www-cultofmac-com.cdn.ampproject.org Open in urlscan Pro
2a00:1450:4001:808::2001  Public Scan

Submitted URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_j...
Effective URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_j...
Submission Tags: falconsandbox
Submission: On January 17 via api from US

Summary

This website contacted 10 IPs in 3 countries across 8 domains to perform 25 HTTP transactions. The main IP is 2a00:1450:4001:808::2001, located in Frankfurt am Main, Germany and belongs to GOOGLE, US. The main domain is www-cultofmac-com.cdn.ampproject.org.
TLS certificate: Issued by GTS CA 1O1 on December 15th 2020. Valid for: 3 months.
This is the only time www-cultofmac-com.cdn.ampproject.org was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

Domain Requested by
11 cdn.ampproject.org www-cultofmac-com.cdn.ampproject.org
cdn.ampproject.org
3 cdn-cultofmac-com.cdn.ampproject.org www-cultofmac-com.cdn.ampproject.org
2 www.cultofmac.com cdn.ampproject.org
1 www.google-analytics.com cdn.ampproject.org
1 ping.chartbeat.net
1 g.ezoic.net cdn.ampproject.org
1 www.googletagservices.com cdn.ampproject.org
1 3p.ampproject.net cdn.ampproject.org
1 d-1819781232624198192.ampproject.net cdn.ampproject.org
1 www.facebook.com cdn.ampproject.org
1 secure-gravatar-com.cdn.ampproject.org www-cultofmac-com.cdn.ampproject.org
1 www-cultofmac-com.cdn.ampproject.org
25 12
Subject Issuer Validity Valid
misc-sni.google.com
GTS CA 1O1
2020-12-15 -
2021-03-09
3 months crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2020-12-22 -
2021-03-21
3 months crt.sh
*.g.doubleclick.net
GTS CA 1O1
2020-12-15 -
2021-03-09
3 months crt.sh
ezoic.net
Let's Encrypt Authority X3
2020-11-24 -
2021-02-22
3 months crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2020-05-27 -
2021-05-27
a year crt.sh
*.chartbeat.net
Thawte RSA CA 2018
2020-12-01 -
2021-12-30
a year crt.sh
*.google-analytics.com
GTS CA 1O1
2020-12-15 -
2021-03-09
3 months crt.sh

This page contains 2 frames:

Primary Page: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Frame ID: 2F2A413BA156CD5AC5CA64BC0827246F
Requests: 26 HTTP requests in this frame

Frame: https://www.facebook.com/plugins/like.php?href=https://www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/&width=152&layout=button_count&action=like&size=large&show_faces=false&share=true&height=32&appId=249151412165931
Frame ID: 44607EAFF170692E9C9A78819CFBC8A2
Requests: 1 HTTP requests in this frame

Screenshot


Page Statistics

25
Requests

100 %
HTTPS

78 %
IPv6

8
Domains

12
Subdomains

10
IPs

3
Countries

304 kB
Transfer

963 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

25 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/
71 KB
12 KB
Document
General
Full URL
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f67c25b02efbb3cecce0c404e49cee7e04bc6e6126b7d5dd6a38fae1ad31c02c
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src 'sha256-5CxqAdDXlHviOy7zxeRpMobzRK/JNpLvkS+k8Zj3L3A=' 'sha256-FIBGC/wl1Qfnh2Fb5NPFHmRty7BHJdDpWW1FZ8egppI=' 'sha256-dKn2nAtwgzaaXC8ZM58hhldxNyeuu4qrzW4H9//9YMA=' blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www-cultofmac-com.cdn.ampproject.org
:scheme
https
:path
/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

