URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infras...
Submission: On April 10 via automatic, source hackernews

Summary

This website contacted 82 IPs in 7 countries across 57 domains to perform 241 HTTP transactions. The main IP is 50.31.169.131, located in Chicago, United States and belongs to SERVERCENTRAL - Server Central Network, US. The main domain is arstechnica.com.
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on January 16th 2019. Valid for: 2 years.
This is the only time arstechnica.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 50.31.169.131 23352 (SERVERCEN...)
20 205.234.175.175 30081 (CACHENETW...)
2 2.18.232.23 16625 (AKAMAI-AS)
3 151.139.128.10 ()
1 2a00:1450:400... ()
1 151.101.0.239 54113 (FASTLY)
2 63.32.166.115 16509 (AMAZON-02)
6 2a00:1450:400... 15169 (GOOGLE)
1 91.228.74.184 27281 (QUANTCAST)
1 46.228.164.13 56396 (TURN)
4 2a03:2880:f02... 32934 (FACEBOOK)
1 143.204.101.26 16509 (AMAZON-02)
1 35.190.92.63 15169 (GOOGLE)
1 35.161.216.48 16509 (AMAZON-02)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
3 52.3.171.116 14618 (AMAZON-AES)
1 2 104.73.138.159 16625 (AKAMAI-AS)
1 2.18.234.190 16625 (AKAMAI-AS)
2 52.86.193.78 14618 (AMAZON-AES)
1 46.51.202.182 16509 (AMAZON-02)
2 63.140.41.50 15224 (OMNITURE)
1 1 66.117.28.86 ()
1 143.204.98.108 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
1 52.86.70.149 14618 (AMAZON-AES)
2 3.94.199.232 14618 (AMAZON-AES)
9 54.165.0.24 14618 (AMAZON-AES)
1 2600:9000:20a... 16509 (AMAZON-02)
7 23.58.216.21 16625 (AKAMAI-AS)
1 1 2a00:1450:400... ()
1 1 2a00:1450:400... ()
1 2a00:1450:400... 15169 (GOOGLE)
1 64.74.236.19 22075 (AS-OUTBRAIN)
1 2 35.190.59.101 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 143.204.90.253 16509 (AMAZON-02)
3 143.204.101.51 16509 (AMAZON-02)
5 2.18.234.21 16625 (AKAMAI-AS)
1 52.210.6.215 16509 (AMAZON-02)
2 2606:4700::68... 13335 (CLOUDFLAR...)
1 143.204.101.102 16509 (AMAZON-02)
1 54.174.217.231 14618 (AMAZON-AES)
1 2 2a05:f500:10:... 14413 (LINKEDIN)
2 143.204.90.45 16509 (AMAZON-02)
16 143.204.98.42 16509 (AMAZON-02)
8 104.103.102.169 16625 (AKAMAI-AS)
2 2a03:2880:f12... 32934 (FACEBOOK)
2 2606:4700::68... 13335 (CLOUDFLAR...)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
6 172.217.22.2 15169 (GOOGLE)
15 52.2.117.76 14618 (AMAZON-AES)
1 151.101.2.2 54113 (FASTLY)
1 35.190.40.172 15169 (GOOGLE)
1 35.201.67.47 15169 (GOOGLE)
3 2a00:1450:400... 15169 (GOOGLE)
3 143.204.98.182 16509 (AMAZON-02)
1 52.10.81.221 16509 (AMAZON-02)
2 2 185.33.223.100 ()
5 35.160.176.109 16509 (AMAZON-02)
2 2 52.49.216.17 ()
1 1 172.217.22.66 ()
2 2 185.64.189.110 ()
1 1 178.162.133.149 ()
1 2600:9000:20a... 16509 (AMAZON-02)
4 52.21.120.172 14618 (AMAZON-AES)
2 2a00:1450:400... 15169 (GOOGLE)
1 2600:9000:20a... 16509 (AMAZON-02)
4 2a00:1450:400... 15169 (GOOGLE)
2 52.94.216.48 16509 (AMAZON-02)
1 54.85.121.67 14618 (AMAZON-AES)
3 2a00:1450:400... ()
4 2.18.235.40 16625 (AKAMAI-AS)
1 2606:4700::68... 13335 (CLOUDFLAR...)
4 34.235.240.97 14618 (AMAZON-AES)
1 182.161.72.131 55569 (CRITEO-AS...)
1 52.31.192.216 16509 (AMAZON-02)
4 104.17.192.78 13335 (CLOUDFLAR...)
2 2606:4700::68... 13335 (CLOUDFLAR...)
8 20 152.195.15.114 15133 (EDGECAST)
1 143.204.98.100 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 52.44.76.10 14618 (AMAZON-AES)
2 143.204.98.220 16509 (AMAZON-02)
3 143.204.101.62 16509 (AMAZON-02)
3 143.204.101.76 16509 (AMAZON-02)
1 2606:4700::68... ()
2 178.250.2.152 ()
241 82
Apex Domain
Subdomains
Transfer
34 condenastdigital.com
pixel.condenastdigital.com
infinityid.condenastdigital.com
4d.condenastdigital.com
capture.condenastdigital.com
21 KB
29 cloudfront.net
d1z2jf7jlzjs58.cloudfront.net
dwgyu36up6iuz.cloudfront.net
d2c8v52ll5s99u.cloudfront.net
dp8hsntg6do36.cloudfront.net
830 KB
20 advertising.com
adserver-us.adtech.advertising.com
5 KB
20 arstechnica.net
cdn.arstechnica.net
868 KB
9 evidon.com
c.evidon.com
iabmap.evidon.com
37 KB
8 doubleclick.net
stats.g.doubleclick.net
securepubads.g.doubleclick.net
cm.g.doubleclick.net
pubads.g.doubleclick.net
101 KB
8 outbrainimg.com
tcheck.outbrainimg.com
log.outbrainimg.com
images.outbrainimg.com
42 KB
7 ad.gt
a.ad.gt
p.ad.gt
ids.ad.gt
18 KB
6 googlesyndication.com
pagead2.googlesyndication.com
tpc.googlesyndication.com
64 KB
6 skimresources.com
s.skimresources.com
r.skimresources.com
p.skimresources.com
t.skimresources.com
17 KB
5 cnevids.com
api.cnevids.com
player.cnevids.com
58 KB
5 google-analytics.com
www.google-analytics.com
19 KB
4 casalemedia.com
as-sec.casalemedia.com
3 KB
4 polarcdn-pentos.com
polarcdn-pentos.com
914 B
4 moatads.com
z.moatads.com
px.moatads.com
265 KB
4 betrad.com
l.betrad.com
480 B
4 amazon-adsystem.com
c.amazon-adsystem.com
aax.amazon-adsystem.com
23 KB
4 googletagservices.com
www.googletagservices.com
96 KB
4 google.com
ampcid.google.com
www.google.com
adservice.google.com
1 KB
4 facebook.net
connect.facebook.net
115 KB
3 adsrvr.org
match.adsrvr.org
1 KB
3 googleapis.com
imasdk.googleapis.com
105 KB
3 consensu.org
api.skimlinks.mgr.consensu.org
vendorlist.consensu.org
evidon.mgr.consensu.org
16 KB
3 polarcdn-terrax.com
polarcdn-terrax.com
104 KB
3 google.de
ampcid.google.de
www.google.de
adservice.google.de
459 B
3 medtargetsystem.com
www.medtargetsystem.com
44 KB
3 bounceexchange.com
tag.bounceexchange.com
assets.bounceexchange.com
99 KB
3 demdex.net
dpm.demdex.net
condenast.demdex.net
3 KB
3 arstechnica.com
arstechnica.com
sstats.arstechnica.com
15 KB
2 criteo.com
bidder.criteo.com
426 B
2 plrsrvcs.com
bw-prod.plrsrvcs.com
2 KB
2 pubmatic.com
image2.pubmatic.com
995 B
2 adnxs.com
secure.adnxs.com
2 KB
2 facebook.com
www.facebook.com
323 B
2 linkedin.com
px.ads.linkedin.com
643 B
2 mediavoice.com
cdn.mediavoice.com
plugin.mediavoice.com
121 KB
2 outbrain.com
widgets.outbrain.com
odb.outbrain.com
48 KB
2 scorecardresearch.com
sb.scorecardresearch.com
1 KB
2 adobedtm.com
assets.adobedtm.com
42 KB
1 2mdn.net
s0.2mdn.net
10 KB
1 criteo.net
static.criteo.net
25 KB
1 polarcdn.com
static.polarcdn.com
111 KB
1 sonobi.com
sync.go.sonobi.com
726 B
1 arsdev.net
cdn.accelerator.arsdev.net
302 B
1 zqtk.net
segment-data.zqtk.net
850 B
1 indexww.com
js-sec.indexww.com
39 KB
1 quantcount.com
rules.quantcount.com
2 KB
1 everesttech.net
cm.everesttech.net
527 B
1 licdn.com
snap.licdn.com
5 KB
1 sail-horizon.com
ak.sail-horizon.com
41 KB
1 turn.com
d.turn.com
698 B
1 quantserve.com
secure.quantserve.com
6 KB
1 googletagmanager.com
www.googletagmanager.com
61 KB
0 rubiconproject.com Failed
fastlane.rubiconproject.com Failed
0 rkdms.com Failed
mid.rkdms.com Failed
0 rlcdn.com Failed
api.rlcdn.com Failed
0 parsely.com Failed
srv-2019-04-10-18.config.parsely.com Failed
241 57
Domain Requested by
28 capture.condenastdigital.com arstechnica.com
20 adserver-us.adtech.advertising.com 8 redirects arstechnica.com
20 cdn.arstechnica.net arstechnica.com
cdn.arstechnica.net
18 dwgyu36up6iuz.cloudfront.net arstechnica.com
d2c8v52ll5s99u.cloudfront.net
cdn.arstechnica.net
8 c.evidon.com assets.adobedtm.com
c.evidon.com
arstechnica.com
6 dp8hsntg6do36.cloudfront.net arstechnica.com
d2c8v52ll5s99u.cloudfront.net
6 images.outbrainimg.com arstechnica.com
5 ids.ad.gt arstechnica.com
5 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
arstechnica.com
5 www.google-analytics.com www.googletagmanager.com
www.google-analytics.com
arstechnica.com
4 as-sec.casalemedia.com js-sec.indexww.com
4 polarcdn-pentos.com static.polarcdn.com
4 tpc.googlesyndication.com securepubads.g.doubleclick.net
4 l.betrad.com arstechnica.com
4 d2c8v52ll5s99u.cloudfront.net player.cnevids.com
imasdk.googleapis.com
d2c8v52ll5s99u.cloudfront.net
4 www.googletagservices.com cdn.arstechnica.net
securepubads.g.doubleclick.net
4 connect.facebook.net arstechnica.com
connect.facebook.net
d2c8v52ll5s99u.cloudfront.net
3 z.moatads.com securepubads.g.doubleclick.net
d2c8v52ll5s99u.cloudfront.net
3 match.adsrvr.org 2 redirects js-sec.indexww.com
3 imasdk.googleapis.com player.cnevids.com
imasdk.googleapis.com
3 polarcdn-terrax.com cdn.mediavoice.com
static.polarcdn.com
arstechnica.com
3 player.cnevids.com cdn.arstechnica.net
player.cnevids.com
3 4d.condenastdigital.com pixel.condenastdigital.com
cdn.arstechnica.net
3 www.medtargetsystem.com arstechnica.com
www.medtargetsystem.com
2 bidder.criteo.com static.criteo.net
2 bw-prod.plrsrvcs.com static.polarcdn.com
arstechnica.com
2 aax.amazon-adsystem.com c.amazon-adsystem.com
2 pagead2.googlesyndication.com securepubads.g.doubleclick.net
arstechnica.com
2 image2.pubmatic.com 2 redirects
2 secure.adnxs.com 2 redirects
2 adservice.google.com www.googletagservices.com
imasdk.googleapis.com
2 www.facebook.com arstechnica.com
connect.facebook.net
2 assets.bounceexchange.com tag.bounceexchange.com
assets.bounceexchange.com
2 px.ads.linkedin.com 1 redirects arstechnica.com
2 c.amazon-adsystem.com cdn.arstechnica.net
c.amazon-adsystem.com
2 p.skimresources.com arstechnica.com
2 r.skimresources.com 1 redirects arstechnica.com
2 infinityid.condenastdigital.com pixel.condenastdigital.com
cdn.arstechnica.net
d2c8v52ll5s99u.cloudfront.net
2 sstats.arstechnica.com arstechnica.com
2 api.cnevids.com cdn.arstechnica.net
2 sb.scorecardresearch.com 1 redirects arstechnica.com
2 dpm.demdex.net arstechnica.com
2 assets.adobedtm.com arstechnica.com
assets.adobedtm.com
1 px.moatads.com arstechnica.com
1 pubads.g.doubleclick.net d2c8v52ll5s99u.cloudfront.net
1 s0.2mdn.net imasdk.googleapis.com
1 static.criteo.net js-sec.indexww.com
1 static.polarcdn.com securepubads.g.doubleclick.net
1 evidon.mgr.consensu.org c.evidon.com
1 vendorlist.consensu.org c.evidon.com
1 iabmap.evidon.com c.evidon.com
1 sync.go.sonobi.com 1 redirects
1 cm.g.doubleclick.net 1 redirects
1 p.ad.gt a.ad.gt
1 t.skimresources.com s.skimresources.com
1 api.skimlinks.mgr.consensu.org s.skimresources.com
1 odb.outbrain.com widgets.outbrain.com
1 adservice.google.de www.googletagservices.com
1 plugin.mediavoice.com cdn.mediavoice.com
1 cdn.accelerator.arsdev.net cdn.arstechnica.net
1 cdn.mediavoice.com cdn.arstechnica.net
1 segment-data.zqtk.net cdn.arstechnica.net
1 js-sec.indexww.com cdn.arstechnica.net
1 log.outbrainimg.com widgets.outbrain.com
1 www.google.de arstechnica.com
1 www.google.com 1 redirects
1 stats.g.doubleclick.net 1 redirects
1 ampcid.google.de www.google-analytics.com
1 tcheck.outbrainimg.com widgets.outbrain.com
1 rules.quantcount.com secure.quantserve.com
1 ampcid.google.com www.google-analytics.com
1 d1z2jf7jlzjs58.cloudfront.net arstechnica.com
1 cm.everesttech.net 1 redirects
1 condenast.demdex.net arstechnica.com
1 widgets.outbrain.com cdn.arstechnica.net
1 snap.licdn.com arstechnica.com
1 a.ad.gt www.googletagmanager.com
1 tag.bounceexchange.com arstechnica.com
1 ak.sail-horizon.com www.googletagmanager.com
1 d.turn.com arstechnica.com
1 secure.quantserve.com www.googletagmanager.com
1 pixel.condenastdigital.com cdn.arstechnica.net
1 www.googletagmanager.com arstechnica.com
1 s.skimresources.com arstechnica.com
1 arstechnica.com
0 fastlane.rubiconproject.com Failed js-sec.indexww.com
0 mid.rkdms.com Failed js-sec.indexww.com
0 api.rlcdn.com Failed js-sec.indexww.com
0 srv-2019-04-10-18.config.parsely.com Failed d1z2jf7jlzjs58.cloudfront.net
241 89
Subject Issuer Validity Valid
*.arstechnica.com
Sectigo RSA Domain Validation Secure Server CA
2019-01-16 -
2021-01-15
2 years crt.sh
*.cachefly.net
GlobalSign Organization Validation CA - SHA256 - G2
2018-09-14 -
2019-09-29
a year crt.sh
assets.adobedtm.com
DigiCert SHA2 High Assurance Server CA
2019-03-04 -
2020-03-11
a year crt.sh
*.skimresources.com
DigiCert SHA2 Secure Server CA
2018-09-13 -
2020-10-07
2 years crt.sh
*.google-analytics.com
Google Internet Authority G3
2019-03-01 -
2019-05-24
3 months crt.sh
condenast.com
GlobalSign CloudSSL CA - SHA256 - G3
2019-03-28 -
2019-09-07
5 months crt.sh
*.demdex.net
DigiCert SHA2 High Assurance Server CA
2018-01-09 -
2021-02-12
3 years crt.sh
*.quantserve.com
DigiCert SHA2 High Assurance Server CA
2018-10-16 -
2019-10-21
a year crt.sh
*.turn.com
DigiCert SHA2 Secure Server CA
2019-01-25 -
2020-03-31
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-03-08 -
2019-06-06
3 months crt.sh
ak.sail-horizon.com
Amazon
2019-03-06 -
2020-04-06
a year crt.sh
tag.bounceexchange.com
Thawte RSA CA 2018
2018-08-13 -
2020-08-12
2 years crt.sh
*.ad.gt
Amazon
2018-08-03 -
2019-09-03
a year crt.sh
*.licdn.com
DigiCert SHA2 Secure Server CA
2019-04-01 -
2021-05-07
2 years crt.sh
medtargetsystem.com
Amazon
2018-11-23 -
2019-12-23
a year crt.sh
*.scorecardresearch.com
COMODO RSA Organization Validation Secure Server CA
2018-11-28 -
2019-12-26
a year crt.sh
*.outbrain.com
DigiCert SHA2 Secure Server CA
2018-12-14 -
2020-03-14
a year crt.sh
*.cnevids.com
Trusted Secure Certificate Authority 5
2017-01-10 -
2020-01-10
3 years crt.sh
sstats.arstechnica.com
DigiCert SHA2 High Assurance Server CA
2019-03-03 -
2020-06-05
a year crt.sh
*.cloudfront.net
DigiCert Global CA G2
2018-10-08 -
2019-10-09
a year crt.sh
*.google.com
Google Internet Authority G3
2019-03-01 -
2019-05-24
3 months crt.sh
*.conde.io
Amazon
2018-05-22 -
2019-06-22
a year crt.sh
*.outbrainimg.com
DigiCert SHA2 Secure Server CA
2019-02-24 -
2020-05-25
a year crt.sh
www.google.de
Google Internet Authority G3
2019-03-01 -
2019-05-24
3 months crt.sh
*.g.doubleclick.net
Google Internet Authority G3
2019-03-01 -
2019-05-24
3 months crt.sh
c.amazon-adsystem.com
Amazon
2018-12-18 -
2019-11-21
a year crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2019-01-09 -
2020-03-09
a year crt.sh
*.zqtk.net
COMODO RSA Domain Validation Secure Server CA
2018-08-09 -
2020-08-24
2 years crt.sh
ssl962336.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-01-25 -
2019-12-11
a year crt.sh
*.accelerator.arsdev.net
Amazon
2018-08-14 -
2019-09-14
a year crt.sh
px.ads.linkedin.com
DigiCert SHA2 Secure Server CA
2017-06-06 -
2019-06-11
2 years crt.sh
*.bounceexchange.com
Amazon
2018-08-21 -
2019-09-21
a year crt.sh
*.evidon.com
DigiCert ECC Secure Server CA
2019-02-01 -
2020-05-02
a year crt.sh
ssl446800.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-04-05 -
2019-10-12
6 months crt.sh
f2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-04-01 -
2019-09-07
5 months crt.sh
api.skimlinks.mgr.consensu.org
DigiCert SHA2 Secure Server CA
2018-08-15 -
2019-10-23
a year crt.sh
*.googleapis.com
Google Internet Authority G3
2019-03-01 -
2019-05-24
3 months crt.sh
l.betrad.com
Go Daddy Secure Certificate Authority - G2
2017-04-25 -
2019-06-24
2 years crt.sh
vendorlist.consensu.org
Amazon
2019-03-06 -
2020-04-06
a year crt.sh
tpc.googlesyndication.com
Google Internet Authority G3
2019-03-01 -
2019-05-24
3 months crt.sh
aax-eu.amazon-adsystem.com
Amazon
2018-12-12 -
2019-12-10
a year crt.sh
evidon.mgr.consensu.org
Amazon
2018-09-20 -
2019-10-20
a year crt.sh
moatads.com
DigiCert ECC Secure Server CA
2018-11-10 -
2020-02-09
a year crt.sh
ssl962736.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-12-19 -
2019-12-11
a year crt.sh
*.criteo.net
DigiCert ECC Secure Server CA
2019-03-26 -
2020-03-30
a year crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2019-03-07 -
2021-04-19
2 years crt.sh
ssl887612.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-03-21 -
2019-09-27
6 months crt.sh
ssl880796.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-02-20 -
2019-08-29
6 months crt.sh
*.adtech.advertising.com
DigiCert SHA2 High Assurance Server CA
2018-05-22 -
2020-05-26
2 years crt.sh
*.doubleclick.net
Google Internet Authority G3
2019-03-01 -
2019-05-24
3 months crt.sh
*.criteo.com
DigiCert SHA2 Secure Server CA
2018-11-05 -
2020-01-03
a year crt.sh

This page contains 10 frames:

Primary Page: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Frame ID: D2027CCBA2D41FE2AB476E901170B93B
Requests: 203 HTTP requests in this frame

Frame: https://condenast.demdex.net/dest5.html?d_nsid=0
Frame ID: 3FB01690AABD8E79F39ACE1BB4678118
Requests: 1 HTTP requests in this frame

Frame: https://www.medtargetsystem.com/beacon/portal/?_url=https%3A%2F%2Farstechnica.com&_sid=bac26c73-6fe9-4c85-bbdb-db3ba78b0338&_vid=6c3897c7-dfef-47bb-a73b-f08d07d06996&_ak=119-556-B0E9F642&_flash=false&_th=1554919835|1554919835|1
Frame ID: 99E7C953899E9206967D8681F1CB348F
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: 45E1EB408BA64C7DAF2942F23868A1A9
Requests: 29 HTTP requests in this frame

Frame: https://www.facebook.com/tr/
Frame ID: 98F8AED93BD24AAC3E5BF5168910D637
Requests: 1 HTTP requests in this frame

Frame: https://assets.bounceexchange.com/assets/bounce/local_storage_frame10.min.html
Frame ID: B42A0487F9181E5E358E540270E59EE5
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/pagead/js/r20190403/r20110914/client/ext/m_window_focus_non_hydra.js
Frame ID: D1EC4922D869F9DB4D1E044450E032B5
Requests: 7 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-32/html/container.html
Frame ID: E6B2BCD343C6E54471D02F1A02F2C925
Requests: 1 HTTP requests in this frame

Frame: https://static.polarcdn.com/creative/creative.js
Frame ID: A52285E0BD5FC13C5950006615E40603
Requests: 12 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.293.0_en.html
Frame ID: 0A577FD7D81EA4AF2FD1797D14B13D95
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+wp-(?:content|includes)/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+wp-(?:content|includes)/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • env /^bouncex$/i

Overall confidence: 100%
Detected patterns
  • env /^criteo/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^\/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • script /googlesyndication\.com\//i
  • env /^google_ad_/i
  • env /^__google_ad_/i
  • env /^Goog_AdSense_/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|(analytics))\.js/i
  • env /^gaGlobal$/i

Overall confidence: 100%
Detected patterns
  • env /^googletag$/i
  • env /^google_tag_manager$/i

Overall confidence: 100%
Detected patterns
  • env /^moment$/i

Overall confidence: 100%
Detected patterns
  • env /^(?:OutbrainPermaLink|OB_releaseVer)$/i

Overall confidence: 100%
Detected patterns
  • env /^PARSELY$/i

Overall confidence: 100%
Detected patterns
  • env /^quantserve$/i

Overall confidence: 100%
Detected patterns
  • env /^s_(?:account|objectID|code|INST)$/i

Overall confidence: 100%
Detected patterns
  • env /^jQuery$/i

Page Statistics

241
Requests

95 %
HTTPS

30 %
IPv6

57
Domains

89
Subdomains

82
IPs

7
Countries

3482 kB
Transfer

8996 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 43
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035094&ns__t=1554919835128&ns_c=UTF-8&c8=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1554919835128&ns_c=UTF-8&c8=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&c9=
Request Chain 48
  • https://cm.everesttech.net/cm/dd?d_uuid=15806987984794601532959400675347229924 HTTP 302
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=XK4xmwAAE76VQRN_
Request Chain 62
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j73&tid=UA-31997-1&cid=1164808658.1554919836&jid=792882631&gjid=2115350926&_gid=1414418620.1554919836&_u=aGBAgUAjAAQC~&z=749590268 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1164808658.1554919836&jid=792882631&_v=j73&z=749590268 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1164808658.1554919836&jid=792882631&_v=j73&z=749590268&slf_rd=1&random=2102174321
Request Chain 65
  • https://r.skimresources.com/api/?callback=skimlinksBeaconCallback&data=%7B%22pubcode%22%3A%22100098X1555750%22%2C%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F%22%2C%22domains%22%3A%5B%22cdn.arstechnica.net%22%2C%22flickr.com%22%2C%22facebook.com%22%2C%22twitter.com%22%2C%22reddit.com%22%2C%22en.wikipedia.org%22%2C%22fireeye.com%22%2C%22outbrain.com%22%2C%22condenast.com%22%5D%7D HTTP 302
  • https://r.skimresources.com/api/?callback=skimlinksBeaconCallback&persistence=1&xguid=01D8473JD4S6EM034CQ4980S8Z&data=%7B%22pubcode%22%3A%22100098X1555750%22%2C%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F%22%2C%22domains%22%3A%5B%22cdn.arstechnica.net%22%2C%22flickr.com%22%2C%22facebook.com%22%2C%22twitter.com%22%2C%22reddit.com%22%2C%22en.wikipedia.org%22%2C%22fireeye.com%22%2C%22outbrain.com%22%2C%22condenast.com%22%5D%7D&checksum=b3ffa6c91c0d274eb859c357f17148ed01bd836b6bb8c2e119a62dd0616b51da
Request Chain 81
  • https://px.ads.linkedin.com/collect/?time=1554919836224&pid=434737&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&fmt=js&s=1 HTTP 302
  • https://px.ads.linkedin.com/collect/?time=1554919836224&pid=434737&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&fmt=js&s=1&cookiesTest=true
Request Chain 128
  • https://secure.adnxs.com/getuid?https://ids.ad.gt/api/v1/match?id=10d80dd9-37d3-4f96-a09f-25df82a0eea3&adnxs_id=$UID HTTP 302
  • https://secure.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fmatch%3Fid%3D10d80dd9-37d3-4f96-a09f-25df82a0eea3%26adnxs_id%3D%24UID HTTP 302
  • https://ids.ad.gt/api/v1/match?id=10d80dd9-37d3-4f96-a09f-25df82a0eea3&adnxs_id=6499738377187706161
Request Chain 129
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=8gkxb6n&ttd_tpi=1&gpdr=0&ttd_puid=10d80dd9-37d3-4f96-a09f-25df82a0eea3 HTTP 302
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=8gkxb6n&ttd_tpi=1&gpdr=0&ttd_puid=10d80dd9-37d3-4f96-a09f-25df82a0eea3 HTTP 302
  • https://ids.ad.gt/api/v1/t_match?tdid=66259148-a2ad-43c6-9444-0cdbe3f12acd&id=10d80dd9-37d3-4f96-a09f-25df82a0eea3
Request Chain 130
  • https://cm.g.doubleclick.net/pixel?google_nid=audigent_w_appnexus_3985&google_cm&google_sc&google_ula=450542624&id=10d80dd9-37d3-4f96-a09f-25df82a0eea3 HTTP 302
  • https://ids.ad.gt/api/v1/g_match?id=10d80dd9-37d3-4f96-a09f-25df82a0eea3&google_gid=CAESEB-uuPtyrwzI3MXFfLhT3_8&google_cver=1&google_ula=450542624,0
Request Chain 131
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3D10d80dd9-37d3-4f96-a09f-25df82a0eea3 HTTP 302
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?ird=1&rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3D10d80dd9-37d3-4f96-a09f-25df82a0eea3 HTTP 302
  • https://ids.ad.gt/api/v1/pbm_match?pbm=20C0BF6E-8276-487B-AC11-3B96AD3A600E&id=10d80dd9-37d3-4f96-a09f-25df82a0eea3
Request Chain 132
  • https://sync.go.sonobi.com/us?https://ids.ad.gt/api/v1/son_match?id=10d80dd9-37d3-4f96-a09f-25df82a0eea3&uid=[UID] HTTP 302
  • https://ids.ad.gt/api/v1/son_match?id=10d80dd9-37d3-4f96-a09f-25df82a0eea3&uid=635b8c07-3e6d-4b08-9dea-638b80fed45c
Request Chain 192
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1554919841400;callback=window.headertag.AolHtb.adResponseCallbacks._ie9Xaq83; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841400;callback=window.headertag.AolHtb.adResponseCallbacks._ie9Xaq83
Request Chain 193
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1554919841401;callback=window.headertag.AolHtb.adResponseCallbacks._FDumt9XV; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841401;callback=window.headertag.AolHtb.adResponseCallbacks._FDumt9XV
Request Chain 201
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._7OvPyQ5v; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._7OvPyQ5v
Request Chain 202
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._iSfgL8ui; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1554919840;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._iSfgL8ui
Request Chain 224
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._7OvPyQ5v HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;apid=1Af3d61cb2-5bbb-11e9-9350-12bf237d14d4;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._7OvPyQ5v
Request Chain 225
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1554919840;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._iSfgL8ui HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;apid=1Af3d5f980-5bbb-11e9-9b67-12e614795296;cfp=1;rndc=1554919840;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._iSfgL8ui
Request Chain 226
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841400;callback=window.headertag.AolHtb.adResponseCallbacks._ie9Xaq83 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;apid=1Af3d63bc0-5bbb-11e9-821f-12244f280cb6;cfp=1;rndc=1554919840;cmd=bid;cors=yes;v=2;misc=1554919841400;callback=window.headertag.AolHtb.adResponseCallbacks._ie9Xaq83
Request Chain 227
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841401;callback=window.headertag.AolHtb.adResponseCallbacks._FDumt9XV HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;apid=1Af3d63e72-5bbb-11e9-ae82-12d220623a1c;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841401;callback=window.headertag.AolHtb.adResponseCallbacks._FDumt9XV

241 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
44 KB
15 KB
Document
General
Full URL
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.31.169.131 Chicago, United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
ge-11-2-1.ar10.ord6.us.scnet.net
Software
nginx /
Resource Hash
4cc4e3410378e14183cbc61e7fd2a3e1ec59d53c9e3ade461b49c071266fa750
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
arstechnica.com
:scheme
https
:path
/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
server
nginx
date
Wed, 10 Apr 2019 18:10:34 GMT
content-type
text/html; charset=UTF-8
link
<https://arstechnica.com/wp-json/>; rel="https://api.w.org/"
strict-transport-security
max-age=300
x-content-type-options
nosniff
x-xss-protection
1; mode=block
x-frame-options
SAMEORIGIN
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
x-ars-server
web207
content-encoding
gzip
main-e28793ce68.css
cdn.arstechnica.net/wp-content/themes/ars/assets/css/
332 KB
69 KB
Stylesheet
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
bff87041c749a5f66e9f85f96bcb1b6e2a75d8efb198a6a5aa15ea76d5167333

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:34 GMT
content-encoding
gzip
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1554153431:cacheN.fra2-01:H
status
200
content-length
70273
x-cf-tsc
1554153439
x-cf2
H
last-modified
Mon, 01 Apr 2019 21:08:04 GMT
server
CFS 0215
x-cff
B
etag
W/"5ca27db4-53022"
content-type
text/css
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Wed, 05 Jun 2019 18:10:34 GMT
oil-refinery-800x534.jpg
cdn.arstechnica.net/wp-content/uploads/2019/04/
64 KB
64 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2019/04/oil-refinery-800x534.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
0910f1b9d4f0ac04b8fb6996841463f8b6e407653812b277bc6449a7a7587c65

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:34 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
65078
x-cf-tsc
1554869101
x-cf2
H
last-modified
Tue, 09 Apr 2019 22:21:17 GMT
server
CFS 0215
x-cff
B
etag
"5cad1add-fe36"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Wed, 05 Jun 2019 18:10:34 GMT
main-fdf777f7dd.js
cdn.arstechnica.net/wp-content/themes/ars/assets/js/
648 KB
211 KB
Script
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-fdf777f7dd.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
7025412ad51c0ec1fed19afd26d2aa94f261c634a9b481ef08804c980ae620a4

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:34 GMT
content-encoding
gzip
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
215607
x-cf-tsc
1554153300
x-cf2
H
last-modified
Mon, 01 Apr 2019 21:08:04 GMT
server
CFS 0215
x-cff
B
etag
W/"5ca27db4-a200d"
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Wed, 05 Jun 2019 18:10:34 GMT
ars-3b01442aaa.ads.us.js
cdn.arstechnica.net/wp-content/themes/ars/assets/js/
3 KB
2 KB
Script
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/ars-3b01442aaa.ads.us.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
64d2d3dc68f59fec33141b38317ceb57a980c650041004016ebeddb7dc609a28

