URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Submission: On May 28 via api from US

Summary

This website contacted 30 IPs in 7 countries across 20 domains to perform 91 HTTP transactions. The main IP is 185.113.25.55, located in United Kingdom and belongs to FUTURE, GB. The main domain is www.techradar.com.
TLS certificate: Issued by Let's Encrypt Authority X3 on May 3rd 2020. Valid for: 3 months.
This is the only time www.techradar.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
4 185.113.25.55 20596 (FUTURE)
13 8.253.95.245 3356 (LEVEL3)
7 185.113.25.53 20596 (FUTURE)
5 2600:9000:219... 16509 (AMAZON-02)
1 2606:4700::68... 13335 (CLOUDFLAR...)
2 8.241.89.124 3356 (LEVEL3)
1 7 2a00:1450:400... 15169 (GOOGLE)
1 13.224.96.38 16509 (AMAZON-02)
1 3 2.16.46.85 16625 (AKAMAI-AS)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 35.168.180.84 14618 (AMAZON-AES)
18 217.182.138.133 16276 (OVH)
3 3 2a00:1450:400... 15169 (GOOGLE)
3 3 2a00:1450:400... 15169 (GOOGLE)
3 2a00:1450:400... 15169 (GOOGLE)
1 2600:9000:219... 16509 (AMAZON-02)
5 185.113.25.51 20596 (FUTURE)
1 94.31.29.99 33438 (HIGHWINDS2)
3 35.157.212.16 16509 (AMAZON-02)
1 216.58.207.38 15169 (GOOGLE)
1 13.224.95.90 16509 (AMAZON-02)
1 35.190.59.101 15169 (GOOGLE)
1 185.113.25.54 20596 (FUTURE)
1 8.241.80.252 3356 (LEVEL3)
1 52.28.51.75 16509 (AMAZON-02)
2 52.239.242.148 8075 (MICROSOFT...)
3 35.233.20.168 15169 (GOOGLE)
1 2a04:4e42:1b:... 54113 (FASTLY)
1 2001:4860:480... 15169 (GOOGLE)
2 185.113.25.61 20596 (FUTURE)
91 30
Domain Requested by
13 vanilla.futurecdn.net www.techradar.com
vanilla.futurecdn.net
www.google-analytics.com
12 www.ultimedia.com vanilla.futurecdn.net
www.techradar.com
www.ultimedia.com
7 www.google-analytics.com 1 redirects www.techradar.com
vanilla.futurecdn.net
7 widgets.hawk-assets.co.uk www.techradar.com
widgets.hawk-assets.co.uk
6 medialb.ultimedia.com
5 search-api.fie.future.net.uk www.techradar.com
4 www.techradar.com vanilla.futurecdn.net
www.techradar.com
3 offer.slgnt.eu targetemsecure.blob.core.windows.net
offer.slgnt.eu
www.techradar.com
3 orionis.techradar.com www.techradar.com
3 www.google.de www.techradar.com
3 www.google.com 3 redirects
3 stats.g.doubleclick.net 3 redirects
3 sb.scorecardresearch.com 1 redirects www.techradar.com
3 quantcast.mgr.consensu.org www.techradar.com
quantcast.mgr.consensu.org
2 api.vanilla.futurecdn.net www.techradar.com
2 targetemsecure.blob.core.windows.net www.techradar.com
targetemsecure.blob.core.windows.net
2 static.quantcast.mgr.consensu.org quantcast.mgr.consensu.org
2 cdn.mos.cms.futurecdn.net www.techradar.com
1 siteeuwest.slgnt.eu www.techradar.com
1 cdn.polyfill.io targetemsecure.blob.core.windows.net
1 www.summerhamster.com
1 mos.fie.futurecdn.net
1 gizmos.future-fie.co.uk
1 r.skimresources.com www.techradar.com
1 audit.quantcast.mgr.consensu.org www.techradar.com
1 ad.doubleclick.net
1 dg876rejmw3ebkm51boa0sx2-wpengine.netdna-ssl.com
1 vendorlist.consensu.org www.techradar.com
1 srv-2020-05-28-13.pixel.parsely.com www.techradar.com
1 ampcid.google.de www.techradar.com
1 ampcid.google.com www.techradar.com
1 cdn.parsely.com www.techradar.com
1 cdn.onesignal.com www.techradar.com
91 33
Subject Issuer Validity Valid
techradar.com
Let's Encrypt Authority X3
2020-05-03 -
2020-08-01
3 months crt.sh
*.futurecdn.net
DigiCert SHA2 High Assurance Server CA
2017-07-20 -
2020-07-01
3 years crt.sh
hawk-assets.co.uk
Let's Encrypt Authority X3
2020-05-03 -
2020-08-01
3 months crt.sh
quantcast.mgr.consensu.org
Amazon
2020-05-22 -
2021-06-22
a year crt.sh
sni.cloudflaressl.com
CloudFlare Inc ECC CA-2
2020-04-06 -
2020-10-09
6 months crt.sh
*.google-analytics.com
GTS CA 1O1
2020-05-05 -
2020-07-28
3 months crt.sh
*.parsely.com
Amazon
2019-08-30 -
2020-09-30
a year crt.sh
*.scorecardresearch.com
Sectigo RSA Organization Validation Secure Server CA
2019-12-16 -
2020-12-25
a year crt.sh
*.google.com
GTS CA 1O1
2020-05-05 -
2020-07-28
3 months crt.sh
*.google.de
GTS CA 1O1
2020-05-05 -
2020-07-28
3 months crt.sh
*.pixel.parsely.com
Let's Encrypt Authority X3
2020-04-01 -
2020-06-30
3 months crt.sh
*.ultimedia.com
Sectigo RSA Domain Validation Secure Server CA
2020-03-05 -
2022-03-05
2 years crt.sh
www.google.de
GTS CA 1O1
2020-05-05 -
2020-07-28
3 months crt.sh
vendorlist.consensu.org
Amazon
2020-02-07 -
2021-03-07
a year crt.sh
search-api.fie.future.net.uk
Let's Encrypt Authority X3
2020-05-03 -
2020-08-01
3 months crt.sh
*.netdna-ssl.com
Sectigo RSA Domain Validation Secure Server CA
2020-02-18 -
2021-03-18
a year crt.sh
orionis.techradar.com
Let's Encrypt Authority X3
2020-04-17 -
2020-07-16
3 months crt.sh
*.doubleclick.net
GTS CA 1O1
2020-05-05 -
2020-07-28
3 months crt.sh
*.skimresources.com
DigiCert SHA2 Secure Server CA
2018-09-13 -
2020-10-07
2 years crt.sh
future-fie.co.uk
Let's Encrypt Authority X3
2020-05-03 -
2020-08-01
3 months crt.sh
*.summerhamster.com
Let's Encrypt Authority X3
2020-04-21 -
2020-07-20
3 months crt.sh
*.blob.core.windows.net
Microsoft IT TLS CA 5
2020-04-22 -
2022-04-22
2 years crt.sh
*.slgnt.eu
DigiCert SHA2 Secure Server CA
2019-10-18 -
2021-09-22
2 years crt.sh
f3.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2020-04-16 -
2021-04-17
a year crt.sh
api.vanilla.futurecdn.net
Let's Encrypt Authority X3
2020-05-03 -
2020-08-01
3 months crt.sh

This page contains 4 frames:

Primary Page: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Frame ID: E79755448BEF3894E1E745C2FDA45906
Requests: 89 HTTP requests in this frame

Frame: https://static.quantcast.mgr.consensu.org/v33/cmp-3pc-check.html
Frame ID: 496FA22013D0B5C7EDEDFD9FAEB5E618
Requests: 1 HTTP requests in this frame

Frame: https://www.ultimedia.com/deliver/generic/iframe?mdtk=02312367&zone=2&type_player=0&sendstats=0&src=f5lsup&width=452&height=300&urlfacebook=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&ad=1&autoplay=yes&fstart=1&title=The+Last+of+Us+Part+2+release+date%2C+delay%2C+trailers%2C+news%2C+and+rumors+%7C+TechRadar+Talks&endMessage=um_ultimedia_wrapper_ultimediaEndRoll&widgetPrefix=um_ultimedia_wrapper_&tagparam=&tagparamdecoded=&visible=&gdprconsentstring=
Frame ID: DF17444B30A9E7CCA17B79E776DA9B66
Requests: 1 HTTP requests in this frame

Frame: https://offer.slgnt.eu/sdstatic/cookie.html
Frame ID: E789F54F10C073674269306EE6A2BDE3
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<iframe[^>]* (?:id="comscore"|scr=[^>]+comscore)|\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • script /\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i

Page Statistics

91
Requests

99 %
HTTPS

35 %
IPv6

20
Domains

33
Subdomains

30
IPs

7
Countries

1521 kB
Transfer

5239 kB
Size

8
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 20
  • https://sb.scorecardresearch.com/b?c1=2&c2=10055482&cs_ucfr=&comscorekw=prokw&ns__t=1590673226478&ns_c=UTF-8&cv=3.5&c8=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&c7=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=10055482&cs_ucfr=&comscorekw=prokw&ns__t=1590673226478&ns_c=UTF-8&cv=3.5&c8=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&c7=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&c9=
Request Chain 27
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j82&tid=UA-48894329-1&cid=1121561642.1590673227&jid=1372885134&gjid=813227896&_gid=1153192048.1590673227&_u=YGBAgEABBAQC~&z=757396633 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1121561642.1590673227&jid=1372885134&_v=j82&z=757396633 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1121561642.1590673227&jid=1372885134&_v=j82&z=757396633&slf_rd=1&random=3869390625
Request Chain 75
  • https://www.google-analytics.com/r/collect?v=1&_v=j82&a=1515924664&t=event&ni=1&_s=1&dl=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&ul=en-us&de=UTF-8&dt=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&ec=Affiliates&ea=FEP%20TOP%20widget%20missing&el=Password&_u=6HDAAEABBAQC~&jid=1790958497&gjid=1927355864&cid=1121561642.1590673227&tid=UA-48894329-1&_gid=1153192048.1590673227&_r=1&cd57=null&cd40=Password&cd41=Malware%7CDiscord%7CTrojan_horse_computing%7CUser_computing%7CAnarchyGrabber3_AnarchyGrabber3&cd42=Software&cd45=Password&cd46=Computing&cd47=Malware_turns_Discord_client_into_password_stealer&cd50=5&cd51=false&cd58=Computing&cd74=&cd13=false&cd10=EN-US&cd1=news&cd2=computing&cd3=computing&cd4=tech_techradar%2F&cd5=XUeVg74qQZwxrcTVTXpDSk&cd6=%7Cdiscord%7Canarchygrabber%7Cmalware%7Ctrojan%7Cpasswords%7C2fa%7Chackers%7Canarchygrabber3%7Cdiscord%7Canarchygrabber%7Cmalware%7Ctrojan%7Cpasswords%7C2fa%7Chackers%7Canarchygrabber3%7Ccomputing%7Ctrbc%7Cexclude-from-homepage%7Ctype_news%7Cchannel_computing%7Ccontentdev%7Ctrbc%7Cexclude-from-homepage%7Ctype_news%7Cchannel_computing%7Ccontentdev%7Cserversidehawk&cd7=anthony_spadafora&cd8=25-05-2020&cd9=1&cd27=182136&cd95=news&cd106=0&cd126=en&cd127=GB%7CUS%7CAU%7CSG%7CIN%7CAE%7CNZ%7CZA&cd128=25-05-2020&cd31=10&cd30=4g&cd12=null&cd14=null&cd16=null&cd17=null&cd25=null&cd37=null&cd48=null&cd53=null&cd62=0&cd73=null&cd75=null&cd76=null&cd90=3855272525428220400&cd105=null&cd111=null&cd115=null&cd116=null&cd117=null&cd118=null&cd124=null&cd125=null&cm1=1518&cm27=3036&cm28=1168&z=1088227136 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-48894329-1&cid=1121561642.1590673227&jid=1790958497&_gid=1153192048.1590673227&gjid=1927355864&_v=j82&z=1088227136 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1121561642.1590673227&jid=1790958497&_v=j82&z=1088227136 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1121561642.1590673227&jid=1790958497&_v=j82&z=1088227136&slf_rd=1&random=4082598051
Request Chain 90
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j82&tid=UA-48894329-1&cid=1121561642.1590673227&jid=2035591828&gjid=483722976&_gid=1153192048.1590673227&_u=6HDAgEABBAQC~&z=515231478 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1121561642.1590673227&jid=2035591828&_v=j82&z=515231478 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1121561642.1590673227&jid=2035591828&_v=j82&z=515231478&slf_rd=1&random=1885769797

91 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set malware-turns-discord-client-into-password-stealer
www.techradar.com/news/
175 KB
48 KB
Document
General
Full URL
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.55 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif08.web.future.net.uk
Software
/
Resource Hash
6b7920a513b4ef82d5ba26a110c0a41a91d339e7d401902361d172e898e1545d

