verification2factor.redirectme.net
Open in
urlscan Pro
13.86.24.146
Malicious Activity!
Public Scan
Effective URL: https://verification2factor.redirectme.net/navyfederal.php
Submission: On June 29 via automatic, source certstream-suspicious — Scanned from DE
Summary
TLS certificate: Issued by R3 on June 29th 2022. Valid for: 3 months.
This is the only time verification2factor.redirectme.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Navy Federal Credit Union (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 29 | 13.86.24.146 13.86.24.146 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 2a00:1450:400... 2a00:1450:4001:813::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 104.111.241.176 104.111.241.176 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
2 | 2a00:1450:400... 2a00:1450:4001:812::2003 | 15169 (GOOGLE) (GOOGLE) | |
1 1 | 147.154.111.84 147.154.111.84 | 31898 (ORACLE-BM...) (ORACLE-BMC-31898) | |
1 2 | 104.92.81.206 104.92.81.206 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
35 | 6 |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
verification2factor.redirectme.net |
ASN16625 (AKAMAI-AS, US)
PTR: a104-111-241-176.deploy.static.akamaitechnologies.com
my.navyfederal.org |
ASN16625 (AKAMAI-AS, US)
PTR: a104-92-81-206.deploy.static.akamaitechnologies.com
www.navyfederal.org | |
web.navyfederal.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
29 |
redirectme.net
1 redirects
verification2factor.redirectme.net |
6 MB |
4 |
navyfederal.org
2 redirects
my.navyfederal.org — Cisco Umbrella Rank: 76843 rnemsg.navyfederal.org — Cisco Umbrella Rank: 103698 www.navyfederal.org — Cisco Umbrella Rank: 27236 web.navyfederal.org — Cisco Umbrella Rank: 86218 |
23 KB |
2 |
gstatic.com
fonts.gstatic.com |
26 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 71 |
1 KB |
35 | 4 |
Domain | Requested by | |
---|---|---|
29 | verification2factor.redirectme.net |
1 redirects
verification2factor.redirectme.net
|
2 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | web.navyfederal.org |
verification2factor.redirectme.net
|
1 | www.navyfederal.org | 1 redirects |
1 | rnemsg.navyfederal.org | 1 redirects |
1 | my.navyfederal.org |
verification2factor.redirectme.net
my.navyfederal.org |
1 | fonts.googleapis.com |
verification2factor.redirectme.net
|
35 | 7 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.navyfederal.org |
accountservices.navyfederal.org |
Subject Issuer | Validity | Valid | |
---|---|---|---|
verification2factor.redirectme.net R3 |
2022-06-29 - 2022-09-27 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-06-06 - 2022-08-29 |
3 months | crt.sh |
my.navyfederal.org DigiCert SHA2 Extended Validation Server CA |
2021-12-21 - 2022-12-20 |
a year | crt.sh |
*.gstatic.com GTS CA 1C3 |
2022-06-06 - 2022-08-29 |
3 months | crt.sh |
www.navyfederal.org DigiCert SHA2 Extended Validation Server CA |
2021-09-10 - 2022-09-10 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://verification2factor.redirectme.net/navyfederal.php
Frame ID: B84D0003E1F7FBD9ACB44F797277BD39
Requests: 34 HTTP requests in this frame
Frame:
https://web.navyfederal.org/images/spacer.gif
Frame ID: B3FB4FB234FCD89F8A42C8E400C15512
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
Navy Federal Credit Union - Our Members are the MissionĀ®Page URL History Show full URLs
-
https://verification2factor.redirectme.net/
HTTP 302
https://verification2factor.redirectme.net/navyfederal.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Bootstrap (Web Frameworks) Expand
Detected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
reCAPTCHA (Captchas) Expand
Detected patterns
- /recaptcha/api\.js
Page Statistics
13 Outgoing links
These are links going to different origins than the main page.
