www-cultofmac-com.cdn.ampproject.org Open in urlscan Pro
2a00:1450:4001:808::2001  Public Scan

Submitted URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_j...
Effective URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_j...
Submission: On June 24 via api from US

Summary

This website contacted 9 IPs in 3 countries across 6 domains to perform 23 HTTP transactions. The main IP is 2a00:1450:4001:808::2001, located in Frankfurt am Main, Germany and belongs to GOOGLE, US. The main domain is www-cultofmac-com.cdn.ampproject.org.
TLS certificate: Issued by GTS CA 1O1 on May 26th 2020. Valid for: 3 months.
This is the only time www-cultofmac-com.cdn.ampproject.org was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

Domain Requested by
10 cdn.ampproject.org www-cultofmac-com.cdn.ampproject.org
cdn.ampproject.org
2 ping.chartbeat.net
2 d-26067633171742201859.ampproject.net cdn.ampproject.org
2 cdn-cultofmac-com.cdn.ampproject.org www-cultofmac-com.cdn.ampproject.org
2 www-cultofmac-com.cdn.ampproject.org www-cultofmac-com.cdn.ampproject.org
1 www.google-analytics.com cdn.ampproject.org
1 www.cultofmac.com cdn.ampproject.org
1 3p.ampproject.net cdn.ampproject.org
1 www.facebook.com cdn.ampproject.org
1 secure-gravatar-com.cdn.ampproject.org
23 10
Subject Issuer Validity Valid
misc-sni.google.com
GTS CA 1O1
2020-05-26 -
2020-08-18
3 months crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2020-05-14 -
2020-08-05
3 months crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2020-05-27 -
2021-05-27
a year crt.sh
*.chartbeat.net
Thawte RSA CA 2018
2019-12-16 -
2020-12-30
a year crt.sh
*.google-analytics.com
GTS CA 1O1
2020-05-26 -
2020-08-18
3 months crt.sh

This page contains 3 frames:

Primary Page: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Frame ID: 7131039F63BD8E105C2D8D0AC3DB5545
Requests: 23 HTTP requests in this frame

Frame: https://www.facebook.com/plugins/like.php?href=https://www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/&width=152&layout=button_count&action=like&size=large&show_faces=false&share=true&height=32&appId=249151412165931
Frame ID: 68C6A228BF89B4FFEE4B330E60483074
Requests: 1 HTTP requests in this frame

Frame: https://d-26067633171742201859.ampproject.net/2006112352001/frame.html
Frame ID: 143FD7345D1C37B26F1093696E873665
Requests: 1 HTTP requests in this frame

