![](/screenshots/8d271587-e606-4015-a680-4dab676f785a.png)
yousee.zapto.org
Open in
urlscan Pro
195.22.153.77
Malicious Activity!
Public Scan
Submission Tags: https://phish.report @phish_report Search All
Submission: On April 14 via api from FI — Scanned from FI
Summary
TLS certificate: Issued by R3 on April 14th 2023. Valid for: 3 months.
This is the only time yousee.zapto.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: MitID (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 195.22.153.77 195.22.153.77 | 47196 (GARANT-PA...) (GARANT-PARK-INTERNET) | |
1 | 2a00:1450:400... 2a00:1450:4001:803::200a | 15169 (GOOGLE) (GOOGLE) | |
9 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
zapto.org
yousee.zapto.org |
324 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 323 |
30 KB |
0 |
mitid.dk
Failed
www.mitid.dk Failed |
|
9 | 3 |
Domain | Requested by | |
---|---|---|
2 | yousee.zapto.org |
yousee.zapto.org
|
1 | ajax.googleapis.com |
yousee.zapto.org
|
0 | www.mitid.dk Failed |
yousee.zapto.org
|
9 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
yousee.zapto.org R3 |
2023-04-14 - 2023-07-13 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-03-28 - 2023-06-20 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://yousee.zapto.org/READY/
Frame ID: 9F26C1F7717EFBADA209CD700913884D
Requests: 14 HTTP requests in this frame
Screenshot
![](/screenshots/8d271587-e606-4015-a680-4dab676f785a.png)
Page Title
MitIDDetected technologies
![](/vendor/wappa/icons/Vue.js.png)
Detected patterns
- <[^>]+\sdata-v(?:ue)?-
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
yousee.zapto.org/READY/ |
23 KB 12 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cs.css
yousee.zapto.org/READY/ |
498 KB 312 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.1.1/ |
82 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
7 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
95 KB 95 KB |
Font
application/x-font-ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
IBMPlexSans-Bold.woff2
www.mitid.dk/assets/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
55 KB 55 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
55 KB 55 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
IBMPlexSans-Bold.woff
www.mitid.dk/assets/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
IBMPlexSans-SemiBold.woff2
www.mitid.dk/assets/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
58 KB 58 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
IBMPlexSans-Medium.woff2
www.mitid.dk/assets/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
IBMPlexSans-SemiBold.woff
www.mitid.dk/assets/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
IBMPlexSans-Medium.woff
www.mitid.dk/assets/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.mitid.dk
- URL
- https://www.mitid.dk/assets/fonts/IBMPlexSans-Bold.woff2
- Domain
- www.mitid.dk
- URL
- https://www.mitid.dk/assets/fonts/IBMPlexSans-Bold.woff
- Domain
- www.mitid.dk
- URL
- https://www.mitid.dk/assets/fonts/IBMPlexSans-SemiBold.woff2
- Domain
- www.mitid.dk
- URL
- https://www.mitid.dk/assets/fonts/IBMPlexSans-Medium.woff2
- Domain
- www.mitid.dk
- URL
- https://www.mitid.dk/assets/fonts/IBMPlexSans-SemiBold.woff
- Domain
- www.mitid.dk
- URL
- https://www.mitid.dk/assets/fonts/IBMPlexSans-Medium.woff
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: MitID (Government)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless function| $ function| jQuery function| clickButton1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
yousee.zapto.org/ | Name: PHPSESSID Value: 74c1cq3rpbt01sectjt39lakm7 |
8 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
www.mitid.dk
yousee.zapto.org
www.mitid.dk
195.22.153.77
2a00:1450:4001:803::200a
037236ed4bf58a85f67074c165d308260fd6be01c86d7df4e79ea16eb273f8c5
532d48d8bc62a4c4c630470e0994f5050cd460d6d075ad5a6bc9c722d8f23d15
572ef6180698d1ab46b7cc657300ff9c93f2bca2d214739e20d839029f8f4455
61bfa80e071153824914399d5f7ca26ec75fcfe3f4ad20e616e88fe6d9544823
874706b2b1311a0719b5267f7d1cf803057e367e94ae1ff7bf78c5450d30f5d4
ab2ce720a7be6aac9983f30b829fb25ddf0a904e107e7c92b0151048a42569a7
d1b487975f6ce408cd744706737a81439b9acc110bbfe4e79b4058e1a9467ac0
dba2217764db8eafe6a839bb07c45512e76628d82502e4be28975fd18b7d75c1