Request headers

Host
www.techradar.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 28 May 2020 09:28:26 GMT
Content-Type
text/html; charset=UTF-8
X-FTR-Request-ID
c0966a92-1c95-45ce-883b-4ddde96269d4 00000000:FBBC_00000000:01BB_5ECFBF4A_1BDF58:46DF
Last-Modified
Thu, 28 May 2020 09:28:26 GMT
Xkey
techradar-platform-responsive techradar-article-XUeVg74qQZwxrcTVTXpDSk techradar-articletype-news techradar-articletemplate-standard techradar-article-age-recent techradar-region-US techradar-language-en techradar-author-7mgQv8SNay7k3EBExM79hM techradar-tag-ePwDVFQDuuC4YhTucNxXYX techradar-tag-pK8oXQy9JfmnytYhEXvzf5 techradar-tag-Tyi2HRsUEfBw27aPdPzTfj techradar-tag-jP7tiF7wYMBxMXrHBxtP57 techradar-tag-qPwtyR6YYDqxCFSHZ7aQxk techradar-tag-RF2BL6kwcsaDbnN779UvG5 techradar-tag-d2FrBhFT5eEGbW3zsX6FJ8 techradar-tag-rRSjdh2qpsswfChKiWgkyT techradar-tag-UAhMNQhdFijuNAxvLUWf2Y techradar-tag-ELVnYF7rwgQ2gqidP3Ra9S techradar-tag-ocag5ygCaDAoLAbxoFE747 techradar-tag-ZSgdGBn8nBmXMiNdjn5w6S techradar-version-26.9.0 techradar-server-ftefrontprod-172-20-9-85
Content-Encoding
gzip
Vary
Accept-Encoding
Age
15119
X-Country-Code
US
X-FTR-Cache-Status
HIT
X-FTR-Expires
Sat, 30 May 2020 09:28:26 GMT
Expires
Thu, 28 May 2020 13:45:26 GMT
Cache-Control
max-age=300,public
Set-Cookie
FTR_Country_Code=CH; path=/; domain=www.techradar.com
X-Country-Code-Real
CH
Accept-Ranges
bytes
Content-Length
47347
X-FTR-Realm
pip
X-FTR-DC
TC
X-FTR-Balancer
fteproxyred
X-FTR-Backend
www-live-sites-varnish
X-FTR-Backend-Server
ftevarnishprodyellow
OpenSans.woff2
vanilla.futurecdn.net/techradar/182136/media/fonts/
10 KB
11 KB
Font
General
Full URL
https://vanilla.futurecdn.net/techradar/182136/media/fonts/OpenSans.woff2
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.253.95.245 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
12b9d92963b594157b22adeebfbcf463b80c5d504f0fefe3bee1533e20a996c9

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Origin
https://www.techradar.com

Response headers

Date
Wed, 27 May 2020 10:32:20 GMT
Content-Encoding
gzip
Age
97686
X-FTR-Backend-Server
ftefrontprod-172-20-9-86
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
10220
X-FTR-Balancer
webproxyprod01
X-FTR-Request-ID
00000000:AA2A_00000000:0050_5ECE41B4_DCB1F:0C6C
Last-Modified
Wed, 27 May 2020 10:01:57 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5ece3a95-2844"
access-control-allow-methods
GET
Content-Type
text/plain; charset=utf-8
access-control-allow-origin
*
Cache-Control
max-age=2592000
access-control-allow-credentials
true
Accept-Ranges
bytes
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Fri, 26 Jun 2020 10:32:20 GMT
OpenSans-Semibold.woff2
vanilla.futurecdn.net/techradar/182136/media/fonts/
10 KB
11 KB
Font
General
Full URL
https://vanilla.futurecdn.net/techradar/182136/media/fonts/OpenSans-Semibold.woff2
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.253.95.245 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
83113ce831f3f1ec8841232d895e17f722444b1939f5230891f7ff17a7c53618

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Origin
https://www.techradar.com

Response headers

Date
Wed, 27 May 2020 10:32:23 GMT
Content-Encoding
gzip
Age
97683
X-FTR-Backend-Server
ftefrontprod-172-20-9-86
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
10389
X-FTR-Balancer
webproxyprod01
X-FTR-Request-ID
00000000:E47A_00000000:0050_5ECE41B6_63531:0C6A
Last-Modified
Wed, 27 May 2020 10:01:57 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5ece3a95-28a4"
Access-Control-Allow-Methods
GET
Content-Type
text/plain; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Fri, 26 Jun 2020 10:32:28 GMT
responsive.js
widgets.hawk-assets.co.uk/js/w/
96 KB
29 KB
Script
General
Full URL
https://widgets.hawk-assets.co.uk/js/w/responsive.js
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.53 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif10.web.future.net.uk
Software
/
Resource Hash
4683c315ab19a0dbe37361b3ff1b57691231fb474dd47093844b080e1b76cac1

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 28 May 2020 13:39:58 GMT
Content-Encoding
gzip
X-Hawk-Country
Xkey
asset-type-fie-widgets
Age
27
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-assets
X-FTR-Cache-Status
HIT
Content-Length
28935
X-FTR-Expires
Thu, 28 May 2020 14:09:58 GMT
X-FTR-Balancer
hawkproxyprodblue
X-FTR-Request-ID
00000000:2996_00000000:01BB_5ECFBF4A_68DB92:1CC0
Last-Modified
Tue, 26 May 2020 16:53:02 GMT
X-Country-Code-Real
CH
ETag
"5ecd496e-17f1a"
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
X-FTR-Backend-Server
fievarnishprodwhite
Cache-Control
max-age=3600
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Expires
Thu, 28 May 2020 14:39:58 GMT
header.js
vanilla.futurecdn.net/techradar/182136/media/js/header/
687 KB
195 KB
Script
General
Full URL
https://vanilla.futurecdn.net/techradar/182136/media/js/header/header.js
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.253.95.245 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
f71b4c273db3eddb2b6d993ea9aff9e065b8981ecc3613649471054b6083c4a7

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Origin
https://www.techradar.com

Response headers

Date
Wed, 27 May 2020 10:32:20 GMT
Content-Encoding
gzip
Age
97686
X-FTR-Backend-Server
ftefrontprod-172-20-9-85
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
199201
X-FTR-Balancer
webproxyprod01
X-FTR-Request-ID
00000000:B719_00000000:0050_5ECE41B4_DCB25:0C6C
Last-Modified
Wed, 27 May 2020 10:01:57 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5ece3a95-abb11"
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Fri, 26 Jun 2020 10:32:28 GMT
choice.js
quantcast.mgr.consensu.org/choice/uer8ZPXHG8WDU/www.techradar.com/
4 KB
2 KB
Script
General
Full URL
https://quantcast.mgr.consensu.org/choice/uer8ZPXHG8WDU/www.techradar.com/choice.js?timestamp=1590673226236
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2190:2800:9:46dc:4700:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
9b69d8cb86f47f6a5a9f02444453c471e8e219cc805d3d918bca89cb7620fe36

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 28 May 2020 13:40:22 GMT
content-encoding
gzip
last-modified
Tue, 19 May 2020 15:31:34 GMT
server
AmazonS3
age
33
x-amz-server-side-encryption
AES256
vary
Access-Control-Request-Headers,Access-Control-Request-Method,Origin,Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript; charset=UTF-8
status
200
x-amz-cf-pop
ZRH50-C1
x-amz-cf-id
plytiPA-N3B9aa6-Nfc2gKbXDfzdZah8jPUS_pYeJPY9ximp1n8Wog==
via
1.1 d7147e532e5cf73689fcb39fa760bcf3.cloudfront.net (CloudFront)
techradar.woff
vanilla.futurecdn.net/techradar/182136/media/fonts/
8 KB
8 KB
Font
General
Full URL
https://vanilla.futurecdn.net/techradar/182136/media/fonts/techradar.woff
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.253.95.245 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
1c732fe50c12ed90ffeb0ddc68602e4f8f46d7089efdfadfe0871a56af5498a1

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Origin
https://www.techradar.com

Response headers

Date
Wed, 27 May 2020 10:32:20 GMT
Age
97686
X-FTR-Backend-Server
ftefrontprod-172-20-9-86
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
7840
X-FTR-Balancer
webproxyprodred
X-FTR-Request-ID
00000000:E225_00000000:0050_5ECE41B4_58CCE:0BAC
Last-Modified
Wed, 27 May 2020 10:01:57 GMT
Server
Footprint Distributor V6.1.1162
ETag
"5ece3a95-1ea0"
Access-Control-Allow-Methods
GET
Content-Type
application/font-woff
Access-Control-Allow-Origin
*
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Fri, 26 Jun 2020 10:32:20 GMT
OneSignalSDK.js
cdn.onesignal.com/sdks/
8 KB
3 KB
Script
General
Full URL
https://cdn.onesignal.com/sdks/OneSignalSDK.js
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6812:e234 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
b1357113f7b28eb8a5e2da0fe0bca37f40fa0d5d25d9dafa4698d0ceb9c72d78

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 28 May 2020 13:40:26 GMT
content-encoding
gzip
cf-cache-status
HIT
server
cloudflare
age
1299
etag
W/"3f1c1174b1ee437acb796315c8259f0c"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=43200
cf-ray
59a863301f9bc272-FRA
cf-request-id
02fd1c520b0000c2727ba09200000001
expires
Fri, 29 May 2020 01:40:26 GMT
dEpz5LV5PYpqYBngLd6omi-650-80.jpg.webp
cdn.mos.cms.futurecdn.net/
46 KB
47 KB
Image
General
Full URL
https://cdn.mos.cms.futurecdn.net/dEpz5LV5PYpqYBngLd6omi-650-80.jpg.webp
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.241.89.124 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
openresty/1.15.8.1 /
Resource Hash
0f9a6e8590cfcdb342f9dd2786b4b274e3d4b15264be190d05489bee561570c7

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 11 May 2020 16:21:29 GMT
X-Backend
default
Age
1459137
X-FTR-DC
TC
X-FTR-Realm
pip
X-FTR-Backend
mos_kodiak
Connection
keep-alive
X-FTR-Cache-Status
MISS
Content-Length
47498
X-FTR-Balancer
bulkproxyprod01
X-FTR-Request-ID
00000000:6755_00000000:0050_5EB97B86_28985:0B28
Server
openresty/1.15.8.1
X-Served-By
kodiak-mos-adapter-varnish-fdc57966-fkvrc
Content-Type
image/webp
X-FTR-Backend-Server
kube
Cache-Control
max-age=5184000
Accept-Ranges
bytes
Expires
Sat, 11 Jul 2020 13:13:27 GMT
missing-image.svg
vanilla.futurecdn.net/techradar/media/img/
3 KB
2 KB
Image
General
Full URL
https://vanilla.futurecdn.net/techradar/media/img/missing-image.svg
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.253.95.245 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
131423a5b0117aa6fddbde39abed88048b2ee6a147ade1fbf040b551614ab2d2

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 22 May 2020 19:38:16 GMT
Content-Encoding
gzip
Age
496930
X-FTR-Backend-Server
ftefrontprod-172-20-9-86
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
1061
X-FTR-Balancer
webproxyprod01
X-FTR-Request-ID
00000000:A4D9_00000000:0050_5EC82A28_1AAC5:7685
Last-Modified
Fri, 22 May 2020 13:48:30 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5ec7d82e-a6b"
access-control-allow-methods
GET
Content-Type
image/svg+xml
access-control-allow-origin
*
Cache-Control
max-age=2592000
access-control-allow-credentials
true
Accept-Ranges
bytes
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Sun, 21 Jun 2020 19:38:16 GMT
analytics.js
www.google-analytics.com/
45 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
2f1fd973e6c48489ae07c467e3278635b856c698d1f502e06af3ab555937deac
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 30 Apr 2020 21:54:13 GMT
server
Golfe2
age
2647
date
Thu, 28 May 2020 12:56:19 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18433
expires
Thu, 28 May 2020 14:56:19 GMT
hawklinks.js
widgets.hawk-assets.co.uk/hl/
114 KB
38 KB
Script
General
Full URL
https://widgets.hawk-assets.co.uk/hl/hawklinks.js
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.53 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif10.web.future.net.uk
Software
/
Resource Hash
4670d2c85aebbf7c824f2296f3f0fd6173f6dd74b42a0d9866b094ccb86406f7

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 28 May 2020 13:20:36 GMT
Content-Encoding
gzip
X-Hawk-Country
Xkey
asset-type-fie-hawklinks
Age
1189
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-assets
X-FTR-Cache-Status
HIT
Content-Length
37957
X-FTR-Expires
Thu, 28 May 2020 13:50:36 GMT
X-FTR-Balancer
hawkproxyprodblue
X-FTR-Request-ID
00000000:2998_00000000:01BB_5ECFBF4A_41B66E:1CBE
Last-Modified
Tue, 26 May 2020 09:16:18 GMT
X-Country-Code-Real
CH
ETag
"5eccde62-1c967"
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
X-FTR-Backend-Server
fievarnishprodwhite
Cache-Control
max-age=3600
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Expires
Thu, 28 May 2020 14:20:36 GMT
p.js
cdn.parsely.com/keys/techradar.com/
48 KB
19 KB
Script
General
Full URL
https://cdn.parsely.com/keys/techradar.com/p.js
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.96.38 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-96-38.zrh50.r.cloudfront.net
Software
nginx /
Resource Hash
a78fd35e8afff22e72a55015aa54ad045f829f3380927d0c88363d324b8d55c2

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
public
date
Wed, 27 May 2020 19:13:08 GMT
content-encoding
gzip
last-modified
Thu, 02 Apr 2020 00:28:36 GMT
server
nginx
age
66465
etag
"5e8531b4-c07c"
x-cache
Hit from cloudfront
content-type
application/x-javascript
status
200
cache-control
max-age=86400, public
x-amz-cf-pop
ZRH50-C1
x-amz-cf-id
AaSvZ7F4CV4N559v-Z7k1hz11qMDhMIKOdV-5LhBSbYkEKje-yUNkA==
via
1.1 110750d14d1d900cd5c76d0ac872f5dd.cloudfront.net (CloudFront)
expires
Thu, 28 May 2020 19:12:34 GMT
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.46.85 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-16-46-85.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a256529bd5b1b8846f8d2536ce7581fb6cea4479992f222d01535903dff48d79