Screenshot


Page Statistics

23
Requests

100 %
HTTPS

88 %
IPv6

6
Domains

10
Subdomains

9
IPs

3
Countries

316 kB
Transfer

858 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

23 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/
36 KB
11 KB
Document
General
Full URL
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
55d37037738eb83c3c75c5e6e040fa9832e14d4939904ff6e1baa4cc27d34622
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src 'sha256-5CxqAdDXlHviOy7zxeRpMobzRK/JNpLvkS+k8Zj3L3A=' 'sha256-FIBGC/wl1Qfnh2Fb5NPFHmRty7BHJdDpWW1FZ8egppI=' 'sha256-dKn2nAtwgzaaXC8ZM58hhldxNyeuu4qrzW4H9//9YMA=' blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www-cultofmac-com.cdn.ampproject.org
:scheme
https
:path
/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
nel
{"report_to":"nel","max_age":604800,"success_fraction":0.05}
report-to
{"group":"nel","max_age":604800,"endpoints":[{"url":"https://beacons.gcp.gvt2.com/nel/upload-nel"},{"url":"https://beacons.gvt2.com/nel/upload-nel"}]}
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
br
content-type
text/html
x-page-speed
0.9.10.99-9999
link
<https://cdn.ampproject.org/rtv/012006112352001/v0.js>; rel=preload; as=script, <https://cdn.ampproject.org/rtv/012006112352001/v0/amp-viewer-integration-0.1.js>; rel=preload; as=script, <https://cdn-cultofmac-com.cdn.ampproject.org/i/s/cdn.cultofmac.com/wp-content/uploads/2016/01/Backlit_keyboard-350x197.jpg>; rel=preload; as=image; media="screen and (max-width: 350px)", <https://cdn-cultofmac-com.cdn.ampproject.org/i/s/cdn.cultofmac.com/wp-content/uploads/2016/01/Backlit_keyboard-400x225.jpg>; rel=preload; as=image; media="screen and (min-width: 351px) and (max-width: 400px)", <https://www-cultofmac-com.cdn.ampproject.org/i/s/www.cultofmac.com/wp-content/uploads/2016/01/Backlit_keyboard-350x197@2x.jpg>; rel=preload; as=image; media="screen and (min-width: 401px) and (max-width: 700px)", <https://cdn-cultofmac-com.cdn.ampproject.org/i/s/cdn.cultofmac.com/wp-content/uploads/2016/01/Backlit_keyboard-780x439.jpg>; rel=preload; as=image; media="screen and (min-width: 701px) and (max-width: 780px)", <https://www-cultofmac-com.cdn.ampproject.org/i/s/www.cultofmac.com/wp-content/uploads/2016/01/Backlit_keyboard-400x225@2x.jpg>; rel=preload; as=image; media="screen and (min-width: 781px) and (max-width: 800px)", <https://www-cultofmac-com.cdn.ampproject.org/i/s/www.cultofmac.com/wp-content/uploads/2016/01/Backlit_keyboard-780x439@2x.jpg>; rel=preload; as=image; media="screen and (min-width: 801px)"
content-security-policy
default-src * blob: data:; script-src 'sha256-5CxqAdDXlHviOy7zxeRpMobzRK/JNpLvkS+k8Zj3L3A=' 'sha256-FIBGC/wl1Qfnh2Fb5NPFHmRty7BHJdDpWW1FZ8egppI=' 'sha256-dKn2nAtwgzaaXC8ZM58hhldxNyeuu4qrzW4H9//9YMA=' blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-length
8965
date
Wed, 24 Jun 2020 11:34:03 GMT
expires
Wed, 24 Jun 2020 11:34:03 GMT
cache-control
private, max-age=86400
last-modified
Mon, 22 Jun 2020 23:19:11 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
v0.js
cdn.ampproject.org/rtv/012006112352001/
261 KB
72 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012006112352001/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
84b8f166c1c93dbd8745c32d0ab99bbad06e201b272d6eb5de7a5925980ca98c
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
50430
status
200
alt-svc
h3-28=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
72558
x-xss-protection
0
server
sffe
date
Tue, 23 Jun 2020 21:33:33 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"dd4ec5a361084c59"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 23 Jun 2021 21:33:33 GMT
amp-viewer-integration-0.1.js
cdn.ampproject.org/rtv/012006112352001/v0/
18 KB
7 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012006112352001/v0/amp-viewer-integration-0.1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
101adddecd2e7d4af5cf1977db144a982ef82a769047bfdd72c9b518c6f59a57
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
50430
status
200
alt-svc
h3-28=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
6593
x-xss-protection
0
server
sffe
date
Tue, 23 Jun 2020 21:33:33 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"90b1bc6deedec87e"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 23 Jun 2021 21:33:33 GMT
Backlit_keyboard-780x439@2x.jpg
www-cultofmac-com.cdn.ampproject.org/i/s/www.cultofmac.com/wp-content/uploads/2016/01/
93 KB
93 KB
Image
General
Full URL
https://www-cultofmac-com.cdn.ampproject.org/i/s/www.cultofmac.com/wp-content/uploads/2016/01/Backlit_keyboard-780x439@2x.jpg
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c6f067b84a418cad9412b7f1f0a162d987ae63e81ae4b0a4a416292bd66f56f5
Security Headers
Name Value
Content-Security-Policy default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
x-content-type-options
nosniff
last-modified
Sat, 20 Jun 2020 16:30:17 GMT
server
sffe
date
Wed, 24 Jun 2020 11:34:03 GMT
vary
Accept,Save-Data
content-type
image/webp
status
200
cache-control
private, max-age=31536000
content-disposition
attachment
accept-ranges
bytes
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
95430
x-xss-protection
0
expires
Wed, 24 Jun 2020 11:34:03 GMT
amp-ad-0.1.js
cdn.ampproject.org/rtv/012006112352001/v0/
63 KB
18 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012006112352001/v0/amp-ad-0.1.js
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f12247871a1902f631d55bb4c482a690f26b754b3e26bac52f06378cd5924fe6
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
50888
status
200
alt-svc
h3-28=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18621
x-xss-protection
0
server
sffe
date
Tue, 23 Jun 2020 21:25:55 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"d0dda6a84cc35d6e"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 23 Jun 2021 21:25:55 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012006112352001/v0/
98 KB
30 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012006112352001/v0/amp-analytics-0.1.js
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
85a53e55a6a0737917c9cb6458c0df042c15e3b170f7ae587a9e415488de1c67
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
50430
status
200
alt-svc
h3-28=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
30137
x-xss-protection
0
server
sffe
date
Tue, 23 Jun 2020 21:33:33 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"e2e621c54f9cc3ea"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 23 Jun 2021 21:33:33 GMT
amp-iframe-0.1.js
cdn.ampproject.org/rtv/012006112352001/v0/
23 KB
8 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012006112352001/v0/amp-iframe-0.1.js
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
40ee2ade10a03d3e3e59aed08208c238a86a49fff476e8131b7f350e43432dca
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
50430
status
200
alt-svc
h3-28=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
8558
x-xss-protection
0
server
sffe
date
Tue, 23 Jun 2020 21:33:33 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"2771c018829c3176"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 23 Jun 2021 21:33:33 GMT
truncated
/
80 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
81341629bdf34f2b9ace9b2a2521f9a60ed6c9c474b3168b8f6d5a5b83bc6d79

