nordeanorge.wpengine.com
Open in
urlscan Pro
35.185.22.192
Malicious Activity!
Public Scan
Effective URL: https://nordeanorge.wpengine.com/bank-id/bank-id/betale/wait/index.php
Submission: On April 29 via manual from NO — Scanned from NO
Summary
TLS certificate: Issued by RapidSSL TLS DV RSA Mixed SHA256 2020... on August 3rd 2021. Valid for: a year.
This is the only time nordeanorge.wpengine.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BBVA (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 6 | 35.185.22.192 35.185.22.192 | 15169 (GOOGLE) (GOOGLE) | |
5 | 1 |
ASN15169 (GOOGLE, US)
PTR: 192.22.185.35.bc.googleusercontent.com
nordeanorge.wpengine.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
wpengine.com
1 redirects
nordeanorge.wpengine.com |
83 KB |
5 | 1 |
Domain | Requested by | |
---|---|---|
6 | nordeanorge.wpengine.com |
1 redirects
nordeanorge.wpengine.com
|
5 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.wpengine.com RapidSSL TLS DV RSA Mixed SHA256 2020 CA-1 |
2021-08-03 - 2022-09-03 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://nordeanorge.wpengine.com/bank-id/bank-id/betale/wait/index.php
Frame ID: B94F7809C8ED92D4EC4851D5A6316911
Requests: 5 HTTP requests in this frame
Screenshot
Page Title
NordeaPage URL History Show full URLs
-
https://nordeanorge.wpengine.com/bank-id/bank-id/betale/send/payment.php
HTTP 302
https://nordeanorge.wpengine.com/bank-id/bank-id/betale/wait/index.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://nordeanorge.wpengine.com/bank-id/bank-id/betale/send/payment.php
HTTP 302
https://nordeanorge.wpengine.com/bank-id/bank-id/betale/wait/index.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
index.php
nordeanorge.wpengine.com/bank-id/bank-id/betale/wait/ Redirect Chain
|
1 KB 798 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mag1.css
nordeanorge.wpengine.com/bank-id/bank-id/betale/wait/Nordea_files/ |
2 KB 506 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mag2.css
nordeanorge.wpengine.com/bank-id/bank-id/betale/wait/Nordea_files/ |
5 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
load.gif
nordeanorge.wpengine.com/bank-id/bank-id/betale/wait/Nordea_files/ |
80 KB 80 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg-menu.svg
nordeanorge.wpengine.com/bank-id/bank-id/betale/wait/Nordea_files/ |
548 B 548 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BBVA (Financial)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone function| getScreenDetails0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
nordeanorge.wpengine.com
35.185.22.192
05eb745176d79ec27d52d544582483fc4d0f6378c7ed2060be24dfc4e8990668
27d16707c8433c6884449b69def53bd1a6c6c37ba27d230d51e662b47a867580
82e33c5faa06cfbf076e18a81b803b1b5b2e39d28ae1b58008cdeb617fe5b0d2
d465172175d35d493fb1633e237700022bd849fa123164790b168b8318acb090
f50d24d39d62e5de48d2cb97baf9ea54673eba5990b83ef31efa957e51710546