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 28 May 2020 13:40:26 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
884
Expires
Fri, 29 May 2020 13:40:26 GMT
main.min.js
vanilla.futurecdn.net/techradar/182136/media/js/
1 MB
212 KB
Script
General
Full URL
https://vanilla.futurecdn.net/techradar/182136/media/js/main.min.js
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.253.95.245 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
0cfeaa5d33585688e72458302176524d406def37c1e9bac99c0fbc295f3a5375

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 10:32:20 GMT
Content-Encoding
gzip
Age
97686
X-FTR-Backend-Server
ftefrontprodred.core.future.net.uk
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
216667
X-FTR-Balancer
webproxyprodred
X-FTR-Request-ID
00000000:AC07_00000000:0050_5ECE41B4_FA7A8:0BAE
Last-Modified
Wed, 27 May 2020 10:01:57 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5ece3a95-104ea1"
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
access-control-allow-origin
*
Cache-Control
max-age=2592000
access-control-allow-credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Fri, 26 Jun 2020 10:32:20 GMT
techradar.min.css
vanilla.futurecdn.net/techradar/182136/media/css/
376 KB
52 KB
Stylesheet
General
Full URL
https://vanilla.futurecdn.net/techradar/182136/media/css/techradar.min.css
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.253.95.245 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
0f9e15fb725a8979aebe09f59dfab116a4ede8e34d4e9b279e29546c39af0280

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 10:32:20 GMT
Content-Encoding
gzip
Age
97686
X-FTR-Backend-Server
ftefrontprod-172-20-9-85
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
52513
X-FTR-Balancer
webproxyprodred
X-FTR-Request-ID
00000000:DCC8_00000000:0050_5ECE41B4_FA7A4:0BAE
Last-Modified
Wed, 27 May 2020 10:01:57 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5ece3a95-5e092"
Access-Control-Allow-Methods
GET
Content-Type
text/css
Access-Control-Allow-Origin
*
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Fri, 26 Jun 2020 10:32:38 GMT
cmp.js
quantcast.mgr.consensu.org/
264 KB
76 KB
Script
General
Full URL
https://quantcast.mgr.consensu.org/cmp.js
Requested by
Host: quantcast.mgr.consensu.org
URL: https://quantcast.mgr.consensu.org/choice/uer8ZPXHG8WDU/www.techradar.com/choice.js?timestamp=1590673226236
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2190:2800:9:46dc:4700:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
8f670db094f8157451312a2d25ce34fd67f622e07d356f9db841224cceeeed2d

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 28 May 2020 13:32:57 GMT
content-encoding
gzip
last-modified
Thu, 21 May 2020 20:45:01 GMT
server
AmazonS3
age
514
x-amz-server-side-encryption
AES256
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/javascript;charset=UTF-8
status
200
cache-control
public, max-age=7200
x-amz-meta-qc-ineu
True
x-amz-cf-pop
ZRH50-C1
x-amz-cf-id
t_TCFE7MiDgA3TsQHX2ygvPNPHYxnoy7IPeM6JiLq2ncGYIOjKcETQ==
via
1.1 d7147e532e5cf73689fcb39fa760bcf3.cloudfront.net (CloudFront)
publisher:getClientId
ampcid.google.com/v1/
74 B
181 B
XHR
General
Full URL
https://ampcid.google.com/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
991bfe84fec788f2b7d432b99a60c1e2aa2e799bc0137da8cf478299d0fc9a10
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Thu, 28 May 2020 13:40:26 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://www.techradar.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
94
x-xss-protection
0
8e9982e0-1eef-4b7e-81e2-3e3d9afd8cd1
https://www.techradar.com/
14 KB
0
Other
General
Full URL
blob:https://www.techradar.com/8e9982e0-1eef-4b7e-81e2-3e3d9afd8cd1
Requested by
Host: vanilla.futurecdn.net
URL: https://vanilla.futurecdn.net/techradar/182136/media/js/header/header.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
53192a2094cdc2c18d57a5621e3d49b310f349e26707bbdf523a85e7e60e01d8

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
14798
desktop-article-layout-responsive.js
vanilla.futurecdn.net/techradar/182136/media/js/header/
7 KB
3 KB
Script
General
Full URL
https://vanilla.futurecdn.net/techradar/182136/media/js/header/desktop-article-layout-responsive.js
Requested by
Host: vanilla.futurecdn.net
URL: https://vanilla.futurecdn.net/techradar/182136/media/js/header/header.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.253.95.245 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
e25eb4e58f80aefd45bce61567a7ca97370b2b74404da791c4102402a2f8a004

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 10:32:21 GMT
Content-Encoding
gzip
Age
97685
X-FTR-Backend-Server
ftefrontprod-172-20-9-86
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
1909
X-FTR-Balancer
webproxyprodred
X-FTR-Request-ID
00000000:D016_00000000:0050_5ECE41B5_8F628:0BAD
Last-Modified
Wed, 27 May 2020 10:01:57 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5ece3a95-1b11"
access-control-allow-methods
GET
Content-Type
application/javascript; charset=utf-8
access-control-allow-origin
*
Cache-Control
max-age=2592000
access-control-allow-credentials
true
Accept-Ranges
bytes
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Fri, 26 Jun 2020 10:32:29 GMT
n-format-format-responsive.js
vanilla.futurecdn.net/techradar/182136/media/js/header/
14 KB
5 KB
Script
General
Full URL
https://vanilla.futurecdn.net/techradar/182136/media/js/header/n-format-format-responsive.js
Requested by
Host: vanilla.futurecdn.net
URL: https://vanilla.futurecdn.net/techradar/182136/media/js/header/header.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.253.95.245 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
e05d3de73f21a59708352346d84a657deed3db5dfa3d90403f5153bf873ef21f

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 10:32:24 GMT
Content-Encoding
gzip
Age
97682
X-FTR-Backend-Server
ftefrontprodblue.core.future.net.uk
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
4740
X-FTR-Balancer
webproxyprodred
X-FTR-Request-ID
00000000:D543_00000000:0050_5ECE41B6_FA7E6:0BAE
Last-Modified
Wed, 27 May 2020 10:01:57 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5ece3a95-39ea"
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Fri, 26 Jun 2020 10:33:26 GMT
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=10055482&cs_ucfr=&comscorekw=prokw&ns__t=1590673226478&ns_c=UTF-8&cv=3.5&c8=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRad...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=10055482&cs_ucfr=&comscorekw=prokw&ns__t=1590673226478&ns_c=UTF-8&cv=3.5&c8=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRa...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=10055482&cs_ucfr=&comscorekw=prokw&ns__t=1590673226478&ns_c=UTF-8&cv=3.5&c8=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&c7=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&c9=
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.46.85 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-16-46-85.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 28 May 2020 13:40:26 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=10055482&cs_ucfr=&comscorekw=prokw&ns__t=1590673226478&ns_c=UTF-8&cv=3.5&c8=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&c7=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&c9=
Pragma
no-cache
Date
Thu, 28 May 2020 13:40:26 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
publisher:getClientId
ampcid.google.de/v1/
3 B
110 B
XHR
General
Full URL
https://ampcid.google.de/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Thu, 28 May 2020 13:40:26 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://www.techradar.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
23
x-xss-protection
0
/
srv-2020-05-28-13.pixel.parsely.com/plogger/
43 B
229 B
Image
General
Full URL
https://srv-2020-05-28-13.pixel.parsely.com/plogger/?rand=1590673226505&plid=77756209&idsite=techradar.com&url=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&urlref=&screen=1600x1200%7C1600x1200%7C24&data=%7B%7D&sid=1&surl=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&sref=&sts=1590673226501&slts=0&title=Malware+turns+Discord+client+into+password+stealer+%7C+TechRadar&date=Thu+May+28+2020+15%3A40%3A26+GMT%2B0200+(Central+European+Summer+Time)&action=pageview&pvid=1265637&u=pid%3D3785c169e2d91ed85569b7b79f0cf665
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.168.180.84 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-168-180-84.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 28 May 2020 13:40:26 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
smart.js
www.ultimedia.com/js/common/
40 KB
8 KB
Script
General
Full URL
https://www.ultimedia.com/js/common/smart.js
Requested by
Host: vanilla.futurecdn.net
URL: https://vanilla.futurecdn.net/techradar/182136/media/js/main.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
217.182.138.133 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb8.dginfra.net
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
ab0392b691d0326eb200e753184da2899fde1f20f72aea022b466d21cad7a8a8
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 28 May 2020 13:40:26 GMT
content-encoding
gzip
last-modified
Tue, 19 May 2020 08:52:48 GMT
server
nginx/1.10.3 (Ubuntu)
etag
W/"5ec39e60-a055"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=2678400
strict-transport-security
max-age=31536000; includeSubDomains
expires
Sun, 28 Jun 2020 13:40:26 GMT
US.svg
www.techradar.com/media/shared/img/flags/
3 KB
1 KB
Image
General
Full URL
https://www.techradar.com/media/shared/img/flags/US.svg
Requested by
Host: vanilla.futurecdn.net
URL: https://vanilla.futurecdn.net/techradar/182136/media/js/main.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.55 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif08.web.future.net.uk
Software
/
Resource Hash
a715e6b25ddd72ca18758cc80de0f3d56c9168743069ace7490be62ff13a16df

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 07 May 2020 15:12:12 GMT
Content-Encoding
gzip
Age
1808893
X-FTR-DC
TC
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites-varnish
X-FTR-Cache-Status
HIT
Content-Length
436
X-FTR-Expires
Sat, 06 Jun 2020 15:12:12 GMT
X-FTR-Balancer
fteproxyred
X-FTR-Request-ID
00000000:FBBC_00000000:01BB_5ECFBF4A_1BDF59:46DF
Last-Modified
Thu, 07 May 2020 10:09:26 GMT
X-Country-Code-Real
CH
ETag
W/"5eb3de56-a56"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
image/svg+xml
X-FTR-Backend-Server
ftevarnishprodred
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
X-Country-Code
US
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Sat, 06 Jun 2020 15:12:12 GMT
cmp-3pc-check.html
static.quantcast.mgr.consensu.org/v33/ Frame 496F
0
0
Document
General
Full URL
https://static.quantcast.mgr.consensu.org/v33/cmp-3pc-check.html
Requested by
Host: quantcast.mgr.consensu.org
URL: https://quantcast.mgr.consensu.org/cmp.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2190:2800:9:46dc:4700:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash

Request headers

:method
GET
:authority
static.quantcast.mgr.consensu.org
:scheme
https
:path
/v33/cmp-3pc-check.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer

Response headers

status
200
content-type
text/html
content-length
645
last-modified
Thu, 14 May 2020 20:38:15 GMT
x-amz-server-side-encryption
AES256
accept-ranges
bytes
server
AmazonS3
date
Thu, 28 May 2020 13:39:07 GMT
etag
"55b98270d639ef0c34781d9f03cce91f"
cache-control
immutable, max-age=1209600
x-cache
Hit from cloudfront
via
1.1 d7147e532e5cf73689fcb39fa760bcf3.cloudfront.net (CloudFront)
x-amz-cf-pop
ZRH50-C1
x-amz-cf-id
69wa6biDTWWxjqB6Y0w_fjtFLm4HhR97EYyiUt4Ztq8uGK7P6g1L0g==
age
615
collect
www.google-analytics.com/
35 B
96 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j82&a=1515924664&t=pageview&_s=1&dl=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&ul=en-us&de=UTF-8&dt=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=YGBAgEABBAQC~&jid=1372885134&gjid=813227896&cid=1121561642.1590673227&tid=UA-48894329-1&_gid=1153192048.1590673227&cd57=null&cd40=Password&cd41=Malware%7CDiscord%7CTrojan_horse_computing%7CUser_computing%7CAnarchyGrabber3_AnarchyGrabber3&cd42=Software&cd45=Password&cd46=Computing&cd47=Malware_turns_Discord_client_into_password_stealer&cd50=5&cd51=false&cd58=Computing&cd74=&cd13=false&cd10=EN-US&cd1=news&cd2=computing&cd3=computing&cd4=tech_techradar%2F&cd5=XUeVg74qQZwxrcTVTXpDSk&cd6=%7Cdiscord%7Canarchygrabber%7Cmalware%7Ctrojan%7Cpasswords%7C2fa%7Chackers%7Canarchygrabber3%7Cdiscord%7Canarchygrabber%7Cmalware%7Ctrojan%7Cpasswords%7C2fa%7Chackers%7Canarchygrabber3%7Ccomputing%7Ctrbc%7Cexclude-from-homepage%7Ctype_news%7Cchannel_computing%7Ccontentdev%7Ctrbc%7Cexclude-from-homepage%7Ctype_news%7Cchannel_computing%7Ccontentdev%7Cserversidehawk&cd7=anthony_spadafora&cd8=25-05-2020&cd9=1&cd27=182136&cd95=news&cd106=0&cd126=en&cd127=GB%7CUS%7CAU%7CSG%7CIN%7CAE%7CNZ%7CZA&cd128=25-05-2020&cd31=10&cd30=4g&z=1633631741
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 18 May 2020 22:57:55 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
830551
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j82&tid=UA-48894329-1&cid=1121561642.1590673227&jid=1372885134&gjid=813227896&_gid=1153192048.1590673227&_u=YGBAgEABBAQC~&z=757396633
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1121561642.1590673227&jid=1372885134&_v=j82&z=757396633
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1121561642.1590673227&jid=1372885134&_v=j82&z=757396633&slf_rd=1&random=3869390625
42 B
106 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1121561642.1590673227&jid=1372885134&_v=j82&z=757396633&slf_rd=1&random=3869390625
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 28 May 2020 13:40:26 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 28 May 2020 13:40:26 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1121561642.1590673227&jid=1372885134&_v=j82&z=757396633&slf_rd=1&random=3869390625
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
cmpui-popup.js
static.quantcast.mgr.consensu.org/v33/
266 KB
75 KB
Script
General
Full URL
https://static.quantcast.mgr.consensu.org/v33/cmpui-popup.js
Requested by
Host: quantcast.mgr.consensu.org
URL: https://quantcast.mgr.consensu.org/cmp.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2190:2800:9:46dc:4700:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
5038a66361943a447d31ef8898fb0f069593b45a5176454742b5d062d19cb41c