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
79 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
89ea5b34ec596bad17feeba77b9ecb3ebafde9a0a8c1bcf26ac9d48b1d892a71

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
placeholder-icon.png
cdn-cultofmac-com.cdn.ampproject.org/i/s/cdn.cultofmac.com/wp-content/plugins/amp/assets/images/
243 B
730 B
Image
General
Full URL
https://cdn-cultofmac-com.cdn.ampproject.org/i/s/cdn.cultofmac.com/wp-content/plugins/amp/assets/images/placeholder-icon.png
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b40d96971087e509167aecb1c6b4d5f2e43d7521c0b938ea4b4329b89ff322b9
Security Headers
Name Value
Content-Security-Policy default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
x-content-type-options
nosniff
last-modified
Tue, 23 Jun 2020 01:12:07 GMT
server
sffe
date
Wed, 24 Jun 2020 11:34:03 GMT
content-type
image/png
status
200
cache-control
private, max-age=31536000
content-disposition
attachment
accept-ranges
bytes
alt-svc
h3-28=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
243
x-xss-protection
0
expires
Wed, 24 Jun 2020 11:34:03 GMT
com-logo.png
cdn-cultofmac-com.cdn.ampproject.org/ii/w39/s/cdn.cultofmac.com/wp-content/plugins/com2014-custom//img/
0
0
Image
General
Full URL
https://cdn-cultofmac-com.cdn.ampproject.org/ii/w39/s/cdn.cultofmac.com/wp-content/plugins/com2014-custom//img/com-logo.png
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