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:34 GMT
content-encoding
gzip
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1554153455:cacheN.fra2-01:H
status
200
content-length
1589
x-cf-tsc
1554153458
x-cf2
H
last-modified
Mon, 01 Apr 2019 21:08:04 GMT
server
CFS 0215
x-cff
B
etag
W/"5ca27db4-de9"
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Wed, 05 Jun 2019 18:10:34 GMT
satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/
75 KB
23 KB
Script
General
Full URL
https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.23 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-23.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
40543640eb6187832a2bd4f777b1a85f6d1aa283cd708bd29f5ef8114816e740

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:34 GMT
content-encoding
gzip
last-modified
Mon, 11 Mar 2019 16:42:01 GMT
server
Apache
etag
"726cdd0e62ef73225b0e432fa2506ff4:1552322521"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=3600
accept-ranges
bytes
timing-allow-origin
*, *
content-length
23575
expires
Wed, 10 Apr 2019 19:10:34 GMT
100098X1555750.skimlinks.js
s.skimresources.com/js/
38 KB
14 KB
Script
General
Full URL
https://s.skimresources.com/js/100098X1555750.skimlinks.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
151.139.128.10 Dallas, United States, ASN (),
Reverse DNS
Software
AmazonS3 /
Resource Hash
9e7dc8ac97eb079382ea2255d1751dc5b062515575a8795caa5851fae66accf4

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:34 GMT
content-encoding
gzip
last-modified
Wed, 10 Apr 2019 12:29:38 GMT
server
AmazonS3
x-amz-request-id
A0532F3AEB24ED16
etag
"348c531dc115e487911f261fe3477ce3"
x-hw
1554919834.cds017.pa1.hn,1554919834.cds024.pa1.c
content-type
application/octet-stream
status
200
cache-control
max-age=3600
accept-ranges
bytes
content-length
14498
x-amz-id-2
bozIgyt2UzNOekgJsdFkZPb8Mnt5WC1cPzRau7Pbe/BCIL1uECXoaGu9O9IjudUWvmRsHYYKHWo=
services.min.js
cdn.arstechnica.net/cns/
149 KB
43 KB
Script
General
Full URL
https://cdn.arstechnica.net/cns/services.min.js?1554919200
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
5ae42b31cd43c4d1a536b9bd53a19693d4bc8447c48051724b26de65f8f89ed7

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:34 GMT
content-encoding
gzip
x-cf3
H
x-amz-request-id
85E6D45B256DE1D6
x-cf1
14961:fB.fra2:co:1553189295:cacheN.fra2-01:H
status
200
content-length
43882
x-amz-id-2
dKj5rKBIu0WtEIpNkAhOQxALpQZWTmeuaEWDffJ/mdNsF4X7SWYUF7GB2incCPpQ38hHNyeLqfA=
x-served-by
cache-mdw17379-MDW
cf4ttl
43200.000
x-cf2
H
last-modified
Thu, 21 Mar 2019 17:17:45 GMT
server
CFS 0215
x-timer
S1553621347.099346,VS0,VE284
x-cff
B
etag
"cf723245057e5def17c0d107b3eac5e6"
vary
Accept-Encoding
content-type
text/javascript
access-control-allow-origin
*
expires
Wed, 05 Jun 2019 18:10:34 GMT
cache-control
max-age=4838400
cf4age
4485
x-amz-version-id
uOg6df7ZtzAAIyH5AMJ.kfvRiYpzffwE
accept-ranges
bytes
x-cf-tsc
1553625832
x-cache-hits
0
gtm.js
www.googletagmanager.com/
246 KB
61 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2008 , Ireland, ASN (),
Reverse DNS
Software
Google Tag Manager (scaffolding) /
Resource Hash
da924a378b297c568f440bf2adc2f2e973fb7bfc8be6f6052e5c97be056ccbd3
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:34 GMT
content-encoding
br
last-modified
Tue, 09 Apr 2019 23:34:41 GMT
server
Google Tag Manager (scaffolding)
access-control-allow-origin
http://www.googletagmanager.com
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
content-length
61987
x-xss-protection
0
expires
Wed, 10 Apr 2019 18:10:34 GMT
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
78c8c364b438f0be81f1c51627902fda95b7aebdd2c04aee28c2f72cd4390207

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
357 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f95836cdd8c1af1d8261e8e198a4c1dd306e2b50ddc389fe820b56212a9cb17d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
279 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5ecbfb541946a9a9437190a21d98e1c7ab7d863837d7d038a9a1e053c649c8ba

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
400 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6f261533d4b74ae931965cf3609bf47bb55001e39eb7029502d96cec73c4749a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
700 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5ab499494548829e507e9b6cd57247a6cd565e7f1bc6eb55e3da445af76f1f0c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
49282a74c6ced31e99f808232188ade8d82652004df4d664dcdb98c32563dd39

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
841 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
039f13cdf684666dd973e2385f773385adb074039e8a832ec48e1ae35fb20c15

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
power-grid-360x200.jpg
cdn.arstechnica.net/wp-content/uploads/2017/09/
16 KB
16 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2017/09/power-grid-360x200.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
352978b9e43f11a6b277ddd8bac1c0469022903430904496a471e4aace3fa218

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:34 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
15982
x-cf-tsc
1554869181
x-cf2
H
last-modified
Wed, 06 Sep 2017 03:58:25 GMT
server
CFS 0215
x-cff
B
etag
"59af7261-3e6e"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Wed, 05 Jun 2019 18:10:34 GMT
refinery-360x200.jpg
cdn.arstechnica.net/wp-content/uploads/2018/10/
17 KB
17 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2018/10/refinery-360x200.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
0c6f50f8794a17a58ad3228b46d927d9e0886129cceb4019da8d8af5a95fcc45

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:34 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1540384962:cacheN.fra2-01:H
status
200
content-length
17147
x-cf-tsc
1554869181
x-cf2
H
last-modified
Wed, 24 Oct 2018 12:42:44 GMT
server
CFS 0215
x-cff
B
etag
"5bd068c4-42fb"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Wed, 05 Jun 2019 18:10:34 GMT
blockquote-15f4e0cf4f.svg
cdn.arstechnica.net/wp-content/themes/ars/assets/img/
434 B
755 B
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/img/blockquote-15f4e0cf4f.svg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
69df9c207667c2ef7940a78d951cda72d599be4e843d8bc43cc3b0ff2c08e280

Request headers

Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:34 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
434
x-cf-tsc
1553678732
x-cf2
H
last-modified
Tue, 26 Mar 2019 16:40:51 GMT
server
CFS 0215
x-cff
B
etag
"5c9a5613-1b2"
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Wed, 05 Jun 2019 18:10:34 GMT
Dang.jpg
cdn.arstechnica.net/wp-content/uploads/2018/10/
90 KB
91 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2018/10/Dang.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
d6f350f62fc19bfd7091e3841649be70e806fb94c00a1f777dbed2ea8ecc9daa

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:34 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
92486
x-cf-tsc
1554059394
x-cf2
H
last-modified
Mon, 08 Oct 2018 19:35:22 GMT
server
CFS 0215
x-cff
B
etag
"5bbbb17a-16946"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Wed, 05 Jun 2019 18:10:34 GMT
channel-ars-be7bb52ba9.png
cdn.arstechnica.net/wp-content/themes/ars/assets/img/
5 KB
5 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/img/channel-ars-be7bb52ba9.png
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
08ed3bf6e73a999bafb422b878fb05b87269b00a65230c9457ce75aee10b873e

Request headers

Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:34 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
4809
x-cf-tsc
1553647525
x-cf2
H
last-modified
Tue, 26 Mar 2019 16:40:51 GMT
server
CFS 0215
x-cff
B
etag
"5c9a5613-12c9"
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
28688
accept-ranges
bytes
expires
Wed, 05 Jun 2019 18:10:34 GMT
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c7f2558d7005dc61e343b6abb61a63da8ace760a0fdd45cb0cc124b0de5b4c2f

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
18 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
62c7d2da9a5942053f17c9756e53b7cda414541619bd35c2b1441cd88c77f235

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4ec4b6769730ca98db1f40b152c52bd5bec01f61f559fb92709c307750388ac8

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
economica-bold-otf-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
25 KB
25 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/economica-bold-otf-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
5315cf641e62ac7de4a82e6003cc1bd1ff09218400d8ff5286c951e25aee966b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Wed, 10 Apr 2019 18:10:34 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
25592
x-cf-tsc
1553645151
x-cf2
H
last-modified
Mon, 25 Mar 2019 21:33:35 GMT
server
CFS 0215
x-cff
B
etag
"5c99492f-63f8"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
27820
accept-ranges
bytes
expires
Wed, 05 Jun 2019 18:10:34 GMT
economica-regular-otf-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
24 KB
24 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/economica-regular-otf-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
c14a030b0b5ef06f710d9bbff164662d4b43c037e62f254aa6280504013caa34

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Wed, 10 Apr 2019 18:10:34 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
24264
x-cf-tsc
1553645151
x-cf2
H
last-modified
Mon, 25 Mar 2019 21:33:35 GMT
server
CFS 0215
x-cff
B
etag
"5c99492f-5ec8"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
27820
accept-ranges
bytes
expires
Wed, 05 Jun 2019 18:10:34 GMT
bitter-italic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
24 KB
24 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-italic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
1193e934b76ed372f47e23f78f8a13e99d9588e564aff866e8f700e7a0650a83

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Wed, 10 Apr 2019 18:10:34 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
24212
x-cf-tsc
1553645151
x-cf2
H
last-modified
Mon, 25 Mar 2019 21:33:35 GMT
server
CFS 0215
x-cff
B
etag
"5c99492f-5e94"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
27820
accept-ranges
bytes
expires
Wed, 05 Jun 2019 18:10:34 GMT
bitter-regular-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
22 KB
23 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-regular-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
0186840386391fa2c0750ff7450a78e066498ba3274546a6fcf0fa9c55cd457c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Wed, 10 Apr 2019 18:10:34 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
22872
x-cf-tsc
1553645151
x-cf2
H
last-modified
Mon, 25 Mar 2019 21:33:35 GMT
server
CFS 0215
x-cff
B
etag
"5c99492f-5958"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
27820
accept-ranges
bytes
expires
Wed, 05 Jun 2019 18:10:34 GMT
opensans-semibold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
19 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-semibold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
1f9cd4a445ba85172da6090dd7b95edf55fd9e81ddb193e0b78093c1afa84378

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Wed, 10 Apr 2019 18:10:34 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
18972
x-cf-tsc
1553645151
x-cf2
H
last-modified
Mon, 25 Mar 2019 21:33:35 GMT
server
CFS 0215
x-cff
B
etag
"5c99492f-4a1c"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
27410
accept-ranges
bytes
expires
Wed, 05 Jun 2019 18:10:34 GMT
opensans-semibolditalic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-semibolditalic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
59201950b83489808587827b4050ffe0597992825daa88c227476cdbbf8ca282

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Wed, 10 Apr 2019 18:10:34 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
20872
x-cf-tsc
1553645151
x-cf2
H
last-modified
Tue, 26 Mar 2019 16:40:51 GMT
server
CFS 0215
x-cff
B
etag
"5c9a5613-5188"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
26272
accept-ranges
bytes
expires
Wed, 05 Jun 2019 18:10:34 GMT
opensans-regular-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
18 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-regular-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
caa3854f28740fa98125ded826446ee4456379e8ad7c4ff46643347d1901506a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Wed, 10 Apr 2019 18:10:34 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
18824
x-cf-tsc
1553645151
x-cf2
H
last-modified
Mon, 25 Mar 2019 21:33:35 GMT
server
CFS 0215
x-cff
B
etag
"5c99492f-4988"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
27820
accept-ranges
bytes
expires
Wed, 05 Jun 2019 18:10:34 GMT
opensans-bold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
19 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-bold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
86096831a70c72ac0c08f5e65ae92d98330d9fd2b7511dde65ff50b8a16bfd9a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Wed, 10 Apr 2019 18:10:34 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
19516
x-cf-tsc
1553647524
x-cf2
H
last-modified
Mon, 25 Mar 2019 21:33:35 GMT
server
CFS 0215
x-cff
B
etag
"5c99492f-4c3c"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
29489
accept-ranges
bytes
expires
Wed, 05 Jun 2019 18:10:34 GMT
bitter-bold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
22 KB
22 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-bold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
807271433f80bb33654a84ec904035be3d2b34e505a051e3469a47fe39ccb752

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Wed, 10 Apr 2019 18:10:34 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
22104
x-cf-tsc
1553645151
x-cf2
H
last-modified
Mon, 25 Mar 2019 21:33:35 GMT
server
CFS 0215
x-cff
B
etag
"5c99492f-5658"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
27103
accept-ranges
bytes
expires
Wed, 05 Jun 2019 18:10:34 GMT
sparrow.min.js
pixel.condenastdigital.com/
38 KB
14 KB
Script
General
Full URL
https://pixel.condenastdigital.com/sparrow.min.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1554919200
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.0.239 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
e53759cbefbca7ac3585c5a7586b03a20b664142fa2bb668ba1d11213c97f423

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:35 GMT
Content-Encoding
gzip
Age
175042
Via
1.1 varnish, 1.1 varnish
X-Cache
HIT, HIT
X-Cache-Hits
3, 12653
Connection
keep-alive
Content-Length
13219
x-amz-id-2
xd1+yeEFTU9q2brJ2F7DjIW+4XlI5g+WcyXrwk3x6llRKqsAjUEQ2JZsBiTSzr75ABhMkGX0ZR8=
X-Served-By
cache-iad2141-IAD, cache-hhn1529-HHN
Last-Modified
Mon, 28 Jan 2019 17:44:57 GMT
Server
AmazonS3
X-Timer
S1554919835.159379,VS0,VE0
ETag
"4beefaddd4ac53cdf6e84d0d370b0aa1"
Vary
Accept-Encoding
x-amz-request-id
3CF8D054D39F1709
Access-Control-Allow-Origin
*
Cache-Control
no-cache, public, max-age=604800
Accept-Ranges
bytes
Content-Type
application/javascript
Expires
Mon, 28 Jan 2019 23:44:56 GMT
id
dpm.demdex.net/
5 KB
2 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=3.3.0&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_orgid=F7093025512D2B690A490D44%40AdobeOrg&d_nsid=0&ts=1554919835102
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
63.32.166.115 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-63-32-166-115.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
0534f10c6a4720df97496177faa6b1bdb17ab46489b259049492bf802c184022

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v026-03d56fa6f.edge-irl1.demdex.com 5.51.2.20190403131314 10ms
Pragma
no-cache
Content-Encoding
gzip
X-TID
mFbxGBJJRXs=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
1473
Expires
Thu, 01 Jan 1970 00:00:00 GMT
analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81f::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
3e552578c7d450b023f2cd9d28f830be4335c3acc6c4ab6dadda0769f09e5f22
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 16 Jan 2019 20:01:45 GMT
server
Golfe2
age
2288
date
Wed, 10 Apr 2019 17:32:27 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
17543
expires
Wed, 10 Apr 2019 19:32:27 GMT
quant.js
secure.quantserve.com/
12 KB
6 KB
Script
General
Full URL
https://secure.quantserve.com/quant.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.184 , United Kingdom, ASN27281 (QUANTCAST - Quantcast Corporation, US),
Reverse DNS
Software
QS /
Resource Hash
404a9b0ffbcc813e8ddbb8d8510a24a69c09079282f8083ee94f4adc5d627176

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:35 GMT
Content-Encoding
gzip
Last-Modified
Wed, 10-Apr-2019 18:10:35 GMT
Server
QS
ETag
M0-e2b9884a
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=604800
Connection
keep-alive
Content-Length
5456
Expires
Wed, 17 Apr 2019 18:10:35 GMT
PageName=information%20technology,SiteID=Ars%20Technica,CampaignID=1802C,Channel=website,CreativeID=undefined
d.turn.com/r/dd/id/L21rdC84MTYvY2lkLzI4NTk1MjExL3QvMA/kv/
253 B
698 B
Script
General
Full URL
https://d.turn.com/r/dd/id/L21rdC84MTYvY2lkLzI4NTk1MjExL3QvMA/kv/PageName=information%20technology,SiteID=Ars%20Technica,CampaignID=1802C,Channel=website,CreativeID=undefined
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_CBC
Server
46.228.164.13 , United Kingdom, ASN56396 (TURN, GB),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
7baa71814fefb146eb0d6b4b2272ed77df1d6dced4139ca2782b6e28555ae545

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Apr 2019 18:10:34 GMT
Cache-Control
max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0
Server
Apache-Coyote/1.1
Content-Type
text/javascript;charset=UTF-8
Content-Length
253
P3P
policyref="/w3c/p3p.xml", CP="NOI CURa DEVa TAIa PSAa PSDa IVAa IVDa OUR IND UNI NAV"
fbevents.js
connect.facebook.net/en_US/
53 KB
15 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
fa59b1ed1b011e084474ad818b5f6986d84fc678e2f37fee9330eb52d86860b3
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
15397
x-xss-protection
0
pragma
public
x-fb-debug
nc4pOpWGDcwrg9xfPVv3KVmwLTMhWeT6V9MAUGd0pvmrjTtBiOM2qMUxXA+xkd0FL3k0fAsO3uSMYpkb0ggcyg==
date
Wed, 10 Apr 2019 18:10:35 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
expires
Sat, 01 Jan 2000 00:00:00 GMT
spm.v1.min.js
ak.sail-horizon.com/spm/
113 KB
41 KB
Script
General
Full URL
https://ak.sail-horizon.com/spm/spm.v1.min.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.26 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-26.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
7deb7e9381e893cc8912f3be15f3fccb25f7dab52ec5aae51d30757f43906c5a

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:05:00 GMT
content-encoding
gzip
last-modified
Wed, 10 Apr 2019 16:03:02 GMT
server
Apache
age
336
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/javascript
status
200
cache-control
max-age=600; must-revalidate
accept-ranges
bytes
content-length
41752
via
1.1 d55780b776b171387055eca956ae29a9.cloudfront.net (CloudFront)
x-amz-cf-id
Nml9Wbm0pMkpV-hke2OOGjiiV54Sx73j9X71Rp55TjWVBaDJHxHQfA==
i.js
tag.bounceexchange.com/2806/
10 KB
3 KB
Script
General
Full URL
https://tag.bounceexchange.com/2806/i.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.92.63 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
63.92.190.35.bc.googleusercontent.com
Software
fasthttp /
Resource Hash
cb7c9941d73a550766d10581953d949b048498aa49c86026a46440b4c2ecb056

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:34 GMT
content-encoding
gzip
server
fasthttp
etag
6b31fc89f1c4c4
content-type
text/plain; charset=utf-8
status
200
cache-control
no-cache, must-revalidate
x-region
europe-west3
alt-svc
clear
content-length
3361
via
1.1 google
57
a.ad.gt/api/v1/u/matches/
3 KB
2 KB
Script
General
Full URL
https://a.ad.gt/api/v1/u/matches/57
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.161.216.48 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-161-216-48.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
3c4c1114c652aaa696cecc26447d865e32ce1cd4b9dc2776d8c54c9b788d4287

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:35 GMT
Content-Encoding
gzip
Server
nginx/1.8.1
Connection
keep-alive
Content-Length
1206
Content-Type
text/html; charset=utf-8
insight.min.js
snap.licdn.com/li.lms-analytics/
15 KB
5 KB
Script
General
Full URL
https://snap.licdn.com/li.lms-analytics/insight.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:28c::25ea , European Union, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
bc9cef10d07e8da3ce80181de07a056414731f86e0dc12e2c81d652b28ac770b

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:35 GMT
Content-Encoding
gzip
Last-Modified
Mon, 03 Dec 2018 23:03:30 GMT
X-CDN
AKAM
Vary
Accept-Encoding
Content-Type
application/x-javascript;charset=utf-8
Cache-Control
max-age=36595
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
4571
beacon.js
www.medtargetsystem.com/javascript/
138 KB
44 KB
Script
General
Full URL
https://www.medtargetsystem.com/javascript/beacon.js?v2.5.12
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.3.171.116 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-3-171-116.compute-1.amazonaws.com
Software
Apache/2.4.7 (Ubuntu) /
Resource Hash
ce2bfdab07acb291542c8cb990b5a96e203bf6d14766e2efc97577c2d578e3c4

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:35 GMT
Content-Encoding
gzip
Last-Modified
Tue, 09 Apr 2019 15:25:22 GMT
Server
Apache/2.4.7 (Ubuntu)
ETag
"22681-5861a8fb79c80-gzip"
Vary
X-Forwarded-Proto,Accept-Encoding
Content-Type
application/javascript
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
44404
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035094&ns__t=1554919835128&ns_c=UTF-8&c8=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site%20%7C%20Ars%20...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1554919835128&ns_c=UTF-8&c8=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site%20%7C%20Ars%2...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1554919835128&ns_c=UTF-8&c8=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&c9=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.73.138.159 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-73-138-159.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Apr 2019 18:10:35 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1554919835128&ns_c=UTF-8&c8=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&c9=
Pragma
no-cache
Date
Wed, 10 Apr 2019 18:10:35 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
outbrain.js
widgets.outbrain.com/
111 KB
39 KB
Script
General
Full URL
https://widgets.outbrain.com/outbrain.js?_=1554919835234
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-fdf777f7dd.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.190 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-190.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
a16f312eab072872fac72f7420ea5d9bbf5217265997813840c0185cb4e5f8eb

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:35 GMT
Content-Encoding
gzip
Last-Modified
Wed, 10 Apr 2019 08:45:21 GMT
Server
Apache
ETag
"4db2c291fdf1e3e26a4935de9d7b8a79:1554885921"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=604800
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
39218
video_groups
api.cnevids.com/v1/
4 KB
1 KB
XHR
General
Full URL
https://api.cnevids.com/v1/video_groups?filters={%22channel_key%22:%22arstechnica%22}&pagesize=20&endpoint=oo.arstechnica
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-fdf777f7dd.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.86.193.78 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-86-193-78.compute-1.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
44ee4abf7c64d5189f8e658246d8c13c9ded4b24f67396b2346ea1338b841776
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/*
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:35 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
642
X-XSS-Protection
1; mode=block
X-Request-Id
e913908f-d1f0-4ed2-8ab0-448cd9b77bf9
X-Runtime
0.001912
X-Backend-Node
10.110.10.11
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
X-Frame-Options
SAMEORIGIN
ETag
W/"cfe2f5a0a97bf21dba9858ad511a9acb"
X-Download-Options
noopen
Vary
Accept-Encoding, Origin
Access-Control-Allow-Methods
GET, PUT, POST, DELETE, OPTIONS
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
Cookie set dest5.html
condenast.demdex.net/ Frame 3FB0
0
0
Document
General
Full URL
https://condenast.demdex.net/dest5.html?d_nsid=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
46.51.202.182 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-46-51-202-182.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash

Request headers

Host
condenast.demdex.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Accept-Encoding
gzip, deflate, br
Cookie
demdex=15806987984794601532959400675347229924
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/

Response headers

Accept-Ranges
bytes
Cache-Control
max-age=21600
Content-Encoding
gzip
Content-Type
text/html
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified
Thu, 04 Apr 2019 08:47:05 GMT
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Pragma
no-cache
Set-Cookie
demdex=15806987984794601532959400675347229924;Path=/;Domain=.demdex.net;Expires=Mon, 07-Oct-2019 18:10:35 GMT;Max-Age=15552000
Vary
Accept-Encoding, User-Agent
X-TID
slXddWmGTEI=
Content-Length
2764
Connection
keep-alive
id
sstats.arstechnica.com/
49 B
411 B
XHR
General
Full URL
https://sstats.arstechnica.com/id?d_visid_ver=3.3.0&d_fieldgroup=A&mcorgid=F7093025512D2B690A490D44%40AdobeOrg&mid=15589102529895167682980396206669799485&ts=1554919835457
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.140.41.50 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
arstechnica.com.ssl.d1.sc.omtrdc.net
Software
Omniture DC /
Resource Hash
54e4fedaec16d22e1bb6d1a45db601844bf6ceaf8227e0075ec6c7c6135639fc

Request headers

Pragma
no-cache
Origin
https://arstechnica.com
Accept-Encoding
gzip, deflate, br
Host
sstats.arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded
Accept
*/*
Cache-Control
no-cache
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Connection
keep-alive
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Date
Wed, 10 Apr 2019 18:10:35 GMT
Server
Omniture DC
xserver
www7142
Vary
Origin
X-C
ms-6.6.0
P3P
CP="This is not a P3P policy"
Access-Control-Allow-Origin
https://arstechnica.com
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/x-javascript
Keep-Alive
timeout=15
Content-Length
49
ibs:dpid=411&dpuuid=XK4xmwAAE76VQRN_
dpm.demdex.net/
Redirect Chain
  • https://cm.everesttech.net/cm/dd?d_uuid=15806987984794601532959400675347229924
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=XK4xmwAAE76VQRN_
42 B
769 B
Image
General
Full URL
https://dpm.demdex.net/ibs:dpid=411&dpuuid=XK4xmwAAE76VQRN_
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
63.32.166.115 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-63-32-166-115.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

DCS
dcs-prod-irl1-v026-0f1d5ea11.edge-irl1.demdex.com 5.51.2.20190403131314 3ms
Pragma
no-cache
X-TID
wm8tA8ChQXA=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT

Redirect headers

Date
Wed, 10 Apr 2019 18:10:35 GMT
Server
AMO-cookiemap/1.1
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Location
https://dpm.demdex.net/ibs:dpid=411&dpuuid=XK4xmwAAE76VQRN_
Cache-Control
no-cache
Connection
Keep-Alive
Keep-Alive
timeout=15,max=100
Content-Length
0
p.js
d1z2jf7jlzjs58.cloudfront.net/
6 KB
3 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/p.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.108 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-108.fra50.r.cloudfront.net
Software
nginx /
Resource Hash
725913eab3460e2955a8ac4ec176f902c7d8d2db60757248b735cbf8698b0749

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
public
Date
Tue, 09 Apr 2019 22:22:43 GMT
Content-Encoding
gzip
Last-Modified
Fri, 07 Mar 2014 00:45:07 GMT
Server
nginx
Age
74874
ETag
W/"53191693-19c1"
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
application/x-javascript
Via
1.1 a394c864b23364262af48fed4e7e9fad.cloudfront.net (CloudFront)
Cache-Control
max-age=86400, public
Connection
keep-alive
X-Amz-Cf-Id
-m75oFmm-a7ZR-0BY7rirGD_7CKbBDMVD-kbuIwRTO-KnS7IZq7lFQ==
Expires
Wed, 10 Apr 2019 21:22:38 GMT
linkid.js
www.google-analytics.com/plugins/ua/
2 KB
943 B
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/linkid.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81f::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
92fca55833f48b4289ac8f1cedd48752b580fce4ec4b5d81670b8193d6e51b54
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:08:49 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 21 Apr 2016 03:17:22 GMT
server
sffe
age
106
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
856
x-xss-protection
0
expires
Wed, 10 Apr 2019 19:08:49 GMT
publisher:getClientId
ampcid.google.com/v1/
74 B
435 B
XHR
General
Full URL
https://ampcid.google.com/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:809::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
991bfe84fec788f2b7d432b99a60c1e2aa2e799bc0137da8cf478299d0fc9a10
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 10 Apr 2019 18:10:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
94
x-xss-protection
1; mode=block
228464857488266
connect.facebook.net/signals/config/
174 KB
42 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/228464857488266?v=2.8.47&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
d17293416b9a5d885d322ee5d26cbff2de1f87bcec5c1b5710174a1111e14245
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
42680
x-xss-protection
0
pragma
public
x-fb-debug
/2pCRUcTW0F7BaS91SYSGSxkhv6IgvVvz3ealvR+oik0jRjejtwLBQiqIx7bU4BvXQkf/dd8WOuuKDGWw4TYIg==
date
Wed, 10 Apr 2019 18:10:35 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
/
infinityid.condenastdigital.com/
36 B
1 KB
XHR
General
Full URL
https://infinityid.condenastdigital.com/?rand=1554919835579
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.86.70.149 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-86-70-149.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
d368d542caca5f83ef3446018ba6ae971805572493b05aec869bf9378c1c6a0c

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:35 GMT
content-encoding
gzip
Server
nginx/1.15.8
vary
origin,accept-encoding
Content-Type
text/plain; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
transfer-encoding
chunked
content
4d.condenastdigital.com/
4 KB
2 KB
XHR
General
Full URL
https://4d.condenastdigital.com/content?url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.94.199.232 Fairfield, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-3-94-199-232.compute-1.amazonaws.com
Software
/
Resource Hash
56ac23b6977873cfafb6c3e007160d369006a96b72e5fa7b17d00f0a3136d5a5

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:36 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-04-10T18%3A10%3A35.584Z&_t=library_sparrow&cBr=Ars%20Technica&cKe=critical%20infrastructure%7Cindustrial%20control%20systems%7Cmalware%7Ctriton&cCh=information%20technology&cTi=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&cCl=818&cId=1488751&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4000&pSw=1600&pSh=1200&uID=5709d500-24b8-4241-b0ac-0af4b7b56552&uNw=1&uUq=1&sID=48a1e0ef-c70e-4345-b6bf-01c69e73e4ed&pID=b68db677-c3c7-45b3-93ac-e7cd5941aaa2&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&requestStart=926.5900030732155&requestEnd=1024.2699980735779&init=1433.5049986839294&_logType=info
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:36 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-04-10T18%3A10%3A35.593Z&_t=loaded&cBr=Ars%20Technica&cKe=critical%20infrastructure%7Cindustrial%20control%20systems%7Cmalware%7Ctriton&cCh=information%20technology&cTi=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&cCl=818&cId=1488751&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4000&pSw=1600&pSh=1200&uID=5709d500-24b8-4241-b0ac-0af4b7b56552&sID=48a1e0ef-c70e-4345-b6bf-01c69e73e4ed&pID=b68db677-c3c7-45b3-93ac-e7cd5941aaa2&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns&cns=2_26_0&feature_get_entries=true&feature_performance_now=true&cns_metrics=1_1_0&cns_metrics_sparrow=1_2_0&_logType=info
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:36 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
rules-p-Jjy-Cyr1NZGRz.js
rules.quantcount.com/
4 KB
2 KB
Script
General
Full URL
https://rules.quantcount.com/rules-p-Jjy-Cyr1NZGRz.js
Requested by
Host: secure.quantserve.com
URL: https://secure.quantserve.com/quant.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20ac:8400:6:44e3:f8c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
efdbd8582066a12cf45115f1e150d2a8de06bf6b14db3feca98b116efeb9e0bb

