users.jyu.fi
Open in
urlscan Pro
130.234.10.207
Malicious Activity!
Public Scan
Effective URL: http://users.jyu.fi/~piaupaal/chase.com/login.php?cmd=login_submit&id=1e9fce9b8e016f52db9a66f474d39aba1e9fce9b8e016f...
Submission: On July 26 via manual from US
Summary
This is the only time users.jyu.fi was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online) Chase (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2001:62a:4:70... 2001:62a:4:70::80:132 | 1853 (ACONET AC...) (ACONET ACOnet Backbone) | |
1 9 | 130.234.10.207 130.234.10.207 | 1741 (FUNETAS) (FUNETAS) | |
1 | 54.148.84.95 54.148.84.95 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
10 | 3 |
ASN1853 (ACONET ACOnet Backbone, AT)
homepage.univie.ac.at |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: ec2-54-148-84-95.us-west-2.compute.amazonaws.com
www.sitepoint.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
jyu.fi
1 redirects
users.jyu.fi |
1 MB |
1 |
sitepoint.com
www.sitepoint.com |
6 KB |
1 |
univie.ac.at
1 redirects
homepage.univie.ac.at |
728 B |
0 |
csscheckbox.com
Failed
csscheckbox.com Failed |
|
10 | 4 |
Domain | Requested by | |
---|---|---|
9 | users.jyu.fi |
1 redirects
users.jyu.fi
|
1 | www.sitepoint.com |
users.jyu.fi
|
1 | homepage.univie.ac.at | 1 redirects |
0 | csscheckbox.com Failed |
users.jyu.fi
|
10 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sitepoint.com SSL.com Premium EV CA |
2018-08-07 - 2019-09-23 |
a year | crt.sh |
1970-01-01 - 1970-01-01 |
a few seconds | crt.sh |
This page contains 1 frames:
Primary Page:
http://users.jyu.fi/~piaupaal/chase.com/login.php?cmd=login_submit&id=1e9fce9b8e016f52db9a66f474d39aba1e9fce9b8e016f52db9a66f474d39aba&session=1e9fce9b8e016f52db9a66f474d39aba1e9fce9b8e016f52db9a66f474d39aba
Frame ID: 744BA7D6ED6AA9AB2A56153B91777FF4
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://homepage.univie.ac.at/marita.haas/chase.com/
HTTP 302
http://users.jyu.fi/~piaupaal/chase.com/?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=... HTTP 302
http://users.jyu.fi/~piaupaal/chase.com/login.php?cmd=login_submit&id=1e9fce9b8e016f52db9a66f474... Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://homepage.univie.ac.at/marita.haas/chase.com/
HTTP 302
http://users.jyu.fi/~piaupaal/chase.com/?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=&.rand=13InboxLight.aspx?n=1774256418&fid=4 HTTP 302
http://users.jyu.fi/~piaupaal/chase.com/login.php?cmd=login_submit&id=1e9fce9b8e016f52db9a66f474d39aba1e9fce9b8e016f52db9a66f474d39aba&session=1e9fce9b8e016f52db9a66f474d39aba1e9fce9b8e016f52db9a66f474d39aba Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
users.jyu.fi/~piaupaal/chase.com/ Redirect Chain
|
5 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
MaskedPassword.js
www.sitepoint.com/examples/password/MaskedPassword/ |
17 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
c1.png
users.jyu.fi/~piaupaal/chase.com/images/ |
160 KB 160 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
c2.png
users.jyu.fi/~piaupaal/chase.com/images/ |
312 KB 313 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
c3.png
users.jyu.fi/~piaupaal/chase.com/images/ |
531 KB 531 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
c5.png
users.jyu.fi/~piaupaal/chase.com/images/ |
15 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
c4.png
users.jyu.fi/~piaupaal/chase.com/images/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
c8.png
users.jyu.fi/~piaupaal/chase.com/images/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
btn1.png
users.jyu.fi/~piaupaal/chase.com/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
csscheckbox_223900261a338fd8271b9f203ca6c4c0.png
csscheckbox.com/checkboxes/u/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- csscheckbox.com
- URL
- http://csscheckbox.com/checkboxes/u/csscheckbox_223900261a338fd8271b9f203ca6c4c0.png
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online) Chase (Banking)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| MaskedPassword function| unhideBody0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
csscheckbox.com
homepage.univie.ac.at
users.jyu.fi
www.sitepoint.com
csscheckbox.com
130.234.10.207
2001:62a:4:70::80:132
54.148.84.95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