1f42e583825bf8b1907851f7c9866f21
secure-gravatar-com.cdn.ampproject.org/ii/w39/s/secure.gravatar.com/avatar/
446 B
635 B
Image
General
Full URL
https://secure-gravatar-com.cdn.ampproject.org/ii/w39/s/secure.gravatar.com/avatar/1f42e583825bf8b1907851f7c9866f21?s=24&d=mm&r=g
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a8ae18d4d6bc25dbc021c9dee26ead02629778c7ed32d8c51159d5dabc91a75c
Security Headers
Name Value
Content-Security-Policy default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src 'none'; report-uri https://csp.withgoogle.com/csp/amp
x-content-type-options
nosniff
last-modified
Fri, 19 Jun 2020 12:21:15 GMT
server
sffe
date
Wed, 24 Jun 2020 11:34:03 GMT
vary
Accept,Save-Data
content-type
image/webp
status
200
cache-control
private, max-age=299
content-disposition
attachment
accept-ranges
bytes
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
446
x-xss-protection
0
expires
Wed, 24 Jun 2020 11:34:03 GMT
amp-auto-lightbox-0.1.js
cdn.ampproject.org/rtv/012006112352001/v0/
7 KB
4 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012006112352001/v0/amp-auto-lightbox-0.1.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012006112352001/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c4b8b382d5c936605f117bae8392377a46c85024acca11a3a07516cb6f563ae1
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Origin
https://www-cultofmac-com.cdn.ampproject.org

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
50430
status
200
alt-svc
h3-28=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2760
x-xss-protection
0
server
sffe
date
Tue, 23 Jun 2020 21:33:33 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"90c855c17e3b4550"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 23 Jun 2021 21:33:33 GMT
like.php
www.facebook.com/plugins/ Frame 68C6
0
0
Document
General
Full URL
https://www.facebook.com/plugins/like.php?href=https://www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/&width=152&layout=button_count&action=like&size=large&show_faces=false&share=true&height=32&appId=249151412165931
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012006112352001/v0/amp-iframe-0.1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;block-all-mixed-content;upgrade-insecure-requests;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www.facebook.com
:scheme
https
:path
/plugins/like.php?href=https://www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/&width=152&layout=button_count&action=like&size=large&show_faces=false&share=true&height=32&appId=249151412165931
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D

Response headers

status
200
cache-control
private, no-cache, no-store, must-revalidate
pragma
no-cache
strict-transport-security
max-age=15552000; preload
content-encoding
br
timing-allow-origin
*
content-security-policy
default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;block-all-mixed-content;upgrade-insecure-requests;
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
expires
Sat, 01 Jan 2000 00:00:00 GMT
content-type
text/html; charset="utf-8"
x-fb-debug
7GHX1LsrN6pc0eJpDXw3qGq0JYMQDFIi9ISZfVousRXKdBT+zzJYzFZz4BVuGS9lFjMzO0bYRoqxMSJ1gjQgYA==
date
Wed, 24 Jun 2020 11:34:03 GMT Wed, 24 Jun 2020 11:34:03 GMT
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
frame.html
d-26067633171742201859.ampproject.net/2006112352001/
0
0
Other
General
Full URL
https://d-26067633171742201859.ampproject.net/2006112352001/frame.html
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012006112352001/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

access-control-allow-origin
*
f.js
3p.ampproject.net/2006112352001/
181 KB
48 KB
Other
General
Full URL
https://3p.ampproject.net/2006112352001/f.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012006112352001/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
2c697847155b64f2a3994509b8fd966566fdbbcd3298d7b80feb966d046c5152
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 23 Jun 2020 15:31:54 GMT
content-encoding
br
x-content-type-options
nosniff
age
72129
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
49114
x-xss-protection
0
last-modified
Tue, 23 Jun 2020 14:45:00 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
expires
Wed, 23 Jun 2021 15:31:54 GMT
amp-lightbox-gallery-0.1.js
cdn.ampproject.org/rtv/012006112352001/v0/
59 KB
18 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012006112352001/v0/amp-lightbox-gallery-0.1.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012006112352001/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
9f5a38209108c13ae7d352d80839f62367d9d011986d24d64b2e4e03c93a48a5
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Origin
https://www-cultofmac-com.cdn.ampproject.org

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
50429
status
200
alt-svc
h3-28=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18095
x-xss-protection
0
server
sffe
date
Tue, 23 Jun 2020 21:33:34 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"d621fdd10449367c"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 23 Jun 2021 21:33:34 GMT
amp-loader-0.1.js
cdn.ampproject.org/rtv/012006112352001/v0/
15 KB
4 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012006112352001/v0/amp-loader-0.1.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012006112352001/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
d2d456f9f3ba604895c100b58418b8a9afa411dfb9afdb58d54c5b357dc64ae4
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Origin
https://www-cultofmac-com.cdn.ampproject.org