nel
{"report_to":"nel","max_age":604800,"success_fraction":0.05}
report-to
{"group":"nel","max_age":604800,"endpoints":[{"url":"https://beacons.gcp.gvt2.com/nel/upload-nel"},{"url":"https://beacons.gvt2.com/nel/upload-nel"}]}
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
br
content-type
text/html
x-page-speed
0.9.10.99-9999
origin-trial
AluRfCTGQ+WhED/eItze5YQ3PzwVes+6glUnejTS7qkAMN6MvMi/olOuFrMrUWPQELf02CmInshQ3U4r2r8dngwAAABveyJvcmlnaW4iOiJodHRwczovL2Nkbi5hbXBwcm9qZWN0Lm9yZzo0NDMiLCJmZWF0dXJlIjoiQmVmb3JlTWF0Y2hFdmVudCIsImV4cGlyeSI6MTYxMjg5MjgzOCwiaXNTdWJkb21haW4iOnRydWV9
link
<https://cdn.ampproject.org/rtv/012012301722001/v0.js>; rel=preload; as=script, <https://cdn.ampproject.org/rtv/012012301722001/v0/amp-viewer-integration-0.1.js>; rel=preload; as=script
content-security-policy
default-src * blob: data:; script-src 'sha256-5CxqAdDXlHviOy7zxeRpMobzRK/JNpLvkS+k8Zj3L3A=' 'sha256-FIBGC/wl1Qfnh2Fb5NPFHmRty7BHJdDpWW1FZ8egppI=' 'sha256-dKn2nAtwgzaaXC8ZM58hhldxNyeuu4qrzW4H9//9YMA=' blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-length
11024
date
Sun, 17 Jan 2021 04:57:28 GMT
expires
Sun, 17 Jan 2021 04:57:28 GMT
cache-control
private, max-age=86400
last-modified
Sun, 17 Jan 2021 01:35:13 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
v0.js
cdn.ampproject.org/rtv/012012301722001/
254 KB
70 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012012301722001/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
4ddfce71f7db4c847f4410c9c4093d4182098d9a87646f6be35ac9e65ada543b
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
302098
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
70812
x-xss-protection
0
server
sffe
date
Wed, 13 Jan 2021 17:02:30 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"b20f735c12571609"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 13 Jan 2022 17:02:30 GMT
amp-viewer-integration-0.1.js
cdn.ampproject.org/rtv/012012301722001/v0/
31 KB
11 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012012301722001/v0/amp-viewer-integration-0.1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
20fdcdbbb38e98d550ae0e69f284834980c357b136ef20918496abea8a5db327
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
302097
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
11157
x-xss-protection
0
server
sffe
date
Wed, 13 Jan 2021 17:02:31 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"5a487bee73095a6c"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 13 Jan 2022 17:02:31 GMT
amp-access-0.1.js
cdn.ampproject.org/rtv/012012301722001/v0/
54 KB
16 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012012301722001/v0/amp-access-0.1.js
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
01f346cd3b90ca579f60d2461a0694a422f6c49c26024ed905b46f1b628c9120
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
302092
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
16567
x-xss-protection
0
server
sffe
date
Wed, 13 Jan 2021 17:02:36 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"d9bac8ac6be1c357"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 13 Jan 2022 17:02:36 GMT
amp-ad-0.1.js
cdn.ampproject.org/rtv/012012301722001/v0/
67 KB
19 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012012301722001/v0/amp-ad-0.1.js
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
6f670c8ae6541681ecc6012d4ce933238a1e831b5f32dc4ddda0ce235b797b70
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
302098
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
19678
x-xss-protection
0
server
sffe
date
Wed, 13 Jan 2021 17:02:30 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"4874403a9b76b236"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 13 Jan 2022 17:02:30 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012012301722001/v0/
96 KB
29 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012012301722001/v0/amp-analytics-0.1.js
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f95305ffa81a843fd855d10212d8a52d308679931b107e1869239f0dfab49eb9
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
302098
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29959
x-xss-protection
0
server
sffe
date
Wed, 13 Jan 2021 17:02:30 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"304983c12166b63c"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 13 Jan 2022 17:02:30 GMT
amp-iframe-0.1.js
cdn.ampproject.org/rtv/012012301722001/v0/
21 KB
8 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012012301722001/v0/amp-iframe-0.1.js
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
1d450150edc695d56839784d41fc5852c7d2d5e3d329ea824d24b3e02c698fe9
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
302098
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
7721
x-xss-protection
0
server
sffe
date
Wed, 13 Jan 2021 17:02:30 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"2487ee182bec71cf"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 13 Jan 2022 17:02:30 GMT
truncated
/
80 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
885014673b49e09a9421eaae25ce0b95dc2e9c8da50f73b11ac3f531d38fd59e

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
79 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a45f008c935886524c2d85d415e7350c070a05bfbd953899ea762c1ef0da2638