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 28 May 2020 13:32:01 GMT
content-encoding
gzip
last-modified
Thu, 14 May 2020 20:38:14 GMT
server
AmazonS3
age
858
x-amz-server-side-encryption
AES256
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/javascript;charset=UTF-8
status
200
cache-control
immutable, max-age=1209600
x-amz-cf-pop
ZRH50-C1
x-amz-cf-id
zKgUQtuRBHAC4lm_s32zFx2DPn_mqKQQ9NBltHs4jhWbCnUhJQ4GGQ==
via
1.1 d7147e532e5cf73689fcb39fa760bcf3.cloudfront.net (CloudFront)
OpenSans-Bold.woff2
vanilla.futurecdn.net/techradar/182136/media/fonts/
10 KB
11 KB
Font
General
Full URL
https://vanilla.futurecdn.net/techradar/182136/media/fonts/OpenSans-Bold.woff2
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.253.95.245 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
7a223174668e40dccd38462d34304503b75e31e700bff92b7e9e8fdda3274670

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://vanilla.futurecdn.net/techradar/182136/media/css/techradar.min.css
Origin
https://www.techradar.com

Response headers

Date
Wed, 27 May 2020 10:32:21 GMT
Content-Encoding
gzip
Age
97685
X-FTR-Backend-Server
ftefrontprod-172-20-9-86
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
10278
X-FTR-Balancer
webproxyprodred
X-FTR-Request-ID
00000000:D3F6_00000000:0050_5ECE41B5_FA7BC:0BAE
Last-Modified
Wed, 27 May 2020 10:01:57 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5ece3a95-2840"
Access-Control-Allow-Methods
GET
Content-Type
text/plain; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Fri, 26 Jun 2020 10:32:41 GMT
OpenSans-Light.woff2
vanilla.futurecdn.net/techradar/182136/media/fonts/
10 KB
11 KB
Font
General
Full URL
https://vanilla.futurecdn.net/techradar/182136/media/fonts/OpenSans-Light.woff2
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.253.95.245 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
6ed0702c109875dca01cfa51b44aa5c9da3f51892f8e9ba54e523d772ca20afb

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://vanilla.futurecdn.net/techradar/182136/media/css/techradar.min.css
Origin
https://www.techradar.com

Response headers

Date
Wed, 27 May 2020 10:32:21 GMT
Content-Encoding
gzip
Age
97685
X-FTR-Backend-Server
ftefrontprodblue.core.future.net.uk
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
10161
X-FTR-Balancer
webproxyprodred
X-FTR-Request-ID
00000000:9D51_00000000:0050_5ECE41B4_FA79E:0BAE
Last-Modified
Wed, 27 May 2020 10:01:57 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5ece3a95-27e0"
Access-Control-Allow-Methods
GET
Content-Type
text/plain; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Fri, 26 Jun 2020 10:32:41 GMT
wBY6c87uVw5WYSCfr4bfMM-1024-80.jpg.webp
cdn.mos.cms.futurecdn.net/
39 KB
40 KB
Image
General
Full URL
https://cdn.mos.cms.futurecdn.net/wBY6c87uVw5WYSCfr4bfMM-1024-80.jpg.webp
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.241.89.124 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
openresty/1.15.8.1 /
Resource Hash
1d17a4585e0f43b09a052cae32122092714fa34856b48c4afc779e5ed5aba17a

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 25 May 2020 03:00:31 GMT
X-Backend
default
Age
297595
X-FTR-DC
TC
X-FTR-Realm
pip
X-FTR-Backend
mos_kodiak
Connection
keep-alive
X-FTR-Cache-Status
MISS
Content-Length
40196
X-FTR-Balancer
bulkproxyprod01
X-FTR-Request-ID
00000000:708C_00000000:0050_5ECB34CE_2B2CC:7813
Server
openresty/1.15.8.1
X-Served-By
kodiak-mos-adapter-varnish-fdc57966-fkvrc
Content-Type
image/webp
X-FTR-Backend-Server
kube
Cache-Control
max-age=5184000
Accept-Ranges
bytes
Expires
Fri, 24 Jul 2020 03:31:55 GMT
2
www.ultimedia.com/api/widget/getwidget/mdtk/02312367/zone/
136 B
338 B
XHR
General
Full URL
https://www.ultimedia.com/api/widget/getwidget/mdtk/02312367/zone/2?url=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&meta_breadcrumb=&meta_tag=
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
217.182.138.133 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb8.dginfra.net
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
e78f56276c04b58863c43424709892edc08c45c7eb17bdc289d3cdd2a060fb1e
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Thu, 28 May 2020 13:40:27 GMT
server
nginx/1.10.3 (Ubuntu)
access-control-allow-origin
*
content-length
136
strict-transport-security
max-age=31536000; includeSubDomains
content-type
application/json
visible_player.js
www.ultimedia.com/js/common/
27 KB
9 KB
Script
General
Full URL
https://www.ultimedia.com/js/common/visible_player.js?v=1590624000000
Requested by
Host: www.ultimedia.com
URL: https://www.ultimedia.com/js/common/smart.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
217.182.138.133 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb8.dginfra.net
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
13df0abc22358701ae098e908624f5fb67766bc4a81702e9bc9d8abea1469ee2
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 28 May 2020 13:40:26 GMT
content-encoding
gzip
last-modified
Mon, 04 May 2020 10:47:28 GMT
server
nginx/1.10.3 (Ubuntu)
etag
W/"5eaff2c0-6ccb"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=2678400
strict-transport-security
max-age=31536000; includeSubDomains
expires
Sun, 28 Jun 2020 13:40:26 GMT
notification.js
www.ultimedia.com/js/common/
5 KB
2 KB
Script
General
Full URL
https://www.ultimedia.com/js/common/notification.js?v=1590624000000
Requested by
Host: www.ultimedia.com
URL: https://www.ultimedia.com/js/common/smart.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
217.182.138.133 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb8.dginfra.net
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
780396b361c35383795d3d1fb3e71e8c1e57e717973f3a4599ec4f11ba75f84e
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 28 May 2020 13:40:26 GMT
content-encoding
gzip
last-modified
Fri, 20 Mar 2020 09:46:29 GMT
server
nginx/1.10.3 (Ubuntu)
etag
W/"5e7490f5-129f"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=2678400
strict-transport-security
max-age=31536000; includeSubDomains
expires
Sun, 28 Jun 2020 13:40:26 GMT
visibilityStat.js
www.ultimedia.com/js/common/
2 KB
1 KB
Script
General
Full URL
https://www.ultimedia.com/js/common/visibilityStat.js?v=1590624000000
Requested by
Host: www.ultimedia.com
URL: https://www.ultimedia.com/js/common/smart.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
217.182.138.133 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb8.dginfra.net
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
675ab0a24f0160c73eaa7dde430b9f5ee68a54dc0c0c8d7d2bd0a811f30f6fd5
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 28 May 2020 13:40:26 GMT
content-encoding
gzip
last-modified
Fri, 20 Mar 2020 09:46:29 GMT
server
nginx/1.10.3 (Ubuntu)
etag
W/"5e7490f5-701"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=2678400
strict-transport-security
max-age=31536000; includeSubDomains
expires
Sun, 28 Jun 2020 13:40:26 GMT
vendorlist.json
vendorlist.consensu.org/
97 KB
18 KB
XHR
General
Full URL
https://vendorlist.consensu.org/vendorlist.json
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2190:5c00:1:af78:4c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
59b3a40d8afe6809772f568a403f5994910ddf1a1f3e39e830e490d66e31f90b

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 16:10:47 GMT
content-encoding
gzip
vary
Accept-Encoding,Origin,Access-Control-Request-Headers,Access-Control-Request-Method
age
595780
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Thu, 21 May 2020 16:01:21 GMT
server
AmazonS3
access-control-max-age
604800
access-control-allow-methods
GET
x-amz-version-id
Yh6c11QRkOU5DxynD2yPL5LFEJecOV97
via
1.1 6b0e09b8a7d995016df1513b4b11c17e.cloudfront.net (CloudFront)
cache-control
max-age=604800
x-amz-cf-pop
ZRH50-C1
content-type
application/json; charset=utf-8
x-amz-cf-id
4gvPCcKCPkv4GTEcMAqcVEa2Bx-K2nYolYFOh7kDA2uxqemDymlIXA==
pubvendors.json
quantcast.mgr.consensu.org/choice/uer8ZPXHG8WDU/www.techradar.com/.well-known/
6 KB
2 KB
XHR
General
Full URL
https://quantcast.mgr.consensu.org/choice/uer8ZPXHG8WDU/www.techradar.com/.well-known/pubvendors.json?timestamp=1590673226376
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2190:2800:9:46dc:4700:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
9b976763a0e92a50e457fd232430728eed5db0d9691c7d5bebee54162be2f496

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 28 May 2020 13:39:55 GMT
content-encoding
gzip
vary
Origin
age
32
x-amz-server-side-encryption
AES256
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
https://www.techradar.com
last-modified
Fri, 27 Mar 2020 14:13:46 GMT
server
AmazonS3
access-control-max-age
3000
access-control-allow-methods
GET
content-type
application/json;charset=UTF-8
via
1.1 d92debab8d9ca0518390aebaec8733a7.cloudfront.net (CloudFront)
access-control-allow-credentials
true
x-amz-cf-pop
ZRH50-C1
x-amz-cf-id
XR1fxb9xTIC5jzPc38gPo6LOmO1TWja-EzbngmiH3YmPrvv3LhekQA==
merchant-domains.php
search-api.fie.future.net.uk/
161 KB
35 KB
Fetch
General
Full URL
https://search-api.fie.future.net.uk/merchant-domains.php?site=TRD
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.51 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif14.web.future.net.uk
Software
/
Resource Hash
2c4c2efce29b5629e5a47ba2094e3ec51c53cb66c81bc989148f5e3e0f2f0027

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 28 May 2020 13:24:48 GMT
Content-Encoding
gzip
X-Hawk-Country
Age
938
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-api
X-FTR-Cache-Status
HIT
Content-Length
35027
X-FTR-Expires
Thu, 28 May 2020 13:54:48 GMT
X-FTR-Balancer
hawk-proxy-185-113-25-40
X-FTR-Request-ID
00000000:0E40_00000000:01BB_5ECFBF4B_103E9BC:479B
X-Country-Code-Real
CH
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/json; charset=utf-8;
X-FTR-Backend-Server
fievarnishprodwhite
Cache-Control
max-age=300,public
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,X-Hawk-Country,X-Hawk-Area
Expires
Thu, 28 May 2020 13:45:27 GMT
atechradar-gb.js
www.techradar.com/182136/media/shared/js/
332 KB
72 KB
Script
General
Full URL
https://www.techradar.com/182136/media/shared/js/atechradar-gb.js
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.55 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif08.web.future.net.uk
Software
/
Resource Hash
f414c6c2a7af37d10afc4d4a65377216199319ad3dcf9a3378cc1cc38e0f47df

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 10:32:22 GMT
Content-Encoding
gzip
Age
97684
X-FTR-DC
TC
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites-varnish
X-FTR-Cache-Status
HIT
Content-Length
72556
X-FTR-Expires
Fri, 26 Jun 2020 10:32:23 GMT
X-FTR-Balancer
fteproxyred
X-FTR-Request-ID
00000000:FBBC_00000000:01BB_5ECFBF4A_1BDF69:46DF
Last-Modified
Wed, 27 May 2020 10:01:57 GMT
X-Country-Code-Real
CH
ETag
W/"5ece3a95-52f4a"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
X-FTR-Backend-Server
ftevarnishprodblue
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
X-Country-Code
US
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Fri, 26 Jun 2020 10:32:22 GMT
btechradar-gb.js
www.techradar.com/182136/media/shared/js/
6 KB
3 KB
Script
General
Full URL
https://www.techradar.com/182136/media/shared/js/btechradar-gb.js
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.55 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif08.web.future.net.uk
Software
/
Resource Hash
9d1edce9b427c9853d98a71b4bf00cee076aeab478760b4101ec5dc6b3c7d1d1

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 10:32:30 GMT
Content-Encoding
gzip
Age
97676
X-FTR-DC
TC
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites-varnish
X-FTR-Cache-Status
HIT
Content-Length
1702
X-FTR-Expires
Fri, 26 Jun 2020 10:32:30 GMT
X-FTR-Balancer
fteproxyred
X-FTR-Request-ID
00000000:FBE8_00000000:01BB_5ECFBF4B_1037519:46E2
Last-Modified
Wed, 27 May 2020 10:01:57 GMT
X-Country-Code-Real
CH
ETag
W/"5ece3a95-1671"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
X-FTR-Backend-Server
ftevarnishprodgreen
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
X-Country-Code
US
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Fri, 26 Jun 2020 10:32:30 GMT
TR_Logo.png
dg876rejmw3ebkm51boa0sx2-wpengine.netdna-ssl.com/wp-content/uploads/2017/12/
6 KB
6 KB
Image
General
Full URL
https://dg876rejmw3ebkm51boa0sx2-wpengine.netdna-ssl.com/wp-content/uploads/2017/12/TR_Logo.png
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
94.31.29.99 , United Kingdom, ASN33438 (HIGHWINDS2, US),
Reverse DNS
94.31.29.99.IPYX-077437-ZYO.above.net
Software
NetDNA-cache/2.2 /
Resource Hash
37ccf6a41d068537cb68f6c2cc3b1f9b438d5f18d2a87a2a640172a850218b60