Title: ī·Locations
Search URL Search Domain Scan URL
Title: ī²Contact Us
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Sign In Help
Search URL Search Domain Scan URL
Title: Enroll in digital banking Ā»
Search URL Search Domain Scan URL
Title: Learn more Ā»
Search URL Search Domain Scan URL
Title: About Us
Search URL Search Domain Scan URL
Title: Privacy Policy
Search URL Search Domain Scan URL
Title: Security
Search URL Search Domain Scan URL
Title: Accessibility
Search URL Search Domain Scan URL
Title: Browser Support
Search URL Search Domain Scan URL
Title: Federally Insured by NCUA
Search URL Search Domain Scan URL
Title: Equal Housing Lender
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://verification2factor.redirectme.net/
HTTP 302
https://verification2factor.redirectme.net/navyfederal.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 31- https://rnemsg.navyfederal.org/ci/pta/logout HTTP 302
- https://www.navyfederal.org/images/spacer.gif HTTP 301
- https://web.navyfederal.org/images/spacer.gif
35 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
navyfederal.php
verification2factor.redirectme.net/ Redirect Chain
|
19 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
nfcu-icons-88d4e0feb09a5e55cdea1190a39e3d14.css
verification2factor.redirectme.net/resources/css/ |
10 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all-88d4e0feb09a5e55cdea1190a39e3d14.css
verification2factor.redirectme.net/resources/css/ |
49 KB 10 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
nauth-88d4e0feb09a5e55cdea1190a39e3d14.css
verification2factor.redirectme.net/resources/css/ |
5 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
responsivemain-88d4e0feb09a5e55cdea1190a39e3d14.css
verification2factor.redirectme.net/resources/css/ |
135 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
s_code.js
verification2factor.redirectme.net/web.navyfederal.org/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-ec401aee041a200e3dd94ec7982f0f2f.js
verification2factor.redirectme.net/resources/js/ |
292 KB 78 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
common-ec401aee041a200e3dd94ec7982f0f2f.js
verification2factor.redirectme.net/resources/js/ |
7 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dropdown-ec401aee041a200e3dd94ec7982f0f2f.js
verification2factor.redirectme.net/resources/js/ |
5 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap-select.min-ec401aee041a200e3dd94ec7982f0f2f.js
verification2factor.redirectme.net/resources/js/ |
31 KB 9 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
keypad-ec401aee041a200e3dd94ec7982f0f2f.js
verification2factor.redirectme.net/resources/js/ |
3 KB 823 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
modal-ec401aee041a200e3dd94ec7982f0f2f.js
verification2factor.redirectme.net/resources/js/ |
10 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cookieGenerator-ec401aee041a200e3dd94ec7982f0f2f.js
verification2factor.redirectme.net/resources/js/ |
2 KB 914 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login-ec401aee041a200e3dd94ec7982f0f2f.js
verification2factor.redirectme.net/resources/js/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
api.js
verification2factor.redirectme.net/www.google.com/recaptcha/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
le2-mtagconfig.js
verification2factor.redirectme.net/web.navyfederal.org/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
NFCU_Mob_Logo-b1271111c431cb515c864ee4da390e0b.svg
verification2factor.redirectme.net/resources/images/ |
4 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
img_logo-veterans-b1271111c431cb515c864ee4da390e0b.svg
verification2factor.redirectme.net/resources/images/ |
21 KB 22 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
contact-us-b1271111c431cb515c864ee4da390e0b.svg
verification2factor.redirectme.net/resources/images/ |
1 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
img-BecomeAMember-b1271111c431cb515c864ee4da390e0b.jpg
verification2factor.redirectme.net/resources/images/ |
5 MB 5 MB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Group5159-b1271111c431cb515c864ee4da390e0b.svg
verification2factor.redirectme.net/resources/images/ |
5 KB 5 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Group5166-b1271111c431cb515c864ee4da390e0b.svg
