInclude string| theChatStatusInclude boolean| doHideShowDivOpacityFade function| MM_swapImgRestore function| MM_preloadImages function| MM_findObj function| MM_swapImage function| MM_openBrWindow function| SwitchColor function| MakeDark function| MakeLight string| pop_collection string| pop_styleObj function| GetObject function| SwitchHTML function| SwitchDivs function| HideDiv function| ShowDiv function| URLEncodeString object| opacitySliderTimeouts function| SlideObjOpacity function| ChangeObjOpacity object| heightSliderTimeouts function| SlideObjHeight function| ChangeObjHeight function| ClearTimeoutArray function| AttachEventFunctionToObject function| RemoveEventFunctionFromObject function| SetCookie function| GetCookie function| AlignObject function| MoveObject function| MoveDivToColTop function| AddEventListenerToObj function| ContentNotifyPrefsShortSubmit function| ContentNotifyPrefsShortGenerateAndDisplayRSSFeed function| RedirectConfirm function| blend function| returnPosYofObj function| returnPosXofObj function| returnCurrentWindowYOffset function| returnCurrentWindowXOffset object| menuMoverTimeouts number| menuMoverTimeoutCounter number| menuMaxOpacity function| ShowMenu function| ChangeObjectLeft function| ChangeObjectTop function| NumStepsToMove function| AddPopMenuEventListener boolean| lockPoppedMenu string| lockedPoppedMenuObjName function| PopMenu object| closeMenuTimeouts number| closeMenuTimeoutCounter function| PopMenuOff number| globalPopXDiff number| globalPopYDiff function| createSubmenu function| LRSliderHandler string| active_pop_collection string| active_pop_styleObj function| GetActiveObject function| PrintActiveContent function| LoadScript function| RemoveScript string| theRateLink function| ShowRateMenu function| ShowSaveInfo function| HideSaveInfo function| HideRateMenu function| RateThis function| ChangeRateMenuFormParam function| BuildAndLoadRateMenuScript function| ClearRateMenuForm function| ClearRateLink function| ContentConsumptionLoggedSuccess function| ContentSignUpLoggedSuccess function| ObjectFader function| PageEffectPopUp function| returnWidthofObj function| cookiesEnabled boolean| pop_ns4 boolean| pop_dom boolean| active_pop_ns4 boolean| active_pop_dom function| $ function| jQuery function| displayWhatsThisBox function| displayPartnerPerspectivesBox function| displayMalwareBytesPartnerPerspectivesBox function| displayEvidentioPartnerPerspectivesBox function| displayF5PartnerPerspectivesBox function| displayBitdefenderPartnerPerspectivesBox function| displayGeneralDynamicsFidelisPartnerPerspectivesBox function| displayPartnerPerspectivesBoxArticle function| displayMalwareBytesPartnerPerspectivesBoxArticle function| displayGigamonPartnerPerspectivesBoxArticle function| displayAuthorInfoBox function| highlightTopStory function| showMobileIconOverlay function| closeMobileOverlayMenu function| goToByScroll function| ToggleNavButtonMenu function| ToggleNavButton object| designlinesSliderHandler string| designlinesLeftArrowButtonMouseoutImgSrc string| designlinesRightArrowButtonMouseoutImgSrc number| oneScrollHeight number| currentTickerItem number| numberOfTickerItems boolean| tickerIsPopulated undefined| tickerTimeout boolean| tickerStopped function| InitializeNewsTicker function| RotateNewsTicker function| StartNewsTicker function| StopNewsTicker boolean| superNavEventsMenuOpen function| ToggleSuperNavEventsMenu function| swipeleftHandler function| swiperightHandler function| tapholdHandler function| tapholdOutHandler function| sizeAnyBrightcoveObjects function| sizeDocImageClass object| jQuery111006091129645160636 object| visitor function| Visitor object| s_c_il number| s_c_in object| adobe object| _AT function| mboxCreate function| mboxDefine function| mboxUpdate string| thePageTitle string| ngenv string| ngserv string| omn_regtrackproduct string| omn_nltrackproduct function| CSBJs_Core function| CSBJs_OOP function| CSBJs_Resources function| CSBJs_ServiceRequest function| CSBJs_Exception