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 28 May 2020 13:40:27 GMT
last-modified
Tue, 10 Apr 2018 12:55:44 GMT
server
NetDNA-cache/2.2
status
200
etag
"5accb450-18f4"
vary
Accept-Encoding
x-cache
HIT
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
6388
truncated
/
3 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
87562d3773ffab3d0716a70faa73c38b322fde3b8f265c3d646a3cea976ef67e

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
smart
www.ultimedia.com/api/widget/
76 KB
10 KB
Script
General
Full URL
https://www.ultimedia.com/api/widget/smart?j=new&t=1590673226856&exclude=&meta_description=The%20AnarchyGrabber%20trojan%20has%20been%20updated%20to%20steal%20passwords%2C%20disable%202FA%20and%20spread%20malware%20to%20a%20victim%27s%20Discord%20friends.&meta_ogtitle=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_ogdescription=New%20variant%20of%20the%20AnarchyGrabber%20trojan%20can%20steal%20plain%20text%20passwords&meta_twittertitle=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_twitterdescription=New%20variant%20of%20the%20AnarchyGrabber%20trojan%20can%20steal%20plain%20text%20passwords&meta_title=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&meta_h1=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_h2=AnarchyGrabber3&meta_datepublished=2020-05-25T19%3A24%3A31Z&url=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&mdtk=02312367&zone=2&layout=&otherplayer=0&target=ultimedia_wrapper
Requested by
Host: www.ultimedia.com
URL: https://www.ultimedia.com/js/common/smart.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
217.182.138.133 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb8.dginfra.net
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
e8b78bda4e19ef69451df2988bc3f26a98249c2183e32d2eb9a92e7be217c14c
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 28 May 2020 13:40:27 GMT
content-encoding
gzip
server
nginx/1.10.3 (Ubuntu)
vary
Accept-Encoding
content-type
application/javascript; charset="utf-8"
status
200
strict-transport-security
max-age=31536000; includeSubDomains
content-length
10356
get_site_data
orionis.techradar.com/
18 B
251 B
XHR
General
Full URL
https://orionis.techradar.com/get_site_data?account_id=200&href=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&requestUUID=22635071-d41e-4e74-b3eb-6b7cec4bab34-1590673227109
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.157.212.16 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-35-157-212-16.eu-central-1.compute.amazonaws.com
Software
Jetty(9.4.2.v20170220) /
Resource Hash
6cddc935bfd70130ff535506925990fa432ff5dbf670134a9d5829cf8fa0374d

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 28 May 2020 13:40:27 GMT
x-sp-mms-node
mms-ay6.node.fra.consul
server
Jetty(9.4.2.v20170220)
status
200
access-control-allow-methods
GET
content-type
text/plain
access-control-allow-origin
https://www.techradar.com
cache-control
max-age=2592000
access-control-allow-credentials
true
;ord=1590673227114
ad.doubleclick.net/ddm/ad/puuqjxnalo/cgaedrrc/tbhnfsgqn/yewtlwthb/
43 B
662 B
Image
General
Full URL
https://ad.doubleclick.net/ddm/ad/puuqjxnalo/cgaedrrc/tbhnfsgqn/yewtlwthb/;ord=1590673227114?
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.38 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s24-in-f6.1e100.net
Software
cafe /
Resource Hash
9c41ba408efaf3a7a36099370bc814e38b0afd42229fa9e0e6040740620c85c0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 28 May 2020 13:40:27 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
43
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
translations.php
search-api.fie.future.net.uk/
20 KB
7 KB
Fetch
General
Full URL
https://search-api.fie.future.net.uk/translations.php?language=en-CH
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.51 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif14.web.future.net.uk
Software
/
Resource Hash
55ab111fd5836b7adc128da2ac5f23ca3ad59cac96e71650c99dc00fef6c5f3c

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 28 May 2020 13:14:43 GMT
Content-Encoding
gzip
X-Hawk-Country
Age
1543
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-api
X-FTR-Cache-Status
HIT
Content-Length
6342
X-FTR-Expires
Thu, 28 May 2020 13:44:43 GMT
X-FTR-Balancer
hawk-proxy-185-113-25-40
X-FTR-Request-ID
00000000:0E40_00000000:01BB_5ECFBF4B_103E9CA:479B
X-Country-Code-Real
CH
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/json; charset=utf-8;
X-FTR-Backend-Server
fievarnishprodred
Cache-Control
max-age=300,public
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,X-Hawk-Country,X-Hawk-Area
Expires
Thu, 28 May 2020 13:45:27 GMT
responsivev3.js
www.ultimedia.com/widgets/js/
108 KB
43 KB
Script
General
Full URL
https://www.ultimedia.com/widgets/js/responsivev3.js?v=2.0.2.7537
Requested by
Host: www.ultimedia.com
URL: https://www.ultimedia.com/api/widget/smart?j=new&t=1590673226856&exclude=&meta_description=The%20AnarchyGrabber%20trojan%20has%20been%20updated%20to%20steal%20passwords%2C%20disable%202FA%20and%20spread%20malware%20to%20a%20victim%27s%20Discord%20friends.&meta_ogtitle=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_ogdescription=New%20variant%20of%20the%20AnarchyGrabber%20trojan%20can%20steal%20plain%20text%20passwords&meta_twittertitle=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_twitterdescription=New%20variant%20of%20the%20AnarchyGrabber%20trojan%20can%20steal%20plain%20text%20passwords&meta_title=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&meta_h1=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_h2=AnarchyGrabber3&meta_datepublished=2020-05-25T19%3A24%3A31Z&url=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&mdtk=02312367&zone=2&layout=&otherplayer=0&target=ultimedia_wrapper
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
217.182.138.133 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb8.dginfra.net
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
99e39599d9a8292c712094b6114233d19961923037fc0e2d9441c773f654b98a
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 28 May 2020 13:40:27 GMT
content-encoding
gzip
last-modified
Fri, 20 Mar 2020 09:46:16 GMT
server
nginx/1.10.3 (Ubuntu)
etag
W/"5e7490e8-1ae39"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=2678400
strict-transport-security
max-age=31536000; includeSubDomains
expires
Sun, 28 Jun 2020 13:40:27 GMT
hawk.min.css
widgets.hawk-assets.co.uk/css/14.13.15-ac7e27af5aad941f6e65db1907ee427ad1ee105c/
17 KB
3 KB
Stylesheet
General
Full URL
https://widgets.hawk-assets.co.uk/css/14.13.15-ac7e27af5aad941f6e65db1907ee427ad1ee105c/hawk.min.css
Requested by
Host: widgets.hawk-assets.co.uk
URL: https://widgets.hawk-assets.co.uk/js/w/responsive.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.53 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif10.web.future.net.uk
Software
/
Resource Hash
e718d2a1972506572962e52c13af917e6c9bb570fff71006ca1b66da0b2a732e

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 28 May 2020 13:40:00 GMT
Content-Encoding
gzip
X-Hawk-Country
Xkey
asset-type-fie-widgets
Age
26
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-assets
X-FTR-Cache-Status
HIT
Content-Length
2119
X-FTR-Expires
Thu, 28 May 2020 14:10:00 GMT
X-FTR-Balancer
hawkproxyprodblue
X-FTR-Request-ID
00000000:2998_00000000:01BB_5ECFBF4A_41B679:1CBE
Last-Modified
Tue, 26 May 2020 16:53:02 GMT
X-Country-Code-Real
CH
ETag
"5ecd496e-43b5"
Vary
Accept-Encoding
Content-Type
text/css
X-FTR-Backend-Server
fievarnishprodwhite
Cache-Control
max-age=3600
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Expires
Thu, 28 May 2020 14:40:00 GMT
hawk.js
widgets.hawk-assets.co.uk/js/w/3f19011cfba4f086e527/
207 KB
69 KB
Script
General
Full URL
https://widgets.hawk-assets.co.uk/js/w/3f19011cfba4f086e527/hawk.js
Requested by
Host: widgets.hawk-assets.co.uk
URL: https://widgets.hawk-assets.co.uk/js/w/responsive.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.53 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif10.web.future.net.uk
Software
/
Resource Hash
c83b50479d009ce646d69c6cb3369238f8c32b4399f9297cebc02ac69b35653a

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 28 May 2020 13:40:00 GMT
Content-Encoding
gzip
X-Hawk-Country
Xkey
asset-type-fie-widgets
Age
27
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-assets
X-FTR-Cache-Status
HIT
Content-Length
69521
X-FTR-Expires
Thu, 28 May 2020 14:10:00 GMT
X-FTR-Balancer
hawkproxyprodblue
X-FTR-Request-ID
00000000:2996_00000000:01BB_5ECFBF4A_68DB9D:1CC0
Last-Modified
Tue, 26 May 2020 16:53:02 GMT
X-Country-Code-Real
CH
ETag
"5ecd496e-33d68"
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
X-FTR-Backend-Server
fievarnishprodwhite
Cache-Control
max-age=3600
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Expires
Thu, 28 May 2020 14:40:00 GMT
trd.min.css
widgets.hawk-assets.co.uk/css/
3 KB
2 KB
Stylesheet
General
Full URL
https://widgets.hawk-assets.co.uk/css/trd.min.css
Requested by
Host: widgets.hawk-assets.co.uk
URL: https://widgets.hawk-assets.co.uk/js/w/responsive.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.53 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif10.web.future.net.uk
Software
/
Resource Hash
95bd1ab7171ff0c52da6112fee1d48be3bd5ce549765ec276a817131a38011d8

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 28 May 2020 13:40:20 GMT
Content-Encoding
gzip
X-Hawk-Country
Xkey
asset-type-fie-widgets
Age
6
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-assets
X-FTR-Cache-Status
HIT
Content-Length
1331
X-FTR-Expires
Thu, 28 May 2020 14:10:20 GMT
X-FTR-Balancer
hawkproxyprodblue
X-FTR-Request-ID
00000000:2998_00000000:01BB_5ECFBF4B_41B6E4:1CBE
Last-Modified
Tue, 26 May 2020 16:53:02 GMT
X-Country-Code-Real
CH
ETag
"5ecd496e-d96"
Vary
Accept-Encoding
Content-Type
text/css
X-FTR-Backend-Server
fievarnishprodred
Cache-Control
max-age=3600
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Expires
Thu, 28 May 2020 14:40:20 GMT
/
audit.quantcast.mgr.consensu.org/
80 B
487 B
XHR
General
Full URL
https://audit.quantcast.mgr.consensu.org/?log=;1590673227256;TechRadar;https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer;;;;;p,off,false,uer8ZPXHG8WDU,1,en,33,203,true,true,false;displayConsentUi:mandatory,;GDPR-64xqw690h83sxw83oelk
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.95.90 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-95-90.zrh50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
2d0f6b590917e7d27ddeb026b280d62dde9d03bb92f47f56342fc5f68f0c24eb

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 28 May 2020 01:33:37 GMT
via
1.1 4e0fd86f7afa735e772d6f7fe5e91f5b.cloudfront.net (CloudFront)
vary
Origin
age
43611
x-cache
Hit from cloudfront
status
200
content-length
80
last-modified
Mon, 11 Jun 2018 22:07:34 GMT
server
AmazonS3
etag
"0614149d8033903db5de46d6c184bbfd"
access-control-max-age
3000
access-control-allow-methods
GET
content-type
text/html
access-control-allow-origin
*
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
x-amz-cf-id
kzGqQIR3_hXBt3CeWv6GI7ovTHr4gpqMPmJn07JbZtcRnX6tNJHg8A==
responsivev3.js
www.ultimedia.com/widgets/js/
108 KB
43 KB
Script
General
Full URL
https://www.ultimedia.com/widgets/js/responsivev3.js?v=2.0.2.7537
Requested by
Host: www.ultimedia.com
URL: https://www.ultimedia.com/api/widget/smart?j=new&t=1590673226856&exclude=&meta_description=The%20AnarchyGrabber%20trojan%20has%20been%20updated%20to%20steal%20passwords%2C%20disable%202FA%20and%20spread%20malware%20to%20a%20victim%27s%20Discord%20friends.&meta_ogtitle=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_ogdescription=New%20variant%20of%20the%20AnarchyGrabber%20trojan%20can%20steal%20plain%20text%20passwords&meta_twittertitle=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_twitterdescription=New%20variant%20of%20the%20AnarchyGrabber%20trojan%20can%20steal%20plain%20text%20passwords&meta_title=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&meta_h1=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_h2=AnarchyGrabber3&meta_datepublished=2020-05-25T19%3A24%3A31Z&url=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&mdtk=02312367&zone=2&layout=&otherplayer=0&target=ultimedia_wrapper
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
217.182.138.133 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb8.dginfra.net
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
99e39599d9a8292c712094b6114233d19961923037fc0e2d9441c773f654b98a
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 28 May 2020 13:40:27 GMT
content-encoding
gzip
last-modified
Fri, 20 Mar 2020 09:46:16 GMT
server
nginx/1.10.3 (Ubuntu)
etag
W/"5e7490e8-1ae39"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=2678400
strict-transport-security
max-age=31536000; includeSubDomains
expires
Sun, 28 Jun 2020 13:40:27 GMT
iframe
www.ultimedia.com/deliver/generic/ Frame DF17
0
0
Document
General
Full URL
https://www.ultimedia.com/deliver/generic/iframe?mdtk=02312367&zone=2&type_player=0&sendstats=0&src=f5lsup&width=452&height=300&urlfacebook=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&ad=1&autoplay=yes&fstart=1&title=The+Last+of+Us+Part+2+release+date%2C+delay%2C+trailers%2C+news%2C+and+rumors+%7C+TechRadar+Talks&endMessage=um_ultimedia_wrapper_ultimediaEndRoll&widgetPrefix=um_ultimedia_wrapper_&tagparam=&tagparamdecoded=&visible=&gdprconsentstring=
Requested by
Host: www.ultimedia.com
URL: https://www.ultimedia.com/api/widget/smart?j=new&t=1590673226856&exclude=&meta_description=The%20AnarchyGrabber%20trojan%20has%20been%20updated%20to%20steal%20passwords%2C%20disable%202FA%20and%20spread%20malware%20to%20a%20victim%27s%20Discord%20friends.&meta_ogtitle=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_ogdescription=New%20variant%20of%20the%20AnarchyGrabber%20trojan%20can%20steal%20plain%20text%20passwords&meta_twittertitle=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_twitterdescription=New%20variant%20of%20the%20AnarchyGrabber%20trojan%20can%20steal%20plain%20text%20passwords&meta_title=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&meta_h1=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_h2=AnarchyGrabber3&meta_datepublished=2020-05-25T19%3A24%3A31Z&url=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&mdtk=02312367&zone=2&layout=&otherplayer=0&target=ultimedia_wrapper
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
217.182.138.133 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb8.dginfra.net
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