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 17:32:47 GMT
content-encoding
gzip
last-modified
Mon, 19 Mar 2018 22:18:17 GMT
server
AmazonS3
age
2502
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/x-javascript
status
200
cache-control
max-age=3600
x-amz-cf-id
TSLy_WAfLy3TW8XNqLRKYKwvXLuUEDgvanheXiKQN_IELdq7yBCucg==
via
1.1 e9e2a595ae7215ef40a63576095c281b.cloudfront.net (CloudFront)
YXJzdGVjaG5pY2EuY29t
tcheck.outbrainimg.com/tcheck/check/
16 B
477 B
XHR
General
Full URL
https://tcheck.outbrainimg.com/tcheck/check/YXJzdGVjaG5pY2EuY29t
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1554919835234
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.58.216.21 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
929701ed632814943e3df803ddd9e3f179ccf889c0ad7b7f3392bd8d109b174f
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
ETag
W/"10-us8lSJutAxKqLzf8c1+n5XstcwY"
Access-Control-Max-Age
43200
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=26329
Date
Wed, 10 Apr 2019 18:10:42 GMT
Connection
keep-alive
Access-Control-Allow-Credentials
false
Content-Length
16
Expires
Thu, 11 Apr 2019 01:29:31 GMT
publisher:getClientId
ampcid.google.de/v1/
3 B
179 B
XHR
General
Full URL
https://ampcid.google.de/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81f::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 10 Apr 2019 18:10:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
23
x-xss-protection
1; mode=block
s-code-contents-566dcf5046f148f38d0aa32bf73df40db7ae7768.js
assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/
67 KB
19 KB
Script
General
Full URL
https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/s-code-contents-566dcf5046f148f38d0aa32bf73df40db7ae7768.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.23 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-23.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
de4de18224e2109f2f8ff4ce9a40cb51c6a36724b2df68e8bd6080b8ee3a02d0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:35 GMT
content-encoding
gzip
last-modified
Mon, 11 Mar 2019 16:42:01 GMT
server
Apache
etag
"06a88b0424fa26cefa8da4fc4967b294:1552322522"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=3600
accept-ranges
bytes
timing-allow-origin
*, *
content-length
19132
expires
Wed, 10 Apr 2019 19:10:35 GMT
collect
www.google-analytics.com/
35 B
100 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j73&a=370652430&t=pageview&_s=1&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&dr=%2F&dp=%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&ul=en-us&de=UTF-8&dt=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site%20%7C%20Ars%20Technica&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=aGBAgUAjAAQC~&jid=792882631&gjid=2115350926&cid=1164808658.1554919836&tid=UA-31997-1&_gid=1414418620.1554919836&gtm=2wg430NLXNPCQ&cg1=article%7Creport&cg2=information-technology&cg3=information%20technology&cd1=GTM-NLXNPCQ&cd2=86&cd4=&cd6=Wed%20Apr%2010%202019%2018%3A10%3A35%20GMT%2B0000%20(Coordinated%20Universal%20Time)&cd7=1554919835112.y2y1026p&cd8=0&cd9=Mozilla%2F5.0%20(Macintosh%3B%20Intel%20Mac%20OS%20X%2010_13_5)%20AppleWebKit%2F537.36%20(KHTML%2C%20like%20Gecko)%20Chrome%2F67.0.3396.87%20Safari%2F537.36&cd10=English&cd11=desktop&cd12=0&cd13=Tag%20Name%3A%20GA%20-%20Pageview%20-%20Core%20Pageview%20-%20All%20Pages&cd20=none&cd25=Dan%20Goodin&cd26=1488751&cd27=818&cd28=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site&cd29=web&cd32=2019-04-10T04%3A01%3A40%2B00%3A00&cd34=2019-04-10T12%3A22%3A32%2B00%3A00&cd35=critical%20infrastructure%7Cindustrial%20control%20systems%7Cmalware%7Ctriton&cd36=web&cd43=Ars%20Technica&cd45=Adblock%20Enabled%20-%20false&cd62=https%3A%2F%2Farstechnica.com%2F%3Fp%3D1488751&cd63=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&cd65=&cd72=1.0.0&cd92=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&cd93=information%20technology&cd97=-1303530583&cd98=article%7Creport&cd103=&cd3=1164808658.1554919836&z=1513186653
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81f::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 09 Mar 2019 02:37:34 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
2820781
content-type
image/gif
status
200
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
cache-control
no-cache, no-store, must-revalidate
access-control-allow-origin
*
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j73&tid=UA-31997-1&cid=1164808658.1554919836&jid=792882631&gjid=2115350926&_gid=1414418620.1554919836&_u=aGBAgUAjAAQC~&z=749590268
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1164808658.1554919836&jid=792882631&_v=j73&z=749590268
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1164808658.1554919836&jid=792882631&_v=j73&z=749590268&slf_rd=1&random=2102174321
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1164808658.1554919836&jid=792882631&_v=j73&z=749590268&slf_rd=1&random=2102174321
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:80b::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:36 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:36 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1164808658.1554919836&jid=792882631&_v=j73&z=749590268&slf_rd=1&random=2102174321
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, no-store, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
5b27ee7e8c1abc4e7900000f
api.cnevids.com/v1/video_groups/
35 KB
7 KB
XHR
General
Full URL
https://api.cnevids.com/v1/video_groups/5b27ee7e8c1abc4e7900000f?endpoint=oo.arstechnica
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-fdf777f7dd.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.86.193.78 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-86-193-78.compute-1.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
e59db1cfd9d6437e42d9810f72f2d9a7e19641a48d207b63da6dea262b406b6a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/*
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:36 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
6576
X-XSS-Protection
1; mode=block
X-Request-Id
bb8ff117-d157-449f-97ec-7c78420554c9
X-Runtime
0.003041
X-Backend-Node
10.110.28.153
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
X-Frame-Options
SAMEORIGIN
ETag
W/"bd5c490146ae7f841849da1bf48b2f6f"
X-Download-Options
noopen
Vary
Accept-Encoding, Origin
Access-Control-Allow-Methods
GET, PUT, POST, DELETE, OPTIONS
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
dwce_cheq_events
log.outbrainimg.com/loggerServices/
4 B
344 B
XHR
General
Full URL
https://log.outbrainimg.com/loggerServices/dwce_cheq_events?timestamp=1554919835985&sessionId=8cc52969-251f-3c07-be5d-36e688281611&url=arstechnica.com&cheqEvent=0&exitReason=2
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1554919835234
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.74.236.19 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
chi.outbrain.com
Software
/
Resource Hash
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com

Response headers

Pragma
no-cache
Date
Wed, 10 Apr 2019 18:10:36 GMT
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
Connection
close
X-TraceId
e69753a70e0e953579987c4105dd24f0
Content-Length
4
Expires
0
/
r.skimresources.com/api/
Redirect Chain
  • https://r.skimresources.com/api/?callback=skimlinksBeaconCallback&data=%7B%22pubcode%22%3A%22100098X1555750%22%2C%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2...
  • https://r.skimresources.com/api/?callback=skimlinksBeaconCallback&persistence=1&xguid=01D8473JD4S6EM034CQ4980S8Z&data=%7B%22pubcode%22%3A%22100098X1555750%22%2C%22page%22%3A%22https%3A%2F%2Farstech...
160 B
456 B
Script
General
Full URL
https://r.skimresources.com/api/?callback=skimlinksBeaconCallback&persistence=1&xguid=01D8473JD4S6EM034CQ4980S8Z&data=%7B%22pubcode%22%3A%22100098X1555750%22%2C%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F%22%2C%22domains%22%3A%5B%22cdn.arstechnica.net%22%2C%22flickr.com%22%2C%22facebook.com%22%2C%22twitter.com%22%2C%22reddit.com%22%2C%22en.wikipedia.org%22%2C%22fireeye.com%22%2C%22outbrain.com%22%2C%22condenast.com%22%5D%7D&checksum=b3ffa6c91c0d274eb859c357f17148ed01bd836b6bb8c2e119a62dd0616b51da
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
41a61101f994793adc87b0d63f05ec87541dfcc16356747e87ff498ca466bd3d
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:36 GMT
via
1.1 google
x-content-type-options
nosniff
server
openresty/1.11.2.5
access-control-allow-origin
https://arstechnica.com
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
status
200
access-control-allow-credentials
true
content-type
application/javascript
alt-svc
clear

Redirect headers

date
Wed, 10 Apr 2019 18:10:36 GMT
via
1.1 google
server
openresty/1.11.2.5
access-control-allow-origin
https://arstechnica.com
location
//r.skimresources.com/api/?callback=skimlinksBeaconCallback&persistence=1&xguid=01D8473JD4S6EM034CQ4980S8Z&data=%7B%22pubcode%22%3A%22100098X1555750%22%2C%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F%22%2C%22domains%22%3A%5B%22cdn.arstechnica.net%22%2C%22flickr.com%22%2C%22facebook.com%22%2C%22twitter.com%22%2C%22reddit.com%22%2C%22en.wikipedia.org%22%2C%22fireeye.com%22%2C%22outbrain.com%22%2C%22condenast.com%22%5D%7D&checksum=b3ffa6c91c0d274eb859c357f17148ed01bd836b6bb8c2e119a62dd0616b51da
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
status
302
access-control-allow-credentials
true
content-type
text/html
alt-svc
clear
content-length
167
px.gif
p.skimresources.com/
43 B
496 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=1&rn=8.404520018808078
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
151.139.128.10 Dallas, United States, ASN (),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:36 GMT
status
200
x-guploader-uploadid
AEnB2UqKMnnFD6FurCKo3JVJRV5vqdTwEdKHTFPFQbJUWdkYR9KM1Eap8RIdT5mygJLPTl-HdOSyPRAy29-X8mT41LA6oNe5wA
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
x-hw
1554919836.cds017.pa1.hn,1554919836.cds041.pa1.c
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
px.gif
p.skimresources.com/
43 B
107 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=2&rn=8.404520018808078
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
151.139.128.10 Dallas, United States, ASN (),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:36 GMT
status
200
x-guploader-uploadid
AEnB2UqKMnnFD6FurCKo3JVJRV5vqdTwEdKHTFPFQbJUWdkYR9KM1Eap8RIdT5mygJLPTl-HdOSyPRAy29-X8mT41LA6oNe5wA
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
x-hw
1554919836.cds017.pa1.hn,1554919836.cds041.pa1.c
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
gpt.js
www.googletagservices.com/tag/js/
43 KB
11 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1554919200
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:808::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
97fe7b6c82efcdb3e6ad524fd4e85f82bdc048d4dccaf642d597967c0b0bb9c4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"132 / 786 of 1000 / last-modified: 1554846738"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
11297
x-xss-protection
0
expires
Wed, 10 Apr 2019 18:10:36 GMT
apstag.js
c.amazon-adsystem.com/aax2/
66 KB
19 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1554919200
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.90.253 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-90-253.fra50.r.cloudfront.net
Software
Server /
Resource Hash
06042f6ac2063c8e23fcce2c7c64449bae470d34c4d46f97e145242158ef15f3

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 16:37:19 GMT
Content-Encoding
gzip
Server
Server
Age
5599
ETag
179e41b046d5f974d2586d066c70d87e
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 632ee301c4920b52f2463aa9e978c57f.cloudfront.net (CloudFront)
Cache-Control
public, max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
X-Amz-Cf-Id
A9J5UTTQKszs3eCItyDJUncIf6RQsMvpjdzUuPTft97lvvkI_caLJA==
arstechnica.js
player.cnevids.com/interlude/
107 KB
27 KB
Script
General
Full URL
https://player.cnevids.com/interlude/arstechnica.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1554919200
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.51 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-51.fra50.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
71dc4bed677b2f8eab8641b364ea660977b4c42e8f66bd5b98acb159206839df
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:07 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Age
29
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Status
200 OK
Connection
keep-alive
X-XSS-Protection
1; mode=block
X-Request-Id
c569c1d8-fea2-4302-a02a-80c1624ce954
X-Runtime
0.034605
X-Backend-Node
10.110.120.110
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"1372ea9dbef3af4d915102de04009a1a"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 5f6905ea282e042ad3334bfed8a840ce.cloudfront.net (CloudFront)
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Id
O5IDQwrAQyOySAn04ZfP5QoSoZbJw7Z4grx0bN8645eHAczzFJSkNA==
htw-condenast.js
js-sec.indexww.com/ht/
176 KB
39 KB
Script
General
Full URL
https://js-sec.indexww.com/ht/htw-condenast.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1554919200
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
ebcb1918cee0d14597958c88ced103f45bcb157ee1f574b07e2ad09c67b3fab1

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:40 GMT
Content-Encoding
gzip
Last-Modified
Wed, 10 Apr 2019 17:50:07 GMT
Server
Apache
ETag
"904e08-2c123-58630b33d00eb"
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=2648
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
text/javascript
Content-Length
39347
Expires
Wed, 10 Apr 2019 18:54:48 GMT
conde-nast
segment-data.zqtk.net/
579 B
850 B
Script
General
Full URL
https://segment-data.zqtk.net/conde-nast?url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1554919200
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.210.6.215 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-210-6-215.eu-west-1.compute.amazonaws.com
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
001177995c0f55a6b83a7c9c9de42cffdc8190ec53b3ebb1a9f4c9818ebc0472

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:39 GMT
Last-Modified
Wed, 10 Apr 2019 04:05:13 GMT
Server
nginx/1.10.3 (Ubuntu)
Connection
keep-alive
Content-Type
application/javascript; charset=UTF-8
Content-Length
579
Expires
Fri, 12 Apr 2019 04:05:13 GMT
conde-asa-polar-master.js
cdn.mediavoice.com/nativeads/script/condenastcorporate/
5 KB
2 KB
Script
General
Full URL
https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1554919200
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:da83 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
030e91b7512dbb40e9b9057f20bcf54c296a7f28c04bbcde0f2d2706dd2a3a06

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:36 GMT
content-encoding
gzip
cf-cache-status
HIT
status
200
content-type
text/javascript
content-length
2018
via
1.1 varnish
server
cloudflare
cache-control
max-age=21600
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-varnish
1017029814 1016500440
x-country
DE
cf-ipcountry
DE
accept-ranges
bytes
cf-ray
4c56adaf5b866343-FRA
https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F
cdn.accelerator.arsdev.net/h/
12 B
302 B
Script
General
Full URL
https://cdn.accelerator.arsdev.net/h/https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F?callback=arsData
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1554919200
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.102 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-102.fra50.r.cloudfront.net
Software
nginx/1.4.6 (Ubuntu) / PHP/5.5.9-1ubuntu4.9
Resource Hash
18c4dfbdcbf664e92468c3a09814db7f114f9b393613e2cb077d81565d496f8d

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:30 GMT
via
1.1 009e5e3e32afcd1d135a7234c9da5521.cloudfront.net (CloudFront)
server
nginx/1.4.6 (Ubuntu)
age
149
x-powered-by
PHP/5.5.9-1ubuntu4.9
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
max-age=300, public
x-amz-cf-id
KElOUN4bISop_N_2jpqv4-US7d-BrFpnrtT4apUBtVwLu00hsoOyGA==
content
4d.condenastdigital.com/
4 KB
2 KB
XHR
General
Full URL
https://4d.condenastdigital.com/content?url=https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1554919200
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.174.217.231 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-174-217-231.compute-1.amazonaws.com
Software
/
Resource Hash
56ac23b6977873cfafb6c3e007160d369006a96b72e5fa7b17d00f0a3136d5a5

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com

Response headers

Date
Wed, 10 Apr 2019 18:10:36 GMT
content-encoding
gzip
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
Content-Length
1386
/
infinityid.condenastdigital.com/
0
0

track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-04-10T18%3A10%3A36.038Z&_t=library_service&cBr=Ars%20Technica&cKe=critical%20infrastructure%7Cindustrial%20control%20systems%7Cmalware%7Ctriton&cCh=information%20technology&cTi=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&cCl=818&cId=1488751&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4000&pSw=1600&pSh=1200&uID=5709d500-24b8-4241-b0ac-0af4b7b56552&pID=b68db677-c3c7-45b3-93ac-e7cd5941aaa2&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&init=925.3799989819527&requestEnd=611.6100028157234&requestStart=587.2699990868568&device=desktop&cns=2_26_0&_logType=info
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:36 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-04-10T18%3A10%3A36.082Z&_t=page_created&cBr=Ars%20Technica&cKe=critical%20infrastructure%7Cindustrial%20control%20systems%7Cmalware%7Ctriton&cCh=information%20technology&cTi=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&cCl=818&cId=1488751&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4000&pSw=1600&pSh=1200&uID=1903bb92-2429-4df3-848e-3de4d4b8bd1e&uNw=1&uUq=1&pID=4bab7b43-bf77-4561-8958-b9c2e4f4c994&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&content_uri=information_technology&image_avg_surface=427200&image_count=1&image_surface=427200&server=production&vp_height=1200&vp_width=1585&channel=information_technology&slots_count=6&tags=critical_infrastructure_industrial_control_systems_malware_triton&template=article&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:36 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
yubikey-promo-2x-a2b77428d4.png
cdn.arstechnica.net/wp-content/themes/ars/assets/img/
153 KB
153 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/img/yubikey-promo-2x-a2b77428d4.png
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-fdf777f7dd.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
1f984105fa8d01eee607c197a2b918604aa4c0d608f1cbf8a0f15f6502d2318d

Request headers

Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:36 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
156233
x-cf-tsc
1553647525
x-cf2
H
last-modified
Tue, 26 Mar 2019 16:40:51 GMT
server
CFS 0215
x-cff
B
etag
"5c9a5613-26249"
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
26055
accept-ranges
bytes
expires
Wed, 05 Jun 2019 18:10:36 GMT
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ded8aafe08adcc23835de89f62fbee0b98184f32296c7679ab5b5a358f044f63

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
/
px.ads.linkedin.com/collect/
Redirect Chain
  • https://px.ads.linkedin.com/collect/?time=1554919836224&pid=434737&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critica...
  • https://px.ads.linkedin.com/collect/?time=1554919836224&pid=434737&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critica...
0
193 B
Script
General
Full URL
https://px.ads.linkedin.com/collect/?time=1554919836224&pid=434737&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&fmt=js&s=1&cookiesTest=true
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:f500:10:101::b93f:9105 , Ireland, ASN14413 (LINKEDIN - LinkedIn Corporation, US),
Reverse DNS
Software
Play /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:36 GMT
content-encoding
gzip
server
Play
vary
Accept-Encoding
x-li-fabric
prod-ltx1
status
200
x-li-proto
http/2
x-li-pop
prod-efr5
content-type
application/javascript
content-length
20
x-li-uuid
jFJ+BFEvlBXghEUwqisAAA==

Redirect headers

date
Wed, 10 Apr 2019 18:10:36 GMT
content-encoding
gzip
server
Play
location
/collect/?time=1554919836224&pid=434737&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&fmt=js&s=1&cookiesTest=true
vary
Accept-Encoding
x-li-fabric
prod-ltx1
status
302
x-li-proto
http/2
x-li-pop
prod-efr5
content-length
20
x-li-uuid
Eghc4lAvlBWgiOLjqSsAAA==
ijs_all_modules_6d8297c25ce85d8909a19bede888cc9e.js
assets.bounceexchange.com/assets/smart-tags/versioned/
420 KB
95 KB
Script
General
Full URL
https://assets.bounceexchange.com/assets/smart-tags/versioned/ijs_all_modules_6d8297c25ce85d8909a19bede888cc9e.js
Requested by
Host: tag.bounceexchange.com
URL: https://tag.bounceexchange.com/2806/i.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.90.45 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-90-45.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
2c01b0864969a01652be46c7b4c4521589ab7e149693494356843d8927e63d40

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 05 Apr 2019 16:51:52 GMT
content-encoding
gzip
last-modified
Fri, 05 Apr 2019 16:49:16 GMT
server
AmazonS3
age
436725
etag
"1ee16d17ebdebc6aa44475fdbd49151f"
x-cache
Hit from cloudfront
x-amz-version-id
yes3D1byCsBuTn8gypA10L1_Ztb48_R6
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-type
application/javascript
content-length
97122
via
1.1 5721f7035c3fc934bd3f96dbb04ba1e5.cloudfront.net (CloudFront)
x-amz-cf-id
MK_1WpPseR9ItbBe7uzAxCo2iyFylWNfQEVuEsyAsOFZTg6oZ2mHJg==
arstechnica.com
srv-2019-04-10-18.config.parsely.com/config/
0
0

user
4d.condenastdigital.com/
54 B
418 B
XHR
General
Full URL
https://4d.condenastdigital.com/user?xid=925f08bd-5329-4aea-a2c0-c2c82a4afb3c
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.94.199.232 Fairfield, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-3-94-199-232.compute-1.amazonaws.com
Software
/
Resource Hash
4bc0a1554d30f30f24a36021cb1303bd4fe53f92684f493992da8742f8bbe071

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:36 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
5ca20d91bcdfff463e4e1d46.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady68318697
player.cnevids.com/script/video/
59 KB
19 KB
Script
General
Full URL
https://player.cnevids.com/script/video/5ca20d91bcdfff463e4e1d46.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady68318697
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-fdf777f7dd.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.51 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-51.fra50.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
e5c159f7ffa5cef5db4fd87499a22a47525563ec3bbf8a16fdfc67734bb86add
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:36 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
X-Cache
Miss from cloudfront
Status
200 OK
Connection
keep-alive
Content-Length
19101
X-XSS-Protection
1; mode=block
X-Request-Id
1b2308b4-c58d-4ef9-bd64-161bf2d9cc41
X-Runtime
0.007246
X-Backend-Node
10.110.29.24
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"9ca9c2e0c250a050f16933981865a439"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 5f6905ea282e042ad3334bfed8a840ce.cloudfront.net (CloudFront)
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Id
d1ayOaKycaMN9MBXeVjLLJFaF7fn0k53r5mS_NMs2XDgw8Lx6MHK4A==
arstechnica_war-stories-mechwarrior-5-mercenaries.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1554815651/
18 KB
19 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1554815651/arstechnica_war-stories-mechwarrior-5-mercenaries.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.42 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-42.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
beac971874ce449cc6d4bc56595e08da64e5ff5059ac828d2964f2918fe42e98

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 09 Apr 2019 13:23:32 GMT
Via
1.1 varnish, 1.1 1f49a084ca923f375f74b42fa36ef429.cloudfront.net (CloudFront)
Age
103624
Edge-Cache-Tag
449226972451991935294885795153819156355,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
18615
X-Request-Id
dbd4f5d90c68d92f
X-Served-By
cache-hhn1525-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 09 Apr 2019 13:23:27 GMT
Server
cloudinary
X-Timer
S1554816212.722426,VS0,VE369
ETag
"2390acbcc75a98765d12a8a6d71194a5"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
hweakssOL0wS6yA6Vy3oeQnWqPZhaddyX5mCRIQMS7q5dz81dUovXQ==
X-Cache-Hits
0
arstechnica_war-stories-c-and-c-tiberian-sun.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1551193450/
19 KB
19 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1551193450/arstechnica_war-stories-c-and-c-tiberian-sun.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.42 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-42.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
27348ba4b98bd80f1038496ec5dea6ad865680540058fb085b8ca199b8aaf4c5

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 27 Feb 2019 16:48:29 GMT
Via
1.1 varnish, 1.1 1f49a084ca923f375f74b42fa36ef429.cloudfront.net (CloudFront)
Age
1041682
Edge-Cache-Tag
313687566273846460968749706722669918033,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
19022
X-Request-Id
adbd00b36667674a
X-Served-By
cache-fra19141-FRA
Last-Modified
Wed, 27 Feb 2019 16:48:24 GMT
Server
cloudinary
X-Timer
S1551286109.206125,VS0,VE190
ETag
"fe52b9acd391d8bee8de15a0f429b377"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
5T6eCWSSstWox-mT7H9ynwRUhWYBiWI5uMtDffj3vugHMtsIaxACMA==
X-Cache-Hits
0
arstechnica_army-s-next-vertical-lift-en-route.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550680609/
5 KB
6 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550680609/arstechnica_army-s-next-vertical-lift-en-route.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.42 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-42.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
4868ca91bcd0d492c501ec5b8d44ac78d3e1226977ae14ff598f5efe78751951

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 01:21:40 GMT
Via
1.1 varnish, 1.1 1f49a084ca923f375f74b42fa36ef429.cloudfront.net (CloudFront)
Age
1596811
Edge-Cache-Tag
312535560964408758261298476626669868625,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
4867
X-Request-Id
069ad4eba4382402
X-Served-By
cache-hhn1545-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Thu, 21 Feb 2019 15:50:43 GMT
Server
cloudinary
X-Timer
S1553736101.873181,VS0,VE1
ETag
"90ad4d692f7209c01596b99729f26e7b"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
NyQoyZI0ePWhboAEwBJbuyG_JtcaLA_m7oqZZGJcS2qxIfUD01HgGQ==
X-Cache-Hits
1
arstechnica_war-stories-blade-runner-skinjobs-voxels-and-future-noir.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550244434/
18 KB
19 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550244434/arstechnica_war-stories-blade-runner-skinjobs-voxels-and-future-noir.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.42 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-42.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
8b72952d3fd656ee6594f0d9735d928113ad1d590705b14f77abf75f1d4d5d69

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 15 Feb 2019 15:34:32 GMT
Via
1.1 varnish, 1.1 1f49a084ca923f375f74b42fa36ef429.cloudfront.net (CloudFront)
Age
2017980
Edge-Cache-Tag
292757494989914907279105994976263969890,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
18172
X-Request-Id
d20856717f768878
X-Served-By
cache-fra19143-FRA
Last-Modified
Fri, 15 Feb 2019 15:34:33 GMT
Server
cloudinary
X-Timer
S1550244873.748801,VS0,VE172
ETag
"32f1b8954559c8d598e9861f5b8360b9"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
_ATQWfepoGDnYZWB8ydzEq9VPHGy_qxEVtW5reBcjs6HoGMJ5uRMjw==
X-Cache-Hits
0
arstechnica_sitrep-president-trump-s-missile-defense-strategy.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1548700799/
8 KB
9 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1548700799/arstechnica_sitrep-president-trump-s-missile-defense-strategy.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.42 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-42.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
de7e987b13a516c3c85e56d6b661929539d01906f8bd15f4440af2c6ed93d6ab

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Mon, 11 Feb 2019 17:05:24 GMT
Via
1.1 varnish, 1.1 d55780b776b171387055eca956ae29a9.cloudfront.net (CloudFront)
Age
317666
Edge-Cache-Tag
451606510291173075421239350555464354948,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
8338
X-Request-Id
7d27bebea3c736e7
X-Served-By
cache-hhn1525-HHN
Last-Modified
Wed, 30 Jan 2019 18:19:14 GMT
Server
cloudinary
X-Timer
S1549904724.932595,VS0,VE232
ETag
"bcb1adcc61de1e8426163f2fa2a406ba"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
G6i1gOqQmF6o1RgcJZKJ0DK1wlvKJip7swDgF4b-XZGHGPqHYB5czg==
X-Cache-Hits
0
arstechnica_war-stories-dead-space-the-drag-tentacle.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1546889545/
7 KB
8 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1546889545/arstechnica_war-stories-dead-space-the-drag-tentacle.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.42 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-42.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
9933997608e86beaf1e7f7188a5c657cdad8ccd9d20eb7b1a46adaa83fa850ab

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 08 Jan 2019 16:38:59 GMT
Via
1.1 varnish, 1.1 1f49a084ca923f375f74b42fa36ef429.cloudfront.net (CloudFront)
Age
408559
Edge-Cache-Tag
561334743792169660751574031162860899763,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
7393
X-Served-By
cache-fra19129-FRA
Last-Modified
Tue, 08 Jan 2019 16:38:58 GMT
Server
cloudinary
X-Timer
S1546965539.158106,VS0,VE116
ETag
"17a6e4b5eb75eb12f5d8c89eb3d0ace8"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
xdVKnng8H3qMZPK9V0S3f3kM9r1f0GD3nJING4TzDE5xA9tr68vrog==
X-Cache-Hits
0
arstechnica_how-does-that-work-rising-sea-levels.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1543950592/
9 KB
10 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1543950592/arstechnica_how-does-that-work-rising-sea-levels.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.42 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-42.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
dd261883873740a78bac0e65e1cef85b5fcc28635db0ec6c77fdedc60dc88862

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 06 Dec 2018 14:36:02 GMT
Via
1.1 varnish, 1.1 d55780b776b171387055eca956ae29a9.cloudfront.net (CloudFront)
Age
1357309
Edge-Cache-Tag
385094425222450584203964863140983279661,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
9655
X-Served-By
cache-hhn1537-HHN
Last-Modified
Thu, 06 Dec 2018 14:36:01 GMT
Server
cloudinary
X-Timer
S1544106963.502265,VS0,VE111
ETag
"bda75cc62fe7e0ea855b01b75e00e673"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
nPPh740E8XXFZ7xR5jYPpv0wrYhRYWbiceLhDUsy8ELS6-lKZDvyoA==
X-Cache-Hits
0
arstechnica_hybrid-options-for-us-s-next-top-fighter.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1543245409/
6 KB
7 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1543245409/arstechnica_hybrid-options-for-us-s-next-top-fighter.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.42 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-42.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
e014974a17d0f6e6775b4fcf5e53e2b0f3570edc070104c75d34a07d8dac4cc5

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 01:38:29 GMT
Via
1.1 varnish, 1.1 d55780b776b171387055eca956ae29a9.cloudfront.net (CloudFront)
Age
1960641
Edge-Cache-Tag
283442808216472163809384800557055011655,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
6586
X-Served-By
cache-fra19169-FRA
Last-Modified
Wed, 28 Nov 2018 14:30:45 GMT
Server
cloudinary
X-Timer
S1553737109.390237,VS0,VE1
ETag
"8a94ee8d7c54e8d420f337a0b28fb6a6"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
kYctHJBNMcWaJa2zPA6qTyz0BztgWgc1CVwRJlaFwPfGOO0gA7rDMA==
X-Cache-Hits
1
arstechnica_teach-the-controversy-flat-earthers.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1541592304/
10 KB
11 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1541592304/arstechnica_teach-the-controversy-flat-earthers.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.42 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-42.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
7364fcbb6c5d775f07816712af8a6419db99268f72c337a4977f706dc3423bb3

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 09 Nov 2018 14:44:56 GMT
Via
1.1 varnish, 1.1 d55780b776b171387055eca956ae29a9.cloudfront.net (CloudFront)
Age
409427
Edge-Cache-Tag
522150850958368321191235208678465217967,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
10595
X-Request-Id
0d3c8bdfb997f2cc
X-Served-By
cache-fra19130-FRA
Last-Modified
Fri, 09 Nov 2018 14:44:53 GMT
Server
cloudinary
X-Timer
S1541774697.715247,VS0,VE188
ETag
"6c0c4f8a9d61ed2b5863a8058c624a37"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
-3wy1IqELtPGqhXXNo_OVYw3y2lYN1EdDjJc22LZ2tSDRLWqy2r-aQ==
X-Cache-Hits
0
arstechnica_star-control-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1540238325/
10 KB
11 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1540238325/arstechnica_star-control-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.42 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-42.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
5ecce433fdd65965f4acae00993b06c37d0f4960c18b36312efbf96471f95474

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Mon, 08 Apr 2019 00:06:16 GMT
Via
1.1 varnish, 1.1 d55780b776b171387055eca956ae29a9.cloudfront.net (CloudFront)
Age
1614081
Edge-Cache-Tag
530064111679661360080335205530300069954,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
10583
X-Served-By
cache-fra19178-FRA
Last-Modified
Tue, 23 Oct 2018 16:50:21 GMT
Server
cloudinary
X-Timer
S1554681976.054239,VS0,VE1
ETag
"adccb40ff91a04ac0066ab46e3c60f86"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
_k-WuU_MrNdz77JWN01POWh_XHb38X2AuKC2KGPD5ZqnaQrJSjX1GA==
X-Cache-Hits
1
arstechnica_war-stories-serious-sam.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1538576823/
13 KB
14 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1538576823/arstechnica_war-stories-serious-sam.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.42 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-42.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
ed86af54b875e74d1f45f0e835237ecb7f8d1bd3f06d51c9586576ef756a372e

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 03 Oct 2018 18:45:24 GMT
Via
1.1 varnish, 1.1 d55780b776b171387055eca956ae29a9.cloudfront.net (CloudFront)
Age
1128063
Edge-Cache-Tag
302283555134930517008734674519776029634,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
13034
X-Served-By
cache-hhn1547-HHN
Last-Modified
Wed, 03 Oct 2018 18:45:04 GMT
Server
cloudinary
X-Timer
S1538592324.341440,VS0,VE112
ETag
"5ad02d5b6b61591f35f1a938c31ee9e9"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
5MVTzmmnZmoNlIv40Y-WiFkn1MftTAmIFh5cnP-ciYE3nfvU2JEfyw==
X-Cache-Hits
0
arstechnica_delta-v-the-burgeoning-world-of-small-rockets-paul-allen-s-huge-plane-and-spacex-get-s-a-crucial-green-light.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1537406983/
12 KB
13 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1537406983/arstechnica_delta-v-the-burgeoning-world-of-small-rockets-paul-allen-s-huge-plane-and-spacex-get-s-a-crucial-green-light.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.42 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-42.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
16f86804dd013db340fee4020a539d3e9d6e5a03d6841e431e50c428e99c26e8

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Mon, 08 Apr 2019 00:12:42 GMT
Via
1.1 varnish, 1.1 d55780b776b171387055eca956ae29a9.cloudfront.net (CloudFront)
Age
237474
Edge-Cache-Tag
389498626973997838808844380914497340413,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
12509
X-Request-Id
033829b9717b5c27
X-Served-By
cache-hhn1523-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 21 Sep 2018 16:51:30 GMT
Server
cloudinary
X-Timer
S1554682362.436720,VS0,VE313
ETag
"b9c502ffc902b60d0eb13698b37a945d"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
BRJXiBllB2gwxURgzq9u1bI16f20Mko4jt1uGQlMq2bh84PfXYcRpg==
X-Cache-Hits
0
arstechnica_chris-hadfield-explains-his-space-oddity-video.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1522031130/
7 KB
8 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1522031130/arstechnica_chris-hadfield-explains-his-space-oddity-video.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.42 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-42.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
3ce7e824185893264ab44fbf8370a8f1262831c4c6c367b15f7d4f1e88fadc8c

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sat, 04 Aug 2018 00:07:14 GMT
Via
1.1 varnish, 1.1 d55780b776b171387055eca956ae29a9.cloudfront.net (CloudFront)
Age
2776203
Edge-Cache-Tag
294316597633303263276952824544497226127,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
7181
X-Served-By
cache-fra19147-FRA
Last-Modified
Fri, 06 Jul 2018 12:23:22 GMT
Server
cloudinary
X-Timer
S1533341234.118391,VS0,VE1
ETag
"0549828edcecd339d8d10ebe6119de70"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
QWuceOA996Kq5GIBol9HLZoCIK98PbuQK2w496HmS6oSVZqt9xCcfg==
X-Cache-Hits
1
arstechnica_apollo-mission-episode-1.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1512424612/
14 KB
15 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1512424612/arstechnica_apollo-mission-episode-1.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.42 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-42.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
82cd1a97f81e5b63a621311be2993916eea0907b5eadd53bb6b280f4bb0f8391

