Submitted URL: https://t.co/fdC85rE44B
Effective URL: https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-hacked-to-deploy-blackbyte-ransomware/
Submission: On December 03 via api from US — Scanned from DE

Summary

This website contacted 6 IPs in 2 countries across 6 domains to perform 11 HTTP transactions. The main IP is 104.20.59.209, located in and belongs to CLOUDFLARENET, US. The main domain is www.bleepingcomputer.com.
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on May 16th 2020. Valid for: 2 years.
This is the only time www.bleepingcomputer.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 104.244.42.133 13414 (TWITTER)
3 104.20.59.209 13335 (CLOUDFLAR...)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 2606:4700::68... 13335 (CLOUDFLAR...)
3 2606:4700:303... 13335 (CLOUDFLAR...)
2 2a04:4e42:3::307 54113 (FASTLY)
11 6
Domain Requested by
3 www.bleepingcomputer.com t.co
www.bleepingcomputer.com
static.cloudflareinsights.com
2 strangely-perfect-amoeba.edgecompute.app
2 serverless-benchmarks-js.cloudflare-free.workers.dev www.bleepingcomputer.com
1 serverless-benchmarks-rust.cloudflare-free.workers.dev
1 static.cloudflareinsights.com www.bleepingcomputer.com
1 api.radar.cloudflare.com www.bleepingcomputer.com
1 t.co
11 7

This site contains links to these domains. Also see Links.

Domain
www.cloudflare.com
Subject Issuer Validity Valid
t.co
DigiCert TLS RSA SHA256 2020 CA1
2021-02-05 -
2022-02-04
a year crt.sh
bleepingcomputer.com
Sectigo RSA Domain Validation Secure Server CA
2020-05-16 -
2022-05-15
2 years crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2021-07-14 -
2022-07-13
a year crt.sh
*.cloudflare-free.workers.dev
R3
2021-12-03 -
2022-03-03
3 months crt.sh
*.edgecompute.app
GlobalSign Atlas R3 DV TLS CA H2 2021
2021-10-18 -
2022-11-19
a year crt.sh

This page contains 1 frames:

Primary Page: https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-hacked-to-deploy-blackbyte-ransomware/
Frame ID: 5723AC8A86D83C6CE88A10F60F2D69D7
Requests: 11 HTTP requests in this frame

Screenshot

Page Title

Access denied | www.bleepingcomputer.com used Cloudflare to restrict access

Page URL History Show full URLs

  1. https://t.co/fdC85rE44B Page URL
  2. https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-hacked-to-deploy-blackbyte-ransomware/ Page URL

Page Statistics

11
Requests

100 %
HTTPS

67 %
IPv6

6
Domains

7
Subdomains

6
IPs

2
Countries

16 kB
Transfer

44 kB
Size

3
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://t.co/fdC85rE44B Page URL
  2. https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-hacked-to-deploy-blackbyte-ransomware/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

11 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
fdC85rE44B
t.co/
494 B
681 B
Document
General
Full URL
https://t.co/fdC85rE44B
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.244.42.133 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=0
X-Xss-Protection 0

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

date
Fri, 03 Dec 2021 14:43:04 GMT
vary
Origin
server
tsa_o
expires
Fri, 03 Dec 2021 14:48:04 GMT
content-type
text/html; charset=utf-8
cache-control
private,max-age=300
content-length
244
content-encoding
gzip
x-xss-protection
0
strict-transport-security
max-age=0
x-response-time
119
x-connection-hash
f3151c989142651ff4de281c9bf0e077818bf0abadbf78808b1d3f56f770f6e2
Primary Request /
www.bleepingcomputer.com/news/security/microsoft-exchange-servers-hacked-to-deploy-blackbyte-ransomware/
3 KB
2 KB
Document
General
Full URL
https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-hacked-to-deploy-blackbyte-ransomware/
Requested by
Host: t.co
URL: https://t.co/fdC85rE44B
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.20.59.209 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c1c2712729a09335341e347e4dac325c02573148c607bef85978ebd4471e367e
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://t.co/

