ibuscar-support.com
Open in
urlscan Pro
161.35.234.254
Malicious Activity!
Public Scan
Effective URL: https://ibuscar-support.com/ipass/PhC
Submission Tags: 7257052
Submission: On August 06 via api from NL
Summary
TLS certificate: Issued by R3 on July 6th 2021. Valid for: 3 months.
This is the only time ibuscar-support.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Apple (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 5 | 161.35.234.254 161.35.234.254 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
1 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:2a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 1 | 17.253.144.10 17.253.144.10 | 714 (APPLE-ENG...) (APPLE-ENGINEERING) | |
1 | 104.109.70.123 104.109.70.123 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
5 | 3 |
ASN16625 (AKAMAI-AS, US)
PTR: a104-109-70-123.deploy.static.akamaitechnologies.com
www.icloud.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
ibuscar-support.com
2 redirects
ibuscar-support.com |
11 KB |
2 |
icloud.com
1 redirects
icloud.com www.icloud.com |
370 B |
1 |
jquery.com
code.jquery.com |
81 KB |
5 | 3 |
Domain | Requested by | |
---|---|---|
5 | ibuscar-support.com |
2 redirects
ibuscar-support.com
|
1 | www.icloud.com |
ibuscar-support.com
|
1 | icloud.com | 1 redirects |
1 | code.jquery.com |
ibuscar-support.com
|
5 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
ibuscar-support.com R3 |
2021-07-06 - 2021-10-04 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2021-07-14 - 2022-08-14 |
a year | crt.sh |
www.icloud.com Apple Public EV Server RSA CA 2 - G1 |
2021-06-16 - 2022-07-16 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://ibuscar-support.com/ipass/PhC
Frame ID: A3466ECBB7B25D1268C024859CF72D12
Requests: 5 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://ibuscar-support.com/ipass/PhC
HTTP 301
https://ibuscar-support.com/ipass/PhC Page URL
Detected technologies
Ubuntu (Operating Systems) ExpandDetected patterns
- headers server /Ubuntu/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://ibuscar-support.com/ipass/PhC
HTTP 301
https://ibuscar-support.com/ipass/PhC Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 2- https://ibuscar-support.com/ipass/activity-indicator.js HTTP 302
- https://icloud.com/ HTTP 301
- https://www.icloud.com/
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
PhC
ibuscar-support.com/ipass/ Redirect Chain
|
18 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
passcode.css
ibuscar-support.com/2022/_library/_css/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.4.1.js
code.jquery.com/ |
274 KB 81 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
www.icloud.com/ Redirect Chain
|
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
next.png
ibuscar-support.com/2022/_library/_images/ |
4 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Apple (Online)23 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| bloquearSource string| PassCode string| ConfirmPasscode number| step number| count number| TotalNumberPass boolean| ShowMessages string| pageRedirect number| redirectTime boolean| selfReload2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
ibuscar-support.com/ | Name: PHPSESSID Value: 86lmqg22bvto4dgin3dobet1j1 |
|
ibuscar-support.com/ipass | Name: MyHost Value: https%3A%2F%2Fibuscar-support.com%2F2022%2Flogin3%2F |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
ibuscar-support.com
icloud.com
www.icloud.com
104.109.70.123
161.35.234.254
17.253.144.10
2001:4de0:ac18::1:a:2a
439f4ed5d5616cdc024227e4985d64d47079599a94b79ec2565f25e6342aead6
4a0f37b150539c7952cc52123d915c2f6c4dca3fa7f009d498cb344ab081751f
5a93a88493aa32aab228bf4571c01207d3b42b0002409a454d404b4d8395bd55
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
fa9dcfe37df0132504fdb3ed8632df800b64023daa5f7fc1338f1ee0126f7b15