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 06 Jul 2018 19:56:52 GMT
Via
1.1 varnish, 1.1 d55780b776b171387055eca956ae29a9.cloudfront.net (CloudFront)
Age
576101
Edge-Cache-Tag
424632948265147424317824738369264083785,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
14040
X-Request-Id
2c586190b5f04277
X-Served-By
cache-hhn1529-HHN
Last-Modified
Tue, 05 Dec 2017 01:52:25 GMT
Server
cloudinary
X-Timer
S1530907012.372106,VS0,VE153
ETag
"ecc047c6eed3dc571a78eab647201220"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
cdAZ2_djoCJ_2O_-NE65jYWPECVo1JVKsEj1mZpA-DIS6eSb0QaEcA==
X-Cache-Hits
0
arstechnica_richard-garriot-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1513807048/
14 KB
14 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1513807048/arstechnica_richard-garriot-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.42 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-42.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
4980853759711c8e9e2779239acd62e9e802fba38371763c65ecdd016a83fdbd

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 06 Jul 2018 19:56:52 GMT
Via
1.1 varnish, 1.1 1f49a084ca923f375f74b42fa36ef429.cloudfront.net (CloudFront)
Age
1169612
Edge-Cache-Tag
489732375708630852448407029403767769375,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
13885
X-Request-Id
bb3d79146157beb6
X-Served-By
cache-fra19125-FRA
Last-Modified
Fri, 06 Jul 2018 19:56:42 GMT
Server
cloudinary
X-Timer
S1530907012.103758,VS0,VE151
ETag
"13d45a1733ad4d2f3ae707584d6a8a32"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
1C0wN4eLjuObS_VbTaLH5ww8r3k-fjIUFXNIaIIb5aJMYDa7h6LtOg==
X-Cache-Hits
0
evidon-sitenotice-tag.js
c.evidon.com/sitenotice/
43 KB
11 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.103.102.169 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-103-102-169.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
9d62f3a91dbd689cfdbb16d57942a788bb50778e3c62c2e6f2c90f997d59828e

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:36 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
11393
last-modified
Mon, 08 Apr 2019 20:18:12 GMT
server
Apache
etag
"afefedfbe8590423e768d90e657730ed:1554754693"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400, private;max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
expires
Thu, 11 Apr 2019 18:10:36 GMT
country.js
c.evidon.com/geo/
260 B
456 B
Script
General
Full URL
https://c.evidon.com/geo/country.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.103.102.169 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-103-102-169.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
f9784f57729f84391b084eed9e944e048f771129d65e9b58f34095fdfba86473

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:36 GMT
content-encoding
gzip
last-modified
Wed, 30 May 2018 22:23:16 GMT
server
Apache
access-control-allow-origin
*
etag
"c1e367d098d326049811561575dbda4a:1527718996"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
status
200
access-control-max-age
86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
content-length
165
snthemes.js
c.evidon.com/sitenotice/4419/
57 KB
4 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/4419/snthemes.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.103.102.169 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-103-102-169.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cfcdfbf144964c03b23e6e63abfeeeb923eedda0c421f6279bad5040ef5a3dd1

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:36 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
3254
last-modified
Thu, 26 Jul 2018 15:49:16 GMT
server
Apache
etag
"4f337c9f26cb2f12ef4d5d50fc716fc2:1532620156"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400, private;max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
expires
Thu, 11 Apr 2019 18:10:36 GMT
settings.js
c.evidon.com/sitenotice/4419/arstechnica/
18 KB
4 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/4419/arstechnica/settings.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.103.102.169 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-103-102-169.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
34cdcc2da3ff2a7234554eb850346c12c2c61cefaf60396542af6e9d3108ca0d

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:36 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
3798
last-modified
Fri, 15 Mar 2019 18:36:13 GMT
server
Apache
etag
"603795c9b87c0cb44fec11cd75462ca2:1552674973"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400, private;max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
expires
Thu, 11 Apr 2019 18:10:36 GMT
s45998233944449
sstats.arstechnica.com/b/ss/conde-arstechnica/1/JS-1.4.1-D7QN/
43 B
545 B
Image
General
Full URL
https://sstats.arstechnica.com/b/ss/conde-arstechnica/1/JS-1.4.1-D7QN/s45998233944449?AQB=1&ndh=1&pf=1&t=10%2F3%2F2019%2018%3A10%3A36%203%200&D=D%3D&mid=15589102529895167682980396206669799485&aamlh=6&ce=UTF-8&ns=condenast&pageName=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&g=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&c.&visCheck=15589102529895167682980396206669799485&.c&cc=USD&ch=Biz%20%26amp%3B%20IT&events=event2%2Cevent28%2Cevent82%3D0&aamb=6G1ynYcLPuiQxYZrsz_pkqfLG9yMXBpb2zX5dvJdYQJzPXImdj0y&v2=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&l2=critical-infrastructure%7Cindustrial-control-systems%7Cmalware%7Ctriton%7Ctype%3A%20report&c3=D%3Dv3&v3=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site&c4=D%3Dv4&v4=1488751&c5=D%3Dv5&v5=report&c6=D%3Dv6&v6=Biz%20%26amp%3B%20IT&c7=D%3Dv7&v7=Biz%20%26amp%3B%20IT%2Fundefined&c11=D%3Dv11&v11=2%3A10%20PM%7CWednesday&c16=not%20logged%20in&v16=not%20logged%20in&c17=1&v17=1&c23=D%3Dv23&v23=New&v24=925f08bd-5329-4aea-a2c0-c2c82a4afb3c&c32=D%3Dv32&v32=1&c44=D%3Dv44&v44=null&c50=critical-infrastructure%7Cindustrial-control-systems%7Cmalware%7Ctriton%7Ctype%3A%20report&c51=D%3Dv51&v51=desktop%20layout%3A1600x1200&c55=D%3Dv55&v55=Dan%20Goodin&c56=D%3Dv56&v56=2.0&c60=D%3Dv60&v60=818&c61=D%3Dv61&v61=14h%7C0d&c62=D%3Dv62&v62=2019-04-10T04%3A01%3A40%2B00%3A00&c65=D%3Dv65&v65=null&s=1600x1200&c=24&j=1.6&v=N&k=Y&bw=1600&bh=1200&AQE=1
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.140.41.50 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
arstechnica.com.ssl.d1.sc.omtrdc.net
Software
Omniture DC /
Resource Hash
a1ecbaed793a1f564c49c671f2dd0ce36f858534ef6d26b55783a06b884cc506

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate, br
Host
sstats.arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Connection
keep-alive
Cache-Control
no-cache
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:36 GMT
X-C
ms-6.6.0
P3P
CP="This is not a P3P policy"
Connection
Keep-Alive
Content-Length
43
Pragma
no-cache
Last-Modified
Thu, 11 Apr 2019 18:10:36 GMT
Server
Omniture DC
xserver
www7143
ETag
"3339164921847939072-4857978349089261817"
Vary
*
Content-Type
image/gif
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Keep-Alive
timeout=15
Expires
Tue, 09 Apr 2019 18:10:36 GMT
/
www.facebook.com/tr/
44 B
323 B
Image
General
Full URL
https://www.facebook.com/tr/?id=228464857488266&ev=PageView&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&rl=&if=false&ts=1554919836587&cd[SiteSection]=information%20technology&cd[PageTags]=critical%20infrastructure%7Cindustrial%20control%20systems%7Cmalware%7Ctriton&cd[Brand]=Pitchfork&sw=1600&sh=1200&v=2.8.47&r=stable&ec=0&o=30&fbp=fb.1.1554919836576.1538970084&it=1554919835517&coo=false&rqm=GET
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:37 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
content-length
44
expires
Wed, 10 Apr 2019 18:10:37 GMT
plugin.js
plugin.mediavoice.com/
318 KB
119 KB
Script
General
Full URL
https://plugin.mediavoice.com/plugin.js
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:da83 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
32e0da7d78bf993fb019ea36703662c7c7dc9bb71b82b8627f520cc6779ea1da

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:37 GMT
content-encoding
gzip
cf-cache-status
HIT
cf-ray
4c56adb559fa6343-FRA
status
200
content-length
121070
via
1.1 varnish
x-varnish
2053738440 2053712595
last-modified
Wed, 27 Mar 2019 16:18:17 GMT
server
cloudflare
etag
W/"5c9ba249-4f6e8"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, OPTIONS
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=43200
access-control-allow-credentials
true
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
expires
Wed, 10 Apr 2019 16:19:45 GMT
condenastcorporate
polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/organization/
181 B
585 B
XHR
General
Full URL
https://polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/organization/condenastcorporate
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
6bd131d59efb6aa6a2d98ce4af498a811c84f74148129e140ff5a76904ca9f74

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com

Response headers

timing-allow-origin
*
date
Wed, 10 Apr 2019 18:10:36 GMT
content-encoding
gzip
server
cloudflare
status
200
etag
W/"4ed41fc03a3c3b67ac78af86ee19d7f1"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-Country, CF-Ray
cache-control
max-age=86400
x-country
DE
cf-ray
4c56adb368a6c305-FRA
integrator.js
adservice.google.de/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:816::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:80b::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
pubads_impl_2019032901.js
securepubads.g.doubleclick.net/gpt/
158 KB
57 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019032901.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
sffe /
Resource Hash
43001733235888c4a12ee8147a20fb01643d6be427b730fc021e0b04a111abf6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 29 Mar 2019 14:59:45 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
58393
x-xss-protection
0
expires
Wed, 10 Apr 2019 18:10:37 GMT
Cookie set /
www.medtargetsystem.com/beacon/portal/ Frame 99E7
0
0
Document
General
Full URL
https://www.medtargetsystem.com/beacon/portal/?_url=https%3A%2F%2Farstechnica.com&_sid=bac26c73-6fe9-4c85-bbdb-db3ba78b0338&_vid=6c3897c7-dfef-47bb-a73b-f08d07d06996&_ak=119-556-B0E9F642&_flash=false&_th=1554919835|1554919835|1
Requested by
Host: www.medtargetsystem.com
URL: https://www.medtargetsystem.com/javascript/beacon.js?v2.5.12
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.3.171.116 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-3-171-116.compute-1.amazonaws.com
Software
Apache/2.4.7 (Ubuntu) / PHP/7.0.19-1+deb.sury.org~trusty+2
Resource Hash

Request headers

Host
www.medtargetsystem.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/

Response headers

Cache-Control
no-store, no-cache, must-revalidate
Content-Encoding
gzip
Content-Type
text/html; charset=UTF-8
Date
Wed, 10 Apr 2019 18:10:36 GMT
Expires
Thu, 19 Nov 1981 08:52:00 GMT
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Pragma
no-cache
Server
Apache/2.4.7 (Ubuntu)
Set-Cookie
DMDSESSID=pdee0pcd3cqe8p4jbq4mcvvql7; path=/; HttpOnly
Vary
X-Forwarded-Proto,Accept-Encoding
X-Powered-By
PHP/7.0.19-1+deb.sury.org~trusty+2
Content-Length
6419
Connection
keep-alive
collect.gif
www.medtargetsystem.com/analytics/
0
245 B
Image
General
Full URL
https://www.medtargetsystem.com/analytics/collect.gif?e=1&aid=&vid=6c3897c7-dfef-47bb-a73b-f08d07d06996&sid=bac26c73-6fe9-4c85-bbdb-db3ba78b0338&vh=1&vt=1554919835&pt=1554919835&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&r=&t=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site%20%7C%20Ars%20Technica&p=2600.71&pm=&ab=&ak=119-556-B0E9F642
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.3.171.116 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-3-171-116.compute-1.amazonaws.com
Software
Apache/2.4.7 (Ubuntu) / PHP/7.0.19-1+deb.sury.org~trusty+2
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:37 GMT
Server
Apache/2.4.7 (Ubuntu)
Connection
keep-alive
X-Powered-By
PHP/7.0.19-1+deb.sury.org~trusty+2
Content-Length
0
Vary
X-Forwarded-Proto
Content-Type
text/html; charset=UTF-8
truncated
/
408 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c21029f21dc145723d40362da85504ee5a5bd33f5db6636beae3a01c7aba1fa2

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&app=playerservice&cCh=videos%2Fshow&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pID=&sID=&uId=&xid=&_ts=2019-04-10T18%3A10%3A36.834Z&_c=error&_t=Interlude%20Insertion%20Error&dim1=%7B%22interludeFailure%22%3A%22no%20slot%22%2C%22pageTemplate%22%3A%22report%22%2C%22url%22%3A%22information-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%22%7D&dim3=Availability%3A%20no%20slot
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:37 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
get
odb.outbrain.com/utils/
15 KB
9 KB
Script
General
Full URL
https://odb.outbrain.com/utils/get?url=http%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&srcUrl=http%3A%2F%2Ffeeds.arstechnica.com%2Farstechnica%2Findex%2F&settings=true&recs=true&widgetJSId=JS_1&key=NANOWDGT01&idx=0&version=01020601&apv=false&sig=Ta8SquEJ&format=vjapi&rand=4695&osLang=en-US&winW=1600&winH=1200&scrW=1600&scrH=1200&adblck=false&secured=true&va=true&cmpStat=1&ref=
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1554919835234
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
93a799caab4f5f74cbf1490263323e9399e99e5d130a154cacbe4263d1b28a2f
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=0; includeSubDomains;
content-encoding
gzip
traffic-path
NYDC1, JFK, HHN, Europe1
x-cache
MISS, MISS
p3p
policyref="http://www.outbrain.com/w3c/p3p.xml",CP="NOI NID CURa DEVa TAIa PSAa PSDa OUR IND UNI"
status
200
x-served-by
cache-jfk8124-JFK, cache-hhn1542-HHN
pragma
no-cache
x-timer
S1554919837.064324,VS0,VE145
date
Wed, 10 Apr 2019 18:10:37 GMT
vary
Accept-Encoding, User-Agent
content-type
text/x-json; charset=UTF-8
via
1.1 varnish, 1.1 varnish
expires
Thu, 01 Jan 1970 00:00:00 GMT
cache-control
no-cache
backend-ip
104.156.90.24
accept-ranges
bytes, bytes
x-cache-hits
0, 0
iab
api.skimlinks.mgr.consensu.org/
772 B
636 B
XHR
General
Full URL
https://api.skimlinks.mgr.consensu.org/iab
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.40.172 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
172.40.190.35.bc.googleusercontent.com
Software
nginx/1.14.0 /
Resource Hash
4898c2b9f8c2f931ef6a819d36e0019867931d9519af933ab4bd5edce724b2a8
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com

Response headers

date
Wed, 10 Apr 2019 18:10:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
nginx/1.14.0
access-control-allow-headers
*
status
200
vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, DELETE, OPTIONS
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google
track.php
t.skimresources.com/api/
22 B
409 B
XHR
General
Full URL
https://t.skimresources.com/api/track.php
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 Ann Arbor, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:36 GMT
via
1.1 google
x-content-type-options
nosniff
server
Python/3.7 aiohttp/3.5.4
access-control-allow-headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
status
200
access-control-allow-methods
GET, POST, OPTIONS
content-type
text/plain; charset=utf-8, application/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache, must-revalidate
access-control-allow-credentials
true
warning
299 - "Deprecated API"
alt-svc
clear
content-length
22
embed-api.json
player.cnevids.com/
6 KB
3 KB
Fetch
General
Full URL
https://player.cnevids.com/embed-api.json?videoId=5ca20d91bcdfff463e4e1d46&embedLocation=arstechnica
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5ca20d91bcdfff463e4e1d46.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady68318697
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.51 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-51.fra50.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
9f84e9cd84c718d2afb4c638aef8671cc53c2bb47d4426598f1e1c0753b1f40f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com

Response headers

Date
Wed, 10 Apr 2019 18:09:52 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Age
46
X-Cache
Hit from cloudfront
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
2011
X-XSS-Protection
1; mode=block
X-Request-Id
9a98e6d6-51a5-4236-b130-5f7f1304e750
X-Runtime
0.010683
X-Backend-Node
10.110.29.24
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"780c32a9c870e4d67085c3768087f5b3"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Access-Control-Allow-Methods
GET, OPTIONS
Content-Type
application/json; charset=utf-8
Via
1.1 cdb2dba3874dd4d7b53213b8c63a0997.cloudfront.net (CloudFront)
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
Access-Control-Allow-Origin
*
X-Amz-Cf-Id
CHRdxuZSqpVNFbcZDB6NEMMW2HApZAT86X4d-8yLzZ4QGD_9DEo6FA==
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 45E1
241 KB
83 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5ca20d91bcdfff463e4e1d46.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady68318697
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:80b::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
e9e987d995f1aec234979dd2571ce604fde6e9a833f173ac50f43fbaf7b8a98f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
84516
x-xss-protection
0
expires
Wed, 10 Apr 2019 18:10:37 GMT
gpt_proxy.js
imasdk.googleapis.com/js/sdkloader/
62 KB
23 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/gpt_proxy.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5ca20d91bcdfff463e4e1d46.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady68318697
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:80b::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
6ddab7a3de819b9be5e7b8ab2511694f7383b6120d275d3edf46e9b327cdb21f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:04:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 10 Apr 2019 14:53:46 GMT
server
sffe
age
393
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
22926
x-xss-protection
0
expires
Wed, 10 Apr 2019 18:19:04 GMT
player-style-93d3ac933e3b2a7c0bd52030be8ef0af.css
d2c8v52ll5s99u.cloudfront.net/player/ Frame 45E1
74 KB
12 KB
Stylesheet
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-93d3ac933e3b2a7c0bd52030be8ef0af.css
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5ca20d91bcdfff463e4e1d46.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady68318697
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.182 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-182.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
4cc07db5e979ec8fc492f1cd9d88391360460adc0d8ce6ae568d50cc084da3e0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 13 Feb 2019 18:11:36 GMT
Content-Encoding
gzip
Last-Modified
Wed, 06 Feb 2019 15:32:39 GMT
Server
AmazonS3
Age
4838345
ETag
"4acddbd24b10301fdc4909837b98a5bf"
X-Cache
Hit from cloudfront
Content-Type
text/css; charset=utf-8
Via
1.1 a09186728c1bcdf0a561aedd92656804.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
11327
X-Amz-Cf-Id
w4qY3sg8WY4IYhId0kuQiMkLoMChlrVwOrK-qHIWpaCvQ7u2GT4AvA==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
main-7db437cede3397d9ff68.js
d2c8v52ll5s99u.cloudfront.net/player/ Frame 45E1
910 KB
226 KB
Script
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/main-7db437cede3397d9ff68.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5ca20d91bcdfff463e4e1d46.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady68318697
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.182 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-182.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
a3da0dc769ee64da9789bc69960d09b2050fc7dcbae14464af9d6a2c47679b94

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 05 Apr 2019 14:59:33 GMT
Content-Encoding
gzip
Last-Modified
Fri, 05 Apr 2019 14:38:15 GMT
Server
AmazonS3
Age
443468
ETag
"c386b189e80bf9b7a50084e81d56c6f1"
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 a09186728c1bcdf0a561aedd92656804.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
231295
X-Amz-Cf-Id
2bk-xodrU3H2jjvE_6k4NQ10gdawlYbLlBULlKegl-amLZfreIoXKQ==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/png
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-04-10T18%3A10%3A36.970Z&_t=pageview&cBr=Ars%20Technica&cKe=critical%20infrastructure%7Cindustrial%20control%20systems%7Cmalware%7Ctriton&cCh=information%20technology&cTi=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684&cEnt=triton%2C%20malware%2C%20page%20layout%2C%20fireeye%2C%20dan%20goodin%2C%20russia%2C%20software%20framework%2C%20utc%2C%20operational%20technology%2C%20key%20logger%2C%20screenshot%2C%20exfiltrate%2C%20network%20reconnaissance%2C%20espionage%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20john%20hultquist%2C%20ars%20technica%20addendum%2C%20triconex%2C%20cnmn%20collection&cEnw=1%2C%200.9500050115895406%2C%200.7376657835742741%2C%200.727269122707033%2C%200.45809754901453276%2C%200.45309959010541806%2C%200.4279426928153714%2C%200.4247111958295731%2C%200.4162777364177546%2C%200.3976789615199139%2C%200.39705703877513393%2C%200.3953874679084234%2C%200.39200569316001066%2C%200.381796042701748%2C%200.3721243910381942%2C%200.33329355471876454%2C%200.3103213771374127%2C%200.281461116515084%2C%200.27888604929433647%2C%200.272428808898199&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&cCl=818&cId=1488751&cPd=2019-04-10T04%3A01%3A40.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4900&pSw=1600&pSh=1200&uID=43398a13-ca28-4a71-8cec-1106402730a7&uNw=1&uUq=1&pID=24e6206e-eca2-45a6-baa3-e21a6785c6f3&uDt=desktop&_o=ars-technica&_c=general&xID=925f08bd-5329-4aea-a2c0-c2c82a4afb3c&cKh=triton%2Cmalware%2Cresearcher%2Cpage%20layout%2Cfireeye%2Cintrusion%2Cattacker%2Csystem
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:37 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
57
p.ad.gt/api/v1/p/passive/1604c59db8218f50a2e4bccbcc3aabc3/10d80dd9-37d3-4f96-a09f-25df82a0eea3/
50 KB
14 KB
Script
General
Full URL
https://p.ad.gt/api/v1/p/passive/1604c59db8218f50a2e4bccbcc3aabc3/10d80dd9-37d3-4f96-a09f-25df82a0eea3/57
Requested by
Host: a.ad.gt
URL: https://a.ad.gt/api/v1/u/matches/57
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.10.81.221 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-10-81-221.us-west-2.compute.amazonaws.com
Software
nginx/1.10.1 / Express
Resource Hash
df70e2ad979ccd83bcca60abacf9f4a21e8ba22d118af660c3a80a28af6ed51f

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:40 GMT
Content-Encoding
gzip
Server
nginx/1.10.1
X-Powered-By
Express
ETag
W/"c962-QfJH3adU2CupxI0sbIZTYDlGLO0"
Access-Control-Allow-Methods
GET, POST, OPTIONS
Content-Type
text/html; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Range,Range
Connection
keep-alive
Access-Control-Allow-Headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Range,Range
Content-Length
13174
match
ids.ad.gt/api/v1/
Redirect Chain
  • https://secure.adnxs.com/getuid?https://ids.ad.gt/api/v1/match?id=10d80dd9-37d3-4f96-a09f-25df82a0eea3&adnxs_id=$UID
  • https://secure.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fmatch%3Fid%3D10d80dd9-37d3-4f96-a09f-25df82a0eea3%26adnxs_id%3D%24UID
  • https://ids.ad.gt/api/v1/match?id=10d80dd9-37d3-4f96-a09f-25df82a0eea3&adnxs_id=6499738377187706161
43 B
597 B
Image
General
Full URL
https://ids.ad.gt/api/v1/match?id=10d80dd9-37d3-4f96-a09f-25df82a0eea3&adnxs_id=6499738377187706161
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.160.176.109 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-160-176-109.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:39 GMT
Cache-Control
public, max-age=43200
Server
nginx/1.8.1
Connection
keep-alive
Content-Type
image/gif
transfer-encoding
chunked
Expires
Thu, 11 Apr 2019 06:10:39 GMT

Redirect headers

Pragma
no-cache
Date
Wed, 10 Apr 2019 18:10:40 GMT
AN-X-Request-Uuid
55a738f5-cdef-4dcc-b805-05d7d4f4746a
Content-Type
text/html; charset=utf-8
Server
nginx/1.13.4
Location
https://ids.ad.gt/api/v1/match?id=10d80dd9-37d3-4f96-a09f-25df82a0eea3&adnxs_id=6499738377187706161
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
*
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
X-Proxy-Origin
82.102.16.181; 82.102.16.181; 373.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.223.171:80
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
t_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=8gkxb6n&ttd_tpi=1&gpdr=0&ttd_puid=10d80dd9-37d3-4f96-a09f-25df82a0eea3
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=8gkxb6n&ttd_tpi=1&gpdr=0&ttd_puid=10d80dd9-37d3-4f96-a09f-25df82a0eea3
  • https://ids.ad.gt/api/v1/t_match?tdid=66259148-a2ad-43c6-9444-0cdbe3f12acd&id=10d80dd9-37d3-4f96-a09f-25df82a0eea3
43 B
607 B
Image
General
Full URL
https://ids.ad.gt/api/v1/t_match?tdid=66259148-a2ad-43c6-9444-0cdbe3f12acd&id=10d80dd9-37d3-4f96-a09f-25df82a0eea3
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.160.176.109 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-160-176-109.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:39 GMT
Cache-Control
public, max-age=43200
Server
nginx/1.8.1
Connection
keep-alive
Content-Type
image/gif
transfer-encoding
chunked
Expires
Thu, 11 Apr 2019 06:10:39 GMT

Redirect headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:37 GMT
x-aspnet-version
4.0.30319
location
https://ids.ad.gt/api/v1/t_match?tdid=66259148-a2ad-43c6-9444-0cdbe3f12acd&id=10d80dd9-37d3-4f96-a09f-25df82a0eea3
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"
status
302
cache-control
private,no-cache, must-revalidate
content-type
text/html
content-length
259
g_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://cm.g.doubleclick.net/pixel?google_nid=audigent_w_appnexus_3985&google_cm&google_sc&google_ula=450542624&id=10d80dd9-37d3-4f96-a09f-25df82a0eea3
  • https://ids.ad.gt/api/v1/g_match?id=10d80dd9-37d3-4f96-a09f-25df82a0eea3&google_gid=CAESEB-uuPtyrwzI3MXFfLhT3_8&google_cver=1&google_ula=450542624,0
43 B
586 B
Image
General
Full URL
https://ids.ad.gt/api/v1/g_match?id=10d80dd9-37d3-4f96-a09f-25df82a0eea3&google_gid=CAESEB-uuPtyrwzI3MXFfLhT3_8&google_cver=1&google_ula=450542624,0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.160.176.109 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-160-176-109.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:39 GMT
Cache-Control
public, max-age=43200
Server
nginx/1.8.1
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Thu, 11 Apr 2019 06:10:39 GMT

Redirect headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:37 GMT
server
HTTP server (unknown)
location
https://ids.ad.gt/api/v1/g_match?id=10d80dd9-37d3-4f96-a09f-25df82a0eea3&google_gid=CAESEB-uuPtyrwzI3MXFfLhT3_8&google_cver=1&google_ula=450542624,0
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
302
cache-control
no-cache, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
357
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
pbm_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3D10d80dd9-37d3-4f96-a09f-25df82a0eea3
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?ird=1&rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3D10d80dd9-37d3-4f96-a09f-25df82a0eea3
  • https://ids.ad.gt/api/v1/pbm_match?pbm=20C0BF6E-8276-487B-AC11-3B96AD3A600E&id=10d80dd9-37d3-4f96-a09f-25df82a0eea3
43 B
607 B
Image
General
Full URL
https://ids.ad.gt/api/v1/pbm_match?pbm=20C0BF6E-8276-487B-AC11-3B96AD3A600E&id=10d80dd9-37d3-4f96-a09f-25df82a0eea3
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.160.176.109 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-160-176-109.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:39 GMT
Cache-Control
public, max-age=43200
Server
nginx/1.8.1
Connection
keep-alive
Content-Type
image/gif
transfer-encoding
chunked
Expires
Thu, 11 Apr 2019 06:10:39 GMT

Redirect headers

Location
https://ids.ad.gt/api/v1/pbm_match?pbm=20C0BF6E-8276-487B-AC11-3B96AD3A600E&id=10d80dd9-37d3-4f96-a09f-25df82a0eea3
Date
Wed, 10 Apr 2019 18:10:37 GMT
X-Cnection
close
Server
Apache/2.2.24 (Unix) mod_ssl/2.2.24 OpenSSL/1.0.1e-fips mod_fastcgi/2.4.6
Content-Length
439
Content-Type
text/html; charset=iso-8859-1
son_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://sync.go.sonobi.com/us?https://ids.ad.gt/api/v1/son_match?id=10d80dd9-37d3-4f96-a09f-25df82a0eea3&uid=[UID]
  • https://ids.ad.gt/api/v1/son_match?id=10d80dd9-37d3-4f96-a09f-25df82a0eea3&uid=635b8c07-3e6d-4b08-9dea-638b80fed45c
43 B
607 B
Image
General
Full URL
https://ids.ad.gt/api/v1/son_match?id=10d80dd9-37d3-4f96-a09f-25df82a0eea3&uid=635b8c07-3e6d-4b08-9dea-638b80fed45c
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.160.176.109 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-160-176-109.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:54 GMT
Cache-Control
public, max-age=43200
Server
nginx/1.8.1
Connection
keep-alive
Content-Type
image/gif
transfer-encoding
chunked
Expires
Thu, 11 Apr 2019 06:10:54 GMT

Redirect headers

Pragma
no-cache
Date
Wed, 10 Apr 2019 18:10:54 GMT
Server
sonobi-go
Vary
negotiate,Accept-Encoding
X-Go-Server
xcp-ams-1-7-129
P3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Location
https://ids.ad.gt/api/v1/son_match?id=10d80dd9-37d3-4f96-a09f-25df82a0eea3&uid=635b8c07-3e6d-4b08-9dea-638b80fed45c
Cache-Control
no-cache, no-store, private
Tcn
Choice
Content-Type
text/plain; charset=utf8
Content-Length
0
X-Xss-Protection
0
Expires
Sat, 26 Jul 1997 05:00:00 GMT
en.js
c.evidon.com/sitenotice/4419/translations/
72 KB
4 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/4419/translations/en.js
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.103.102.169 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-103-102-169.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
7713f8cd92d4d6de8f561a9974209f8532e11b1db64d9a20efb50cf995609db0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:37 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
3963
last-modified
Tue, 14 Aug 2018 17:59:16 GMT
server
Apache
etag
"130e50d48e15fc5162f9707b91233f47:1534269556"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400, private;max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
expires
Thu, 11 Apr 2019 18:10:37 GMT
iabevidonmapping.js
iabmap.evidon.com/
6 KB
3 KB
Script
General
Full URL
https://iabmap.evidon.com/iabevidonmapping.js
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20ac:f800:10:27b4:f500:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
c12cfe3245b034d5354184f739ae0b54bcfd061434643d69446737fb395eaf15

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 02:23:15 GMT
content-encoding
gzip
last-modified
Mon, 18 Mar 2019 18:46:52 GMT
server
AmazonS3
age
56866
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-id
FoOJ1WqJo40hEA7DGd7xj502Q-xJrxJj_spIA6z6R5NtDq1Bzpf0Zg==
via
1.1 f0be03416e6497782a570ca9dff589f4.cloudfront.net (CloudFront)
evidon-cmp.js
c.evidon.com/sitenotice/
23 KB
7 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/evidon-cmp.js
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.103.102.169 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-103-102-169.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
4e2621a0a03a54ccc810ccd351aca754e3c2a1d45ab5244e2a589d17efb4a22d

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:37 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
6720
last-modified
Mon, 08 Apr 2019 20:18:13 GMT
server
Apache
etag
"7590f376df7f3b69df41cb549a896955:1554754697"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400, private;max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
expires
Thu, 11 Apr 2019 18:10:37 GMT
evidon-banner.js
c.evidon.com/sitenotice/
9 KB
3 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/evidon-banner.js
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.103.102.169 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-103-102-169.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
2dc9b5aae95a56d19a3be507330dbfc1c2f97c2c97db4e8a584f013f4bb03c85

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:37 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
2563
last-modified
Mon, 08 Apr 2019 20:18:12 GMT
server
Apache
etag
"51d9ffeafa39bf5d24b64fd429b35049:1554754695"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400, private;max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
expires
Thu, 11 Apr 2019 18:10:37 GMT
1
l.betrad.com/site/v3/4419/3803/3/1/2/
0
120 B
Image
General
Full URL
https://l.betrad.com/site/v3/4419/3803/3/1/2/1?consent=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.21.120.172 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-21-120-172.compute-1.amazonaws.com
Software
/ Express
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
date
Wed, 10 Apr 2019 18:10:40 GMT
content-encoding
gzip
etag
W/"a-bAsFyilMr4Ra1hIU5PyoyFRunpI"
x-powered-by
Express
vary
Accept-Encoding
icong1.png
c.evidon.com/pub/
506 B
822 B
Image
General
Full URL
https://c.evidon.com/pub/icong1.png
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.103.102.169 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-103-102-169.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
47ecf8e24654258186de2aabeeb592dc0c1f3d071b0f5b48622be67a9fd60c98

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:37 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
529
last-modified
Thu, 02 Jun 2011 18:30:38 GMT
server
Apache
etag
"e06dbc187b21a416c4ef0da5a3fd3829:1307039438"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
/
www.facebook.com/tr/ Frame 98F8
0
0
Document
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

:method
POST
:authority
www.facebook.com
:scheme
https
:path
/tr/
content-length
2551
pragma
no-cache
cache-control
no-cache
origin
https://arstechnica.com
upgrade-insecure-requests
1
content-type
application/x-www-form-urlencoded
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
accept-encoding
gzip, deflate, br
cookie
fr=0UNLnTsgOj91XtTHP..BcrjGd...1.0.BcrjGd.
Origin
https://arstechnica.com
Upgrade-Insecure-Requests
1
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/