Response headers

date
Fri, 03 Dec 2021 14:43:05 GMT
content-type
text/html; charset=UTF-8
x-frame-options
SAMEORIGIN
referrer-policy
same-origin
cache-control
private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
expires
Thu, 01 Jan 1970 00:00:01 GMT
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
server
cloudflare
cf-ray
6b7d90b44a3e3a4d-CDG
content-encoding
br
main.css
www.bleepingcomputer.com/cdn-cgi/styles/
6 KB
2 KB
Stylesheet
General
Full URL
https://www.bleepingcomputer.com/cdn-cgi/styles/main.css
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-hacked-to-deploy-blackbyte-ransomware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.20.59.209 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2729a14ce8234270b0833cd05eaae83a0d00a89f7e3d79b0bc3b4609c48d85fd
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-hacked-to-deploy-blackbyte-ransomware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Fri, 03 Dec 2021 14:43:05 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 01 Dec 2021 12:20:23 GMT
server
cloudflare
etag
W/"61a76887-19dc"
x-frame-options
DENY
content-type
text/css
cache-control
max-age=7200, public
cf-ray
6b7d90b49ab93a4d-CDG
vary
Accept-Encoding
expires
Fri, 03 Dec 2021 16:43:05 GMT
beacon.js
api.radar.cloudflare.com/
20 KB
6 KB
Script
General
Full URL
https://api.radar.cloudflare.com/beacon.js
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-hacked-to-deploy-blackbyte-ransomware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:1ef , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
78ec9b72d9fca5298d91be7f32bd940c1e100999748c80438edec1e4c807da65

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Fri, 03 Dec 2021 14:43:05 GMT
content-encoding
gzip
referrer-policy
no-referrer
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
*
content-type
text/javascript;charset=UTF-8
access-control-allow-origin
*
cache-control
no-store, max-age=0
cf-ray
6b7d90b4fadb0f72-MXP
access-control-allow-headers
*
v64f9daad31f64f81be21cbef6184a5e31634941392597
static.cloudflareinsights.com/beacon.min.js/
13 KB
5 KB
Script
General
Full URL
https://static.cloudflareinsights.com/beacon.min.js/v64f9daad31f64f81be21cbef6184a5e31634941392597
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-hacked-to-deploy-blackbyte-ransomware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:5e41 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
5bf0a170ae91f1bb8d0c94381a74ab8b85f938bf31bf18a9c8e3b835250d3be6

Request headers

Referer
Origin
https://www.bleepingcomputer.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Fri, 03 Dec 2021 14:43:05 GMT
content-encoding
gzip
last-modified
Fri, 22 Oct 2021 22:23:12 GMT
server
cloudflare
etag
W/2021.10.0
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript;charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=86400
cross-origin-resource-policy
cross-origin
cf-ray
6b7d90b4ff6d3751-MXP
/
serverless-benchmarks-js.cloudflare-free.workers.dev/
0
0
Image
General
Full URL
https://serverless-benchmarks-js.cloudflare-free.workers.dev/?test=99c77b3966a6b6c91bd49fb6b0f712bc80fef174b1607e36109828d5ac0df4ce&img=1&r=51560767
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-hacked-to-deploy-blackbyte-ransomware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::6815:21e1 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

rum
www.bleepingcomputer.com/cdn-cgi/
0
196 B
XHR
General
Full URL
https://www.bleepingcomputer.com/cdn-cgi/rum?
Requested by
Host: static.cloudflareinsights.com
URL: https://static.cloudflareinsights.com/beacon.min.js/v64f9daad31f64f81be21cbef6184a5e31634941392597
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.20.59.209 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

Referer
https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-hacked-to-deploy-blackbyte-ransomware/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
content-type
application/json

Response headers

date
Fri, 03 Dec 2021 14:43:05 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cloudflare
x-frame-options
DENY
access-control-allow-methods
POST,OPTIONS
content-type
text/plain
access-control-allow-origin
https://www.bleepingcomputer.com
access-control-max-age
86400
access-control-allow-credentials
true
cf-ray
6b7d90b60cda3a4d-CDG
vary
Origin
/
strangely-perfect-amoeba.edgecompute.app/
112 B
290 B
Image
General
Full URL
https://strangely-perfect-amoeba.edgecompute.app/?test=aec93c435332795f65e5503d9203ff9065e6fca1761a70f44013dc325e0ea8b6&img=1&r=8574436
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:3::307 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
454c8cdf69f295d7914a530ddfcead74f342c9b690f8148c1fc4a3f1b3c0e871