:method
GET
:authority
www.ultimedia.com
:scheme
https
:path
/deliver/generic/iframe?mdtk=02312367&zone=2&type_player=0&sendstats=0&src=f5lsup&width=452&height=300&urlfacebook=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&ad=1&autoplay=yes&fstart=1&title=The+Last+of+Us+Part+2+release+date%2C+delay%2C+trailers%2C+news%2C+and+rumors+%7C+TechRadar+Talks&endMessage=um_ultimedia_wrapper_ultimediaEndRoll&widgetPrefix=um_ultimedia_wrapper_&tagparam=&tagparamdecoded=&visible=&gdprconsentstring=
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
STICKY=27c9e1ce98058d38f6d710e1b68dee27
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer

Response headers

status
200
server
nginx/1.10.3 (Ubuntu)
date
Thu, 28 May 2020 13:40:27 GMT
content-type
text/html; charset=UTF-8
content-length
9521
cache-control
private, must-revalidate
access-control-allow-origin
*
access-control-allow-credentials
true
pragma
no-cache
expires
-1
vary
Accept-Encoding
content-encoding
gzip
set-cookie
STICKY=85f5a9cedbd7eae328ba9e4ce5c913a4; path=/; HttpOnly
strict-transport-security
max-age=31536000; includeSubDomains
sprit_10.png
www.ultimedia.com/img/widget/
3 KB
3 KB
Image
General
Full URL
https://www.ultimedia.com/img/widget/sprit_10.png
Requested by
Host: www.ultimedia.com
URL: https://www.ultimedia.com/widgets/js/responsivev3.js?v=2.0.2.7537
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
217.182.138.133 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb8.dginfra.net
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
232e2107e9ebb4adaae34e5aa7f8eba38b819ed4a735bac8f26d41106635c97c
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 28 May 2020 13:40:27 GMT
last-modified
Fri, 20 Mar 2020 09:47:14 GMT
server
nginx/1.10.3 (Ubuntu)
etag
"5e749122-b9d"
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/png
status
200
cache-control
max-age=2678400
accept-ranges
bytes
content-length
2973
expires
Sun, 28 Jun 2020 13:40:27 GMT
sprit_6.png
www.ultimedia.com/img/widget/
3 KB
3 KB
Image
General
Full URL
https://www.ultimedia.com/img/widget/sprit_6.png
Requested by
Host: www.ultimedia.com
URL: https://www.ultimedia.com/widgets/js/responsivev3.js?v=2.0.2.7537
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
217.182.138.133 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb8.dginfra.net
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
43fc744dc9f9bdd26ba499a6e1840b548740e7ce2b63e7c986d997d2bcae496e
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 28 May 2020 13:40:27 GMT
last-modified
Fri, 20 Mar 2020 09:47:14 GMT
server
nginx/1.10.3 (Ubuntu)
etag
"5e749122-d0e"
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/png
status
200
cache-control
max-age=2678400
accept-ranges
bytes
content-length
3342
expires
Sun, 28 Jun 2020 13:40:27 GMT
/
www.ultimedia.com/deliver/statistiques/widgetdisplay/
0
154 B
Script
General
Full URL
https://www.ultimedia.com/deliver/statistiques/widgetdisplay/?mdtk=02312367&zone=2&url=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&autoplay=1&widget_type=smartlasthome&result=1&params=%7B%22index%22%3A%22technology%22%2C%22search%22%3A%22Malware+turns+Discord+client+into+password+stealer+%7C+TechRadar+The+AnarchyGrabber+trojan+has+been+updated+to+steal+passwords%2C+disable+2FA+and+spread+malware+to+a+victim%27s+Discord+friends.+Malware+turns+Discord+client+into+password+stealer+New+variant+of+the+AnarchyGrabber+trojan+can+steal+plain+text+passwords%22%2C%22limit%22%3A1590434671%2C%22nb_videos%22%3A6%2C%22videos_results%22%3A%22%22%2C%22first_video_id%22%3A5290025%2C%22first_video_id_content%22%3A25%2C%22click_to_play%22%3A0%7D
Requested by
Host: www.ultimedia.com
URL: https://www.ultimedia.com/api/widget/smart?j=new&t=1590673226856&exclude=&meta_description=The%20AnarchyGrabber%20trojan%20has%20been%20updated%20to%20steal%20passwords%2C%20disable%202FA%20and%20spread%20malware%20to%20a%20victim%27s%20Discord%20friends.&meta_ogtitle=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_ogdescription=New%20variant%20of%20the%20AnarchyGrabber%20trojan%20can%20steal%20plain%20text%20passwords&meta_twittertitle=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_twitterdescription=New%20variant%20of%20the%20AnarchyGrabber%20trojan%20can%20steal%20plain%20text%20passwords&meta_title=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&meta_h1=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_h2=AnarchyGrabber3&meta_datepublished=2020-05-25T19%3A24%3A31Z&url=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&mdtk=02312367&zone=2&layout=&otherplayer=0&target=ultimedia_wrapper
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
217.182.138.133 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb8.dginfra.net
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Thu, 28 May 2020 13:40:28 GMT
server
nginx/1.10.3 (Ubuntu)
access-control-allow-origin
*
content-length
0
strict-transport-security
max-age=31536000; includeSubDomains
content-type
text/html; charset=UTF-8
f5lsup-X.jpg
medialb.ultimedia.com/multi/3uv0q/
7 KB
8 KB
Image
General
Full URL
https://medialb.ultimedia.com/multi/3uv0q/f5lsup-X.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
217.182.138.133 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb8.dginfra.net
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
1ec47208c2cd5206e8088ec570033767c332e06b5709a102ba0ca51b0736c6d0

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
public
date
Thu, 28 May 2020 13:40:27 GMT
last-modified
Mon, 25 May 2020 14:17:11 GMT
server
nginx/1.10.3 (Ubuntu)
etag
"5ecbd367-1d90"
status
200
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public
accept-ranges
bytes
content-length
7568
expires
7d
f50kqu-X.jpg
medialb.ultimedia.com/multi/3urpr/
8 KB
8 KB
Image
General
Full URL
https://medialb.ultimedia.com/multi/3urpr/f50kqu-X.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
217.182.138.133 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb8.dginfra.net
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
9ddd34cdb944de464c7b7e1c0435565f0c4b1e971364559f34bfcd65d890230f

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
public
date
Thu, 28 May 2020 13:40:27 GMT
last-modified
Mon, 25 May 2020 14:16:09 GMT
server
nginx/1.10.3 (Ubuntu)
etag
"5ecbd329-2052"
status
200
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public
accept-ranges
bytes
content-length
8274
expires
7d
fsvzfl-X.jpg
medialb.ultimedia.com/multi/3urzq/
7 KB
7 KB
Image
General
Full URL
https://medialb.ultimedia.com/multi/3urzq/fsvzfl-X.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
217.182.138.133 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb8.dginfra.net
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
36ee7fcf950ad27f5c65f5b166d883c9ec89408a207f631f5d362d675fef6dd2

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
public
date
Thu, 28 May 2020 13:40:27 GMT
last-modified
Mon, 25 May 2020 14:16:08 GMT
server
nginx/1.10.3 (Ubuntu)
etag
"5ecbd328-1d10"
status
200
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public
accept-ranges
bytes
content-length
7440
expires
7d
f3ppf8-X.jpg
medialb.ultimedia.com/multi/3urvq/
8 KB
8 KB
Image
General
Full URL
https://medialb.ultimedia.com/multi/3urvq/f3ppf8-X.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
217.182.138.133 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb8.dginfra.net
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
7e3b437cdc8a473716450d54e742b1be06d9d38b6c1a3c94c9e9433981071759

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
public
date
Thu, 28 May 2020 13:40:27 GMT
last-modified
Mon, 25 May 2020 14:16:09 GMT
server
nginx/1.10.3 (Ubuntu)
etag
"5ecbd329-1fed"
status
200
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public
accept-ranges
bytes
content-length
8173
expires
7d
f35v0r-X.jpg
medialb.ultimedia.com/multi/3uruv/
9 KB
9 KB
Image
General
Full URL
https://medialb.ultimedia.com/multi/3uruv/f35v0r-X.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
217.182.138.133 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb8.dginfra.net
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
36b321f3a8ea592db06677b7488fdf67a00bb896dd53273259061020fd40b0b5

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
public
date
Thu, 28 May 2020 13:40:27 GMT
last-modified
Mon, 25 May 2020 14:16:08 GMT
server
nginx/1.10.3 (Ubuntu)
etag
"5ecbd328-2276"
status
200
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public
accept-ranges
bytes
content-length
8822
expires
7d
fxfxvs-X.jpg
medialb.ultimedia.com/multi/3ur5f/
7 KB
7 KB
Image
General
Full URL
https://medialb.ultimedia.com/multi/3ur5f/fxfxvs-X.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
217.182.138.133 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb8.dginfra.net
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
24591f061929ec37335562066d2b085578ad99cbd8d60507d90b4e4e61cc542d

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
public
date
Thu, 28 May 2020 13:40:27 GMT
last-modified
Mon, 25 May 2020 14:18:19 GMT
server
nginx/1.10.3 (Ubuntu)
etag
"5ecbd3ab-1a5e"
status
200
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public
accept-ranges
bytes
content-length
6750
expires
7d
/
r.skimresources.com/api/
149 B
405 B
Fetch
General
Full URL
https://r.skimresources.com/api/?persistence=1&xguid=01BT2SNRZKMTD96W8181AS0KKC&data={%22pubcode%22:%2292X363%22,%22domains%22:[%22%22,%22techradar.com%22,%22facebook.com%22,%22twitter.com%22,%22youtube.com%22,%22futureplc.com%22,%22send%22,%22pinterest.com%22,%22bleepingcomputer.com%22,%22futureus.com%22],%22page%22:%22https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer%22}&checksum=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
2b2283c7720773efd7869ae9edae7b0b931745df5da90cf66e45000129bad32f
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 28 May 2020 13:40:27 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
openresty/1.11.2.5
status
200
vary
Accept-Encoding
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://www.techradar.com
access-control-allow-credentials
true
strict-transport-security
max-age=31536000
content-type
application/json
alt-svc
clear
via
1.1 google
widget.php
search-api.fie.future.net.uk/
6 KB
2 KB
Fetch
General
Full URL
https://search-api.fie.future.net.uk/widget.php?site=TRD&article_type=news&article_category=retail&model_name=TechRadar%20Magazines&ignore_buy_similar=1&filter_product_types=deals&rows=1
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.51 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif14.web.future.net.uk
Software
/
Resource Hash
fd548cfec0a75aaf55617b24a717984cb293aa2392d0da5e1d9d57485eb7577c

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 28 May 2020 13:21:42 GMT
Content-Encoding
gzip
X-Hawk-Country
Xkey
match-id-3332043978, model-id-783095, model-id-286340, model-id-287573, model-id-287633
Age
1125
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-api
X-FTR-Cache-Status
HIT
Content-Length
1424
X-FTR-Expires
Thu, 28 May 2020 13:51:42 GMT
X-FTR-Balancer
hawk-proxy-185-113-25-40
X-FTR-Request-ID
00000000:0E40_00000000:01BB_5ECFBF4B_103E9DD:479B
X-Country-Code-Real
CH
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/json; charset=utf-8;
X-FTR-Backend-Server
fievarnishprodwhite
Cache-Control
max-age=300,public
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,X-Hawk-Country,X-Hawk-Area
Expires
Thu, 28 May 2020 13:45:27 GMT
widget.php
search-api.fie.future.net.uk/
343 B
1 KB
Fetch
General
Full URL
https://search-api.fie.future.net.uk/widget.php?site=TRD&article_type=news&article_category=retail&model_name=Password&deals_per_model=1&multi=1&related_models=1&rows=4&filter_product_types=deals
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.51 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif14.web.future.net.uk
Software
/
Resource Hash
b6e50074c874220c407e143fbf595a414a746a31dc589916c84837a29ff1561c