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
50429
status
200
alt-svc
h3-28=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
3728
x-xss-protection
0
server
sffe
date
Tue, 23 Jun 2020 21:33:34 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"21416bfafbf57758"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 23 Jun 2021 21:33:34 GMT
googleanalytics.json
cdn.ampproject.org/rtv/012006112352001/v0/analytics-vendors/
2 KB
898 B
Fetch
General
Full URL
https://cdn.ampproject.org/rtv/012006112352001/v0/analytics-vendors/googleanalytics.json
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012006112352001/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
6f53945eda017435c600f05df250c86a4788653b8e2e4c17aa7d647b4ce35bdd
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept
application/json
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
50428
status
200
alt-svc
h3-28=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
778
x-xss-protection
0
server
sffe
date
Tue, 23 Jun 2020 21:33:36 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/json
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"2028134dc6d4ea38"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 23 Jun 2021 21:33:36 GMT
chartbeat.json
cdn.ampproject.org/rtv/012006112352001/v0/analytics-vendors/
924 B
522 B
Fetch
General
Full URL
https://cdn.ampproject.org/rtv/012006112352001/v0/analytics-vendors/chartbeat.json
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012006112352001/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
bc1fe280f4dc2e9d3b3a0eabec7a4cab25847e67aa1f9eef4b9dd1352a798b62
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept
application/json
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
50413
status
200
alt-svc
h3-28=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
414
x-xss-protection
0
server
sffe
date
Tue, 23 Jun 2020 21:33:51 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/json
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"89f1da0a4d60cd2a"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 23 Jun 2021 21:33:51 GMT
imp.gif
www.cultofmac.com/detroitchicago/
43 B
651 B
Other
General
Full URL
https://www.cultofmac.com/detroitchicago/imp.gif?amp=1&backgrounded=0&requestCount=1&url=https%3A%2F%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2Famp%2F&pid=4536&cid=3ckUPShAtdjfo-LXRmjGZQzo3gwkss-eq91grERdQ4MPDJbcFSeJqIatL-xINo9t&referrer=&tstart=1592998444281&pnv=57&pcrs=106&prt=1&pi=12&pcl=12&pc=142&pnt=0&prc=0&ez_orig=1&e=%7B%22ad_cache_level%22%3A0%2C%22ad_lazyload_version%22%3A0%2C%22author%22%3A%22https%3A%2F%2Fwww.facebook.com%2Froblefwrites%22%2C%22days_since_last_visit%22%3A-1%2C%22domain_id%22%3A27792%2C%22domain_test_group%22%3A20200401%2C%22engaged_time_visit%22%3A0%2C%22ezcache_level%22%3A1%2C%22forensiq_score%22%3A-1%2C%22form_factor_id%22%3A2%2C%22framework_id%22%3A2%2C%22is_return_visitor%22%3Afalse%2C%22is_sitespeed%22%3A1%2C%22last_page_load%22%3A%22%22%2C%22last_pageview_id%22%3A%22%22%2C%22lt_cache_level%22%3A0%2C%22page_ad_positions%22%3A%22%22%2C%22page_view_count%22%3A0%2C%22page_view_id%22%3A%22808a56ff-e7b8-4398-65db-812f06e7df29%22%2C%22position_selection_id%22%3A0%2C%22publish_date%22%3A%222016-03-16%22%2C%22pv_event_count%22%3A0%2C%22response_time_orig%22%3A427%2C%22serverid%22%3A%223.235.223.171%3A6210%22%2C%22t_epoch%22%3A1592867950%2C%22template_id%22%3A128%2C%22time_on_site_visit%22%3A0%2C%22url%22%3A%22https%3A%2F%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2Famp%2F%22%2C%22user_id%22%3A0%2C%22weather_precipitation%22%3A0%2C%22weather_summary%22%3A%22%22%2C%22weather_temperature%22%3A0%2C%22word_count%22%3A454%2C%22worst_bad_word_level%22%3A0%7D
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012006112352001/v0/amp-analytics-0.1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:e4::ac40:ae21 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Wed, 24 Jun 2020 11:34:04 GMT
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
cf-cache-status
DYNAMIC
status
200