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/svg+xml
placeholder-icon.png
cdn-cultofmac-com.cdn.ampproject.org/i/s/cdn.cultofmac.com/wp-content/plugins/amp/assets/images/
243 B
452 B
Image
General
Full URL
https://cdn-cultofmac-com.cdn.ampproject.org/i/s/cdn.cultofmac.com/wp-content/plugins/amp/assets/images/placeholder-icon.png
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
42e6220dff25baa367692a306a16bd96bc87c84e03baecd065519914aa41c48d
Security Headers
Name Value
Content-Security-Policy default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
x-content-type-options
nosniff
last-modified
Tue, 12 Jan 2021 20:26:39 GMT
server
sffe
date
Sun, 17 Jan 2021 04:57:28 GMT
content-type
image/png
cache-control
private, max-age=31536000
cross-origin-resource-policy
cross-origin
content-disposition
attachment
accept-ranges
bytes
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
243
x-xss-protection
0
expires
Sun, 17 Jan 2021 04:57:28 GMT
com-logo.png
cdn-cultofmac-com.cdn.ampproject.org/ii/w39/s/cdn.cultofmac.com/wp-content/plugins/com2014-custom//img/
4 KB
4 KB
Image
General
Full URL
https://cdn-cultofmac-com.cdn.ampproject.org/ii/w39/s/cdn.cultofmac.com/wp-content/plugins/com2014-custom//img/com-logo.png
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
fd3fae8366fc1becdde3b0908024bc97a7abc550fc97eae75838233e74b4df88
Security Headers
Name Value
Content-Security-Policy default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
x-content-type-options
nosniff
last-modified
Tue, 12 Jan 2021 20:26:39 GMT
server
sffe
date
Sun, 17 Jan 2021 04:57:28 GMT
content-type
image/png
cache-control
private, max-age=31536000
cross-origin-resource-policy
cross-origin
content-disposition
attachment
accept-ranges
bytes
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
3991
x-xss-protection
0
expires
Sun, 17 Jan 2021 04:57:28 GMT
1f42e583825bf8b1907851f7c9866f21
secure-gravatar-com.cdn.ampproject.org/ii/w39/s/secure.gravatar.com/avatar/
446 B
578 B
Image
General
Full URL
https://secure-gravatar-com.cdn.ampproject.org/ii/w39/s/secure.gravatar.com/avatar/1f42e583825bf8b1907851f7c9866f21?s=24&d=mm&r=g
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a8ae18d4d6bc25dbc021c9dee26ead02629778c7ed32d8c51159d5dabc91a75c
Security Headers
Name Value
Content-Security-Policy default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
x-content-type-options
nosniff
last-modified
Mon, 21 Dec 2020 13:16:33 GMT
server
sffe
date
Sun, 17 Jan 2021 04:57:28 GMT
vary
Accept,Save-Data
content-type
image/webp
cache-control
private, max-age=299
cross-origin-resource-policy
cross-origin
content-disposition
attachment
accept-ranges
bytes
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
446
x-xss-protection
0
expires
Sun, 17 Jan 2021 04:57:28 GMT
Backlit_keyboard-780x439.jpg
cdn-cultofmac-com.cdn.ampproject.org/i/s/cdn.cultofmac.com/wp-content/uploads/2016/01/
34 KB
34 KB
Image
General
Full URL
https://cdn-cultofmac-com.cdn.ampproject.org/i/s/cdn.cultofmac.com/wp-content/uploads/2016/01/Backlit_keyboard-780x439.jpg
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
885eea92a107f8a4a4f6f36df6861dcb1390351cf4f5a13f19614ff6be67ab8b
Security Headers
Name Value
Content-Security-Policy default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
x-content-type-options
nosniff
last-modified
Sun, 17 Jan 2021 01:42:46 GMT
server
sffe
date
Sun, 17 Jan 2021 04:57:28 GMT
vary
Accept,Save-Data
content-type
image/webp
cache-control
private, max-age=31536000
cross-origin-resource-policy
cross-origin
content-disposition
attachment
accept-ranges
bytes
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
34692
x-xss-protection
0
expires
Sun, 17 Jan 2021 04:57:28 GMT
amp-auto-lightbox-0.1.js
cdn.ampproject.org/rtv/012012301722001/v0/
5 KB
3 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012012301722001/v0/amp-auto-lightbox-0.1.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012012301722001/v0.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c9029ae9dcaf52bd278ebc3a87de7340f47f3050780994efcbbff06a7fd62e6c
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Origin
https://www-cultofmac-com.cdn.ampproject.org
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
302097
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2044
x-xss-protection
0
server
sffe
date
Wed, 13 Jan 2021 17:02:31 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"d5e812d6210268bb"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 13 Jan 2022 17:02:31 GMT
amp-loader-0.1.js
cdn.ampproject.org/rtv/012012301722001/v0/
15 KB
4 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012012301722001/v0/amp-loader-0.1.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012012301722001/v0.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
ea23401a3895913cea6ed0ea456373c9081c4a116594b2306a994f15470bf34f
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Origin
https://www-cultofmac-com.cdn.ampproject.org
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
302097
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
3735
x-xss-protection
0
server
sffe
date
Wed, 13 Jan 2021 17:02:31 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"cb1f0b2ab9568c0d"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 13 Jan 2022 17:02:31 GMT
like.php
www.facebook.com/plugins/ Frame 4460
0
0
Document
General
Full URL
https://www.facebook.com/plugins/like.php?href=https://www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/&width=152&layout=button_count&action=like&size=large&show_faces=false&share=true&height=32&appId=249151412165931
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012012301722001/v0/amp-iframe-0.1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;block-all-mixed-content;upgrade-insecure-requests;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www.facebook.com
:scheme
https
:path
/plugins/like.php?href=https://www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/&width=152&layout=button_count&action=like&size=large&show_faces=false&share=true&height=32&appId=249151412165931
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D