function| CSBJs_Ajax function| CSBJs_Decorator function| CSBJs_Decorator_HtmlNode function| CSBJs_App function| CSBJs_App_Window function| CSBJs_App_Window_Modal function| CSBJs_App_Window_Alert function| CSBJs_App_Button function| CSBJs_App_Html function| CSBJs_App_Field function| CSBJs_App_Field_File function| CSBJs_App_Field_TextArea function| CSBJs_Timer function| CSBJs_Form function| CSBJs_Form_Group function| CSBJs_Form_Step function| CSBJs_Form_Element function| CSBJs_Form_Element_Html function| CSBJs_Form_Element_Image function| CSBJs_Form_Element_TextField function| CSBJs_Form_Element_OtherTextField function| CSBJs_Form_Element_Submit function| CSBJs_Form_Element_NextStep function| CSBJs_Form_Element_PreviousStep function| CSBJs_Form_Element_Reset function| CSBJs_Form_Element_Multi function| CSBJs_Form_Element_Select function| CSBJs_Form_Element_Password function| CSBJs_Form_Element_Dynamic function| CSBJs_Form_Element_Hidden function| CSBJs_Form_Element_Checkbox function| CSBJs_Form_Element_Checkboxes function| CSBJs_Form_Element_Radio function| CSBJs_Form_Element_TextArea function| CSBJs_Form_Validation function| CSBJs_Form_Validation_Regex function| CSBJs_Form_Validation_CompareEqual function| CSBJs_Form_Validation_Required function| CSBJs_Form_Validation_JsFunction function| CSBJs_Form_Validation_Ajax function| CSBJs_Form_Validation_JsonP function| CSBJs_Form_Observer function| CSBJs_Form_Observer_Action function| CSBJs_Form_Observer_Action_Hide function| CSBJs_Form_Observer_Action_ChangeDynamic function| CSBJs_Form_Filter function| CSBJs_Form_Filter_Replace function| UBM function| rcCallback string| siteLogo string| privacyLogo string| privacyText string| loginRedirectURL string| loginNextAction string| securityJobAction boolean| reloadOnClose object| ngconfig string| regHeaderContent string| regAction string| ngRegAsset object| loginWidget object| registrationWidget object| updateWidget object| optoutWidget object| newsletterWidget object| newsletterSignupWidget object| externalAuthSuppWidget function| openRegisterThanks function| login function| verifyToken function| securityJobsFromUpdate function| securityJobs function| loginWithMessage function| changePassword function| openForm function| updateForm function| newsletterForm function| newsletterSignupForm function| extAuthSuppForm function| ngLogoutUser function| ngCreateCookie function| ngRreadCookie function| ngEraseCookie function| trackShortRegistrationOpen function| trackSocialMediaBasicRegistration function| trackLongRegistrationOpen function| trackLoginOpen function| trackLoginSuccess function| trackPasswordResetOpen function| trackNewsletterPrefsOpen function| trackNewsletterPrefsConfirm function| trackShortRegistrationConfirm function| trackRegistrationThankYou object| welcomeLinks number| loginCheck string| loginHTML string| loginHTMLMobile function| initGatewayCheck function| setNGReg function| SubmitInPageSurvey number| _doubleclickRand function| jobalert object| _gaq object| _AdsNativeOpts object| googletag object| gptadslots object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleTokenSync object| GPT_jstiming undefined| google_measure_js_timing object| google_reactive_ads_global_state boolean| google_noFetch boolean| google_DisableInitialLoad number| __google_ad_urls_id function| $an function| an_jQuery function| md5 string| txt function| AdsNative function| an_callback_lookup object| _AdsNative object| _comscore function| fbq function| _fbq number| google_unique_id object| gaGlobal object| google_conversion_id object| google_custom_params object| google_remarketing_only function| GooglemKTybQhCsO object| google_conversion_date object| google_conversion_time number| google_conversion_snippets number| google_conversion_first_time object| google_conversion_js_version object| google_conversion_format object| google_enable_display_cookie_match object| google_conversion_type object| google_conversion_order_id object| google_conversion_language