x-middleton-display
imp_sol
content-length
43
cf-request-id
0387b4552d0000c2c79db88200000001
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
1728000
access-control-allow-methods
HEAD, PUT, POST, GET, OPTIONS
content-type
image/gif
access-control-allow-origin
https://www-cultofmac-com.cdn.ampproject.org
cache-control
no-cache, no-store, must-revalidate, max-age=0
cf-ray
5a8623351d40c2c7-FRA
access-control-allow-headers
Content-Type
ping
ping.chartbeat.net/
43 B
168 B
Image
General
Full URL
https://ping.chartbeat.net/ping?h=cultofmac.com&p=%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2F&u=Zg_DX1d1_vuqKdFGojBVP7g62cyprQoq8B8jtvDF-cDeOY-pQxXGSEVrEmFhEFe8&d=www.cultofmac.com&g=54946&g0=News%2C%20Newsstand%2C%20Top%20stories&g1=Rob%20LeFebvre&g2=&g3=&g4=&c=&x=0&m=&y=6019&o=1600&w=1200&j=30&R=1&W=0&I=0&E=1&r=&t=4536Zg_DX1d1_vuqKdFGojBVP7g62cyprQoq8B8jtvDF-cDeOY-pQxXGSEVrEmFhEFe8&b=308&i=Malware%20uses%20Apple%E2%80%99s%20FairPlay%20DRM%20to%20attack%20iOS%20users%20%7C%20Cult%20of%20Mac&T=1592998444308&tz=-120&sn=1&C=2&_
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.85.85.200 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-54-85-85-200.compute-1.amazonaws.com
Software
/
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
pragma
no-cache
date
Wed, 24 Jun 2020 11:34:04 GMT
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
content-length
43
expires
0
collect
www.google-analytics.com/r/
35 B
135 B
Other
General
Full URL
https://www.google-analytics.com/r/collect?v=1&_v=a1&ds=AMP&aip&_s=1&dt=Malware%20uses%20Apple%E2%80%99s%20FairPlay%20DRM%20to%20attack%20iOS%20users%20%7C%20Cult%20of%20Mac&sr=1600x1200&_utmht=1592998444311&cid=HQ5b5vMvEuKRseIztDjNNoGyX_tzPxsFCBJSvUYnmxeUsWDfB_kDnT2hwYekmwi-&tid=UA-84038529-45&dl=https%3A%2F%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2Famp%2F&dr=&sd=24&ul=en-us&de=UTF-8&t=pageview&jid=0.546216248472787&_r=1&a=4536&z=0.7363858470980369&cd1=old_site_gc_mobile&cd2=128&cd3=0
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012006112352001/v0/amp-analytics-0.1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Wed, 24 Jun 2020 11:34:04 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
200
content-type
image/gif
access-control-allow-origin
https://www-cultofmac-com.cdn.ampproject.org
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
frame.html
d-26067633171742201859.ampproject.net/2006112352001/ Frame 143F
0
0
Document
General
Full URL
https://d-26067633171742201859.ampproject.net/2006112352001/frame.html
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012006112352001/v0/amp-ad-0.1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
d-26067633171742201859.ampproject.net
:scheme
https
:path
/2006112352001/frame.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
br
content-type
text/html
access-control-allow-origin
*
content-length
161
date
Wed, 24 Jun 2020 11:34:03 GMT
expires
Thu, 24 Jun 2021 11:34:03 GMT
last-modified
Tue, 23 Jun 2020 14:45:00 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
1
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
ping
ping.chartbeat.net/
43 B
168 B
Image
General
Full URL
https://ping.chartbeat.net/ping?h=cultofmac.com&p=%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2F&u=Zg_DX1d1_vuqKdFGojBVP7g62cyprQoq8B8jtvDF-cDeOY-pQxXGSEVrEmFhEFe8&d=www.cultofmac.com&g=54946&g0=News%2C%20Newsstand%2C%20Top%20stories&g1=Rob%20LeFebvre&g2=&g3=&g4=&c=&x=0&m=&y=4118&o=1600&w=1200&j=30&R=1&W=0&I=0&E=5&r=&t=4536Zg_DX1d1_vuqKdFGojBVP7g62cyprQoq8B8jtvDF-cDeOY-pQxXGSEVrEmFhEFe8&b=308&i=Malware%20uses%20Apple%E2%80%99s%20FairPlay%20DRM%20to%20attack%20iOS%20users%20%7C%20Cult%20of%20Mac&T=1592998459308&tz=-120&sn=2&C=2&_
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.85.85.200 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-54-85-85-200.compute-1.amazonaws.com
Software
/
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
pragma
no-cache
date
Wed, 24 Jun 2020 11:34:19 GMT
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
content-length
43
expires
0