Response headers

vary
Accept-Encoding
x-fb-rlafr
0
pragma
no-cache
expires
Sat, 01 Jan 2000 00:00:00 GMT
content-encoding
br
strict-transport-security
max-age=15552000; preload
x-content-type-options
nosniff
x-xss-protection
0
cache-control
private, no-cache, no-store, must-revalidate
content-security-policy
default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;block-all-mixed-content;upgrade-insecure-requests;
content-type
text/html; charset="utf-8"
x-fb-debug
hpg5U0l9+hepYuCVHGMToXAtSTb5V46D4D1u/+S8pBBGb6x6+HPusB8tOqAiRB0aRqh1EayBgFX3Ec+5RXJGIQ==
date
Sun, 17 Jan 2021 04:57:28 GMT
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
frame.html
d-1819781232624198192.ampproject.net/2012301722001/
0
0
Other
General
Full URL
https://d-1819781232624198192.ampproject.net/2012301722001/frame.html
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012012301722001/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

access-control-allow-origin
*
f.js
3p.ampproject.net/2012301722001/
193 KB
52 KB
Other
General
Full URL
https://3p.ampproject.net/2012301722001/f.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012012301722001/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c3cf14322522e8880d55224d41f3af477ca7e44021378bb9a9e3193425dde774
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 13 Jan 2021 17:02:31 GMT
content-encoding
br
x-content-type-options
nosniff
age
302097
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
52491
x-xss-protection
0
last-modified
Wed, 13 Jan 2021 15:45:00 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
expires
Thu, 13 Jan 2022 17:02:31 GMT
gpt.js
www.googletagservices.com/tag/js/
54 KB
19 KB
Other
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012012301722001/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f6ecaec0528d2ab42345b2d3e5905a0b5c287bed5b243d6f6095a13d519c51b1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sun, 17 Jan 2021 04:57:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"757 / 222 of 1000 / last-modified: 1610752710"
vary
Accept-Encoding
content-type
text/javascript
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
18760
x-xss-protection
0
expires
Sun, 17 Jan 2021 04:57:28 GMT
ampad.js
g.ezoic.net/ezoic/
1 KB
564 B
Other
General
Full URL
https://g.ezoic.net/ezoic/ampad.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012012301722001/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
3.127.76.126 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-127-76-126.eu-central-1.compute.amazonaws.com
Software
nginx/1.16.0 /
Resource Hash
eea9c54783f4fadc9b6de90cae6aed2e33b84318c5756c903315d45aee1adc90