object| google_conversion_value object| google_conversion_evaluemrc object| google_conversion_currency object| google_conversion_domain object| google_conversion_label object| google_conversion_color object| google_disable_viewthrough object| google_gtag_event_data object| google_conversion_linker object| google_tag_for_child_directed_treatment object| google_tag_for_under_age_of_consent object| google_allow_ad_personalization_signals object| google_conversion_items object| google_conversion_merchant_id object| google_user_id object| onload_callback object| opt_image_generator object| google_conversion_page_url object| google_conversion_referrer_url object| google_gtm object| google_gcl_cookie_prefix object| google_read_gcl_cookie_opt_out object| google_basket_feed_country object| google_basket_feed_language object| google_basket_discount object| google_basket_transaction_type object| google_disable_merchant_reported_conversions object| google_additional_conversion_params object| uetq object| _gat object| ___grecaptcha_cfg object| grecaptcha boolean| __google_recaptcha_client function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter object| heatmap object| FB function| udm_ object| ns_p object| COMSCORE function| UET object| __google_ad_urls object| NewsletterBox_14004867696102516636 boolean| google_osd_loaded boolean| google_onload_fired object| ampInaboxIframes object| ampInaboxPendingMessages object| __core-js_shared__ object| recaptcha object| __twttrll object| twttr object| __twttr object| AMP_CONFIG object| log object| AMPErrors boolean| ampInaboxInitialized object| AMP_MODE function| reportError object| AMP function| FlipboardWidgets function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| Sslac object| IN function| Togglehottopicseditorschoice object| lwvalues string| valueToUselw function| Toggleliveeventswebinarslive object| video_reportsSliderHandler string| video_reportsLeftArrowButtonMouseoutImgSrc string| video_reportsRightArrowButtonMouseoutImgSrc string| elqSiteID string| elqVer string| elqERoot string| elqSecERoot function| elqErr string| elqCurESite string| elqAltESite number| elqWCount boolean| elqTryI string| elqStr object| elqTID boolean| elqTRun boolean| elqLoad boolean| elqFail string| elqCurE function| elqClearT function| elqWrite function| elqInit function| elqReplace function| elqQString function| elqAddQS object| _elqQ function| postIframe function| ad_block_test string| s_account object| s string| SCCodeVersion function| s_doPlugins function| getHier function| s_getLoadTime function| AppMeasurement_Module_ActivityMap function| AppMeasurement function| s_gi function| s_pgicq number| s_objectID number| s_giq undefined| s_code string| s_hour string| s_day string| s_timepart number| s_loadT string| x number| y number| d object| eo string| f0 object| s_i_cmpglobalvista string| thispage_sharelink string| adroll_adv_id string| adroll_pix_id string| adroll_segments boolean| recaptchaReady object| teadsscript object| __CELTRA object| _elq function| webpackJsonp_teadsformat object| teads boolean| __adroll_loaded string| adroll_sid object| __adroll boolean| adroll_optout object| adroll_ext_network object| adroll_callbacks function| adroll_tpc_callback object| __adroll_consent boolean| __adroll_consent_is_gdpr object| $jscomp string| BANNER_VERSION object| __adroll_consent_banner

32 Cookies

Domain/Path Name / Value
.teads.tv/ Name: tt_neustar
Value:
.teads.tv/ Name: tt_liveramp
Value:
.teads.tv/ Name: tt_emetriq
Value:
.teads.tv/ Name: tt_viewer
Value: cbecedb8-4716-4985-8640-b1669ddd5989
ng.techweb.com/ Name: JSESSIONID
Value: 80DF0D3E5ACD864015A7F53399B559B3
.demdex.net/ Name: demdex
Value: 55984599095969247600160716791589539836
.darkreading.com/ Name: undefined_s
Value: First%20Visit
.darkreading.com/ Name: __cfduid
Value: df05a83b927fc2051de9a57491904c1941550065850
.darkreading.com/ Name: s_vnum
Value: 1551398400224%26vn%3D1
.facebook.com/ Name: fr
Value: 04uX9Xfpqnk14A0Jd..BcZCC7...1.0.BcZCC7.