Response headers

status
200
content-type
text/plain
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
strict-transport-security
max-age=31536000; includeSubDomains
content-length
0
server
proxygen-bolt
date
Wed, 10 Apr 2019 18:10:37 GMT
local_storage_frame10.min.html
assets.bounceexchange.com/assets/bounce/ Frame B42A
0
0
Document
General
Full URL
https://assets.bounceexchange.com/assets/bounce/local_storage_frame10.min.html
Requested by
Host: assets.bounceexchange.com
URL: https://assets.bounceexchange.com/assets/smart-tags/versioned/ijs_all_modules_6d8297c25ce85d8909a19bede888cc9e.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.90.45 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-90-45.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

:method
GET
:authority
assets.bounceexchange.com
:scheme
https
:path
/assets/bounce/local_storage_frame10.min.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/

Response headers

status
200
content-type
text/html
content-length
995
date
Mon, 10 Dec 2018 18:23:32 GMT
last-modified
Thu, 06 Dec 2018 22:10:11 GMT
etag
"55fccc7bc73db2181e976f1ccec90e2c"
cache-control
max-age=31536000
content-encoding
gzip
x-amz-version-id
iR64T.LKj_uq4qI1dcEGfT66vRlvUKzS
accept-ranges
bytes
server
AmazonS3
age
10453625
x-cache
Hit from cloudfront
via
1.1 5721f7035c3fc934bd3f96dbb04ba1e5.cloudfront.net (CloudFront)
x-amz-cf-id
sDTDwr-5aoqvWa8vf9Fm-3XsCyuR-OoMe-UQfTGU_3iFcXV2-X60lw==
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-04-10T18%3A10%3A37.359Z&_t=slot_staged&cBr=Ars%20Technica&cKe=critical%20infrastructure%7Cindustrial%20control%20systems%7Cmalware%7Ctriton&cCh=information%20technology&cTi=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684&cEnt=triton%2C%20malware%2C%20page%20layout%2C%20fireeye%2C%20dan%20goodin%2C%20russia%2C%20software%20framework%2C%20utc%2C%20operational%20technology%2C%20key%20logger%2C%20screenshot%2C%20exfiltrate%2C%20network%20reconnaissance%2C%20espionage%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20john%20hultquist%2C%20ars%20technica%20addendum%2C%20triconex%2C%20cnmn%20collection&cEnw=1%2C%200.9500050115895406%2C%200.7376657835742741%2C%200.727269122707033%2C%200.45809754901453276%2C%200.45309959010541806%2C%200.4279426928153714%2C%200.4247111958295731%2C%200.4162777364177546%2C%200.3976789615199139%2C%200.39705703877513393%2C%200.3953874679084234%2C%200.39200569316001066%2C%200.381796042701748%2C%200.3721243910381942%2C%200.33329355471876454%2C%200.3103213771374127%2C%200.281461116515084%2C%200.27888604929433647%2C%200.272428808898199&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&cCl=818&cId=1488751&cPd=2019-04-10T04%3A01%3A40.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4900&pSw=1600&pSh=1200&uID=43398a13-ca28-4a71-8cec-1106402730a7&sID=4386387c-b366-4c8f-9a72-8bf2c210feae&pID=24e6206e-eca2-45a6-baa3-e21a6785c6f3&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=925f08bd-5329-4aea-a2c0-c2c82a4afb3c&content_uri=information_technology&image_avg_surface=29913.095238095237&image_count=21&image_surface=628175&server=production&vp_height=1200&vp_width=1585&created=3161.5850031375885&staged=3207.7800035476685&pageload_to_staged=3207.7800035476685&channel=information_technology&ctx_template=article&id=1554919837312oojgrb559xoxf8mfxulc77e0qyijpe&instance=0&name=post_nav_0&position_fold=atf&position_xy=125x193&tags=critical_infrastructure_industrial_control_systems_malware_triton&template=article&type=post_nav&CNS_init=925.3799989819527&CNS_init_to_staged=2282.400004565716&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=triton%2Cmalware%2Cresearcher%2Cpage%20layout%2Cfireeye%2Cintrusion%2Cattacker%2Csystem
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:39 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-04-10T18%3A10%3A37.467Z&_t=slot_staged&cBr=Ars%20Technica&cKe=critical%20infrastructure%7Cindustrial%20control%20systems%7Cmalware%7Ctriton&cCh=information%20technology&cTi=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684&cEnt=triton%2C%20malware%2C%20page%20layout%2C%20fireeye%2C%20dan%20goodin%2C%20russia%2C%20software%20framework%2C%20utc%2C%20operational%20technology%2C%20key%20logger%2C%20screenshot%2C%20exfiltrate%2C%20network%20reconnaissance%2C%20espionage%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20john%20hultquist%2C%20ars%20technica%20addendum%2C%20triconex%2C%20cnmn%20collection&cEnw=1%2C%200.9500050115895406%2C%200.7376657835742741%2C%200.727269122707033%2C%200.45809754901453276%2C%200.45309959010541806%2C%200.4279426928153714%2C%200.4247111958295731%2C%200.4162777364177546%2C%200.3976789615199139%2C%200.39705703877513393%2C%200.3953874679084234%2C%200.39200569316001066%2C%200.381796042701748%2C%200.3721243910381942%2C%200.33329355471876454%2C%200.3103213771374127%2C%200.281461116515084%2C%200.27888604929433647%2C%200.272428808898199&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&cCl=818&cId=1488751&cPd=2019-04-10T04%3A01%3A40.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4900&pSw=1600&pSh=1200&uID=43398a13-ca28-4a71-8cec-1106402730a7&sID=4386387c-b366-4c8f-9a72-8bf2c210feae&pID=24e6206e-eca2-45a6-baa3-e21a6785c6f3&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=925f08bd-5329-4aea-a2c0-c2c82a4afb3c&content_uri=information_technology&image_avg_surface=29913.095238095237&image_count=21&image_surface=628175&server=production&vp_height=1200&vp_width=1585&created=3167.805001139641&staged=3313.289999961853&pageload_to_staged=3313.289999961853&channel=information_technology&ctx_template=article&id=1554919837318qrjwxaenhd2fwtmp9pra5ftzktbc6u&instance=0&name=siderail_0&position_fold=atf&position_xy=145x0&tags=critical_infrastructure_industrial_control_systems_malware_triton&template=article&type=siderail&CNS_init=925.3799989819527&CNS_init_to_staged=2387.9100009799004&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=triton%2Cmalware%2Cresearcher%2Cpage%20layout%2Cfireeye%2Cintrusion%2Cattacker%2Csystem
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:39 GMT
Connection
keep-alive
transfer-encoding
chunked
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-04-10T18%3A10%3A37.492Z&_t=slot_staged&cBr=Ars%20Technica&cKe=critical%20infrastructure%7Cindustrial%20control%20systems%7Cmalware%7Ctriton&cCh=information%20technology&cTi=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684&cEnt=triton%2C%20malware%2C%20page%20layout%2C%20fireeye%2C%20dan%20goodin%2C%20russia%2C%20software%20framework%2C%20utc%2C%20operational%20technology%2C%20key%20logger%2C%20screenshot%2C%20exfiltrate%2C%20network%20reconnaissance%2C%20espionage%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20john%20hultquist%2C%20ars%20technica%20addendum%2C%20triconex%2C%20cnmn%20collection&cEnw=1%2C%200.9500050115895406%2C%200.7376657835742741%2C%200.727269122707033%2C%200.45809754901453276%2C%200.45309959010541806%2C%200.4279426928153714%2C%200.4247111958295731%2C%200.4162777364177546%2C%200.3976789615199139%2C%200.39705703877513393%2C%200.3953874679084234%2C%200.39200569316001066%2C%200.381796042701748%2C%200.3721243910381942%2C%200.33329355471876454%2C%200.3103213771374127%2C%200.281461116515084%2C%200.27888604929433647%2C%200.272428808898199&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&cCl=818&cId=1488751&cPd=2019-04-10T04%3A01%3A40.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4900&pSw=1600&pSh=1200&uID=43398a13-ca28-4a71-8cec-1106402730a7&sID=4386387c-b366-4c8f-9a72-8bf2c210feae&pID=24e6206e-eca2-45a6-baa3-e21a6785c6f3&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=925f08bd-5329-4aea-a2c0-c2c82a4afb3c&content_uri=information_technology&image_avg_surface=29913.095238095237&image_count=21&image_surface=628175&server=production&vp_height=1200&vp_width=1585&created=3172.054998576641&staged=3341.11999720335&pageload_to_staged=3341.11999720335&channel=information_technology&ctx_template=article&id=native_xrail300x140_frame&instance=0&name=native_xrail_0&position_fold=atf&position_xy=436x0&tags=critical_infrastructure_industrial_control_systems_malware_triton&template=article&type=native_xrail&CNS_init=925.3799989819527&CNS_init_to_staged=2415.7399982213974&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=triton%2Cmalware%2Cresearcher%2Cpage%20layout%2Cfireeye%2Cintrusion%2Cattacker%2Csystem
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:39 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-04-10T18%3A10%3A37.502Z&_t=slot_staged&cBr=Ars%20Technica&cKe=critical%20infrastructure%7Cindustrial%20control%20systems%7Cmalware%7Ctriton&cCh=information%20technology&cTi=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684&cEnt=triton%2C%20malware%2C%20page%20layout%2C%20fireeye%2C%20dan%20goodin%2C%20russia%2C%20software%20framework%2C%20utc%2C%20operational%20technology%2C%20key%20logger%2C%20screenshot%2C%20exfiltrate%2C%20network%20reconnaissance%2C%20espionage%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20john%20hultquist%2C%20ars%20technica%20addendum%2C%20triconex%2C%20cnmn%20collection&cEnw=1%2C%200.9500050115895406%2C%200.7376657835742741%2C%200.727269122707033%2C%200.45809754901453276%2C%200.45309959010541806%2C%200.4279426928153714%2C%200.4247111958295731%2C%200.4162777364177546%2C%200.3976789615199139%2C%200.39705703877513393%2C%200.3953874679084234%2C%200.39200569316001066%2C%200.381796042701748%2C%200.3721243910381942%2C%200.33329355471876454%2C%200.3103213771374127%2C%200.281461116515084%2C%200.27888604929433647%2C%200.272428808898199&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&cCl=818&cId=1488751&cPd=2019-04-10T04%3A01%3A40.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4900&pSw=1600&pSh=1200&uID=43398a13-ca28-4a71-8cec-1106402730a7&sID=4386387c-b366-4c8f-9a72-8bf2c210feae&pID=24e6206e-eca2-45a6-baa3-e21a6785c6f3&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=925f08bd-5329-4aea-a2c0-c2c82a4afb3c&content_uri=information_technology&image_avg_surface=29913.095238095237&image_count=21&image_surface=628175&server=production&vp_height=1200&vp_width=1585&created=3176.96999758482&staged=3351.4249995350838&pageload_to_staged=3351.4249995350838&channel=information_technology&ctx_template=article&id=1554919837327oez9t74a2e126mdimymkj9dwjs7vzh&instance=0&name=out_of_page_0&out_of_page=true&position_fold=atf&position_xy=0x0&tags=critical_infrastructure_industrial_control_systems_malware_triton&template=article&type=out_of_page&CNS_init=925.3799989819527&CNS_init_to_staged=2426.045000553131&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=triton%2Cmalware%2Cresearcher%2Cpage%20layout%2Cfireeye%2Cintrusion%2Cattacker%2Csystem
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:39 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
eyJpdSI6IjlhOWUwMDAwYjBmMmFjNGNiOTY2NjI1NTczNDhjYjRiMzA1NTNiYTkyZDY3NjM4MTdiZTc4YzAyZDVkZTc0YjMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
3 KB
4 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjlhOWUwMDAwYjBmMmFjNGNiOTY2NjI1NTczNDhjYjRiMzA1NTNiYTkyZDY3NjM4MTdiZTc4YzAyZDVkZTc0YjMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.58.216.21 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
ec4f9cb92382a86382d7d8be4447c7c97bcec7e8136cdbf4d88a11b2f64e9e30
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Mon, 04 Mar 2019 15:43:22 GMT
Date
Wed, 10 Apr 2019 18:10:39 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1056811
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
3478
eyJpdSI6ImQ5NzFhYTQwYTZkNDQxOWUwYWQyNzEyMmJhZmI5YjRjNGU5Y2ZmYWQ1MTJjYjlmNmE1NGE4ZmIwYjExZmIzMzkiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
6 KB
6 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImQ5NzFhYTQwYTZkNDQxOWUwYWQyNzEyMmJhZmI5YjRjNGU5Y2ZmYWQ1MTJjYjlmNmE1NGE4ZmIwYjExZmIzMzkiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.58.216.21 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b1c2bea409cd185b9040d2d95362de03387cbe0db5b024cfa1d6cfe6affef7cc
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Fri, 08 Mar 2019 08:09:19 GMT
Date
Wed, 10 Apr 2019 18:10:39 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1057603
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
5730
eyJpdSI6IjI5YTAxMTkxMDZiMzZjMmIyNDEzNDEwNjY3NmRjOWQyMzNlYTVjMDg2YTRhNTc5NzVmYTU4NDQxZDNmOGQyNGYiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
7 KB
7 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjI5YTAxMTkxMDZiMzZjMmIyNDEzNDEwNjY3NmRjOWQyMzNlYTVjMDg2YTRhNTc5NzVmYTU4NDQxZDNmOGQyNGYiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.58.216.21 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3af72e1676308b0ef65d4363aed52d71c7d4f6262b92d32d263647d118b5c459
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Thu, 14 Mar 2019 06:08:35 GMT
Date
Wed, 10 Apr 2019 18:10:39 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1784010
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
7038
eyJpdSI6ImZlMjRjN2I4MzRiZTI1YWZkMjliYzc0MzJiMzA5NTBmNDc1MmQ2YTViNjg5MzQ3M2E3ZWFhMWRkZGU5NjQ0ODMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
14 KB
15 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImZlMjRjN2I4MzRiZTI1YWZkMjliYzc0MzJiMzA5NTBmNDc1MmQ2YTViNjg5MzQ3M2E3ZWFhMWRkZGU5NjQ0ODMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.58.216.21 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
ecdde76d076e23eecbc61fa8d6123b17d00f8bd2ca902d62a5fde70b1d2e32c1
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Mon, 11 Mar 2019 12:44:24 GMT
Date
Wed, 10 Apr 2019 18:10:39 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=350451
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
14796
eyJpdSI6ImQ3ZjY2NDliN2JjMmE0NWVjODkzZGYyMzdkYTI4MmYxYzI5NjY2YzM4ZDA1NTk5ZGM2MDBmZDAzMDQ1MDhmNDQiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
4 KB
5 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImQ3ZjY2NDliN2JjMmE0NWVjODkzZGYyMzdkYTI4MmYxYzI5NjY2YzM4ZDA1NTk5ZGM2MDBmZDAzMDQ1MDhmNDQiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.58.216.21 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
0e43e93ec4a140ba78354aec7fcda6cd2c5abd4b03681009970286e731605955
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Mon, 25 Mar 2019 07:30:58 GMT
Date
Wed, 10 Apr 2019 18:10:40 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1906056
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
4286
eyJpdSI6IjcwYTQ5MWIwMzE4ZDk4MGNhMGQ3YzIwZDQyNDUxNWJlZTY2OGU3Y2I2NTcxYjBmY2E3Y2RiOTFmNjQ4MTc4ZTUiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
5 KB
6 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjcwYTQ5MWIwMzE4ZDk4MGNhMGQ3YzIwZDQyNDUxNWJlZTY2OGU3Y2I2NTcxYjBmY2E3Y2RiOTFmNjQ4MTc4ZTUiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.58.216.21 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
04bab2b04b517d219309843b692adb607a6e16ea2ad9b04894a0fd9cd2d809e8
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Tue, 09 Apr 2019 10:47:52 GMT
Date
Wed, 10 Apr 2019 18:10:40 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2396797
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
5300
show_companion_ad.js
pagead2.googlesyndication.com/pagead/
164 KB
62 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/show_companion_ad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019032901.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:809::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
991e61c761ad9a21a9e300677881b378a90018143c15dc38c3220c5b72c4788d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 17:37:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1978
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
62520
x-xss-protection
0
server
cafe
etag
6655164921368399592
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=3600
timing-allow-origin
*
expires
Wed, 10 Apr 2019 18:37:42 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-04-10T18%3A10%3A37.695Z&_t=library_gpt&cBr=Ars%20Technica&cKe=critical%20infrastructure%7Cindustrial%20control%20systems%7Cmalware%7Ctriton&cCh=information%20technology&cTi=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684&cEnt=triton%2C%20malware%2C%20page%20layout%2C%20fireeye%2C%20dan%20goodin%2C%20russia%2C%20software%20framework%2C%20utc%2C%20operational%20technology%2C%20key%20logger%2C%20screenshot%2C%20exfiltrate%2C%20network%20reconnaissance%2C%20espionage%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20john%20hultquist%2C%20ars%20technica%20addendum%2C%20triconex%2C%20cnmn%20collection&cEnw=1%2C%200.9500050115895406%2C%200.7376657835742741%2C%200.727269122707033%2C%200.45809754901453276%2C%200.45309959010541806%2C%200.4279426928153714%2C%200.4247111958295731%2C%200.4162777364177546%2C%200.3976789615199139%2C%200.39705703877513393%2C%200.3953874679084234%2C%200.39200569316001066%2C%200.381796042701748%2C%200.3721243910381942%2C%200.33329355471876454%2C%200.3103213771374127%2C%200.281461116515084%2C%200.27888604929433647%2C%200.272428808898199&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&cCl=818&cId=1488751&cPd=2019-04-10T04%3A01%3A40.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4800&pSw=1600&pSh=1200&uID=43398a13-ca28-4a71-8cec-1106402730a7&sID=4386387c-b366-4c8f-9a72-8bf2c210feae&pID=24e6206e-eca2-45a6-baa3-e21a6785c6f3&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=925f08bd-5329-4aea-a2c0-c2c82a4afb3c&init=3544.8200032114983&requestEnd=1913.3199974894524&requestStart=1869.0500035881996&device=desktop&cns=2_26_0&_logType=info&cKh=triton%2Cmalware%2Cresearcher%2Cpage%20layout%2Cfireeye%2Cintrusion%2Cattacker%2Csystem
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:40 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
vendorlist.json
vendorlist.consensu.org/
78 KB
15 KB
XHR
General
Full URL
https://vendorlist.consensu.org/vendorlist.json
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-cmp.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20ac:5a00:1:af78:4c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
719e25bda1b6c712bfac7a49d1e52f404b3e466302a688ca629ad9c029c7d2a5

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com

Response headers

x-amz-version-id
F25cwM.WMbyq1.7brl39qNLLpQtjwzGo
content-encoding
gzip
vary
Accept-Encoding,Origin,Access-Control-Request-Headers,Access-Control-Request-Method
age
78238
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Thu, 04 Apr 2019 16:00:19 GMT
server
AmazonS3
date
Tue, 09 Apr 2019 20:27:32 GMT
access-control-max-age
86400
access-control-allow-methods
GET
content-type
application/json; charset=utf-8
via
1.1 fc768a4182ca8132c105f5430f31bc8e.cloudfront.net (CloudFront)
cache-control
max-age=259200
x-amz-cf-id
tlyzao2yjOh8ryrHIkEvDgvsaOgzTVkNAqpPrhR0pR3EKnoV7_S7jA==
20312
l.betrad.com/site/v3/4419/3803/3/1/2/1/
0
120 B
Image
General
Full URL
https://l.betrad.com/site/v3/4419/3803/3/1/2/1/20312?consent=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.21.120.172 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-21-120-172.compute-1.amazonaws.com
Software
/ Express
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
date
Wed, 10 Apr 2019 18:10:40 GMT
content-encoding
gzip
etag
W/"a-bAsFyilMr4Ra1hIU5PyoyFRunpI"
x-powered-by
Express
vary
Accept-Encoding
20312
l.betrad.com/site/v3/4419/3803/3/4/2/1/
0
120 B
Image
General
Full URL
https://l.betrad.com/site/v3/4419/3803/3/4/2/1/20312?consent=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.21.120.172 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-21-120-172.compute-1.amazonaws.com
Software
/ Express
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
date
Wed, 10 Apr 2019 18:10:40 GMT
content-encoding
gzip
etag
W/"a-bAsFyilMr4Ra1hIU5PyoyFRunpI"
x-powered-by
Express
vary
Accept-Encoding
20312
l.betrad.com/site/v3/4419/3803/3/2/2/1/
0
120 B
Image
General
Full URL
https://l.betrad.com/site/v3/4419/3803/3/2/2/1/20312?consent=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.21.120.172 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-21-120-172.compute-1.amazonaws.com
Software
/ Express
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
date
Wed, 10 Apr 2019 18:10:40 GMT
content-encoding
gzip
etag
W/"a-bAsFyilMr4Ra1hIU5PyoyFRunpI"
x-powered-by
Express
vary
Accept-Encoding
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-04-10T18%3A10%3A38.464Z&_t=slot_requested&cBr=Ars%20Technica&cKe=critical%20infrastructure%7Cindustrial%20control%20systems%7Cmalware%7Ctriton&cCh=information%20technology&cTi=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684&cEnt=triton%2C%20malware%2C%20page%20layout%2C%20fireeye%2C%20dan%20goodin%2C%20russia%2C%20software%20framework%2C%20utc%2C%20operational%20technology%2C%20key%20logger%2C%20screenshot%2C%20exfiltrate%2C%20network%20reconnaissance%2C%20espionage%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20john%20hultquist%2C%20ars%20technica%20addendum%2C%20triconex%2C%20cnmn%20collection&cEnw=1%2C%200.9500050115895406%2C%200.7376657835742741%2C%200.727269122707033%2C%200.45809754901453276%2C%200.45309959010541806%2C%200.4279426928153714%2C%200.4247111958295731%2C%200.4162777364177546%2C%200.3976789615199139%2C%200.39705703877513393%2C%200.3953874679084234%2C%200.39200569316001066%2C%200.381796042701748%2C%200.3721243910381942%2C%200.33329355471876454%2C%200.3103213771374127%2C%200.281461116515084%2C%200.27888604929433647%2C%200.272428808898199&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&cCl=818&cId=1488751&cPd=2019-04-10T04%3A01%3A40.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4800&pSw=1600&pSh=1200&uID=43398a13-ca28-4a71-8cec-1106402730a7&sID=4386387c-b366-4c8f-9a72-8bf2c210feae&pID=24e6206e-eca2-45a6-baa3-e21a6785c6f3&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=925f08bd-5329-4aea-a2c0-c2c82a4afb3c&content_uri=information_technology&image_avg_surface=23265.74074074074&image_count=27&image_surface=628175&server=production&vp_height=1200&vp_width=1585&created=3161.5850031375885&staged=3207.7800035476685&pageload_to_staged=3207.7800035476685&channel=information_technology&ctx_template=article&id=1554919837312oojgrb559xoxf8mfxulc77e0qyijpe&instance=0&name=post_nav_0&position_fold=atf&position_xy=125x193&tags=critical_infrastructure_industrial_control_systems_malware_triton&template=article&type=post_nav&CNS_init=925.3799989819527&suffix=dart&CNS_init_to_staged=2282.400004565716&inViewport=3304.119996726513&pageLoad_to_in_viewport=2378.7399977445602&isRefresh=true&is_first_Request=true&requested=4313.294999301434&pageLoad_to_requested=4313.294999301434&CNS_init_to_requested=3387.915000319481&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=triton%2Cmalware%2Cresearcher%2Cpage%20layout%2Cfireeye%2Cintrusion%2Cattacker%2Csystem
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:40 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-04-10T18%3A10%3A38.492Z&_t=slot_requested&cBr=Ars%20Technica&cKe=critical%20infrastructure%7Cindustrial%20control%20systems%7Cmalware%7Ctriton&cCh=information%20technology&cTi=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684&cEnt=triton%2C%20malware%2C%20page%20layout%2C%20fireeye%2C%20dan%20goodin%2C%20russia%2C%20software%20framework%2C%20utc%2C%20operational%20technology%2C%20key%20logger%2C%20screenshot%2C%20exfiltrate%2C%20network%20reconnaissance%2C%20espionage%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20john%20hultquist%2C%20ars%20technica%20addendum%2C%20triconex%2C%20cnmn%20collection&cEnw=1%2C%200.9500050115895406%2C%200.7376657835742741%2C%200.727269122707033%2C%200.45809754901453276%2C%200.45309959010541806%2C%200.4279426928153714%2C%200.4247111958295731%2C%200.4162777364177546%2C%200.3976789615199139%2C%200.39705703877513393%2C%200.3953874679084234%2C%200.39200569316001066%2C%200.381796042701748%2C%200.3721243910381942%2C%200.33329355471876454%2C%200.3103213771374127%2C%200.281461116515084%2C%200.27888604929433647%2C%200.272428808898199&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&cCl=818&cId=1488751&cPd=2019-04-10T04%3A01%3A40.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4800&pSw=1600&pSh=1200&uID=43398a13-ca28-4a71-8cec-1106402730a7&sID=4386387c-b366-4c8f-9a72-8bf2c210feae&pID=24e6206e-eca2-45a6-baa3-e21a6785c6f3&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=925f08bd-5329-4aea-a2c0-c2c82a4afb3c&content_uri=information_technology&image_avg_surface=23265.74074074074&image_count=27&image_surface=628175&server=production&vp_height=1200&vp_width=1585&created=3167.805001139641&staged=3313.289999961853&pageload_to_staged=3313.289999961853&channel=information_technology&ctx_template=article&id=1554919837318qrjwxaenhd2fwtmp9pra5ftzktbc6u&instance=0&name=siderail_0&position_fold=atf&position_xy=145x0&tags=critical_infrastructure_industrial_control_systems_malware_triton&template=article&type=siderail&CNS_init=925.3799989819527&suffix=dart&CNS_init_to_staged=2387.9100009799004&inViewport=3340.5250012874603&pageLoad_to_in_viewport=2415.1450023055077&isRefresh=true&requested=4341.009996831417&pageLoad_to_requested=4341.009996831417&CNS_init_to_requested=3415.6299978494644&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=triton%2Cmalware%2Cresearcher%2Cpage%20layout%2Cfireeye%2Cintrusion%2Cattacker%2Csystem
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:40 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-04-10T18%3A10%3A38.508Z&_t=slot_requested&cBr=Ars%20Technica&cKe=critical%20infrastructure%7Cindustrial%20control%20systems%7Cmalware%7Ctriton&cCh=information%20technology&cTi=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684&cEnt=triton%2C%20malware%2C%20page%20layout%2C%20fireeye%2C%20dan%20goodin%2C%20russia%2C%20software%20framework%2C%20utc%2C%20operational%20technology%2C%20key%20logger%2C%20screenshot%2C%20exfiltrate%2C%20network%20reconnaissance%2C%20espionage%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20john%20hultquist%2C%20ars%20technica%20addendum%2C%20triconex%2C%20cnmn%20collection&cEnw=1%2C%200.9500050115895406%2C%200.7376657835742741%2C%200.727269122707033%2C%200.45809754901453276%2C%200.45309959010541806%2C%200.4279426928153714%2C%200.4247111958295731%2C%200.4162777364177546%2C%200.3976789615199139%2C%200.39705703877513393%2C%200.3953874679084234%2C%200.39200569316001066%2C%200.381796042701748%2C%200.3721243910381942%2C%200.33329355471876454%2C%200.3103213771374127%2C%200.281461116515084%2C%200.27888604929433647%2C%200.272428808898199&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&cCl=818&cId=1488751&cPd=2019-04-10T04%3A01%3A40.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4800&pSw=1600&pSh=1200&uID=43398a13-ca28-4a71-8cec-1106402730a7&sID=4386387c-b366-4c8f-9a72-8bf2c210feae&pID=24e6206e-eca2-45a6-baa3-e21a6785c6f3&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=925f08bd-5329-4aea-a2c0-c2c82a4afb3c&content_uri=information_technology&image_avg_surface=23265.74074074074&image_count=27&image_surface=628175&server=production&vp_height=1200&vp_width=1585&created=3172.054998576641&staged=3341.11999720335&pageload_to_staged=3341.11999720335&channel=information_technology&ctx_template=article&id=native_xrail300x140_frame&instance=0&name=native_xrail_0&position_fold=atf&position_xy=436x0&tags=critical_infrastructure_industrial_control_systems_malware_triton&template=article&type=native_xrail&CNS_init=925.3799989819527&suffix=dart&CNS_init_to_staged=2415.7399982213974&inViewport=3350.7950007915497&pageLoad_to_in_viewport=2425.415001809597&isRefresh=true&requested=4357.9699993133545&pageLoad_to_requested=4357.9699993133545&CNS_init_to_requested=3432.590000331402&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=triton%2Cmalware%2Cresearcher%2Cpage%20layout%2Cfireeye%2Cintrusion%2Cattacker%2Csystem
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:40 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-04-10T18%3A10%3A38.531Z&_t=slot_requested&cBr=Ars%20Technica&cKe=critical%20infrastructure%7Cindustrial%20control%20systems%7Cmalware%7Ctriton&cCh=information%20technology&cTi=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684&cEnt=triton%2C%20malware%2C%20page%20layout%2C%20fireeye%2C%20dan%20goodin%2C%20russia%2C%20software%20framework%2C%20utc%2C%20operational%20technology%2C%20key%20logger%2C%20screenshot%2C%20exfiltrate%2C%20network%20reconnaissance%2C%20espionage%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20john%20hultquist%2C%20ars%20technica%20addendum%2C%20triconex%2C%20cnmn%20collection&cEnw=1%2C%200.9500050115895406%2C%200.7376657835742741%2C%200.727269122707033%2C%200.45809754901453276%2C%200.45309959010541806%2C%200.4279426928153714%2C%200.4247111958295731%2C%200.4162777364177546%2C%200.3976789615199139%2C%200.39705703877513393%2C%200.3953874679084234%2C%200.39200569316001066%2C%200.381796042701748%2C%200.3721243910381942%2C%200.33329355471876454%2C%200.3103213771374127%2C%200.281461116515084%2C%200.27888604929433647%2C%200.272428808898199&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&cCl=818&cId=1488751&cPd=2019-04-10T04%3A01%3A40.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4800&pSw=1600&pSh=1200&uID=43398a13-ca28-4a71-8cec-1106402730a7&sID=4386387c-b366-4c8f-9a72-8bf2c210feae&pID=24e6206e-eca2-45a6-baa3-e21a6785c6f3&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=925f08bd-5329-4aea-a2c0-c2c82a4afb3c&content_uri=information_technology&image_avg_surface=23265.74074074074&image_count=27&image_surface=628175&server=production&vp_height=1200&vp_width=1585&created=3176.96999758482&staged=3351.4249995350838&pageload_to_staged=3351.4249995350838&channel=information_technology&ctx_template=article&id=1554919837327oez9t74a2e126mdimymkj9dwjs7vzh&instance=0&name=out_of_page_0&out_of_page=true&position_fold=atf&position_xy=0x0&tags=critical_infrastructure_industrial_control_systems_malware_triton&template=article&type=out_of_page&CNS_init=925.3799989819527&suffix=dart&CNS_init_to_staged=2426.045000553131&inViewport=3373.2250034809113&pageLoad_to_in_viewport=2447.8450044989586&isRefresh=true&requested=4380.369998514652&pageLoad_to_requested=4380.369998514652&CNS_init_to_requested=3454.9899995326996&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=triton%2Cmalware%2Cresearcher%2Cpage%20layout%2Cfireeye%2Cintrusion%2Cattacker%2Csystem
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:40 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
ads
securepubads.g.doubleclick.net/gampad/
31 KB
13 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2080978700080941&correlator=3606493090303318&output=json_html&callback=googletag.impl.pubads.callbackProxy1&impl=fifs&adsid=NT&json_a=1&hxva=1&scor=3407268623779297&eid=21063348&vrg=2019032901&tfcd=0&guci=1.2.0.0.2.2.0.0&plat=1%3A32776%2C2%3A32776%2C8%3A32776&sc=1&sfv=1-0-32&iu_parts=3379%2Cconde.ars%2Cinterstitial%2Cinformation-technology%2Carticle%2C1%2Chero%2Crail%2C2&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5%2C0%2F1%2F6%2F3%2F4%2F5%2C0%2F1%2F7%2F3%2F4%2F5%2C0%2F1%2F7%2F3%2F4%2F8&prev_iu_szs=1x1%2C728x90%7C970x60%7C970x250%7C930x400%7C930x370%7C970x90%7C970x420%7C9x1%7C9x3%7C9x9%7C1200x370%2C300x250%7C300x600%7C300x1050%2C300x140&fsbs=1%2C1%2C1%2C1&ists=8&prev_scp=ctx_slot_name%3D_out_of_page_0%26ctx_slot_instance%3D_out_of_page_0%26ctx_slot_type%3D_out_of_page%26ctx_slot_manual_rn%3D0%26ctx_slot_rn%3D0%7Cctx_slot_name%3Dpost_nav_0%26ctx_slot_instance%3Dpost_nav_0%26ctx_slot_type%3Dpost_nav%26ctx_slot_manual_rn%3D0%26ctx_slot_rn%3D0%7Cctx_slot_name%3Dsiderail_0%26ctx_slot_instance%3Dsiderail_0%26ctx_slot_type%3Dsiderail%26ctx_slot_manual_rn%3D0%26ctx_slot_rn%3D0%7Cctx_slot_name%3Dnative_xrail_0%26ctx_slot_instance%3Dnative_xrail_0%26ctx_slot_type%3Dnative_xrail%26ctx_slot_manual_rn%3D0%26ctx_slot_rn%3D0&eri=1&cust_params=env_device_type%3Ddesktop%26env_server%3Dproduction%26rdt_device_template%3Ddesktop_article%26cnt_tags%3Dcritical-infrastructure%252Cindustrial-control-systems%252Cmalware%252Ctriton%26usr_bkt_pv%3D94%26ctx_cns_version%3D2_26_0%26vnd_4d_ctx_topics%3DALLBRANDS_70%252CALLBRANDS_7%252CALLBRANDS_63%252CALLBRANDS_38%252CALLBRANDS_31%252CALLBRANDS_283%252CALLBRANDS_274%252CALLBRANDS_258%252CALLBRANDS_167%252CALLBRANDS_134%252CALLBRANDS_64%252CALLBRANDS_57%252CALLBRANDS_28%252CALLBRANDS_244%252CALLBRANDS_21%252CALLBRANDS_192%26vnd_4d_ctx_topic_sc%3D0.5031767764227224%252C0.5031767764227224%252C0.5031767764227224%252C0.5031767764227224%252C0.5031767764227224%252C0.5031767764227224%252C0.5031767764227224%252C0.5031767764227224%252C0.5031767764227224%252C0.5031767764227224%252C0.1848402207522684%252C0.1848402207522684%252C0.1848402207522684%252C0.1848402207522684%252C0.1848402207522684%252C0.1848402207522684%26vnd_4d_ctx_entities%3Dtriton%252Cmalware%252Cpage%2520layout%252Cfireeye%252Cdan%2520goodin%252Crussia%252Csoftware%2520framework%252Cutc%252Coperational%2520technology%252Ckey%2520logger%252Cscreenshot%252Cexfiltrate%252Cnetwork%2520reconnaissance%252Cespionage%252Ccond%25C3%25A9%2520nast%252Cars%2520orbital%2520transmission%252Cjohn%2520hultquist%252Cars%2520technica%2520addendum%252Ctriconex%252Ccnmn%2520collection%26vnd_4d_ctx_ent_sc%3D1%252C0.9500050115895406%252C0.7376657835742741%252C0.727269122707033%252C0.45809754901453276%252C0.45309959010541806%252C0.4279426928153714%252C0.4247111958295731%252C0.4162777364177546%252C0.3976789615199139%252C0.39705703877513393%252C0.3953874679084234%252C0.39200569316001066%252C0.381796042701748%252C0.3721243910381942%252C0.33329355471876454%252C0.3103213771374127%252C0.281461116515084%252C0.27888604929433647%252C0.272428808898199%26vnd_4d_ctx_keywords%3Dtriton%252Cmalware%252Cresearcher%252Cpage%2520layout%252Cfireeye%252Cintrusion%252Cattacker%252Csystem%252Ctool%252Cinstitute%252Ccritical%2520infrastructure%2520site%252Clife-threatening%2520accidents.%252Cdan%2520goodin%252Crussia%252Ccritical-infrastructure%2520site%252Crefinery%252Cdetail%252Csoftware%2520framework%252Coperational%2520security%2520measure%252Cutc%26vnd_4d_ctx_kw_sc%3D1%252C0.9500050115895406%252C0.7550226879407017%252C0.7376657835742741%252C0.727269122707033%252C0.6526249262950813%252C0.6511927881546443%252C0.6166450460182566%252C0.5703507853508917%252C0.4886605561391212%252C0.48109651752343857%252C0.4716304409425352%252C0.45809754901453276%252C0.45309959010541806%252C0.43955554794921414%252C0.4373235164923017%252C0.43442680703145203%252C0.4279426928153714%252C0.42600741728463953%252C0.4247111958295731%26vnd_4d_pid%3D4bab7b43-bf77-4561-8958-b9c2e4f4c994%26ctx_template%3Darticle%26ctx_page_slug%3Dmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%26ctx_page_channel%3Dinformation_technology&cookie_enabled=1&bc=15&lmt=1554919838&dt=1554919838635&dlt=1554919834619&idt=2972&frm=20&biw=1585&bih=1200&oid=3&adxs=0%2C193%2C1063%2C1063&adys=0%2C80%2C370%2C786&adks=3280153701%2C3845785953%2C3155743081%2C57498633&ucis=1%7C2%7C3%7C4&ifi=1&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&dssz=71&icsg=1134707274153984&mso=262144&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=0x-1%7C1200x90%7C300x250%7C300x0&msz=0x-1%7C1200x90%7C300x250%7C300x140&blev=1&bisch=1&ga_vid=125902229.1554919839&ga_sid=1554919839&ga_hid=370652430&fws=4%2C4%2C4%2C4
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019032901.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
7fa9cf967d5cd8c5d131a90f62cddac6e6eea84c09b9b42d4b41738d6c48ca08
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com