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sun, 17 Jan 2021 04:57:28 GMT
content-encoding
br
server
nginx/1.16.0
vary
Accept-Encoding, Accept-Encoding
content-type
application/javascript
cache-control
max-age=31536000
content-length
428
expires
Mon, 17 Jan 2022 04:57:28 GMT
ezampdata
www.cultofmac.com/
2 B
911 B
Fetch
General
Full URL
https://www.cultofmac.com/ezampdata?url=https%3A%2F%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2Famp%2F&cid=WMbRLbyKGolhX14hsWjN1KPQHUo6Xxg7X1Tsl3j8ke7PeXShI7tMoL4KGYJuk8bc&pid=4024&d=o611,h611,e611,e611,i611,o605,h605,e605,e605,i605,o607,h607,e607,e607,i607,l608,o608,h608,f608,f608,f608,e608,e608,i608,l609,o609,h609,f609,f609,f609,e609,e609,i609,l697,o697,h697,f697,f697,f697,e697,e697,i697,l610,o610,h610,f610,f610,f610,e610,e610,i610,i111&wc=452&tid=167&__amp_source_origin=https%3A%2F%2Fwww.cultofmac.com
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012012301722001/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::ac43:9411 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

Request headers

Accept
application/json
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sun, 17 Jan 2021 04:57:28 GMT
access-control-allow-methods
GET
vary
Accept-Encoding, Accept-Encoding
cf-cache-status
DYNAMIC
nel
{"report_to":"cf-nel","max_age":604800}
content-length
2
cf-request-id
07b04da17100000ebb88240000000001
amp-access-control-allow-source-origin
https://www.cultofmac.com
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
1728000
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=OuDBt%2Fw%2B0Wio4MQlATXM1nSQMkPR5Vtl2KRiCQhGli1R%2Fko5WUd4ksrg%2FtqreNYtRUeX1r%2BGJqPt8QT49WHMY7WIkOMHbF9IfNpjdvCK613otnbgf7OwYgBkZ%2BTF5w%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
application/json
access-control-allow-origin
https://www-cultofmac-com.cdn.ampproject.org
access-control-expose-headers
AMP-Access-Control-Allow-Source-Origin
cache-control
max-age=0, must-revalidate, no-cache, no-store
access-control-allow-credentials
true
cf-ray
612d7ee24bc30ebb-FRA
access-control-allow-headers
Content-Type
expires
Sat, 16 Jan 2021 04:57:28 GMT
amp-lightbox-gallery-0.1.js
cdn.ampproject.org/rtv/012012301722001/v0/
58 KB
18 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012012301722001/v0/amp-lightbox-gallery-0.1.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012012301722001/v0.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
82ccf25da6a499ec7759aaf897954d0bbe573f2e1c2f998b3568d54c62cec930
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Origin
https://www-cultofmac-com.cdn.ampproject.org
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
302097
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18116
x-xss-protection
0
server
sffe
date
Wed, 13 Jan 2021 17:02:31 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"60951525fc904690"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 13 Jan 2022 17:02:31 GMT
googleanalytics.json
cdn.ampproject.org/rtv/012012301722001/v0/analytics-vendors/
2 KB
837 B
Fetch
General
Full URL
https://cdn.ampproject.org/rtv/012012301722001/v0/analytics-vendors/googleanalytics.json
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012012301722001/v0.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
6f53945eda017435c600f05df250c86a4788653b8e2e4c17aa7d647b4ce35bdd
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept
application/json
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
302097
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
778
x-xss-protection
0
server
sffe
date
Wed, 13 Jan 2021 17:02:31 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/json
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"b6e9f29514be795a"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 13 Jan 2022 17:02:31 GMT
chartbeat.json
cdn.ampproject.org/rtv/012012301722001/v0/analytics-vendors/
924 B
462 B
Fetch
General
Full URL
https://cdn.ampproject.org/rtv/012012301722001/v0/analytics-vendors/chartbeat.json
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012012301722001/v0.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
bc1fe280f4dc2e9d3b3a0eabec7a4cab25847e67aa1f9eef4b9dd1352a798b62
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept
application/json
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
302097
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
414
x-xss-protection
0
server
sffe
date
Wed, 13 Jan 2021 17:02:31 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/json
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"dd5403f95953780c"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 13 Jan 2022 17:02:31 GMT
imp.gif
www.cultofmac.com/detroitchicago/
43 B
492 B
Other
General
Full URL