.darkreading.com/ Name: mbox
Value: session#2ab5af8425774a4c8b97cef434438da0#1550067712|PC#2ab5af8425774a4c8b97cef434438da0.26_5#1613310652
.darkreading.com/ Name: __utma
Value: 199458747.1059710520.1550065851.1550065851.1550065851.1
.darkreading.com/ Name: __utmb
Value: 199458747.1.10.1550065851
.darkreading.com/ Name: s_cc
Value: true
www.darkreading.com/ Name: piddlNGPageReferer
Value: /
.darkreading.com/ Name: s_nr
Value: 1550065852223-New
.darkreading.com/ Name: s_invisit
Value: true
.darkreading.com/ Name: __utmt
Value: 1
.teads.tv/ Name: tt_exelate
Value:
.darkreading.com/ Name: __utmc
Value: 199458747
.darkreading.com/ Name: AMCV_77FB1CFE532B22840A490D45%40AdobeOrg
Value: -330454231%7CMCIDTS%7C17941%7CMCMID%7C48465313890171263150921289782209655055%7CMCAAMLH-1550670651%7C6%7CMCAAMB-1550670651%7C6G1ynYcLPuiQxYZrsz_pkqfLG9yMXBpb2zX5dvJdYQJzPXImdj0y%7CMCOPTOUT-1550073051s%7CNONE%7CMCAID%7CNONE%7CMCSYNCSOP%7C411-17948%7CvVersion%7C3.1.2
.teads.tv/ Name: tt_bluekai
Value:
.darkreading.com/ Name: __utmz
Value: 199458747.1550065851.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)
www.darkreading.com/ Name: darkreading%5Fvisits
Value: 3
www.darkreading.com/ Name: piddlNGSiteReferer
Value: /
.darkreading.com/ Name: _fbp
Value: fb.1.1550065851531.1009155306
.darkreading.com/ Name: __gads
Value: ID=8edbd913cbfa2268:T=1550065851:S=ALNI_MYCSLtih_qau3Uct3dWM1SvlOIhkQ
www.darkreading.com/ Name: darkreading_lastvisit
Value: 2/13/2019 8:50:51 AM
www.darkreading.com/ Name: darkreading%2Dmeter
Value: 1333825
www.darkreading.com/ Name: cplChannelTagID
Value:
.darkreading.com/ Name: check
Value: true
.darkreading.com/ Name: AMCVS_77FB1CFE532B22840A490D45%40AdobeOrg
Value: 1

9 Console Messages

Source Level URL
Text
console-api info URL: https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js(Line 544)
Message:
Powered by AMP ⚡ HTML – Version 1901312147090
console-api error URL: https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js(Line 137)
Message:
localStorage not supported.
console-api info URL: https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js(Line 544)
Message:
Powered by AMP ⚡ HTML – Version 1901312147090
console-api error URL: https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js(Line 137)
Message:
localStorage not supported.
console-api info URL: https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js(Line 544)
Message:
Powered by AMP ⚡ HTML – Version 1901312147090
console-api error URL: https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js(Line 137)
Message:
localStorage not supported.
console-api info URL: https://platform.twitter.com/widgets.js(Line 1)
Message:
You may have been affected by an update to settings in embedded timelines. See https://twittercommunity.com/t/deprecating-widget-settings/102295.