Response headers

date
Wed, 10 Apr 2019 18:10:39 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
13210
x-xss-protection
0
google-lineitem-id
-2,4830169578,-1,4736014287
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-2,138247271585,-1,138237302059
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2019032901.js
securepubads.g.doubleclick.net/gpt/
72 KB
27 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019032901.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019032901.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
sffe /
Resource Hash
75af473fa5f320b8def25c02a8853b4b66f77c275a06c46fc642a2fbf30fb14c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:40 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 29 Mar 2019 14:59:45 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
27615
x-xss-protection
0
expires
Wed, 10 Apr 2019 18:10:40 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-32/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-32/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019032901.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81c::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Purpose
prefetch
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

aps_csm.js
c.amazon-adsystem.com/bao-csm/aps-comm/
6 KB
3 KB
XHR
General
Full URL
https://c.amazon-adsystem.com/bao-csm/aps-comm/aps_csm.js
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.90.253 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-90-253.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
6d6f482982f8f1a1814e279ff50df4ccc301533ca9655e4d080d6b90ec69d69e

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com

Response headers

Date
Wed, 10 Apr 2019 03:34:20 GMT
Content-Encoding
gzip
Vary
Origin
Age
52587
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Access-Control-Allow-Origin
*
Last-Modified
Fri, 24 Aug 2018 07:13:51 GMT
Server
AmazonS3
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET
Content-Type
application/javascript
Via
1.1 b44e2902bb3501d47514e51618f1bda5.cloudfront.net (CloudFront)
Cache-Control
public, max-age=86400
X-Amz-Cf-Id
e8SqGrboLvGi0CRm-EZo4LmfDeifqCzhRskJbnlEEtttmNQBbXM5_A==
bid
aax.amazon-adsystem.com/e/dtb/
47 B
344 B
XHR
General
Full URL
https://aax.amazon-adsystem.com/e/dtb/bid?src=3035&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pid=4658375839831554919839206&cb=4924734384251554919839259&ws=1600x1200&v=7.27.00&t=2000&slots=%5B%7B%22sd%22%3A%22cns_ads_1554919837312OojGrB559xOxF8mfxuLc77e0QYijpE_post_nav_0_container%22%2C%22s%22%3A%5B%22728x90%22%2C%22970x250%22%5D%7D%5D&pj=%7B%22apse%22%3A%7B%22chunkRequests%22%3Afalse%2C%22shouldSampleLatency%22%3Afalse%7D%7D&cfgv=0&gdprl=%7B%22status%22%3A%22cmp-timeout%22%7D
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.94.216.48 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
Server /
Resource Hash
0830953f1df33ac4feb7d3cd69b68a40a5b8cd1df50deec458a8d1cf9a97b443

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com

Response headers

Date
Wed, 10 Apr 2019 18:10:39 GMT
Server
Server
Vary
User-Agent
Content-Type
text/javascript;charset=UTF-8
Access-Control-Allow-Origin
https://arstechnica.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
47
bid
aax.amazon-adsystem.com/e/dtb/
47 B
344 B
XHR
General
Full URL
https://aax.amazon-adsystem.com/e/dtb/bid?src=3035&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pid=4658375839831554919839206&cb=3737829061061554919839264&ws=1600x1200&v=7.27.00&t=2000&slots=%5B%7B%22sd%22%3A%22cns_ads_1554919837318qrjWxAeNhD2FwTmp9PRA5FtZKtBC6U_siderail_0_container%22%2C%22s%22%3A%5B%22300x250%22%2C%22300x600%22%5D%7D%5D&pj=%7B%22apse%22%3A%7B%22chunkRequests%22%3Afalse%2C%22shouldSampleLatency%22%3Afalse%7D%7D&cfgv=0&gdprl=%7B%22status%22%3A%22cmp-timeout%22%7D
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.94.216.48 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
Server /
Resource Hash
b3383c81abaa90f9991e04c2e0d9df80dbe39bf0dc3883554167bd385c759bc2

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com

Response headers

Date
Wed, 10 Apr 2019 18:10:39 GMT
Server
Server
Vary
User-Agent
Content-Type
text/javascript;charset=UTF-8
Access-Control-Allow-Origin
https://arstechnica.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
47
getcookie
evidon.mgr.consensu.org/iab/
169 B
381 B
Script
General
Full URL
https://evidon.mgr.consensu.org/iab/getcookie
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-cmp.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.85.121.67 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-85-121-67.compute-1.amazonaws.com
Software
/
Resource Hash
9b133863146a5f391e8cee0842cafc7498ae89b6f79edbecfc842055342c1fe2

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:41 GMT
access-control-allow-origin
*
x-amzn-requestid
f34d1dbb-5bbb-11e9-98de-19abdfb98e3b
content-type
text/javascript
status
200
x-amzn-trace-id
Root=1-5cae31a1-91f77e6836708ad8327501b8;Sampled=0
x-amz-apigw-id
X7yxKGw9IAMF2LA=
content-length
169
m_window_focus_non_hydra.js
tpc.googlesyndication.com/pagead/js/r20190403/r20110914/client/ext/ Frame D1EC
2 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20190403/r20110914/client/ext/m_window_focus_non_hydra.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019032901.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81c::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
4dd51e6b250e15946ca0af835e0511093c82c5678115aac3055645d889a1681a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 03 Apr 2019 18:54:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
602184
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
1049
x-xss-protection
0
server
cafe
etag
9573447915536422037
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 17 Apr 2019 18:54:16 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame D1EC
76 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019032901.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81d::2002 , Ireland, ASN (),
Reverse DNS
Software
sffe /
Resource Hash
1c25d8cf996f382d2fe60e84c0f74a96cd463f8d4f983b23e61a5aaf8db31915
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:40 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1554722263845644"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
28875
x-xss-protection
0
expires
Wed, 10 Apr 2019 18:10:40 GMT
moatad.js
z.moatads.com/condenastdfp9588492144/ Frame D1EC
287 KB
89 KB
Script
General
Full URL
https://z.moatads.com/condenastdfp9588492144/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019032901.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
c456a0965b21f0c96f7d3cc87df0f4ca037521675e4f5e7664a7b113b03ba006

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:41 GMT
Content-Encoding
gzip
Last-Modified
Wed, 03 Apr 2019 17:11:23 GMT
Server
AmazonS3
x-amz-request-id
2214479BB106E195
ETag
"0851a846fe5396b9f94d191ddf9d02a8"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=40540
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
90638
x-amz-id-2
dcLQh4fo4pMCMNiwW+M0dykgVRDlJjXGSPltyiyMcK7cHe558SJD+wouM/PHWneMLxW1YFQJ+zM=
778489797820282430
tpc.googlesyndication.com/simgad/ Frame D1EC
1 KB
1 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/778489797820282430
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019032901.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81c::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
a8776cd5d9b452db19ebf8c02c4eaabe3dbfa40731a5f0385884650861d457a6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 08 Mar 2019 22:35:43 GMT
x-content-type-options
nosniff
age
2835297
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
1093
x-xss-protection
1; mode=block
last-modified
Tue, 16 Oct 2018 19:26:10 GMT
server
sffe
content-type
image/gif
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 07 Mar 2020 22:35:43 GMT
osd.js
www.googletagservices.com/activeview/js/current/
77 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019032901.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81d::2002 , Ireland, ASN (),
Reverse DNS
Software
sffe /
Resource Hash
0fa5aa7e8c60251d1efeabdd140d85c4720aebbbc45c0861f027f8158fc79403
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:40 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1554722263845644"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
29096
x-xss-protection
0
expires
Wed, 10 Apr 2019 18:10:40 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-32/html/ Frame E6B2
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-32/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019032901.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81c::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-32/html/container.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
3971
date
Sat, 09 Mar 2019 04:02:21 GMT
expires
Sun, 08 Mar 2020 04:02:21 GMT
last-modified
Wed, 06 Feb 2019 20:59:52 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
1; mode=block
cache-control
public, immutable, max-age=31536000
age
2815699
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
creative.js
static.polarcdn.com/creative/ Frame A522
290 KB
111 KB
Script
General
Full URL
https://static.polarcdn.com/creative/creative.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019032901.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:f87e , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
8aa6ba834bdbd506ba9746d5ca744b234613a6a7b72c3bb0efe0858c8e040d36

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:41 GMT
content-encoding
gzip
cf-cache-status
HIT
status
200
content-length
112745
via
1.1 varnish
timing-allow-origin
*
x-varnish
1143029130 1143005107
last-modified
Wed, 27 Mar 2019 16:18:07 GMT
server
cloudflare
cache-control
max-age=10800
etag
W/"5c9ba23f-489ee"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, OPTIONS
content-type
application/javascript
access-control-allow-origin
*
access-control-expose-headers
CF-IPCountry
cf-ipcountry
DE
access-control-allow-credentials
true
accept-ranges
bytes
cf-ray
4c56adce2c1f97e0-FRA
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
expires
Wed, 10 Apr 2019 16:41:42 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame A522
76 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019032901.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81d::2002 , Ireland, ASN (),
Reverse DNS
Software
sffe /
Resource Hash
1c25d8cf996f382d2fe60e84c0f74a96cd463f8d4f983b23e61a5aaf8db31915
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:40 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1554722263845644"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
28875
x-xss-protection
0
expires
Wed, 10 Apr 2019 18:10:40 GMT
moatad.js
z.moatads.com/condenastdfp9588492144/ Frame A522
287 KB
89 KB
Script
General
Full URL
https://z.moatads.com/condenastdfp9588492144/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019032901.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
c456a0965b21f0c96f7d3cc87df0f4ca037521675e4f5e7664a7b113b03ba006

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:42 GMT
Content-Encoding
gzip
Last-Modified
Wed, 03 Apr 2019 17:11:23 GMT
Server
AmazonS3
x-amz-request-id
2214479BB106E195
ETag
"0851a846fe5396b9f94d191ddf9d02a8"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=40539
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
90638
x-amz-id-2
dcLQh4fo4pMCMNiwW+M0dykgVRDlJjXGSPltyiyMcK7cHe558SJD+wouM/PHWneMLxW1YFQJ+zM=
view
securepubads.g.doubleclick.net/pcs/ Frame D1EC
0
132 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuL4QEP8pt7wzy8b24_wtNE1L-p3nmTm1p42WJAbQ3HygpcDMDEHNTOHxEBCvCnErG2J9gYdsmwKS2Nv2GfRB2crqVvf_Vi6hXQJ3EoKqJqAk1Aq-iTxYAdycr8U2TGBhlxAuk7exC0eV3ntV39gIS9GX7ard0PNg3YTbeOaEsNjiS7gLqJ818igzgnAPHNvVeDtnSsJyUp0oHhxrMv07q6ZHH4FExu7vHd2FQkJDsUsho1ZuY0Dhs2noHvPMM4GeIkfRaRentCJNVVwxhPc1TrwRpTv7f3vCMMxw-3dw&sai=AMfl-YThEjjGKdBUaJ5w-MU6xAoLC6Dy8yzI8-cZCDXo6iUIrc_HcqkbrBtNZ43GK9XEVJGOgPcAVAcNLndcuf8UOUOznjuK1QWzjoHrKayoCta-DfLjAThd2jlkvwzA&sig=Cg0ArKJSzOJ7dnMBcXMcEAE&adurl=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:40 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Wed, 10 Apr 2019 18:10:40 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame A522
0
292 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsv8142ORAW-8qnQkQ5tV326iY2QmFL-SYxaCEpWQajga_FSbidOoQcGHkiyS3eXxONgOsjKbKlLgykepv_RuvQz5EPgwRFfr66bmRojZWVnMKM0iUaJ-eInAj9DyuWBDS9YioepBOq_8rb2e-jrPsF_redhdqnSJw--3bzgJ-r6pz9bWllj6dGTEANa7RxiU0ALuf-yI5iUgclHIVjUAV-RJyj1JQ3OLfyGY2g5Txcv7I5PyomanJyk607fVsvnqBlSfo0fifa33NwZ-ftcoiPEHLKoxe4HUPlJfR1CUA&sai=AMfl-YT8g8D1lOo78iLIwH_fhs8iDb3rafig5yvr1CykpxxWG1ycS2CchOYuG28PkATbAFymu84WZKsVszU3LxwhbCzevrXeg5wsnJ0xFYQo2Jh_ew8RPQmDfC7j9CXp&sig=Cg0ArKJSzB940knj0sjHEAE&urlfix=1&adurl=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:40 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Wed, 10 Apr 2019 18:10:40 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-04-10T18%3A10%3A40.758Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=critical%20infrastructure%7Cindustrial%20control%20systems%7Cmalware%7Ctriton&cCh=information%20technology&cTi=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684&cEnt=triton%2C%20malware%2C%20page%20layout%2C%20fireeye%2C%20dan%20goodin%2C%20russia%2C%20software%20framework%2C%20utc%2C%20operational%20technology%2C%20key%20logger%2C%20screenshot%2C%20exfiltrate%2C%20network%20reconnaissance%2C%20espionage%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20john%20hultquist%2C%20ars%20technica%20addendum%2C%20triconex%2C%20cnmn%20collection&cEnw=1%2C%200.9500050115895406%2C%200.7376657835742741%2C%200.727269122707033%2C%200.45809754901453276%2C%200.45309959010541806%2C%200.4279426928153714%2C%200.4247111958295731%2C%200.4162777364177546%2C%200.3976789615199139%2C%200.39705703877513393%2C%200.3953874679084234%2C%200.39200569316001066%2C%200.381796042701748%2C%200.3721243910381942%2C%200.33329355471876454%2C%200.3103213771374127%2C%200.281461116515084%2C%200.27888604929433647%2C%200.272428808898199&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&cCl=818&cId=1488751&cPd=2019-04-10T04%3A01%3A40.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4900&pSw=1600&pSh=1200&uID=7ee5653b-2bea-4e57-b6ee-e12ec9df0247&uNw=1&uUq=1&pID=15933b82-81ce-4ea5-ae23-0b18d3972ddd&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=925f08bd-5329-4aea-a2c0-c2c82a4afb3c&content_uri=information_technology&image_avg_surface=28032.85185185185&image_count=27&image_surface=756887&server=production&vp_height=1200&vp_width=1585&created=3176.96999758482&staged=3351.4249995350838&pageload_to_staged=3351.4249995350838&channel=information_technology&ctx_template=article&id=1554919837327oez9t74a2e126mdimymkj9dwjs7vzh&instance=0&name=out_of_page_0&out_of_page=true&position_fold=atf&position_xy=0x0&request_number=1&tags=critical_infrastructure_industrial_control_systems_malware_triton&template=article&type=out_of_page&CNS_init=925.3799989819527&suffix=dart&CNS_init_to_staged=2426.045000553131&inViewport=3373.2250034809113&pageLoad_to_in_viewport=2447.8450044989586&isRefresh=true&requested=4380.369998514652&pageLoad_to_requested=4380.369998514652&CNS_init_to_requested=3454.9899995326996&rendered=6607.199996709824&creative_type=sized&is_empty=true&request_to_rendered=2226.8299981951714&is_first_rendered=true&pageLoad_to_rendered=6607.199996709824&CNS_init_to_rendered=5681.819997727871&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=triton%2Cmalware%2Cresearcher%2Cpage%20layout%2Cfireeye%2Cintrusion%2Cattacker%2Csystem
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:40 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-04-10T18%3A10%3A40.764Z&_t=unfriendly_iframe&cBr=Ars%20Technica&cKe=critical%20infrastructure%7Cindustrial%20control%20systems%7Cmalware%7Ctriton&cCh=information%20technology&cTi=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684&cEnt=triton%2C%20malware%2C%20page%20layout%2C%20fireeye%2C%20dan%20goodin%2C%20russia%2C%20software%20framework%2C%20utc%2C%20operational%20technology%2C%20key%20logger%2C%20screenshot%2C%20exfiltrate%2C%20network%20reconnaissance%2C%20espionage%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20john%20hultquist%2C%20ars%20technica%20addendum%2C%20triconex%2C%20cnmn%20collection&cEnw=1%2C%200.9500050115895406%2C%200.7376657835742741%2C%200.727269122707033%2C%200.45809754901453276%2C%200.45309959010541806%2C%200.4279426928153714%2C%200.4247111958295731%2C%200.4162777364177546%2C%200.3976789615199139%2C%200.39705703877513393%2C%200.3953874679084234%2C%200.39200569316001066%2C%200.381796042701748%2C%200.3721243910381942%2C%200.33329355471876454%2C%200.3103213771374127%2C%200.281461116515084%2C%200.27888604929433647%2C%200.272428808898199&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&cCl=818&cId=1488751&cPd=2019-04-10T04%3A01%3A40.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4900&pSw=1600&pSh=1200&uID=7ee5653b-2bea-4e57-b6ee-e12ec9df0247&pID=15933b82-81ce-4ea5-ae23-0b18d3972ddd&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=925f08bd-5329-4aea-a2c0-c2c82a4afb3c&content_uri=information_technology&image_avg_surface=28032.85185185185&image_count=27&image_surface=756887&server=production&vp_height=1200&vp_width=1585&created=3176.96999758482&staged=3351.4249995350838&pageload_to_staged=3351.4249995350838&channel=information_technology&ctx_template=article&id=1554919837327oez9t74a2e126mdimymkj9dwjs7vzh&instance=0&name=out_of_page_0&out_of_page=true&position_fold=atf&position_xy=0x0&request_number=1&tags=critical_infrastructure_industrial_control_systems_malware_triton&template=article&type=out_of_page&CNS_init=925.3799989819527&suffix=dart&CNS_init_to_staged=2426.045000553131&inViewport=3373.2250034809113&pageLoad_to_in_viewport=2447.8450044989586&isRefresh=true&requested=4380.369998514652&pageLoad_to_requested=4380.369998514652&CNS_init_to_requested=3454.9899995326996&rendered=6607.199996709824&creative_type=sized&is_empty=true&request_to_rendered=2226.8299981951714&is_first_rendered=true&pageLoad_to_rendered=6607.199996709824&CNS_init_to_rendered=5681.819997727871&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=triton%2Cmalware%2Cresearcher%2Cpage%20layout%2Cfireeye%2Cintrusion%2Cattacker%2Csystem
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:40 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-04-10T18%3A10%3A40.792Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=critical%20infrastructure%7Cindustrial%20control%20systems%7Cmalware%7Ctriton&cCh=information%20technology&cTi=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684&cEnt=triton%2C%20malware%2C%20page%20layout%2C%20fireeye%2C%20dan%20goodin%2C%20russia%2C%20software%20framework%2C%20utc%2C%20operational%20technology%2C%20key%20logger%2C%20screenshot%2C%20exfiltrate%2C%20network%20reconnaissance%2C%20espionage%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20john%20hultquist%2C%20ars%20technica%20addendum%2C%20triconex%2C%20cnmn%20collection&cEnw=1%2C%200.9500050115895406%2C%200.7376657835742741%2C%200.727269122707033%2C%200.45809754901453276%2C%200.45309959010541806%2C%200.4279426928153714%2C%200.4247111958295731%2C%200.4162777364177546%2C%200.3976789615199139%2C%200.39705703877513393%2C%200.3953874679084234%2C%200.39200569316001066%2C%200.381796042701748%2C%200.3721243910381942%2C%200.33329355471876454%2C%200.3103213771374127%2C%200.281461116515084%2C%200.27888604929433647%2C%200.272428808898199&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&cCl=818&cId=1488751&cPd=2019-04-10T04%3A01%3A40.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4900&pSw=1600&pSh=1200&uID=7ee5653b-2bea-4e57-b6ee-e12ec9df0247&pID=15933b82-81ce-4ea5-ae23-0b18d3972ddd&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=925f08bd-5329-4aea-a2c0-c2c82a4afb3c&content_uri=information_technology&image_avg_surface=28032.85185185185&image_count=27&image_surface=756887&server=production&vp_height=1200&vp_width=1585&created=3161.5850031375885&staged=3207.7800035476685&pageload_to_staged=3207.7800035476685&channel=information_technology&ctx_template=article&id=1554919837312oojgrb559xoxf8mfxulc77e0qyijpe&instance=0&name=post_nav_0&position_fold=atf&position_xy=125x193&request_number=1&tags=critical_infrastructure_industrial_control_systems_malware_triton&template=article&type=post_nav&CNS_init=925.3799989819527&suffix=dart&CNS_init_to_staged=2282.400004565716&inViewport=3304.119996726513&pageLoad_to_in_viewport=2378.7399977445602&isRefresh=true&is_first_Request=true&requested=4313.294999301434&pageLoad_to_requested=4313.294999301434&CNS_init_to_requested=3387.915000319481&rendered=6640.984997153282&advertiser_id=4552798968&creative_id=138247271585&creative_type=sized&line_item_id=4830169578&order_id=2409944368&rendered_size=1x1&request_to_rendered=2327.6899978518486&pageLoad_to_rendered=6640.984997153282&CNS_init_to_rendered=5715.6049981713295&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=triton%2Cmalware%2Cresearcher%2Cpage%20layout%2Cfireeye%2Cintrusion%2Cattacker%2Csystem
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:41 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-04-10T18%3A10%3A40.839Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=critical%20infrastructure%7Cindustrial%20control%20systems%7Cmalware%7Ctriton&cCh=information%20technology&cTi=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684&cEnt=triton%2C%20malware%2C%20page%20layout%2C%20fireeye%2C%20dan%20goodin%2C%20russia%2C%20software%20framework%2C%20utc%2C%20operational%20technology%2C%20key%20logger%2C%20screenshot%2C%20exfiltrate%2C%20network%20reconnaissance%2C%20espionage%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20john%20hultquist%2C%20ars%20technica%20addendum%2C%20triconex%2C%20cnmn%20collection&cEnw=1%2C%200.9500050115895406%2C%200.7376657835742741%2C%200.727269122707033%2C%200.45809754901453276%2C%200.45309959010541806%2C%200.4279426928153714%2C%200.4247111958295731%2C%200.4162777364177546%2C%200.3976789615199139%2C%200.39705703877513393%2C%200.3953874679084234%2C%200.39200569316001066%2C%200.381796042701748%2C%200.3721243910381942%2C%200.33329355471876454%2C%200.3103213771374127%2C%200.281461116515084%2C%200.27888604929433647%2C%200.272428808898199&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&cCl=818&cId=1488751&cPd=2019-04-10T04%3A01%3A40.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4900&pSw=1600&pSh=1200&uID=7ee5653b-2bea-4e57-b6ee-e12ec9df0247&pID=15933b82-81ce-4ea5-ae23-0b18d3972ddd&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=925f08bd-5329-4aea-a2c0-c2c82a4afb3c&content_uri=information_technology&image_avg_surface=28032.85185185185&image_count=27&image_surface=756887&server=production&vp_height=1200&vp_width=1585&created=3167.805001139641&staged=3313.289999961853&pageload_to_staged=3313.289999961853&channel=information_technology&ctx_template=article&id=1554919837318qrjwxaenhd2fwtmp9pra5ftzktbc6u&instance=0&name=siderail_0&position_fold=atf&position_xy=20x0&request_number=1&tags=critical_infrastructure_industrial_control_systems_malware_triton&template=article&type=siderail&CNS_init=925.3799989819527&suffix=dart&CNS_init_to_staged=2387.9100009799004&inViewport=3340.5250012874603&pageLoad_to_in_viewport=2415.1450023055077&isRefresh=true&requested=4341.009996831417&pageLoad_to_requested=4341.009996831417&CNS_init_to_requested=3415.6299978494644&rendered=6687.07499653101&advertiser_id=4660981638&creative_id=programmatic&creative_type=sized&line_item_id=programmatic&order_id=2443012271&rendered_size=300x600&request_to_rendered=2346.0649996995926&pageLoad_to_rendered=6687.07499653101&CNS_init_to_rendered=5761.694997549057&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=triton%2Cmalware%2Cresearcher%2Cpage%20layout%2Cfireeye%2Cintrusion%2Cattacker%2Csystem
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:41 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-04-10T18%3A10%3A40.881Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=critical%20infrastructure%7Cindustrial%20control%20systems%7Cmalware%7Ctriton&cCh=information%20technology&cTi=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684&cEnt=triton%2C%20malware%2C%20page%20layout%2C%20fireeye%2C%20dan%20goodin%2C%20russia%2C%20software%20framework%2C%20utc%2C%20operational%20technology%2C%20key%20logger%2C%20screenshot%2C%20exfiltrate%2C%20network%20reconnaissance%2C%20espionage%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20john%20hultquist%2C%20ars%20technica%20addendum%2C%20triconex%2C%20cnmn%20collection&cEnw=1%2C%200.9500050115895406%2C%200.7376657835742741%2C%200.727269122707033%2C%200.45809754901453276%2C%200.45309959010541806%2C%200.4279426928153714%2C%200.4247111958295731%2C%200.4162777364177546%2C%200.3976789615199139%2C%200.39705703877513393%2C%200.3953874679084234%2C%200.39200569316001066%2C%200.381796042701748%2C%200.3721243910381942%2C%200.33329355471876454%2C%200.3103213771374127%2C%200.281461116515084%2C%200.27888604929433647%2C%200.272428808898199&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&cCl=818&cId=1488751&cPd=2019-04-10T04%3A01%3A40.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4900&pSw=1600&pSh=1200&uID=7ee5653b-2bea-4e57-b6ee-e12ec9df0247&pID=15933b82-81ce-4ea5-ae23-0b18d3972ddd&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=925f08bd-5329-4aea-a2c0-c2c82a4afb3c&content_uri=information_technology&image_avg_surface=28032.85185185185&image_count=27&image_surface=756887&server=production&vp_height=1200&vp_width=1585&created=3172.054998576641&staged=3341.11999720335&pageload_to_staged=3341.11999720335&channel=information_technology&ctx_template=article&id=native_xrail300x140_frame&instance=0&name=native_xrail_0&position_fold=atf&position_xy=786x0&request_number=1&tags=critical_infrastructure_industrial_control_systems_malware_triton&template=article&type=native_xrail&CNS_init=925.3799989819527&suffix=dart&CNS_init_to_staged=2415.7399982213974&inViewport=3350.7950007915497&pageLoad_to_in_viewport=2425.415001809597&isRefresh=true&requested=4357.9699993133545&pageLoad_to_requested=4357.9699993133545&CNS_init_to_requested=3432.590000331402&rendered=6730.734996497631&advertiser_id=1454517775&creative_id=138237302059&creative_type=sized&line_item_id=4736014287&order_id=2338761482&rendered_size=300x140&request_to_rendered=2372.7649971842766&pageLoad_to_rendered=6730.734996497631&CNS_init_to_rendered=5805.354997515678&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=triton%2Cmalware%2Cresearcher%2Cpage%20layout%2Cfireeye%2Cintrusion%2Cattacker%2Csystem
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:41 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
truncated
/ Frame D1EC
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
825bf981adaf36969998d18a9fd7cb2be08f9376d94e2e5fbeffd7806b15212e

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/png
publishertag.js
static.criteo.net/js/ld/
83 KB
25 KB
Script
General
Full URL
https://static.criteo.net/js/ld/publishertag.js
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
182.161.72.131 , Singapore, ASN55569 (CRITEO-AS-AP Criteo APAC, JP),
Reverse DNS
Software
nginx /
Resource Hash
b0e82f9ce6c1510f32a8e18c9581ba6573b6988dabdd3f2ed6c1ba08eff85cb9