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 28 May 2020 13:29:12 GMT
Content-Encoding
gzip
X-Hawk-Country
Age
675
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-api
X-FTR-Cache-Status
HIT
Content-Length
222
X-FTR-Expires
Thu, 28 May 2020 13:59:12 GMT
X-FTR-Balancer
hawk-proxy-185-113-25-40
X-FTR-Request-ID
00000000:0E4C_00000000:01BB_5ECFBF4B_103E9E8:479B
X-Country-Code-Real
CH
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/json; charset=utf-8;
X-FTR-Backend-Server
fievarnishprodwhite
Cache-Control
max-age=300,public
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,X-Hawk-Country,X-Hawk-Area
Expires
Thu, 28 May 2020 13:45:27 GMT
seasonal.php
search-api.fie.future.net.uk/
73 B
971 B
Fetch
General
Full URL
https://search-api.fie.future.net.uk/seasonal.php?site=TRD&article_type=news&article_category=retail
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.51 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif14.web.future.net.uk
Software
/
Resource Hash
55a4c56584709b3f525fefb110bce2f5f28c62eef73be55dd5a21d8b8efe9774

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 28 May 2020 13:37:19 GMT
Content-Encoding
gzip
X-Hawk-Country
Age
188
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-api
X-FTR-Cache-Status
HIT
Content-Length
84
X-FTR-Expires
Thu, 28 May 2020 14:07:19 GMT
X-FTR-Balancer
hawk-proxy-185-113-25-40
X-FTR-Request-ID
00000000:0E40_00000000:01BB_5ECFBF4B_103EA12:479B
X-Country-Code-Real
CH
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/json; charset=utf-8;
X-FTR-Backend-Server
fievarnishprodwhite
Cache-Control
max-age=300,public
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,X-Hawk-Country,X-Hawk-Area
Expires
Thu, 28 May 2020 13:45:27 GMT
promotion.min.css
widgets.hawk-assets.co.uk/css/14.13.15-ac7e27af5aad941f6e65db1907ee427ad1ee105c/
52 KB
7 KB
Stylesheet
General
Full URL
https://widgets.hawk-assets.co.uk/css/14.13.15-ac7e27af5aad941f6e65db1907ee427ad1ee105c/promotion.min.css
Requested by
Host: widgets.hawk-assets.co.uk
URL: https://widgets.hawk-assets.co.uk/js/w/responsive.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.53 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif10.web.future.net.uk
Software
/
Resource Hash
3af0ad4b74748533fb1b6ee2db1397a1ad05bb75c448cd9b89d33722ab303a04

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 28 May 2020 13:40:03 GMT
Content-Encoding
gzip
X-Hawk-Country
Xkey
asset-type-fie-widgets
Age
23
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-assets
X-FTR-Cache-Status
HIT
Content-Length
5988
X-FTR-Expires
Thu, 28 May 2020 14:10:03 GMT
X-FTR-Balancer
hawkproxyprodblue
X-FTR-Request-ID
00000000:2996_00000000:01BB_5ECFBF4B_68DC0A:1CC0
Last-Modified
Tue, 26 May 2020 16:53:02 GMT
X-Country-Code-Real
CH
ETag
"5ecd496e-d15c"
Vary
Accept-Encoding
Content-Type
text/css
X-FTR-Backend-Server
fievarnishprodwhite
Cache-Control
max-age=3600
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Expires
Thu, 28 May 2020 14:40:03 GMT
promotion.js
widgets.hawk-assets.co.uk/js/w/3f19011cfba4f086e527/
17 KB
6 KB
Script
General
Full URL
https://widgets.hawk-assets.co.uk/js/w/3f19011cfba4f086e527/promotion.js
Requested by
Host: widgets.hawk-assets.co.uk
URL: https://widgets.hawk-assets.co.uk/js/w/responsive.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.53 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif10.web.future.net.uk
Software
/
Resource Hash
539c2d2a0030427f8e98952254f116eb57c05e0d602b430bf2d98be5da3ece70

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 28 May 2020 13:40:04 GMT
Content-Encoding
gzip
X-Hawk-Country
Xkey
asset-type-fie-widgets
Age
22
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-assets
X-FTR-Cache-Status
HIT
Content-Length
5194
X-FTR-Expires
Thu, 28 May 2020 14:10:04 GMT
X-FTR-Balancer
hawkproxyprodblue
X-FTR-Request-ID
00000000:2998_00000000:01BB_5ECFBF4B_41B6EA:1CBE
Last-Modified
Tue, 26 May 2020 16:53:02 GMT
X-Country-Code-Real
CH
ETag
"5ecd496e-456c"
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
X-FTR-Backend-Server
fievarnishprodwhite
Cache-Control
max-age=3600
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Expires
Thu, 28 May 2020 14:40:04 GMT
techradar.svg
gizmos.future-fie.co.uk/img/sites/svg/
6 KB
6 KB
Image
General
Full URL
https://gizmos.future-fie.co.uk/img/sites/svg/techradar.svg
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.54 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif09.web.future.net.uk
Software
/
Resource Hash
aca8ae0f4de33dc03431cc4b650fb91a32fa06294f38e76bea4fcef2b73f6af1

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 28 May 2020 13:40:22 GMT
X-Hawk-Country
Xkey
asset-type-fie-widgets
Age
5
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-assets
X-FTR-Cache-Status
HIT
Content-Length
5637
X-FTR-Expires
Thu, 28 May 2020 14:10:22 GMT
X-FTR-Balancer
hawkproxyprodred
X-FTR-Request-ID
00000000:7284_00000000:01BB_5ECFBF4B_8EB99E:4F0D
Last-Modified
Tue, 26 May 2020 16:53:02 GMT
X-Country-Code-Real
CH
ETag
"5ecd496e-1605"
Content-Type
image/svg+xml
X-FTR-Backend-Server
fievarnishprodred
Cache-Control
max-age=604800
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Expires
Thu, 04 Jun 2020 13:40:22 GMT
d5glnx0z9nc8afmz-15877400901509-250-80.png
mos.fie.futurecdn.net/logos/models/
14 KB
15 KB
Image
General
Full URL
https://mos.fie.futurecdn.net/logos/models/d5glnx0z9nc8afmz-15877400901509-250-80.png
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.241.80.252 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
nginx /
Resource Hash
d81ecdfd770abb03106fc5106e92380e2ee6dc602ffdd25f3d6e2e622fdf5a10

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 25 May 2020 04:53:37 GMT
X-FTR-Cache-Resized-Status
MISS
Age
290810
X-FTR-DC
TC
X-FTR-Realm
pip
X-FTR-Backend
mos
Connection
keep-alive
Content-Length
14272
X-FTR-Balancer
bulkproxyprod01
X-FTR-Request-ID
00000000:D6EF_00000000:0050_5EA3C251_300E4:53ED
Last-Modified
Fri, 24 Apr 2020 14:54:50 GMT
Server
nginx
ETag
"a094d2e5752ad05274db672e2973c8f0"
Content-Type
image/jpeg
X-FTR-Backend-Server
mos01
Cache-Control
max-age=2592000
Accept-Ranges
bytes
X-FTR-Cache-Host
moscache01
Expires
Wed, 24 Jun 2020 04:53:42 GMT
get_loaders
orionis.techradar.com/mms/
2 B
237 B
XHR
General
Full URL
https://orionis.techradar.com/mms/get_loaders?href=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&account_id=200&requestUUID=22635071-d41e-4e74-b3eb-6b7cec4bab34-1590673227109
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.157.212.16 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-35-157-212-16.eu-central-1.compute.amazonaws.com
Software
Jetty(9.4.2.v20170220) /
Resource Hash
4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 28 May 2020 13:40:27 GMT
x-sp-mms-node
mms-axb.node.fra.consul
server
Jetty(9.4.2.v20170220)
status
200
access-control-allow-methods
GET
content-type
application/json
access-control-allow-origin
https://www.techradar.com
cache-control
max-age=10800
access-control-allow-credentials
true
bcn
www.summerhamster.com/
43 B
181 B
Image
General
Full URL
https://www.summerhamster.com/bcn?fe=1590673227697&y=2.0.1196&elg=439120073&flg=200&x=zzz.whfkudgdu.frp%2Fqhzv%2Fpdozduh-wxuqv-glvfrug-folhqw-lqwr-sdvvzrug-vwhdohu&vqwo=1&deo=0&hu=0&g2=0%3A%3A0%3A%3A0%3A%3A0%3A%3A0&requestUUID=22635071-d41e-4e74-b3eb-6b7cec4bab34-1590673227109
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.28.51.75 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-28-51-75.eu-central-1.compute.amazonaws.com
Software
Jetty(9.2.10.v20150310) /
Resource Hash
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Thu, 28 May 2020 13:40:27 GMT
server
Jetty(9.2.10.v20150310)
access-control-allow-origin
*
content-length
43
access-control-allow-methods
*
content-type
image/gif
aaeb34-a2l4Y3dteGljbndDekE1KmVnZ3N5cnhjbWhBNjQ0KmVmdEFqZXB3aSp2aWppdnZpdkEqd2l3d21zcmN2aWppdnZpdkEqd2l3d21zcmNxaXd3ZWtpY2dzeXJ4QTQqbnpBNjI0MjU1PToqZ2hnQXttcmhzezJjd3RjMnF3azJjbXJ4aXZyZXAyZ2hnNSpsdm...
orionis.techradar.com/
1 KB
2 KB
Script
General
Full URL
https://orionis.techradar.com/aaeb34-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
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/182136/media/shared/js/atechradar-gb.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.157.212.16 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-35-157-212-16.eu-central-1.compute.amazonaws.com
Software
Jetty(9.4.2.v20170220) /
Resource Hash
1a9e90c344a529191888b24cb63a10fa4ce1749035a0ee7ac8df5a629fecfbe2

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 28 May 2020 13:40:27 GMT
x-sp-mms-node
mms-akk.node.fra.consul
server
Jetty(9.4.2.v20170220)
access-control-allow-methods
GET
content-type
application/javascript
status
200
cache-control
no-store, no-cache, private
access-control-allow-credentials
true
x-sp-mms-env
1
expires
Sat, 15 Nov 2008 16:00:00 GMT
138526d18ff94de4b84a3a11ec020ede_1.js
targetemsecure.blob.core.windows.net/138526d1-8ff9-4de4-b84a-3a11ec020ede/
8 KB
3 KB
Script
General
Full URL
https://targetemsecure.blob.core.windows.net/138526d1-8ff9-4de4-b84a-3a11ec020ede/138526d18ff94de4b84a3a11ec020ede_1.js
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.239.242.148 Amsterdam, Netherlands, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
fb9ede2d37c0cf9747716369630f2c26c271892911d1bbcc702a2c31f5cfd386