https://www.cultofmac.com/detroitchicago/imp.gif?amp=1&backgrounded=0&requestCount=1&url=https%3A%2F%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2Famp%2F&pid=4024&cid=WMbRLbyKGolhX14hsWjN1KPQHUo6Xxg7X1Tsl3j8ke7PeXShI7tMoL4KGYJuk8bc&referrer=&tstart=1610859448911&pnv=47&pcrs=109&prt=1&pi=66&pcl=67&pc=382&pnt=0&prc=0&cu=https%3A%2F%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2F&e=%7B%22ad_cache_level%22%3A1%2C%22ad_count_adjustment%22%3A2%2C%22ad_lazyload_version%22%3A-1%2C%22ad_location_ids%22%3A%22%22%2C%22ad_transform_level%22%3A0%2C%22adx_ad_count%22%3A0%2C%22author%22%3A%22https%3A%2F%2Fwww.facebook.com%2Froblefwrites%22%2C%22bidder_method%22%3A1%2C%22bidder_version%22%3A3%2C%22days_since_last_visit%22%3A-1%2C%22display_ad_count%22%3A0%2C%22domain_id%22%3A27792%2C%22domain_test_group%22%3A20200401%2C%22ds_adsize_opt_id%22%3A-1%2C%22engaged_time_visit%22%3A0%2C%22ezcache_level%22%3A1%2C%22ezcache_skip_code%22%3A3%2C%22form_factor_id%22%3A2%2C%22framework_id%22%3A4%2C%22has_bad_image%22%3A0%2C%22has_bad_words%22%3A0%2C%22iab_category%22%3A%22%22%2C%22iab_category_0%22%3A%22596%22%2C%22iab_category_1%22%3A%22602%22%2C%22is_from_recommended_pages%22%3Afalse%2C%22is_return_visitor%22%3Afalse%2C%22is_sitespeed%22%3A1%2C%22last_page_load%22%3A%22%22%2C%22last_pageview_id%22%3A%22%22%2C%22lt_cache_level%22%3A0%2C%22max_ads%22%3A5%2C%22optimization_version%22%3A1%2C%22page_ad_positions%22%3A%22%22%2C%22page_view_count%22%3A0%2C%22page_view_id%22%3A%2299ab4a1d-50b0-4634-4db0-198c478e907c%22%2C%22position_selection_id%22%3A39%2C%22publish_date%22%3A%222016-03-16%22%2C%22pv_event_count%22%3A0%2C%22response_size_orig%22%3A34313%2C%22response_time_orig%22%3A317%2C%22serverid%22%3A%2254.224.111.150%3A11575%22%2C%22sub_page_ad_positions%22%3A%22%22%2C%22t_epoch%22%3A1610847312%2C%22template_id%22%3A167%2C%22time_on_site_visit%22%3A0%2C%22url%22%3A%22https%3A%2F%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2Famp%2F%22%2C%22user_id%22%3A0%2C%22weather_precipitation%22%3A0%2C%22weather_summary%22%3A%22%22%2C%22weather_temperature%22%3A0%2C%22word_count%22%3A452%2C%22worst_bad_word_level%22%3A0%7D
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012012301722001/v0/amp-analytics-0.1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::ac43:9411 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Sun, 17 Jan 2021 04:57:28 GMT
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
cf-cache-status
DYNAMIC
nel
{"report_to":"cf-nel","max_age":604800}
x-middleton-display
imp_sol
content-length
43
cf-request-id
07b04da25500000ebb9623b000000001
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
1728000
access-control-allow-methods
HEAD, PUT, POST, GET, OPTIONS
content-type
image/gif
access-control-allow-origin
https://www-cultofmac-com.cdn.ampproject.org
cache-control
no-cache, no-store, must-revalidate, max-age=0
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=1aTZ%2F7DCAB6PmdkrsvghdMn81XUEJYsgDuX2t0C0t0xhc9LFEGfsYkr4Ngs06Et6ZzhtX53w9WTwQQl45dK69Rayl2poA1WRUjz%2B15QkmNX67x%2BjUf6ucv5lfwnHqw%3D%3D"}],"group":"cf-nel","max_age":604800}
cf-ray
612d7ee3bcee0ebb-FRA
access-control-allow-headers
Content-Type
ping
ping.chartbeat.net/
43 B
169 B
Image
General
Full URL
https://ping.chartbeat.net/ping?h=cultofmac.com&p=%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2F&u=U3WH2PIHVhKnNr6K2cm4QTqFBAper8FZOKXhUjJ0Ccp7q3RXdDavFWdZZzv_Yk5O&d=www.cultofmac.com&g=54946&g0=News%2C%20Newsstand%2C%20Top%20stories&g1=Rob%20LeFebvre&g2=&g3=&g4=&c=&x=0&m=&y=2214&o=1600&w=1200&j=30&R=1&W=0&I=0&E=0&r=&t=4024U3WH2PIHVhKnNr6K2cm4QTqFBAper8FZOKXhUjJ0Ccp7q3RXdDavFWdZZzv_Yk5O&b=539&i=Malware%20uses%20Apple%E2%80%99s%20FairPlay%20DRM%20to%20attack%20iOS%20users%20%7C%20Cult%20of%20Mac&T=1610859448929&tz=-60&sn=1&C=2&_
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.237.68.53 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-237-68-53.compute-1.amazonaws.com
Software
/
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 17 Jan 2021 04:57:29 GMT
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
content-length
43
expires
0
collect
www.google-analytics.com/r/
35 B
459 B
Other
General
Full URL
https://www.google-analytics.com/r/collect?v=1&_v=a1&ds=AMP&aip&_s=1&dt=Malware%20uses%20Apple%E2%80%99s%20FairPlay%20DRM%20to%20attack%20iOS%20users%20%7C%20Cult%20of%20Mac&sr=1600x1200&_utmht=1610859448931&cid=Opo6jerH9w4RlaDVzF2Rl0s6bsCt59hrP0DeW_xNqSALRBuHX6zKLn0XmhD_9SMW&tid=UA-84038529-45&dl=https%3A%2F%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2Famp%2F&dr=&sd=24&ul=en-us&de=UTF-8&t=pageview&jid=0.16038663374466378&_r=1&a=4024&z=0.9830183636779073&cd1=pub_site_mobile_amp&cd2=167&cd3=0
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012012301722001/v0/amp-analytics-0.1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Sun, 17 Jan 2021 04:57:28 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
content-type
image/gif
access-control-allow-origin
https://www-cultofmac-com.cdn.ampproject.org
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT