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:41 GMT
Content-Encoding
gzip
Last-Modified
Thu, 07 Mar 2019 13:26:35 GMT
Server
nginx
ETag
W/"5c811c0b-14ca7"
Transfer-Encoding
chunked
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=86400, public
Timing-Allow-Origin
*
Expires
Thu, 11 Apr 2019 18:10:41 GMT
identity
api.rlcdn.com/api/
0
0

rid
match.adsrvr.org/track/
109 B
525 B
XHR
General
Full URL
https://match.adsrvr.org/track/rid?ttd_pid=casale&fmt=json&p=183973
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.31.192.216 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-31-192-216.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
0b26069836f585051f9117324133e9164aea78ba9e0ab52c58ffba8374119849

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Wed, 10 Apr 2019 18:11:03 GMT
x-aspnet-version
4.0.30319
status
200
vary
Origin
content-type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
cache-control
private
access-control-allow-credentials
true
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Content-Length, Content-Encoding, Vary, Cache-Control, Accept
content-length
109
expires
Fri, 10 May 2019 18:11:03 GMT
ids
mid.rkdms.com/
0
0

wt
polarcdn-pentos.com/ Frame A522
3 B
65 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=1&n=3&p=UNKNOWN&s=1&u=7a504ee3-bc76-4f29-bf8f-305e2edf9fd5&v=2%2Fc19c73b&w=1.131.0&y=w&z=v1.6.31&pas=asa-web&pag2=%2F3379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F2&pai=7f742&d=arstechnica.com&l=&pajs=&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&cu=fd849c02faf58c6f65a7abf56a7a4584&t=arx&parcid=2604d&parid=35321&parin=1&partm=0&par=s&maxts=0.018&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&_=1554919841290
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.192.78 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:41 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
x-amz-request-id
DB783A05C3FEE54D
status
200
content-length
3
x-amz-id-2
HR6fi+cOwrsUo+aPPrhwEkXGglWgyYRjfSoOWmHXK7CYt3cuTeIZsmO8mrEyano/N3YhGjUNDr0=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
cf-ray
4c56add0f82c9d02-AMS
wt
polarcdn-pentos.com/ Frame A522
3 B
593 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=2&n=3&p=UNKNOWN&s=1&u=7a504ee3-bc76-4f29-bf8f-305e2edf9fd5&v=2%2Fc19c73b&w=1.131.0&y=w&z=v1.6.31&pas=asa-web-polarpmp&pag1=conde_customcontent_market&pag2=brand_arstechnica&paenb=u&pai=7f742&d=arstechnica.com&l=&pajs=&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&cu=fd849c02faf58c6f65a7abf56a7a4584&t=atx&parcid=2604d&parid=32785&parin=2&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&_=1554919841291
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.192.78 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:41 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
x-amz-request-id
DB783A05C3FEE54D
status
200
content-length
3
x-amz-id-2
HR6fi+cOwrsUo+aPPrhwEkXGglWgyYRjfSoOWmHXK7CYt3cuTeIZsmO8mrEyano/N3YhGjUNDr0=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
cf-ray
4c56add0f82d9d02-AMS
pl
bw-prod.plrsrvcs.com/bid/ Frame A522
0
340 B
XHR
General
Full URL
https://bw-prod.plrsrvcs.com/bid/pl
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6811:dc0f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Access-Control-Request-Method
POST
Origin
https://arstechnica.com
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Access-Control-Request-Headers
content-type,x-openrtb-version

Response headers

date
Wed, 10 Apr 2019 18:10:41 GMT
server
cloudflare
access-control-allow-origin
*
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, POST, OPTIONS
status
204
cf-ray
4c56add0ff919750-FRA
access-control-allow-headers
Content-Type, x-openrtb-version
ADTECH;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841400;callback=window.headertag.AolHtb.adResponseCallbacks._ie9Xaq83
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1554919841400;callback=window.headertag.AolHtb.adResponseCallbacks._ie9Xaq83;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841400;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841400;callback=window.headertag.AolHtb.adResponseCallbacks._ie9Xaq83
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:41 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841400;callback=window.headertag.AolHtb.adResponseCallbacks._ie9Xaq83
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:41 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841400;callback=window.headertag.AolHtb.adResponseCallbacks._ie9Xaq83
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841401;callback=window.headertag.AolHtb.adResponseCallbacks._FDumt9XV
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1554919841401;callback=window.headertag.AolHtb.adResponseCallbacks._FDumt9XV;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841401;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841401;callback=window.headertag.AolHtb.adResponseCallbacks._FDumt9XV
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:41 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841401;callback=window.headertag.AolHtb.adResponseCallbacks._FDumt9XV
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:41 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841401;callback=window.headertag.AolHtb.adResponseCallbacks._FDumt9XV
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
cygnus
as-sec.casalemedia.com/
66 B
945 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=175689&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A93512305%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%221%22%2C%22siteID%22%3A%22175689%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%222%22%2C%22siteID%22%3A%22175690%22%7D%2C%22id%22%3A%222%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%223%22%2C%22siteID%22%3A%22175691%22%7D%2C%22id%22%3A%223%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
8026103f967c67a965548a4a79091f1682e4467f459ba22ea3c5ef24c666df10

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Wed, 10 Apr 2019 18:10:42 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript
Content-Length
86
Expires
Wed, 10 Apr 2019 18:10:42 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
0
0

fastlane.json
fastlane.rubiconproject.com/a/api/
0
0

fastlane.json
fastlane.rubiconproject.com/a/api/
0
0

fastlane.json
fastlane.rubiconproject.com/a/api/
0
0

fastlane.json
fastlane.rubiconproject.com/a/api/
0
0

fastlane.json
fastlane.rubiconproject.com/a/api/
0
0

ADTECH;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._7OvPyQ5v
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._7OvPyQ5v;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._7OvPyQ5v
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:41 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._7OvPyQ5v
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:41 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._7OvPyQ5v
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1554919840;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._iSfgL8ui
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._iSfgL8ui;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1554919840;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1554919840;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._iSfgL8ui
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:41 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1554919840;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._iSfgL8ui
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:41 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1554919840;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._iSfgL8ui
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
cygnus
as-sec.casalemedia.com/
66 B
945 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=175689&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A82262430%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2210%22%2C%22siteID%22%3A%22175698%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2211%22%2C%22siteID%22%3A%22175699%22%7D%2C%22id%22%3A%222%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A1050%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2212%22%2C%22siteID%22%3A%22175700%22%7D%2C%22id%22%3A%223%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
fc6bf6ccaafb3e02921d5c5d0981c5a41990214c4d55b91361502e76080aefd7

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Wed, 10 Apr 2019 18:10:42 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript
Content-Length
86
Expires
Wed, 10 Apr 2019 18:10:42 GMT
2232b9a2-5226-4478-b5ad-f292d939fc72
https://arstechnica.com/ Frame 45E1
31 B
0
Other
General
Full URL
blob:https://arstechnica.com/2232b9a2-5226-4478-b5ad-f292d939fc72
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-7db437cede3397d9ff68.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7725538fe2f71147bffeba7452b434c826aef9009666cb4360c605d0b2a91d1d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Length
31
Content-Type
application/javascript
sf-ui-display-medium-webfont.woff2
d2c8v52ll5s99u.cloudfront.net/assets/fonts/ Frame 45E1
29 KB
30 KB
Font
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/assets/fonts/sf-ui-display-medium-webfont.woff2
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.100 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-100.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
d281c9d6bae645f3da6d2f0769a2cf0668709fd28e2021ce74821cdd8c7117b3

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-93d3ac933e3b2a7c0bd52030be8ef0af.css
Origin
https://arstechnica.com

Response headers

Date
Wed, 10 Apr 2019 18:10:42 GMT
Content-Encoding
gzip
X-Cache
RefreshHit from cloudfront
Access-Control-Max-Age
3000
Connection
keep-alive
Content-Length
29632
Via
1.1 a394c864b23364262af48fed4e7e9fad.cloudfront.net (CloudFront)
Last-Modified
Mon, 26 Jun 2017 15:24:42 GMT
Server
AmazonS3
ETag
"7d18db04f980971f2a9c5026bbc34bed"
Vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
Access-Control-Allow-Methods
GET
Content-Type
application/font-woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=63072000, public
Accept-Ranges
bytes
X-Amz-Cf-Id
LL4anz8_IIRsPGYDsID-z8vTZYjupGWFQoiCnO3XypXGZNN1v9BYWA==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
bridge3.293.0_en.html
imasdk.googleapis.com/js/core/ Frame 0A57
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.293.0_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:80b::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.293.0_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
182865
date
Tue, 09 Apr 2019 16:30:39 GMT
expires
Wed, 08 Apr 2020 16:30:39 GMT
last-modified
Tue, 09 Apr 2019 16:28:40 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
92402
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
client.js
s0.2mdn.net/instream/video/ Frame 45E1
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:814::2006 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10523
x-xss-protection
0
expires
Wed, 10 Apr 2019 18:10:41 GMT
integrator.js
adservice.google.com/adsid/ Frame 45E1
109 B
481 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:815::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
fbevents.js
connect.facebook.net/en_US/ Frame 45E1
53 KB
16 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-7db437cede3397d9ff68.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
fa59b1ed1b011e084474ad818b5f6986d84fc678e2f37fee9330eb52d86860b3
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
15397
x-xss-protection
0
pragma
public
x-fb-debug
WJpN/9eKJ4O8fdqwn7knu1jWsrnWHj9slQ2r1XXdyLIrVjSE2Y3to3TOiPW4IcbgZHCPx7DoWEAftxUe/SqD9g==
date
Wed, 10 Apr 2019 18:10:41 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
comscore-min.js
d2c8v52ll5s99u.cloudfront.net/player/ Frame 45E1
38 KB
11 KB
Script
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/comscore-min.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-7db437cede3397d9ff68.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.182 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-182.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
833a86642252016b29f08dd45ffd27f9e00ca237f28d8c5f0147a6e15d009377

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:41 GMT
Content-Encoding
gzip
Last-Modified
Wed, 24 May 2017 18:19:15 GMT
Server
AmazonS3
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
text/javascript
Via
1.1 a09186728c1bcdf0a561aedd92656804.cloudfront.net (CloudFront)
Transfer-Encoding
chunked
Connection
keep-alive
X-Amz-Cf-Id
Sopt21tU2sCx7Gh5nZaVTLU1RrBspnV5t93Y5gSJtZYdJVNE__xvVA==
collect
www.google-analytics.com/r/
35 B
314 B
Other
General
Full URL
https://www.google-analytics.com/r/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81f::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:41 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
https://arstechnica.com
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
infinityid
infinityid.condenastdigital.com/ Frame 45E1
36 B
1 KB
XHR
General
Full URL
https://infinityid.condenastdigital.com/infinityid
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-7db437cede3397d9ff68.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.44.76.10 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-44-76-10.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
bb64a597fde3b1992b67aaed194489b224a558fe39c7f75089f0a040fc060281

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com

Response headers

Date
Wed, 10 Apr 2019 18:10:42 GMT
content-encoding
gzip
Server
nginx/1.15.8
vary
origin,accept-encoding
Content-Type
text/plain; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
Content-Length
56
track
capture.condenastdigital.com/ Frame 45E1
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-04-10T18%3A10%3A41.525Z&_c=&_t=Player%20Requested&sID=331ad88f-cd5d-4ec5-ae23-ceb69115d7b4&pID=15933b82-81ce-4ea5-ae23-0b18d3972ddd&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:41 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/ Frame 45E1
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-04-10T18%3A10%3A41.787Z&_c=Performance&_t=adj_player_download_time&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=http%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Fwar-stories-mechwarrior-5-mercenaries&cId=5ca20d91bcdfff463e4e1d46&cKe=&cPd=2019-04-03T15%3A21%3A00%2B00%3A00&cTi=MechWarrior%205%3A%20Mercenaries%20%7C%20War%20Stories&mDu=651&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pID=15933b82-81ce-4ea5-ae23-0b18d3972ddd&pWw=540&pWh=303.75&sID=331ad88f-cd5d-4ec5-ae23-ceb69115d7b4&uId=7ee5653b-2bea-4e57-b6ee-e12ec9df0247&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22guid%22%3A%22abc5d75a-7d5c-df5f-c950-81ddf0a1f05a%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A3493.09375%2C%22playerType%22%3A%22video-continuous%22%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22tabStatus%22%3A%22active%22%2C%22versoPageType%22%3A%22article%7Creport%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3Anull%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%7D&_v=4304.334998130798&adId=&pageType=article%7Creport
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:41 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
arstechnica_war-stories-mechwarrior-5-mercenaries.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1554815651/ Frame 45E1
76 KB
77 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1554815651/arstechnica_war-stories-mechwarrior-5-mercenaries.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.220 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-220.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
dda84bba229c25fe7c744ccdeb5ed6b82c4a3bc91a8db6b61039b597c7087cd2

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 09 Apr 2019 13:16:43 GMT
Via
1.1 varnish, 1.1 ef13dd533b8dc9dcfdc35449cf88f808.cloudfront.net (CloudFront)
Age
104045
Edge-Cache-Tag
449226972451991935294885795153819156355,316951410886732526360935603098811400471,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
77704
X-Request-Id
fbc1b64bba7b1956
X-Served-By
cache-fra19156-FRA
Server
cloudinary
X-Timer
S1554815803.158501,VS0,VE436
ETag
"85605064ad3f281d682f3ee2f5c3b006"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
uqzHIZFf26exUUQIdIstxvdqIOgIB_kFDEdtpwCUweGwqRotrbGaBQ==
X-Cache-Hits
0
pl
bw-prod.plrsrvcs.com/bid/ Frame A522
2 KB
2 KB
XHR
General
Full URL
https://bw-prod.plrsrvcs.com/bid/pl
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6811:dc0f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
a9c697bcafef2f97156aac8f7e9c17fc66af6e9e0bc0eaf5c8eec5500a3227a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
x-openrtb-version
2.3
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Origin
https://arstechnica.com
Content-Type
application/json

Response headers

date
Wed, 10 Apr 2019 18:10:41 GMT
content-encoding
gzip
x-polar-trace-id
x-polar-response-id
be3400fd2b144813ad3e02680bc8a391
status
200
x-polar-h
fbfd7-30
x-polar-t
0.013
pragma
no-cache
server
cloudflare
cache-control
no-cache, no-store, must-revalidate
x-polar-misses
tq
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
*
access-control-expose-headers
CF-IPCountry
cf-ipcountry
DE
cf-ray
4c56add38d609750-FRA
expires
0
4288fbc9-3807-4e18-bdae-6c85ca6f43dcthumbs.mp4
dp8hsntg6do36.cloudfront.net/5ca20d91bcdfff463e4e1d46/ Frame 45E1
64 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5ca20d91bcdfff463e4e1d46/4288fbc9-3807-4e18-bdae-6c85ca6f43dcthumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.62 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-62.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Range
bytes=0-
chrome-proxy
frfr

Response headers

Date
Wed, 10 Apr 2019 13:30:56 GMT
Via
1.1 fb8c0300277bd0137c1693d3d64ab550.cloudfront.net (CloudFront)
Last-Modified
Mon, 01 Apr 2019 13:16:14 GMT
Server
AmazonS3
Age
16787
ETag
"08d3136e25b8d8a1ce53c7ffeaed3f71"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 0-2519760/2519761
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2519761
X-Amz-Cf-Id
ZDHy64PZibJ5bDiarq4jaXb-lzGcy_r21b5RWRMo--WdxxWdzVM7xw==
4288fbc9-3807-4e18-bdae-6c85ca6f43dcthumbs.mp4
dp8hsntg6do36.cloudfront.net/5ca20d91bcdfff463e4e1d46/ Frame 45E1
48 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5ca20d91bcdfff463e4e1d46/4288fbc9-3807-4e18-bdae-6c85ca6f43dcthumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.62 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-62.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Range
bytes=0-
chrome-proxy
frfr

Response headers

Date
Wed, 10 Apr 2019 13:30:56 GMT
Via
1.1 cdb2dba3874dd4d7b53213b8c63a0997.cloudfront.net (CloudFront)
Last-Modified
Mon, 01 Apr 2019 13:16:14 GMT
Server
AmazonS3
Age
16787
ETag
"08d3136e25b8d8a1ce53c7ffeaed3f71"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 0-2519760/2519761
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2519761
X-Amz-Cf-Id
C8-N9MtQcAoHl5-jJwWJCVQGxD4EonmVnJd2qoxhF00HD7_fMKLJRQ==
track
capture.condenastdigital.com/ Frame 45E1
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-04-10T18%3A10%3A41.855Z&_c=Player%20Event&_t=Player%20Loaded&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=http%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Fwar-stories-mechwarrior-5-mercenaries&cId=5ca20d91bcdfff463e4e1d46&cKe=&cPd=2019-04-03T15%3A21%3A00%2B00%3A00&cTi=MechWarrior%205%3A%20Mercenaries%20%7C%20War%20Stories&mDu=651&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pID=15933b82-81ce-4ea5-ae23-0b18d3972ddd&pWw=540&pWh=303.75&sID=331ad88f-cd5d-4ec5-ae23-ceb69115d7b4&uId=7ee5653b-2bea-4e57-b6ee-e12ec9df0247&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22guid%22%3A%22abc5d75a-7d5c-df5f-c950-81ddf0a1f05a%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A3493.09375%2C%22playerType%22%3A%22video-continuous%22%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22tabStatus%22%3A%22active%22%2C%22versoPageType%22%3A%22article%7Creport%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3Anull%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%7D&adId=&pageType=article%7Creport
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:41 GMT
Connection
keep-alive
transfer-encoding
chunked
Content-Type
image/gif
9f52896d-d82b-4fe6-9caa-b2097920dce2
https://arstechnica.com/ Frame 45E1
5 KB
0
Other
General
Full URL
blob:https://arstechnica.com/9f52896d-d82b-4fe6-9caa-b2097920dce2
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-7db437cede3397d9ff68.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d5f3418a3fa657175d5341b5e032be036cb4d5818de5d1497f2175be5a7e3701

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Length
5463
Content-Type
application/javascript
4288fbc9-3807-4e18-bdae-6c85ca6f43dcmanifest-ios.m3u8
dp8hsntg6do36.cloudfront.net/5ca20d91bcdfff463e4e1d46/ Frame 45E1
918 B
1 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5ca20d91bcdfff463e4e1d46/4288fbc9-3807-4e18-bdae-6c85ca6f43dcmanifest-ios.m3u8?videoIndex=0&requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-7db437cede3397d9ff68.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.76 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-76.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
ecab67c5b3845acd14a62d1429aea9cb4acd1a72f3dbb619a3f2cbb60920e04d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com

Response headers

Date
Wed, 10 Apr 2019 11:43:47 GMT
Via
1.1 e64eb476d8f76c461d21278e018e194f.cloudfront.net (CloudFront)
Vary
Origin
Age
23216
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
918
Last-Modified
Mon, 01 Apr 2019 13:14:28 GMT
Server
AmazonS3
ETag
"f13f8ec37d87e775c3d6a1396b451ee0"
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Access-Control-Allow-Origin
*
Accept-Ranges
bytes
X-Amz-Cf-Id
0a7mi4gA3qZz0QTqXfuo7cHIxLPXKSFm1XxFz8owwbt3Iqd2Aj9G5A==
truncated
/ Frame A522
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
58fa168e5bbd9453a59d43970d6bc2f8fc291a3c37a1b357e604a6b50f56f636

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/png
1663130473914833
connect.facebook.net/signals/config/ Frame 45E1
174 KB
42 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/1663130473914833?v=2.8.47&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
353882be32a8dd1327f39cc42e13455b90de35dcd381e3c41244650c928f7add
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
42681
x-xss-protection
0
pragma
public
x-fb-debug
uMlgnitASOvmwfQHEQ4cwX8DoSVly+sENT0KDb7Hr7KxUSnEnxhGVvylS3vKdmL9V24aBvl22rtoHjQ/cz1hLQ==
date
Wed, 10 Apr 2019 18:10:41 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
ADTECH;apid=1Af3d61cb2-5bbb-11e9-9350-12bf237d14d4;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._7OvPyQ5v
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;apid=1Af3d61cb2-5bbb-11e9-9350-12bf237d14d4;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;apid=1Af3d61cb2-5bbb-11e9-9350-12bf237d14d4;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._7OvPyQ5v
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:41 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;apid=1Af3d61cb2-5bbb-11e9-9350-12bf237d14d4;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._7OvPyQ5v
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:41 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;apid=1Af3d61cb2-5bbb-11e9-9350-12bf237d14d4;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._7OvPyQ5v
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Af3d5f980-5bbb-11e9-9b67-12e614795296;cfp=1;rndc=1554919840;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._iSfgL8ui
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1554919840;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;apid=1Af3d5f980-5bbb-11e9-9b67-12e614795296;cfp=1;rndc=1554919840;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;apid=1Af3d5f980-5bbb-11e9-9b67-12e614795296;cfp=1;rndc=1554919840;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._iSfgL8ui
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:41 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;apid=1Af3d5f980-5bbb-11e9-9b67-12e614795296;cfp=1;rndc=1554919840;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._iSfgL8ui
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:41 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;apid=1Af3d5f980-5bbb-11e9-9b67-12e614795296;cfp=1;rndc=1554919840;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._iSfgL8ui
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Af3d63bc0-5bbb-11e9-821f-12244f280cb6;cfp=1;rndc=1554919840;cmd=bid;cors=yes;v=2;misc=1554919841400;callback=window.headertag.AolHtb.adResponseCallbacks._ie9Xaq83
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841400;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;apid=1Af3d63bc0-5bbb-11e9-821f-12244f280cb6;cfp=1;rndc=1554919840;cmd=bid;cors=yes;v=2;misc=1554919841400;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;apid=1Af3d63bc0-5bbb-11e9-821f-12244f280cb6;cfp=1;rndc=1554919840;cmd=bid;cors=yes;v=2;misc=1554919841400;callback=window.headertag.AolHtb.adResponseCallbacks._ie9Xaq83
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:41 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;apid=1Af3d63bc0-5bbb-11e9-821f-12244f280cb6;cfp=1;rndc=1554919840;cmd=bid;cors=yes;v=2;misc=1554919841400;callback=window.headertag.AolHtb.adResponseCallbacks._ie9Xaq83
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:41 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;apid=1Af3d63bc0-5bbb-11e9-821f-12244f280cb6;cfp=1;rndc=1554919840;cmd=bid;cors=yes;v=2;misc=1554919841400;callback=window.headertag.AolHtb.adResponseCallbacks._ie9Xaq83
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Af3d63e72-5bbb-11e9-ae82-12d220623a1c;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841401;callback=window.headertag.AolHtb.adResponseCallbacks._FDumt9XV
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841401;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;apid=1Af3d63e72-5bbb-11e9-ae82-12d220623a1c;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841401;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;apid=1Af3d63e72-5bbb-11e9-ae82-12d220623a1c;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841401;callback=window.headertag.AolHtb.adResponseCallbacks._FDumt9XV
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:41 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;apid=1Af3d63e72-5bbb-11e9-ae82-12d220623a1c;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841401;callback=window.headertag.AolHtb.adResponseCallbacks._FDumt9XV
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:41 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;apid=1Af3d63e72-5bbb-11e9-ae82-12d220623a1c;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841401;callback=window.headertag.AolHtb.adResponseCallbacks._FDumt9XV
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
wt
polarcdn-pentos.com/ Frame A522
3 B
66 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=3&n=3&p=UNKNOWN&s=1&u=7a504ee3-bc76-4f29-bf8f-305e2edf9fd5&v=2%2Fc19c73b&w=1.131.0&y=w&z=v1.6.31&pas=asa-web-polarpmp&pag1=conde_customcontent_market&pag2=brand_arstechnica&paenb=y&paena=a.42117c26-187c-48a9-8593-581405ba4676.be3400&paensm=n&pai=7f742&d=arstechnica.com&l=&pajs=&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&cu=fd849c02faf58c6f65a7abf56a7a4584&t=arx&parcid=2604d&parid=32785&parin=2&partm=1&par=s&maxts=0.614&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&_=1554919841292
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.192.78 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:41 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
x-amz-request-id
DB783A05C3FEE54D
status
200
content-length
3
x-amz-id-2
HR6fi+cOwrsUo+aPPrhwEkXGglWgyYRjfSoOWmHXK7CYt3cuTeIZsmO8mrEyano/N3YhGjUNDr0=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
cf-ray
4c56add43e309d02-AMS
192331735d6742bb8293ae8f68171f68
polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/creative/ Frame A522
16 KB
5 KB
XHR
General
Full URL
https://polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/creative/192331735d6742bb8293ae8f68171f68?order=cbe30fbce6d94ed685a75c934f4416e4
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4032 , United States, ASN (),
Reverse DNS
Software
cloudflare /
Resource Hash
3bd0b26ea5fd1260259d23a2037a5847f25fb7b2cd0f76590284c20dfdd16297

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 10 Apr 2019 18:10:41 GMT
content-encoding
gzip
server
cloudflare
status
200
etag
W/"b3a5d1e21843674034e44065c3e84535"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-Country, CF-Ray
cache-control
max-age=900
x-country
DE
cf-ray
4c56add44ae4c2ab-FRA
wt
polarcdn-pentos.com/ Frame A522
3 B
190 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=4&n=3&p=NA-ARSTECH-11238837&s=1&u=7a504ee3-bc76-4f29-bf8f-305e2edf9fd5&v=2%2Fc19c73b&w=1.131.0&y=w&z=v1.6.31&pas=asa-web-polarpmp&pag1=conde_customcontent_market&pag2=brand_arstechnica&paenb=y&paena=a.42117c26-187c-48a9-8593-581405ba4676.be3400&paenli=3eaf49f2b3064394ac4418be206c0540&paenlip=2c5975f4da59438fa69fc321df0222b6&paeno=cbe30fbce6d94ed685a75c934f4416e4&paenop=75059c2f630e478f8ff38526e7318713&paes=fd9a1a7c3cf24f9fb674bbc3a4ebe163&paensm=n&pai=7f742&d=arstechnica.com&l=Key-native_xrail+%5BXrail%5D&pajs=body&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&pecy=DE&c=b2829e80ae5c43bbba330e21b45ab0eb&pacexp=24ec42973e614b2abfa6c84dc216fc06&t=i&pasp=6fe1dded4b5f4d1a8a01dfa8492cbdab&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&_=1554919841293
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.192.78 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:42 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
x-amz-request-id
DB783A05C3FEE54D
status
200
content-length
3
x-amz-id-2
HR6fi+cOwrsUo+aPPrhwEkXGglWgyYRjfSoOWmHXK7CYt3cuTeIZsmO8mrEyano/N3YhGjUNDr0=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
cf-ray
4c56add49ed29d02-AMS
5c9bbf59fc70759534a71aba
polarcdn-terrax.com/image/v1.0.0/bin/
98 KB
98 KB
Image
General
Full URL
https://polarcdn-terrax.com/image/v1.0.0/bin/5c9bbf59fc70759534a71aba?v=55db1&w=300
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
c137b856df4f31b97d0944c83e1510c47571274546d75a7aafbfcbbe241d8ce7

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Apr 2019 18:10:42 GMT
via
1.1 varnish
cf-cache-status
HIT
cf-ray
4c56add4da0ec305-FRA
status
200
access-control-max-age
432000
content-length
100273
x-varnish
1161159144 1161147884
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=432000
accept-ranges
bytes
timing-allow-origin
*
ADTECH;apid=1Af3d5f980-5bbb-11e9-9b67-12e614795296;cfp=1;rndc=1554919840;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._iSfgL8ui
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/
495 B
610 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;apid=1Af3d5f980-5bbb-11e9-9b67-12e614795296;cfp=1;rndc=1554919840;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._iSfgL8ui
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
d364dc3db3e8efe876f76db02e43c7ee1550e15078d5663140e019e490ee8ea6

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:42 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
495
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Af3d61cb2-5bbb-11e9-9350-12bf237d14d4;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._7OvPyQ5v
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/
495 B
610 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;apid=1Af3d61cb2-5bbb-11e9-9350-12bf237d14d4;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841412;callback=window.headertag.AolHtb.adResponseCallbacks._7OvPyQ5v
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
45017e1d2ef588b6d30da8227f837d92b2ebb969e09f18aa8c54e5617aa03ac3

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:42 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
495
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Af3d63bc0-5bbb-11e9-821f-12244f280cb6;cfp=1;rndc=1554919840;cmd=bid;cors=yes;v=2;misc=1554919841400;callback=window.headertag.AolHtb.adResponseCallbacks._ie9Xaq83
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/
495 B
657 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;apid=1Af3d63bc0-5bbb-11e9-821f-12244f280cb6;cfp=1;rndc=1554919840;cmd=bid;cors=yes;v=2;misc=1554919841400;callback=window.headertag.AolHtb.adResponseCallbacks._ie9Xaq83
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
b3eb36e25ce53aba9a8ba8191d8a918ea34e5fd4a61d6f19874fa48d869ec07a

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:42 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
495
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Af3d63e72-5bbb-11e9-ae82-12d220623a1c;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841401;callback=window.headertag.AolHtb.adResponseCallbacks._FDumt9XV
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/
494 B
609 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;apid=1Af3d63e72-5bbb-11e9-ae82-12d220623a1c;cfp=1;rndc=1554919841;cmd=bid;cors=yes;v=2;misc=1554919841401;callback=window.headertag.AolHtb.adResponseCallbacks._FDumt9XV
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
e361c9e3c0c3fb8031012ebe828aadbb78c04c69dfa2d872c91e06003426e951

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:42 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
494
expires
Mon, 15 Jun 1998 00:00:00 GMT
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=175689&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Wed, 10 Apr 2019 18:10:45 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Wed, 10 Apr 2019 18:10:45 GMT
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=175689&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Wed, 10 Apr 2019 18:10:45 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Wed, 10 Apr 2019 18:10:45 GMT
4288fbc9-3807-4e18-bdae-6c85ca6f43dcfile-1422k-128-48000-768.m3u8
dp8hsntg6do36.cloudfront.net/5ca20d91bcdfff463e4e1d46/ Frame 45E1
9 KB
1 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5ca20d91bcdfff463e4e1d46/4288fbc9-3807-4e18-bdae-6c85ca6f43dcfile-1422k-128-48000-768.m3u8?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-7db437cede3397d9ff68.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.76 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-76.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
0ade8b47caf58d2391cd66bb22761d226b54d39e3ca2e7ba2452197fd2c25e57

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com

Response headers

Date
Wed, 10 Apr 2019 11:43:47 GMT
Content-Encoding
gzip
Last-Modified
Mon, 01 Apr 2019 13:18:06 GMT
Server
AmazonS3
Age
23216
Vary
Origin
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Access-Control-Allow-Origin
*
Access-Control-Max-Age
3000
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
X-Amz-Cf-Id
qzOk0XSUlJOlcSM4HFSzXi51jNzx6B8ah3sBqI9cHnvN05Wz4m_LFA==
Via
1.1 e64eb476d8f76c461d21278e018e194f.cloudfront.net (CloudFront)
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-04-10T18%3A10%3A42.522Z&_t=timespent&cBr=Ars%20Technica&cKe=critical%20infrastructure%7Cindustrial%20control%20systems%7Cmalware%7Ctriton&cCh=information%20technology&cTi=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684&cEnt=triton%2C%20malware%2C%20page%20layout%2C%20fireeye%2C%20dan%20goodin%2C%20russia%2C%20software%20framework%2C%20utc%2C%20operational%20technology%2C%20key%20logger%2C%20screenshot%2C%20exfiltrate%2C%20network%20reconnaissance%2C%20espionage%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20john%20hultquist%2C%20ars%20technica%20addendum%2C%20triconex%2C%20cnmn%20collection&cEnw=1%2C%200.9500050115895406%2C%200.7376657835742741%2C%200.727269122707033%2C%200.45809754901453276%2C%200.45309959010541806%2C%200.4279426928153714%2C%200.4247111958295731%2C%200.4162777364177546%2C%200.3976789615199139%2C%200.39705703877513393%2C%200.3953874679084234%2C%200.39200569316001066%2C%200.381796042701748%2C%200.3721243910381942%2C%200.33329355471876454%2C%200.3103213771374127%2C%200.281461116515084%2C%200.27888604929433647%2C%200.272428808898199&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&cCl=818&cId=1488751&cPd=2019-04-10T04%3A01%3A40.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4900&pSw=1600&pSh=1200&uID=7ee5653b-2bea-4e57-b6ee-e12ec9df0247&sID=331ad88f-cd5d-4ec5-ae23-ceb69115d7b4&pID=15933b82-81ce-4ea5-ae23-0b18d3972ddd&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=general&xID=925f08bd-5329-4aea-a2c0-c2c82a4afb3c&_v=5000&cKh=triton%2Cmalware%2Cresearcher%2Cpage%20layout%2Cfireeye%2Cintrusion%2Cattacker%2Csystem
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:42 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
0988c5cc-b832-4891-9529-82cc31d1a60c
https://arstechnica.com/ Frame 45E1
64 KB
0
Other
General
Full URL
blob:https://arstechnica.com/0988c5cc-b832-4891-9529-82cc31d1a60c
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-7db437cede3397d9ff68.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
3445bd22374e7449265ec9c8ae91ba255148fb1583701f636792dc933befa73b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Length
65790
Content-Type
application/javascript
4288fbc9-3807-4e18-bdae-6c85ca6f43dcfile-1422k-128-48000-768-00001.ts
dp8hsntg6do36.cloudfront.net/5ca20d91bcdfff463e4e1d46/ Frame 45E1
161 KB
132 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5ca20d91bcdfff463e4e1d46/4288fbc9-3807-4e18-bdae-6c85ca6f43dcfile-1422k-128-48000-768-00001.ts?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-7db437cede3397d9ff68.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.76 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-76.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
c94511229b2438ac64e7b9070f1f06e189c9aaa99448516bd8e95c9124043433