Verdicts & Comments Add Verdict or Comment

21 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| AMP object| global object| AMP_CONFIG object| __AMP_LOG object| __AMP_ERRORS object| __AMP_MODE function| __AMP_REPORT_ERROR object| __AMP_TOP object| __AMP_SERVICES object| __AMP__EXPERIMENT_TOGGLES object| __AMP_URL_CACHE boolean| __AMP_TAG object| __AMP_EXTENDED_ELEMENTS function| __AMP_BASE_CE_CLASS object| __AMP_EXPERIMENT_BRANCHES number| ampAdSlotIdCounter object| listeningFors string| __AMP_DEFAULT_BOOTSTRAP_SUBDOMAIN number| 3pla

0 Cookies

2 Console Messages

Source Level URL
Text
console-api info URL: https://cdn.ampproject.org/rtv/012006112352001/v0.js(Line 543)
Message:
Powered by AMP ⚡ HTML – Version 2006112352001 https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D#origin%3Dhttps%3A%2F%2Fwww.google.co.uk%26prerenderSize%3D1%26visibilityState%3Dprerender%26paddingTop%3D32%26p2r%3D0%26horizontalScrolling%3D0%26csi%3D1%26aoh%3D15661572839977%26viewerUrl%3Dhttps%3A%2F%2Fwww.google.co.uk%2Famp%2Fs%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2Famp%2F%26history%3D1%26storage%3D1%26cid%3D1%26cap%3DnavigateTo%2Ccid%2CfullReplaceHistory%2Cfragment%2CreplaceUrl
console-api error URL: https://cdn.ampproject.org/rtv/012006112352001/v0.js(Line 106)
Message:
Failed to load: https://cdn-cultofmac-com.cdn.ampproject.org/i/s/cdn.cultofmac.com/wp-content/plugins/com2014-custom//img/com-logo.png​​​

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src * blob: data:; script-src 'sha256-5CxqAdDXlHviOy7zxeRpMobzRK/JNpLvkS+k8Zj3L3A=' 'sha256-FIBGC/wl1Qfnh2Fb5NPFHmRty7BHJdDpWW1FZ8egppI=' 'sha256-dKn2nAtwgzaaXC8ZM58hhldxNyeuu4qrzW4H9//9YMA=' blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

3p.ampproject.net
cdn-cultofmac-com.cdn.ampproject.org
cdn.ampproject.org
d-26067633171742201859.ampproject.net
ping.chartbeat.net
secure-gravatar-com.cdn.ampproject.org
www-cultofmac-com.cdn.ampproject.org
www.cultofmac.com
www.facebook.com
www.google-analytics.com
2606:4700:e4::ac40:ae21
2a00:1450:4001:808::2001
2a00:1450:4001:814::2003
2a00:1450:4001:817::200e
2a00:1450:4001:81b::2003
2a00:1450:4001:81c::2001
2a03:2880:f12d:83:face:b00c:0:25de
54.85.85.200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