console-api log URL: https://twimgs.com/nojitter/js/dev_adBlockerTrack.js?v1(Line 47)
Message:
15
console-api log URL: https://twimgs.com/nojitter/js/dev_adBlockerTrack.js?v1(Line 49)
Message:
false

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Frame-Options SAMEORIGIN

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

a.teads.tv
ads.celtra.com
adservice.google.de
amp-error-reporting.appspot.com
api-cache.adsnative.com
b1sync.zemanta.com
bat.bing.com
cache-ssl.celtra.com
cdn.ampproject.org
cdn.flipboard.com
cdn.syndication.twimg.com
cf-images.us-east-1.prod.boltdns.net
cm.everesttech.net
cmp.teads.mgr.consensu.org
connect.facebook.net
d.adroll.com
dpm.demdex.net
dsimg.ubm-us.net
epromos.ubmcanon.com
fonts.googleapis.com
fonts.gstatic.com
fpn.flipboard.com
googleads.g.doubleclick.net
i.ubm-us.net
ib.adnxs.com
image6.pubmatic.com
img.deusm.com
img.en25.com
img.lightreading.com
ng.techweb.com
pagead2.googlesyndication.com
pbs.twimg.com
platform.linkedin.com
platform.twitter.com
rtb.mfadsrvr.com
rudy.adsnative.com
s.adroll.com
s2150.t.eloqua.com
s657486201.t.eloqua.com
sb.scorecardresearch.com
securepubads.g.doubleclick.net
ssl.google-analytics.com
static.adsnative.com
staticxx.facebook.com
sync.teads.tv
syndication.twitter.com
t.teads.tv
ton.twimg.com
tpc.googlesyndication.com
track.celtra.com
twimgs.com
u.heatmap.it
ubm.demdex.net
ubm.tt.omtrdc.net
ubmtech.d3.sc.omtrdc.net
www.darkreading.com
www.facebook.com
www.google.com
www.google.de
www.googleadservices.com
www.googletagservices.com
www.gstatic.com
x.bidswitch.net
142.0.160.13
143.204.212.151
143.204.214.107
143.204.214.4
151.139.239.5
172.217.21.194
172.82.228.18
18.153.11.26
18.196.37.19
184.31.90.134
185.33.223.221
185.64.189.115
199.16.156.241
2.18.162.235
2.18.232.7
2.18.233.40
204.79.197.200
207.244.121.73
209.167.231.17
216.58.206.2
23.111.11.217
23.211.0.4
2600:9000:200d:5200:14:85db:2b40:93a1
2600:9000:200d:a00:e:5a70:ca47:86e1
2606:2800:134:1a0d:1429:742:782:b6
2606:2800:234:46c:e8b:1e2f:2bd:694
2606:2800:234:59:254c:406:2366:268c
2606:4700:20::6818:552
2606:4700:30::6818:7975
2606:4700:30::681b:8b16
2606:4700:30::681f:5172
2606:4700::6811:7863
2606:4700::6813:f408
2620:103::192:155:48:119
2a00:1450:4001:816::2001
2a00:1450:4001:817::2003
2a00:1450:4001:81a::2002
2a00:1450:4001:81c::2002
2a00:1450:4001:81d::2004
2a00:1450:4001:81e::2003
2a00:1450:4001:81e::2008
2a00:1450:4001:820::2002
2a00:1450:4001:820::2014
2a00:1450:4001:824::2003
2a00:1450:4001:824::200a
2a00:1450:4001:825::2001
2a00:1450:4016:80d::2002
2a02:26f0:6c00:293::2c92
2a02:26f0:6c00:2bf::25eb
2a03:2880:f01c:216:face:b00c:0:3
2a03:2880:f11c:8083:face:b00c:0:25de
34.250.76.236
46.105.202.39
52.202.3.209
52.59.88.202
54.154.86.186
54.220.0.18
66.117.28.86
66.117.29.11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