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com

Response headers

Date
Wed, 10 Apr 2019 11:43:48 GMT
Content-Encoding
gzip
Last-Modified
Mon, 01 Apr 2019 13:17:57 GMT
Server
AmazonS3
Age
23215
Vary
Origin
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Access-Control-Allow-Origin
*
Access-Control-Max-Age
3000
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
X-Amz-Cf-Id
9r76sCiw_TGOQYoMq6cpeSwmeuOScXe6Ib0MUGHrGlpjNI6eXVvkuw==
Via
1.1 e64eb476d8f76c461d21278e018e194f.cloudfront.net (CloudFront)
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-04-10T18%3A10%3A42.907Z&_t=slot_impression_viewable&cBr=Ars%20Technica&cKe=critical%20infrastructure%7Cindustrial%20control%20systems%7Cmalware%7Ctriton&cCh=information%20technology&cTi=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684&cEnt=triton%2C%20malware%2C%20page%20layout%2C%20fireeye%2C%20dan%20goodin%2C%20russia%2C%20software%20framework%2C%20utc%2C%20operational%20technology%2C%20key%20logger%2C%20screenshot%2C%20exfiltrate%2C%20network%20reconnaissance%2C%20espionage%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20john%20hultquist%2C%20ars%20technica%20addendum%2C%20triconex%2C%20cnmn%20collection&cEnw=1%2C%200.9500050115895406%2C%200.7376657835742741%2C%200.727269122707033%2C%200.45809754901453276%2C%200.45309959010541806%2C%200.4279426928153714%2C%200.4247111958295731%2C%200.4162777364177546%2C%200.3976789615199139%2C%200.39705703877513393%2C%200.3953874679084234%2C%200.39200569316001066%2C%200.381796042701748%2C%200.3721243910381942%2C%200.33329355471876454%2C%200.3103213771374127%2C%200.281461116515084%2C%200.27888604929433647%2C%200.272428808898199&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&cCl=818&cId=1488751&cPd=2019-04-10T04%3A01%3A40.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4900&pSw=1600&pSh=1200&uID=7ee5653b-2bea-4e57-b6ee-e12ec9df0247&sID=331ad88f-cd5d-4ec5-ae23-ceb69115d7b4&pID=15933b82-81ce-4ea5-ae23-0b18d3972ddd&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=925f08bd-5329-4aea-a2c0-c2c82a4afb3c&content_uri=information_technology&image_avg_surface=28638.821428571428&image_count=28&image_surface=801887&server=production&vp_height=1200&vp_width=1585&created=3161.5850031375885&staged=3207.7800035476685&pageload_to_staged=3207.7800035476685&channel=information_technology&ctx_template=article&id=1554919837312oojgrb559xoxf8mfxulc77e0qyijpe&instance=0&name=post_nav_0&position_fold=atf&position_xy=125x793&request_number=1&tags=critical_infrastructure_industrial_control_systems_malware_triton&template=article&type=post_nav&CNS_init=925.3799989819527&suffix=dart&CNS_init_to_staged=2282.400004565716&inViewport=3304.119996726513&pageLoad_to_in_viewport=2378.7399977445602&isRefresh=true&is_first_Request=true&requested=4313.294999301434&pageLoad_to_requested=4313.294999301434&CNS_init_to_requested=3387.915000319481&rendered=6640.984997153282&advertiser_id=4552798968&creative_id=138247271585&creative_type=sized&line_item_id=4830169578&order_id=2409944368&rendered_size=1x1&request_to_rendered=2327.6899978518486&pageLoad_to_rendered=6640.984997153282&CNS_init_to_rendered=5715.6049981713295&is_first_impression_viewable=true&impression_Viewable=8756.099998950958&in_viewport_to_visible_change=5451.980002224445&pageLoad_to_gpt_viewable=8756.099998950958&CNS_init_to_impression_Viewable=7830.719999969006&request_to_impression_Viewable=4442.804999649525&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=triton%2Cmalware%2Cresearcher%2Cpage%20layout%2Cfireeye%2Cintrusion%2Cattacker%2Csystem
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:42 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-04-10T18%3A10%3A42.910Z&_t=slot_impression_viewable&cBr=Ars%20Technica&cKe=critical%20infrastructure%7Cindustrial%20control%20systems%7Cmalware%7Ctriton&cCh=information%20technology&cTi=Mysterious%20safety-tampering%20malware%20infects%20a%20second%20critical%20infrastructure%20site&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.5031767764227224%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684%2C%200.1848402207522684&cEnt=triton%2C%20malware%2C%20page%20layout%2C%20fireeye%2C%20dan%20goodin%2C%20russia%2C%20software%20framework%2C%20utc%2C%20operational%20technology%2C%20key%20logger%2C%20screenshot%2C%20exfiltrate%2C%20network%20reconnaissance%2C%20espionage%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20john%20hultquist%2C%20ars%20technica%20addendum%2C%20triconex%2C%20cnmn%20collection&cEnw=1%2C%200.9500050115895406%2C%200.7376657835742741%2C%200.727269122707033%2C%200.45809754901453276%2C%200.45309959010541806%2C%200.4279426928153714%2C%200.4247111958295731%2C%200.4162777364177546%2C%200.3976789615199139%2C%200.39705703877513393%2C%200.3953874679084234%2C%200.39200569316001066%2C%200.381796042701748%2C%200.3721243910381942%2C%200.33329355471876454%2C%200.3103213771374127%2C%200.281461116515084%2C%200.27888604929433647%2C%200.272428808898199&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&cCl=818&cId=1488751&cPd=2019-04-10T04%3A01%3A40.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4900&pSw=1600&pSh=1200&uID=7ee5653b-2bea-4e57-b6ee-e12ec9df0247&sID=331ad88f-cd5d-4ec5-ae23-ceb69115d7b4&pID=15933b82-81ce-4ea5-ae23-0b18d3972ddd&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=925f08bd-5329-4aea-a2c0-c2c82a4afb3c&content_uri=information_technology&image_avg_surface=28638.821428571428&image_count=28&image_surface=801887&server=production&vp_height=1200&vp_width=1585&created=3167.805001139641&staged=3313.289999961853&pageload_to_staged=3313.289999961853&channel=information_technology&ctx_template=article&id=1554919837318qrjwxaenhd2fwtmp9pra5ftzktbc6u&instance=0&name=siderail_0&position_fold=atf&position_xy=20x0&request_number=1&tags=critical_infrastructure_industrial_control_systems_malware_triton&template=article&type=siderail&CNS_init=925.3799989819527&suffix=dart&CNS_init_to_staged=2387.9100009799004&inViewport=3340.5250012874603&pageLoad_to_in_viewport=2415.1450023055077&isRefresh=true&requested=4341.009996831417&pageLoad_to_requested=4341.009996831417&CNS_init_to_requested=3415.6299978494644&rendered=6687.07499653101&advertiser_id=4660981638&creative_id=programmatic&creative_type=sized&line_item_id=programmatic&order_id=2443012271&rendered_size=300x600&request_to_rendered=2346.0649996995926&pageLoad_to_rendered=6687.07499653101&CNS_init_to_rendered=5761.694997549057&impression_Viewable=8760.02500206232&in_viewport_to_visible_change=5419.50000077486&pageLoad_to_gpt_viewable=8760.02500206232&CNS_init_to_impression_Viewable=7834.645003080368&request_to_impression_Viewable=4419.015005230904&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=triton%2Cmalware%2Cresearcher%2Cpage%20layout%2Cfireeye%2Cintrusion%2Cattacker%2Csystem
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:42 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
activeview
pagead2.googlesyndication.com/pcs/ Frame D1EC
42 B
112 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjssdsE6IrS2f3nBB-plzL-QoJJGDNRSCe2XRVjwfltAyfMWKZkQhlR3RWY9lw2vgmjIPROuHh5yCgyRq2whpCrJfD41RASmahOk5ppEVDw4&sig=Cg0ArKJSzGfeV4Dm7bPzEAE&adk=3845785953&tt=-1&bs=1585%2C1200&mtos=1082,1082,1082,1082,1082&tos=1082,0,0,0,0&p=125,793,126,794&mcvt=1082&rs=3&ht=0&tfs=740&tls=1822&mc=1&lte=1&bas=0&bac=0&avms=geo&rst=1554919840811&rpt=442&isd=0&msd=0&lm=2&oseid=3&xdi=0&ps=1585%2C4945&ss=1600%2C1200&pt=-1&deb=1-3-3-20-14-41-49-12&tvt=1795&r=v&id=osdim&vs=4&uc=14&upc=1&tgt=DIV&cl=1&cec=5&clc=0&cac=0&cd=1x5&v=20190408
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:809::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:42 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
4288fbc9-3807-4e18-bdae-6c85ca6f43dcthumbs.mp4
dp8hsntg6do36.cloudfront.net/5ca20d91bcdfff463e4e1d46/ Frame 45E1
64 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5ca20d91bcdfff463e4e1d46/4288fbc9-3807-4e18-bdae-6c85ca6f43dcthumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.62 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-62.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Range
bytes=65536-

Response headers

Date
Wed, 10 Apr 2019 13:30:56 GMT
Via
1.1 1d87c34bb2f20fda8e0841bc33179769.cloudfront.net (CloudFront)
Last-Modified
Mon, 01 Apr 2019 13:16:14 GMT
Server
AmazonS3
Age
16789
ETag
"08d3136e25b8d8a1ce53c7ffeaed3f71"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 65536-2519760/2519761
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2454225
X-Amz-Cf-Id
i4tj-F17_iXLDZg4Z_bjlCTWw2J1e8CmvDp9ARipt8xmpMCnuwb1Gg==
ads
pubads.g.doubleclick.net/gampad/ Frame 45E1
4 KB
2 KB
XHR
General
Full URL
https://pubads.g.doubleclick.net/gampad/ads?sz=640x480|480x70&iu=/3379/conde.ars/player/biz-andamp-it&ciu_szs=300x60&gdfp_req=1&env=vp&output=vmap&unviewed_position_start=1&cust_params=env_device_type%3Ddesktop%26env_server%3Dproduction%26rdt_device_template%3Ddesktop_article%26cnt_tags%3Dcritical-infrastructure%252Cindustrial-control-systems%252Cmalware%252Ctriton%26usr_bkt_pv%3D94%26ctx_cns_version%3D2_26_0%26vnd_4d_ctx_topics%3DALLBRANDS_70%252CALLBRANDS_7%252CALLBRANDS_63%252CALLBRANDS_38%252CALLBRANDS_31%252CALLBRANDS_283%252CALLBRANDS_274%252CALLBRANDS_258%252CALLBRANDS_167%252CALLBRANDS_134%252CALLBRANDS_64%252CALLBRANDS_57%252CALLBRANDS_28%252CALLBRANDS_244%252CALLBRANDS_21%252CALLBRANDS_192%26vnd_4d_ctx_topic_sc%3D0.5031767764227224%252C0.5031767764227224%252C0.5031767764227224%252C0.5031767764227224%252C0.5031767764227224%252C0.5031767764227224%252C0.5031767764227224%252C0.5031767764227224%252C0.5031767764227224%252C0.5031767764227224%252C0.1848402207522684%252C0.1848402207522684%252C0.1848402207522684%252C0.1848402207522684%252C0.1848402207522684%252C0.1848402207522684%26vnd_4d_ctx_entities%3Dtriton%252Cmalware%252Cpage%2520layout%252Cfireeye%252Cdan%2520goodin%252Crussia%252Csoftware%2520framework%252Cutc%252Coperational%2520technology%252Ckey%2520logger%252Cscreenshot%252Cexfiltrate%252Cnetwork%2520reconnaissance%252Cespionage%252Ccond%25C3%25A9%2520nast%252Cars%2520orbital%2520transmission%252Cjohn%2520hultquist%252Cars%2520technica%2520addendum%252Ctriconex%252Ccnmn%2520collection%26vnd_4d_ctx_ent_sc%3D1%252C0.9500050115895406%252C0.7376657835742741%252C0.727269122707033%252C0.45809754901453276%252C0.45309959010541806%252C0.4279426928153714%252C0.4247111958295731%252C0.4162777364177546%252C0.3976789615199139%252C0.39705703877513393%252C0.3953874679084234%252C0.39200569316001066%252C0.381796042701748%252C0.3721243910381942%252C0.33329355471876454%252C0.3103213771374127%252C0.281461116515084%252C0.27888604929433647%252C0.272428808898199%26vnd_4d_ctx_keywords%3Dtriton%252Cmalware%252Cresearcher%252Cpage%2520layout%252Cfireeye%252Cintrusion%252Cattacker%252Csystem%252Ctool%252Cinstitute%252Ccritical%2520infrastructure%2520site%252Clife-threatening%2520accidents.%252Cdan%2520goodin%252Crussia%252Ccritical-infrastructure%2520site%252Crefinery%252Cdetail%252Csoftware%2520framework%252Coperational%2520security%2520measure%252Cutc%26vnd_4d_ctx_kw_sc%3D1%252C0.9500050115895406%252C0.7550226879407017%252C0.7376657835742741%252C0.727269122707033%252C0.6526249262950813%252C0.6511927881546443%252C0.6166450460182566%252C0.5703507853508917%252C0.4886605561391212%252C0.48109651752343857%252C0.4716304409425352%252C0.45809754901453276%252C0.45309959010541806%252C0.43955554794921414%252C0.4373235164923017%252C0.43442680703145203%252C0.4279426928153714%252C0.42600741728463953%252C0.4247111958295731%26vnd_4d_pid%3D4bab7b43-bf77-4561-8958-b9c2e4f4c994%26vnd_ars_data%3D%26ctx_template%3Darticle%26ctx_page_slug%3Dmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%26ctx_page_channel%3Dinformation_technology%26ctx_line_items%3D%26height%3D304%26muted%3D1%26series%3D5c82bd18bcdfff6f1f2fc5e7%26width%3D540&correlator=3606493090303318&description_url=https%3A%2F%2Fthescene.com%2Fwatch%2Farstechnica%2Fwar-stories-mechwarrior-5-mercenaries&vid=5ca20d91bcdfff463e4e1d46&cmsid=1495&ppid=a34403a493434657826dc280b89cb528
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-7db437cede3397d9ff68.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
ddce26f890ca94b95506347e4dec94dde05c56431e6de2044c9045c5d0f84669
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com

Response headers

date
Wed, 10 Apr 2019 18:10:44 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
1633
x-xss-protection
0
google-lineitem-id
0
pragma
no-cache
server
cafe
google-creative-id
0
content-type
text/xml; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
track
capture.condenastdigital.com/ Frame 45E1
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-04-10T18%3A10%3A44.664Z&_c=timedOut&_t=gptData&sID=331ad88f-cd5d-4ec5-ae23-ceb69115d7b4&pID=15933b82-81ce-4ea5-ae23-0b18d3972ddd&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&dim1=%7B%22adBlocked%22%3Afalse%2C%22adUnits%22%3A%5B%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F2%22%2C%223379%2Fconde.ars%2Finterstitial%2Finformation-technology%2Farticle%2F1%22%5D%2C%22embedLocation%22%3A%22arstechnica%22%2C%22error%22%3A%22%22%2C%22lineItems%22%3A%5B%5D%2C%22publicaEnabled%22%3Afalse%2C%22videoId%22%3A%225ca20d91bcdfff463e4e1d46%22%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:44 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
collect
www.google-analytics.com/r/
35 B
102 B
Other
General
Full URL
https://www.google-analytics.com/r/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81f::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Wed, 10 Apr 2019 18:10:44 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
https://arstechnica.com
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
moatvideo.js
z.moatads.com/condenastjsvideocontent160527792519/ Frame 45E1
280 KB
87 KB
Script
General
Full URL
https://z.moatads.com/condenastjsvideocontent160527792519/moatvideo.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-7db437cede3397d9ff68.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
49472bb8216321c2b757384e77337586c6a49bfc07b11fa399e55f8287aa7761

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Apr 2019 18:10:44 GMT
Content-Encoding
gzip
Last-Modified
Wed, 03 Apr 2019 17:11:18 GMT
Server
AmazonS3
x-amz-request-id
4CB794D089DC0DB6
ETag
"02cdfa76a27ecf2001209a30735be74c"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=40475
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88194
x-amz-id-2
bnY/pAyfDNWwu7O8hmDsyljomI4MZ51uh3oBRNH1oAbNgjGUAmNLJXFBiKlooBcOnaf4u9s7sfE=
track
capture.condenastdigital.com/ Frame 45E1
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-04-10T18%3A10%3A44.931Z&_c=Video%20Ad&_t=Ad%20Call%20Made&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=http%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Fwar-stories-mechwarrior-5-mercenaries&cId=5ca20d91bcdfff463e4e1d46&cKe=&cPd=2019-04-03T15%3A21%3A00%2B00%3A00&cTi=MechWarrior%205%3A%20Mercenaries%20%7C%20War%20Stories&cTy=%2F3379%2Fconde.ars%2Fplayer%2Fbiz-andamp-it&mDu=651&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&pID=15933b82-81ce-4ea5-ae23-0b18d3972ddd&pWw=540&pWh=303.75&sID=331ad88f-cd5d-4ec5-ae23-ceb69115d7b4&uId=7ee5653b-2bea-4e57-b6ee-e12ec9df0247&xid=a34403a4-9343-4657-826d-c280b89cb528&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22guid%22%3A%22abc5d75a-7d5c-df5f-c950-81ddf0a1f05a%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A3493.09375%2C%22playerType%22%3A%22video-continuous%22%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22tabStatus%22%3A%22active%22%2C%22versoPageType%22%3A%22article%7Creport%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3A%22OUT_OF_VIEWPORT%22%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%7D&videoViews=1&adId=&pageType=article%7Creport
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 10 Apr 2019 18:10:44 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CONDEVIDEOCONTENT1&hp=1&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=8&f=0&j=&o=3&t=1554919845089&de=532661399436&m=0&ar=b47585141f-clean&q=8&cb=0&cu=1554919845089&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=MechWarrior%205_%20Mercenaries%20%7C%20War%20Stories%3A%2F3379%2Fconde.ars%2Fplayer%2Fbiz-andamp-it%3Aundefined%3Aundefined&zMoatVideoId=5ca20d91bcdfff463e4e1d46&zMoatAP=-&qs=1&zMoatDomain=arstechnica.com&zMoatSubdomain=arstechnica.com&gw=condenastjsvideocontent160527792519&fd=1&ac=1&it=500&fs=162282&na=1496287040&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Apr 2019 18:10:45 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Apr 2019 18:10:45 GMT
arstechnica_war-stories-mechwarrior-5-mercenaries.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1554815651/ Frame 45E1
76 KB
77 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1554815651/arstechnica_war-stories-mechwarrior-5-mercenaries.jpg
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-7db437cede3397d9ff68.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.42 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-42.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
dda84bba229c25fe7c744ccdeb5ed6b82c4a3bc91a8db6b61039b597c7087cd2

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com

Response headers

Date
Tue, 09 Apr 2019 13:16:43 GMT
Via
1.1 varnish, 1.1 bab8148a65b29113f79cf2725076287d.cloudfront.net (CloudFront)
Age
104046
Edge-Cache-Tag
449226972451991935294885795153819156355,316951410886732526360935603098811400471,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
77704
X-Request-Id
fbc1b64bba7b1956
X-Served-By
cache-fra19156-FRA
Server
cloudinary
X-Timer
S1554815803.158501,VS0,VE436
ETag
"85605064ad3f281d682f3ee2f5c3b006"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
DARwONkV6EYBS3JpmcKfPuXTKldlyBa4iQfJHVn1pzzVoa3KrPRQ6w==
X-Cache-Hits
0
arstechnica_war-stories-mechwarrior-5-mercenaries.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1554815651/ Frame 45E1
76 KB
77 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1554815651/arstechnica_war-stories-mechwarrior-5-mercenaries.jpg
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1554919200
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.220 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-220.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
dda84bba229c25fe7c744ccdeb5ed6b82c4a3bc91a8db6b61039b597c7087cd2

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 09 Apr 2019 13:16:43 GMT
Via
1.1 varnish, 1.1 ef13dd533b8dc9dcfdc35449cf88f808.cloudfront.net (CloudFront)
Age
104045
Edge-Cache-Tag
449226972451991935294885795153819156355,316951410886732526360935603098811400471,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
77704
X-Request-Id
fbc1b64bba7b1956
X-Served-By
cache-fra19156-FRA
Server
cloudinary
X-Timer
S1554815803.158501,VS0,VE436
ETag
"85605064ad3f281d682f3ee2f5c3b006"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
il1Jdrux8Nz6niiShBAykUbbKUcZeHm0ElhcOhOnIgNQLVT9VhKl5g==
X-Cache-Hits
0
cdb
bidder.criteo.com/
0
213 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?ptv=65&profileId=154&cb=71257503663
Requested by
Host: static.criteo.net
URL: https://static.criteo.net/js/ld/publishertag.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_CBC
Server
178.250.2.152 , France, ASN (),
Reverse DNS
Software
Finatra /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

Access-Control-Allow-Origin
https://arstechnica.com
Date
Wed, 10 Apr 2019 18:10:51 GMT
Access-Control-Allow-Credentials
true
Server
Finatra
Timing-Allow-Origin
*
Vary
Origin
cdb
bidder.criteo.com/
0
213 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?ptv=65&profileId=154&cb=46010061840
Requested by
Host: static.criteo.net
URL: https://static.criteo.net/js/ld/publishertag.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_CBC
Server
178.250.2.152 , France, ASN (),
Reverse DNS
Software
Finatra /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

Access-Control-Allow-Origin
https://arstechnica.com
Date
Wed, 10 Apr 2019 18:10:51 GMT
Access-Control-Allow-Credentials
true
Server
Finatra
Timing-Allow-Origin
*
Vary
Origin

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
infinityid.condenastdigital.com
URL
https://infinityid.condenastdigital.com/?rand=1554919836027
Domain
srv-2019-04-10-18.config.parsely.com
URL
https://srv-2019-04-10-18.config.parsely.com/config/arstechnica.com
Domain
api.rlcdn.com
URL
https://api.rlcdn.com/api/identity?pid=2&rt=envelope
Domain
mid.rkdms.com
URL
https://mid.rkdms.com/ids?ptk=17c1789b-e660-493b-aa74-3c8fb990dc5f&pubid=CONDENAST
Domain
fastlane.rubiconproject.com
URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=2&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&p_screen_res=1600x1200&site_id=196712&zone_id=960274&kw=rp.fastlane&tk_flint=index&rand=0.795651615760042
Domain
fastlane.rubiconproject.com
URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=57&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&p_screen_res=1600x1200&site_id=196712&zone_id=960274&kw=rp.fastlane&tk_flint=index&rand=0.5781789168784974
Domain
fastlane.rubiconproject.com
URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=55&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&p_screen_res=1600x1200&site_id=196712&zone_id=960274&kw=rp.fastlane&tk_flint=index&rand=0.8556406001846208
Domain
fastlane.rubiconproject.com
URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=15&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&p_screen_res=1600x1200&site_id=196712&zone_id=960274&kw=rp.fastlane&tk_flint=index&rand=0.21182522958115957
Domain
fastlane.rubiconproject.com
URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=10&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&p_screen_res=1600x1200&site_id=196712&zone_id=960274&kw=rp.fastlane&tk_flint=index&rand=0.864095939132929
Domain
fastlane.rubiconproject.com
URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=54&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F04%2Fmysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site%2F&p_screen_res=1600x1200&site_id=196712&zone_id=960274&kw=rp.fastlane&tk_flint=index&rand=0.10605992904035766

Verdicts & Comments Add Verdict or Comment

180 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask object| ars object| digitalData object| cns object| dataLayer object| BOOMR_mq object| google_tag_manager function| e object| visitor function| Visitor object| s_c_il number| s_c_in function| DIL object| dilInstance string| referrer object| urlParams string| queryString string| fullUrl object| myParam string| GoogleAnalyticsObject function| ga object| _qevents object| __adIq_Config string| b object| h object| _aam_dataLayer undefined| userId boolean| _aam_spa function| fbq function| _fbq function| getVisitNumCustom number| d string| _linkedin_partner_id object| _linkedin_data_partner_ids object| AIM object| Twig object| Arrive function| FPCountdown function| $ function| jQuery function| moment function| UAParser function| purl function| twig function| EvEmitter function| imagesLoaded function| easydropdown function| m function| transitionEnd string| $queryString function| arsVideoModulePlayerReady68318697 function| __cmp object| google_tag_data object| gaplugins object| SparrowCache function| Sparrow boolean| sparrowInitialize object| _4d object| _sparrow function| quantserve function| __qc object| ezt object| _qoptions object| OBR string| OB_releaseVer function| OBR$ object| outbrain object| outbrain_rater object| __core-js_shared__ object| Sailthru object| _satellite object| gaGlobal object| PARSELY object| gaData object| __SKIM_JS_GLOBAL__ function| skimlinksBeaconCallback function| skimlinksBeaconSecondaryCallback function| skimlinksBeaconAuxCallback object| googletag function| moatCondeListener object| apstag object| headertag object| CN function| arsData object| _cne object| PolarConde function| _bizo_local_logger function| _bizo_fire_partners boolean| _bizo_main_already_called object| bouncex string| hash function| s_doPlugins function| s_getLoadTime function| AppMeasurement function| s_gi function| s_pgicq object| s string| s_loadT number| s_objectID number| s_giq object| evidon string| previousTime number| currentTime object| s_i_conde-arstechnica number| vb object| NATIVEADS object| NATIVEADS_QUEUE object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken object| core object| global object| System function| asap function| Observable function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill function| docReady function| mb object| closure_lm_988502 object| google function| reload_campaigns function| setBounceCookie function| getBounceCookie function| setBounceVisitCookie function| getBounceVisitCookie function| clearBounceCookie object| GPT_jstiming undefined| google_measure_js_timing object| closure_memoize_cache_ boolean| google_noFetch boolean| google_DisableInitialLoad number| __google_ad_urls_id object| NATIVEADS_STORE number| google_unique_id object| google_reactive_ads_global_state function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter function| googleCompanionsServicePresent function| googleGetCompanionAdSlots function| googleSetCompanionAdContents function| google_show_companion_ad function| google_show_companion_ad_in_slot function| google_get_companion_slot_params function| google_companion_error function| google_companion_loaded function| google_increment_num_ad_mouseovers string| google_ad_output string| google_ad_client string| google_flash_version boolean| google_webgl_support string| google_ad_section string| google_country object| __google_ad_urls object| ampInaboxIframes object| ampInaboxPendingMessages boolean| google_osd_loaded boolean| google_onload_fired function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| Criteo function| headertag_render object| rubicontag object| closure_lm_766070 string| key object| Moat#G26 boolean| Moat#EVA object| MoatSuperV26 object| criteo_pubtag number| google_global_correlator function| arrive function| unbindArrive function| leave function| unbindLeave

0 Cookies

5 Console Messages

Source Level URL
Text
console-api warning URL: https://player.cnevids.com/interlude/arstechnica.js(Line 2)
Message:
CNE Player: no interlude for "information-technology/2019/04/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site" ("Availability: no slot")
console-api log URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js(Line 1)
Message:
Evidon -- evidon-notice-link not found on page, cant display the consent link.
console-api warning URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-7db437cede3397d9ff68.js(Line 12)
Message:
TypeError: Cannot read property 'getItem' of null
console-api warning URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-7db437cede3397d9ff68.js(Line 12)
Message:
PLAYER found lineItems:
console-api warning URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-7db437cede3397d9ff68.js(Line 12)
Message:
PLAYER found lineItems:

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

4d.condenastdigital.com
a.ad.gt
aax.amazon-adsystem.com
adserver-us.adtech.advertising.com
adservice.google.com
adservice.google.de
ak.sail-horizon.com
ampcid.google.com
ampcid.google.de
api.cnevids.com
api.rlcdn.com
api.skimlinks.mgr.consensu.org
arstechnica.com
as-sec.casalemedia.com
assets.adobedtm.com
assets.bounceexchange.com
bidder.criteo.com
bw-prod.plrsrvcs.com
c.amazon-adsystem.com
c.evidon.com
capture.condenastdigital.com
cdn.accelerator.arsdev.net
cdn.arstechnica.net
cdn.mediavoice.com
cm.everesttech.net
cm.g.doubleclick.net
condenast.demdex.net
connect.facebook.net
d.turn.com
d1z2jf7jlzjs58.cloudfront.net
d2c8v52ll5s99u.cloudfront.net
dp8hsntg6do36.cloudfront.net
dpm.demdex.net
dwgyu36up6iuz.cloudfront.net
evidon.mgr.consensu.org
fastlane.rubiconproject.com
iabmap.evidon.com
ids.ad.gt
image2.pubmatic.com
images.outbrainimg.com
imasdk.googleapis.com
infinityid.condenastdigital.com
js-sec.indexww.com
l.betrad.com
log.outbrainimg.com
match.adsrvr.org
mid.rkdms.com
odb.outbrain.com
p.ad.gt
p.skimresources.com
pagead2.googlesyndication.com
pixel.condenastdigital.com
player.cnevids.com
plugin.mediavoice.com
polarcdn-pentos.com
polarcdn-terrax.com
pubads.g.doubleclick.net
px.ads.linkedin.com
px.moatads.com
r.skimresources.com
rules.quantcount.com
s.skimresources.com
s0.2mdn.net
sb.scorecardresearch.com
secure.adnxs.com
secure.quantserve.com
securepubads.g.doubleclick.net
segment-data.zqtk.net
snap.licdn.com
srv-2019-04-10-18.config.parsely.com
sstats.arstechnica.com
static.criteo.net
static.polarcdn.com
stats.g.doubleclick.net
sync.go.sonobi.com
t.skimresources.com
tag.bounceexchange.com
tcheck.outbrainimg.com
tpc.googlesyndication.com
vendorlist.consensu.org
widgets.outbrain.com
www.facebook.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
www.medtargetsystem.com
z.moatads.com
api.rlcdn.com
fastlane.rubiconproject.com
infinityid.condenastdigital.com
mid.rkdms.com
srv-2019-04-10-18.config.parsely.com
104.103.102.169
104.17.192.78
104.73.138.159
143.204.101.102
143.204.101.26
143.204.101.51
143.204.101.62
143.204.101.76
143.204.90.253
143.204.90.45
143.204.98.100
143.204.98.108
143.204.98.182
143.204.98.220
143.204.98.42
151.101.0.239
151.101.2.2
151.139.128.10
152.195.15.114
172.217.22.2
172.217.22.66
178.162.133.149
178.250.2.152
182.161.72.131
185.33.223.100
185.64.189.110
2.18.232.23
2.18.234.190
2.18.234.21
2.18.235.40
205.234.175.175
23.58.216.21
2600:9000:20ac:5a00:1:af78:4c0:93a1
2600:9000:20ac:8400:6:44e3:f8c0:93a1
2600:9000:20ac:f800:10:27b4:f500:93a1
2606:4700::6811:4032
2606:4700::6811:4132
2606:4700::6811:dc0f
2606:4700::6813:da83
2606:4700::6813:f87e
2a00:1450:4001:808::2002
2a00:1450:4001:809::2002
2a00:1450:4001:809::200e
2a00:1450:4001:80b::2002
2a00:1450:4001:80b::2003
2a00:1450:4001:80b::200a
2a00:1450:4001:814::2006
2a00:1450:4001:815::2002
2a00:1450:4001:815::2004
2a00:1450:4001:816::2002
2a00:1450:4001:816::2008
2a00:1450:4001:81c::2001
2a00:1450:4001:81d::2002
2a00:1450:4001:81f::200e
2a00:1450:400c:c0a::9c
2a02:26f0:6c00:28c::25ea
2a03:2880:f02d:12:face:b00c:0:3
2a03:2880:f12d:83:face:b00c:0:25de
2a05:f500:10:101::b93f:9105
3.94.199.232
34.235.240.97
35.160.176.109
35.161.216.48
35.190.40.172
35.190.59.101
35.190.92.63
35.201.67.47
46.228.164.13
46.51.202.182
50.31.169.131
52.10.81.221
52.2.117.76
52.21.120.172
52.210.6.215
52.3.171.116
52.31.192.216
52.44.76.10
52.49.216.17
52.86.193.78
52.86.70.149
52.94.216.48
54.165.0.24
54.174.217.231
54.85.121.67
63.140.41.50
63.32.166.115
64.74.236.19
66.117.28.86
91.228.74.184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