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Fri, 03 Dec 2021 14:43:07 GMT
x-test-value
314159
referrer-policy
no-referrer
access-control-allow-methods
*
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
no-store
timing-allow-origin
*
access-control-allow-headers
*
content-length
112
/
strangely-perfect-amoeba.edgecompute.app/
112 B
150 B
Image
General
Full URL
https://strangely-perfect-amoeba.edgecompute.app/?test=14016c4aaf282fbb6ae2ea8fbcbf139c641c291709185b8fb8a38913177b9b33&img=1&r=24875547
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:3::307 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
454c8cdf69f295d7914a530ddfcead74f342c9b690f8148c1fc4a3f1b3c0e871

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Fri, 03 Dec 2021 14:43:07 GMT
x-test-value
43
referrer-policy
no-referrer
access-control-allow-methods
*
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
no-store
timing-allow-origin
*
access-control-allow-headers
*
content-length
112
/
serverless-benchmarks-js.cloudflare-free.workers.dev/
0
0
Image
General
Full URL
https://serverless-benchmarks-js.cloudflare-free.workers.dev/?test=bcc6a5c1b80a776e3e00f674e09136aa8b585ed950a086405e56bdf65d02a967&img=1&r=72919710
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::6815:21e1 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

/
serverless-benchmarks-rust.cloudflare-free.workers.dev/
0
0
Image
General
Full URL
https://serverless-benchmarks-rust.cloudflare-free.workers.dev/?test=aec93c435332795f65e5503d9203ff9065e6fca1761a70f44013dc325e0ea8b6&img=1&r=81307583
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::6815:21e1 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

Verdicts & Comments Add Verdict or Comment

39 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect function| reportError boolean| originAgentCluster object| scheduler object| _cf_translation object| e boolean| t boolean| r boolean| s boolean| o boolean| n object| c function| f function| d function| b function| p function| u function| h function| y function| g function| w object| v function| x function| B function| T object| k function| E function| A object| j function| log function| measure function| rand function| get function| getts function| getProtocol function| valid function| perf string| a object| __cfBeacon

3 Cookies

Domain/Path Name / Value
.t.co/ Name: muc
Value: 5dd5ec31-e78c-4ef4-b02f-836724e9c41d
.t.co/ Name: muc_ads
Value: 5dd5ec31-e78c-4ef4-b02f-836724e9c41d
.radar.cloudflare.com/ Name: __cf_bm
Value: BmsT.Vam1MsO88f4Mcg.FneP7QxSvP2V8Sua1lYjoa0-1638542585-0-AQESIiQRBtzaY3UY9PXjmbAWt7MwRc17F9oBJg6ZzDQiMTLlEO2h/ozSyLpi6btt3gFR7jiOf+0fvxPwcGA6GZc=

4 Console Messages

Source Level URL
Text
network error URL: https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-hacked-to-deploy-blackbyte-ransomware/
Message:
Failed to load resource: the server responded with a status of 403 ()
network error URL: https://serverless-benchmarks-js.cloudflare-free.workers.dev/?test=99c77b3966a6b6c91bd49fb6b0f712bc80fef174b1607e36109828d5ac0df4ce&img=1&r=51560767
Message:
Failed to load resource: the server responded with a status of 429 ()
network error URL: https://serverless-benchmarks-js.cloudflare-free.workers.dev/?test=bcc6a5c1b80a776e3e00f674e09136aa8b585ed950a086405e56bdf65d02a967&img=1&r=72919710
Message:
Failed to load resource: the server responded with a status of 429 ()
network error URL: https://serverless-benchmarks-rust.cloudflare-free.workers.dev/?test=aec93c435332795f65e5503d9203ff9065e6fca1761a70f44013dc325e0ea8b6&img=1&r=81307583
Message:
Failed to load resource: the server responded with a status of 429 ()

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=0
X-Xss-Protection 0