verification2factor.redirectme.net/resources/images/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Group5158-b1271111c431cb515c864ee4da390e0b.svg
verification2factor.redirectme.net/resources/images/ |
4 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Vfis
my.navyfederal.org/cEU1LziWs/4KMR7/q9vdI/faq4maAk/OEVYrQzw/BiFFdwE/eEIHK2B/ |
84 KB 22 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg_globe.png
verification2factor.redirectme.net/resources/images/css/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
img-billboard-BG.svg
verification2factor.redirectme.net/resources/images/css/ |
9 KB 10 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6xKydSBYKcSV-LCoeQqfX1RYOo3i54rwlxdu.woff2
fonts.gstatic.com/s/sourcesanspro/v21/ |
13 KB 13 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6xK3dSBYKcSV-LCoeQqfX1RYOo3qOK7l.woff2
fonts.gstatic.com/s/sourcesanspro/v21/ |
13 KB 13 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
nfcu-icons.woff
verification2factor.redirectme.net/resources/fonts/ |
80 KB 80 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
toolTip.svg
verification2factor.redirectme.net/resources/images/css/ |
640 B 813 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icons.png
verification2factor.redirectme.net/resources/images/css/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
spacer.gif
web.navyfederal.org/images/ Frame B3FB Redirect Chain
|
0 0 |
Document
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST |
Vfis
my.navyfederal.org/cEU1LziWs/4KMR7/q9vdI/faq4maAk/OEVYrQzw/BiFFdwE/eEIHK2B/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST |
Vfis
my.navyfederal.org/cEU1LziWs/4KMR7/q9vdI/faq4maAk/OEVYrQzw/BiFFdwE/eEIHK2B/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- my.navyfederal.org
- URL
- https://my.navyfederal.org/cEU1LziWs/4KMR7/q9vdI/faq4maAk/OEVYrQzw/BiFFdwE/eEIHK2B/Vfis
- Domain
- my.navyfederal.org
- URL
- https://my.navyfederal.org/cEU1LziWs/4KMR7/q9vdI/faq4maAk/OEVYrQzw/BiFFdwE/eEIHK2B/Vfis
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Navy Federal Credit Union (Government)50 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| 1 object| 2 object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| $ function| jQuery function| manageFrames function| validateDay function| validatePassword function| validateBirthMY function| clear_form_elements function| removeCookie function| setCookie function| checkCapsLock function| validateSSN function| countModal function| resizeParentFrame function| alertUser function| removeAlert function| validateSecurityAnswer function| getCookie function| createCookie function| setAACookie function| makeRandomValue function| deleteAkamiCookie function| setAkamiCookie function| submitCaptchaForm function| recaptchaWorks function| toggleMobileMenu boolean| captchaEnabled boolean| isCaptchaSuccess object| _acxj object| _cf object| bmak undefined| bm_counter object| bm_script undefined| scripts string| bm_url object| url_split string| obfus_state_field string| state_field_str string| _sd_trace function| verifyCaptcha2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.navyfederal.org/ | Name: akaalb_my_navyfederal_ALB Value: ~op=my_100_wch:my_prdw|~rv=3~m=my_prdw:0|~os=ddcfe9c18a053d3068d757a21af73146~id=b910b77acce51cfbf3d6190a543fe399 |
|
rnemsg.navyfederal.org/ | Name: cp_session Value: fUslKEXgHs1mSUPJ4J6XPg6C5do4csglhTN9YMV9hsJh89HJacbgB8ahAqJLT3pexwukm9xBKk93PG_J_OgsAdsp_kBFsGyykyn5tRw5Ue36xkJEwCqDRXXGczG8BYT0RxKM1brRlhAJtDQ36R481ijlZoi0J~EQBBxe8TvPtcpcvOpKIVksFkqxIGqSXq2B2pGzae38SmRtsSrwLwXr66dXpkNNSVicdmQTPTN2YZqTLZ2U32AGVC9lodnuffRhPUOdYbnHAmurNtd0~x~1euxJsm55wG1weLGW9IwxXYNdUI4r_qkpAEjaIb1VyvdxUrPbehgkjWHhJKUdKrpMk9wdWBx0bPUKhklfJcR7hNRgA44pmgbrBfEZgEX6Hsmchh0LcZOZVAy3qz4C79ElZkumWzpBygfsYPhVf63_Ma0PEcRc0frjFs5ZWs0BMiuKoQOvyEJ26VYhekMpoyxJsJzgTX_FcSuXhS |
8 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
fonts.gstatic.com
my.navyfederal.org
rnemsg.navyfederal.org
verification2factor.redirectme.net
web.navyfederal.org
www.navyfederal.org
my.navyfederal.org
104.111.241.176
104.92.81.206
13.86.24.146
147.154.111.84
2a00:1450:4001:812::2003
2a00:1450:4001:813::200a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