Verdicts & Comments Add Verdict or Comment

28 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated object| AMP object| global object| AMP_CONFIG object| __AMP_LOG object| __AMP_ERRORS object| __AMP_MODE function| __AMP_REPORT_ERROR object| __AMP_TOP object| __AMP_SERVICES object| __AMP_URL_CACHE object| __AMP__EXPERIMENT_TOGGLES object| __AMP_EXPERIMENT_BRANCHES boolean| __AMP_TAG object| __AMP_EXTENDED_ELEMENTS function| __AMP_BASE_CE_CLASS number| ampAdSlotIdCounter object| listeningFors string| __AMP_DEFAULT_BOOTSTRAP_SUBDOMAIN

0 Cookies

1 Console Messages

Source Level URL
Text
console-api info URL: https://cdn.ampproject.org/rtv/012012301722001/v0.js(Line 527)
Message:
Powered by AMP ⚡ HTML – Version 2012301722001 https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D#origin%3Dhttps%3A%2F%2Fwww.google.co.uk%26prerenderSize%3D1%26visibilityState%3Dprerender%26paddingTop%3D32%26p2r%3D0%26horizontalScrolling%3D0%26csi%3D1%26aoh%3D15661572839977%26viewerUrl%3Dhttps%3A%2F%2Fwww.google.co.uk%2Famp%2Fs%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2Famp%2F%26history%3D1%26storage%3D1%26cid%3D1%26cap%3DnavigateTo%2Ccid%2CfullReplaceHistory%2Cfragment%2CreplaceUrl

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src * blob: data:; script-src 'sha256-5CxqAdDXlHviOy7zxeRpMobzRK/JNpLvkS+k8Zj3L3A=' 'sha256-FIBGC/wl1Qfnh2Fb5NPFHmRty7BHJdDpWW1FZ8egppI=' 'sha256-dKn2nAtwgzaaXC8ZM58hhldxNyeuu4qrzW4H9//9YMA=' blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

3p.ampproject.net
cdn-cultofmac-com.cdn.ampproject.org
cdn.ampproject.org
d-1819781232624198192.ampproject.net
g.ezoic.net
ping.chartbeat.net
secure-gravatar-com.cdn.ampproject.org
www-cultofmac-com.cdn.ampproject.org
www.cultofmac.com
www.facebook.com
www.google-analytics.com
www.googletagservices.com
2606:4700:3033::ac43:9411
2a00:1450:4001:808::2001
2a00:1450:4001:80b::2003
2a00:1450:4001:816::200e
2a00:1450:4001:81d::2003
2a00:1450:4001:81e::2002
2a03:2880:f12d:83:face:b00c:0:25de
3.127.76.126
34.237.68.53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