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-lease-status
unlocked
x-ms-blob-type
BlockBlob
Date
Thu, 28 May 2020 13:40:27 GMT
Content-Encoding
gzip
Last-Modified
Thu, 28 May 2020 00:36:05 GMT
Server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
Content-MD5
Bd8Nm3P+obiD/VC1YTJOVw==
ETag
0x8D8029F1B87AAE8
Content-Type
application/javascript
x-ms-request-id
34f41444-c01e-0030-04f5-34437d000000
Cache-Control
public
x-ms-version
2009-09-19
Content-Length
2368
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j82&a=1515924664&t=event&ni=1&_s=1&dl=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&ul=en-us&de=UTF-8...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-48894329-1&cid=1121561642.1590673227&jid=1790958497&_gid=1153192048.1590673227&gjid=1927355864&_v=j82&z=1088227136
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1121561642.1590673227&jid=1790958497&_v=j82&z=1088227136
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1121561642.1590673227&jid=1790958497&_v=j82&z=1088227136&slf_rd=1&random=4082598051
42 B
106 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1121561642.1590673227&jid=1790958497&_v=j82&z=1088227136&slf_rd=1&random=4082598051
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 28 May 2020 13:40:28 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 28 May 2020 13:40:28 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1121561642.1590673227&jid=1790958497&_v=j82&z=1088227136&slf_rd=1&random=4082598051
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
www.google-analytics.com/
35 B
96 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j82&a=1515924664&t=event&ni=1&_s=2&dl=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&ul=en-us&de=UTF-8&dt=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&ec=Affiliates&ea=Promotion%20widget%20appeared&el=TechRadar%20Magazines&_u=6HDAAEABBAQC~&jid=&gjid=&cid=1121561642.1590673227&tid=UA-48894329-1&_gid=1153192048.1590673227&cd57=null&cd40=Password&cd41=Malware%7CDiscord%7CTrojan_horse_computing%7CUser_computing%7CAnarchyGrabber3_AnarchyGrabber3&cd42=Software&cd45=Password&cd46=Computing&cd47=Malware_turns_Discord_client_into_password_stealer&cd50=5&cd51=false&cd58=Computing&cd74=&cd13=false&cd10=EN-US&cd1=news&cd2=computing&cd3=computing&cd4=tech_techradar%2F&cd5=XUeVg74qQZwxrcTVTXpDSk&cd6=%7Cdiscord%7Canarchygrabber%7Cmalware%7Ctrojan%7Cpasswords%7C2fa%7Chackers%7Canarchygrabber3%7Cdiscord%7Canarchygrabber%7Cmalware%7Ctrojan%7Cpasswords%7C2fa%7Chackers%7Canarchygrabber3%7Ccomputing%7Ctrbc%7Cexclude-from-homepage%7Ctype_news%7Cchannel_computing%7Ccontentdev%7Ctrbc%7Cexclude-from-homepage%7Ctype_news%7Cchannel_computing%7Ccontentdev%7Cserversidehawk&cd7=anthony_spadafora&cd8=25-05-2020&cd9=1&cd27=182136&cd95=news&cd106=0&cd126=en&cd127=GB%7CUS%7CAU%7CSG%7CIN%7CAE%7CNZ%7CZA&cd128=25-05-2020&cd31=10&cd30=4g&cd12=3332043978&cd14=My%20Favourite%20Magazines&cd16=null&cd17=1&cd25=US%24%C2%A07.15&cd37=null&cd48=Technology%20Magazines&cd53=null&cd62=0&cd73=null&cd75=null&cd76=https%3A%2F%2Fmyfavouritemagazines.pxf.io%2Fc%2F221109%2F583111%2F9620%3FsubId1%3Dhawk-custom-tracking%26u%3Dhttps%253A%252F%252Fwww.myfavouritemagazines.co.uk%252Ftech-gadgets%252F&cd90=4666612030776526000&cd105=116021&cd111=null&cd115=null&cd116=null&cd117=null&cd118=null&cd124=null&cd125=null&cm1=1515&cm27=3036&z=409567637
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 18 May 2020 22:57:55 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
830553
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
collect
www.google-analytics.com/
35 B
90 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j82&a=1515924664&t=event&ni=1&_s=3&dl=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&ul=en-us&de=UTF-8&dt=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&ec=Affiliates&ea=Promotion%20widget%20viewed&el=TechRadar%20Magazines&_u=6HDAAEABBAQC~&jid=&gjid=&cid=1121561642.1590673227&tid=UA-48894329-1&_gid=1153192048.1590673227&cd57=null&cd40=Password&cd41=Malware%7CDiscord%7CTrojan_horse_computing%7CUser_computing%7CAnarchyGrabber3_AnarchyGrabber3&cd42=Software&cd45=Password&cd46=Computing&cd47=Malware_turns_Discord_client_into_password_stealer&cd50=5&cd51=false&cd58=Computing&cd74=&cd13=false&cd10=EN-US&cd1=news&cd2=computing&cd3=computing&cd4=tech_techradar%2F&cd5=XUeVg74qQZwxrcTVTXpDSk&cd6=%7Cdiscord%7Canarchygrabber%7Cmalware%7Ctrojan%7Cpasswords%7C2fa%7Chackers%7Canarchygrabber3%7Cdiscord%7Canarchygrabber%7Cmalware%7Ctrojan%7Cpasswords%7C2fa%7Chackers%7Canarchygrabber3%7Ccomputing%7Ctrbc%7Cexclude-from-homepage%7Ctype_news%7Cchannel_computing%7Ccontentdev%7Ctrbc%7Cexclude-from-homepage%7Ctype_news%7Cchannel_computing%7Ccontentdev%7Cserversidehawk&cd7=anthony_spadafora&cd8=25-05-2020&cd9=1&cd27=182136&cd95=news&cd106=0&cd126=en&cd127=GB%7CUS%7CAU%7CSG%7CIN%7CAE%7CNZ%7CZA&cd128=25-05-2020&cd31=10&cd30=4g&cd12=3332043978&cd14=My%20Favourite%20Magazines&cd16=null&cd17=1&cd25=US%24%C2%A07.15&cd37=null&cd48=Technology%20Magazines&cd53=null&cd62=0&cd73=null&cd75=null&cd76=https%3A%2F%2Fmyfavouritemagazines.pxf.io%2Fc%2F221109%2F583111%2F9620%3FsubId1%3Dhawk-custom-tracking%26u%3Dhttps%253A%252F%252Fwww.myfavouritemagazines.co.uk%252Ftech-gadgets%252F&cd90=4666612030776526000&cd105=116021&cd111=null&cd115=null&cd116=null&cd117=null&cd118=null&cd124=null&cd125=null&cm1=1565&cm27=3036&cm24=18&z=1138994117
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 18 May 2020 22:57:55 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
830553
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
138526d18ff94de4b84a3a11ec020ede_2_1568799455.js
targetemsecure.blob.core.windows.net/138526d1-8ff9-4de4-b84a-3a11ec020ede/
132 KB
40 KB
Script
General
Full URL
https://targetemsecure.blob.core.windows.net/138526d1-8ff9-4de4-b84a-3a11ec020ede/138526d18ff94de4b84a3a11ec020ede_2_1568799455.js
Requested by
Host: targetemsecure.blob.core.windows.net
URL: https://targetemsecure.blob.core.windows.net/138526d1-8ff9-4de4-b84a-3a11ec020ede/138526d18ff94de4b84a3a11ec020ede_1.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.239.242.148 Amsterdam, Netherlands, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
7d0b85f9a56a5b88448ecc6cac0c98f248f25de12b3bdd5b996095938a6f24cc

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-lease-status
unlocked
x-ms-blob-type
BlockBlob
Date
Thu, 28 May 2020 13:40:27 GMT
Content-Encoding
gzip
Last-Modified
Mon, 25 May 2020 23:16:43 GMT
Server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
Content-MD5
mamiDZ/ncU2HlDgvgesoWQ==
ETag
0x8D80101B044FE96
Content-Type
application/javascript
x-ms-request-id
34f41460-c01e-0030-17f5-34437d000000
Cache-Control
public, max-age=86400
x-ms-version
2009-09-19
Content-Length
40189
5c98640973054f.js
offer.slgnt.eu/1e581d88b4d5488384c77c338b643f79/
29 KB
10 KB
Script
General
Full URL
https://offer.slgnt.eu/1e581d88b4d5488384c77c338b643f79/5c98640973054f.js?v=0c6e8d50c5b7c641ede3baedb286285c
Requested by
Host: targetemsecure.blob.core.windows.net
URL: https://targetemsecure.blob.core.windows.net/138526d1-8ff9-4de4-b84a-3a11ec020ede/138526d18ff94de4b84a3a11ec020ede_1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
35.233.20.168 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
168.20.233.35.bc.googleusercontent.com
Software
/
Resource Hash
95f1d8e0e75700d6fa5bbfd1cacd484bcd585309fe1cbe8ea3959802b4106797
Security Headers
Name Value
Strict-Transport-Security max-age=15724800; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 28 May 2020 13:40:28 GMT
content-encoding
gzip
last-modified
Tue, 25 Feb 2020 16:23:17 GMT
etag
W/"5e5549f5-72a9"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=2592000, public
strict-transport-security
max-age=15724800; includeSubDomains
x-forwarded-proto
https
expires
Sat, 27 Jun 2020 13:40:28 GMT
polyfill.min.js
cdn.polyfill.io/v3/
72 B
583 B
Script
General
Full URL
https://cdn.polyfill.io/v3/polyfill.min.js?features=es6&gated=true
Requested by
Host: targetemsecure.blob.core.windows.net
URL: https://targetemsecure.blob.core.windows.net/138526d1-8ff9-4de4-b84a-3a11ec020ede/138526d18ff94de4b84a3a11ec020ede_2_1568799455.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:4e42:1b::621 , Ascension Island, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
aaecd144d2b8763b2fa5c91f09778294363cef363c10504205f4203922644d11
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; includeSubdomains; preload
content-encoding
br
x-content-type-options
nosniff
content-type
text/javascript; charset=utf-8
age
556926
detected-user-agent
Chrome/74.0.3729
status
200
request_came_from_shield
HHN
server-timing
HIT, fastly;desc="Edge time";dur=0, HIT-CLUSTER, fastly;desc="Edge time";dur=1
content-length
74
referrer-policy
origin-when-cross-origin
last-modified
Thu, 21 May 2020 18:17:07 GMT
date
Thu, 28 May 2020 13:40:28 GMT
vary
User-Agent, Accept-Encoding
access-control-allow-methods
GET,HEAD,OPTIONS
normalized-user-agent
chrome/74.0.0
access-control-allow-origin
*
cache-control
public, s-maxage=31536000, max-age=604800, stale-while-revalidate=604800, stale-if-error=604800
accept-ranges
bytes
timing-allow-origin
*
track
siteeuwest.slgnt.eu/
1 KB
1 KB
Fetch
General
Full URL
https://siteeuwest.slgnt.eu/track
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4860:4802:32::15 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Frontend /
Resource Hash
4609a909498e452b8adefb19f164ea6aba76f1782b0c44f5ba8563137327e290

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
content-type
application/json

Response headers

date
Thu, 28 May 2020 13:40:28 GMT
content-encoding
gzip
server
Google Frontend
status
200
vary
Accept-Encoding
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://www.techradar.com
x-cloud-trace-context
8ebab4f9ebc456b525c690f61212c636
cache-control
private
access-control-allow-credentials
true
content-type
application/json;charset=utf-8
content-length
923
expires
Thu, 01 Jan 1970 00:00:00 GMT
cookie.html
offer.slgnt.eu/sdstatic/ Frame E789
0
0
Document
General
Full URL
https://offer.slgnt.eu/sdstatic/cookie.html
Requested by
Host: offer.slgnt.eu
URL: https://offer.slgnt.eu/1e581d88b4d5488384c77c338b643f79/5c98640973054f.js?v=0c6e8d50c5b7c641ede3baedb286285c
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
35.233.20.168 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
168.20.233.35.bc.googleusercontent.com
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15724800; includeSubDomains

Request headers

:method
GET
:authority
offer.slgnt.eu
:scheme
https
:path
/sdstatic/cookie.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer

Response headers

status
200
date
Thu, 28 May 2020 13:40:28 GMT
content-type
text/html
last-modified
Thu, 13 Feb 2020 10:59:50 GMT
vary
Accept-Encoding
etag
W/"5e452c26-10f"
expires
Sat, 27 Jun 2020 13:40:28 GMT
cache-control
max-age=2592000 public
content-encoding
gzip
strict-transport-security
max-age=15724800; includeSubDomains
x-forwarded-proto
https
aHR0cHM6Ly93d3cudGVjaHJhZGFyLmNvbS9uZXdzL21hbHdhcmUtdHVybnMtZGlzY29yZC1jbGllbnQtaW50by1wYXNzd29yZC1zdGVhbGVy
offer.slgnt.eu/api/db4a8f7d7191408280a85206a47e4bd6/iv/
27 B
550 B
XHR
General
Full URL
https://offer.slgnt.eu/api/db4a8f7d7191408280a85206a47e4bd6/iv/aHR0cHM6Ly93d3cudGVjaHJhZGFyLmNvbS9uZXdzL21hbHdhcmUtdHVybnMtZGlzY29yZC1jbGllbnQtaW50by1wYXNzd29yZC1zdGVhbGVy?sid=0900845e-ea90-4b31-bd48-a87de00ff781
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
35.233.20.168 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
168.20.233.35.bc.googleusercontent.com
Software
/ Express
Resource Hash
03cfe943563047d9804114f133087f320377cbe1ecc4c3c026c1146371a5a3a4
Security Headers
Name Value
Strict-Transport-Security max-age=15724800; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded;charset=UTF-8

Response headers

date
Thu, 28 May 2020 13:40:28 GMT
content-type
text/html; charset=utf-8
status
200
x-powered-by
Express
strict-transport-security
max-age=15724800; includeSubDomains
p3p
policyref="http://www.tastehit.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa OUR BUS IND UNI COM NAV INT CNT PRE"
access-control-allow-origin
https://www.techradar.com
access-control-allow-credentials
true
x-forwarded-proto
https
content-length
27
app.js
vanilla.futurecdn.net/techradar/182136/media/shared/js/
331 KB
92 KB
Script
General
Full URL
https://vanilla.futurecdn.net/techradar/182136/media/shared/js/app.js
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.253.95.245 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
03c21eb8f02574b7c0320431eb08f242fe3d8fb282d982ef077c1e823a662e1f

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 10:32:28 GMT
Content-Encoding
gzip
Age
97680
X-FTR-Backend-Server
ftefrontprod-172-20-9-85
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
93094
X-FTR-Balancer
webproxyprod01
X-FTR-Request-ID
00000000:DD44_00000000:0050_5ECE41BB_94366:0C6B
Last-Modified
Wed, 27 May 2020 10:01:57 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5ece3a95-52dc7"
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
access-control-allow-origin
*
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Fri, 26 Jun 2020 10:32:57 GMT
related
api.vanilla.futurecdn.net/article/v3/
2 KB
2 KB
Fetch
General
Full URL
https://api.vanilla.futurecdn.net/article/v3/related?articleTerritory=US&count=3&site=techradar
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.61 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif02.web.future.net.uk
Software
/
Resource Hash
94893a8ac8d747b43e8fcd1ccc35cfc434c17a49474a9a2050d9c3e2a620954f

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 28 May 2020 13:40:29 GMT
Content-Encoding
gzip
Xkey
techradar-article, techradar-article-latest, techradar-article-api-7db7df769f-j75mv
Age
54
Transfer-Encoding
chunked
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
van-prod
X-Backend
default
X-FTR-Cache-Status
HIT
X-FTR-Balancer
apiproxyprodred
X-FTR-Request-ID
00000000:7F92_00000000:01BB_5ECFBF4D_DDF1F:06A0
X-Served-By
cache-api-79cb4f9fbc-tz9pw
Vary
Accept-Encoding, Origin
Content-Type
application/json; charset=utf-8
X-FTR-Backend-Server
http.van-prod
Cache-Control
public,max-age=900
Access-Control-Allow-Origin
https://www.techradar.com
Expires
Thu, 28 May 2020 13:54:34 UTC
related
api.vanilla.futurecdn.net/article/v3/
12 KB
4 KB
Fetch
General
Full URL
https://api.vanilla.futurecdn.net/article/v3/related?articleTerritory=US&articleVerticalHandle=computing&count=15&site=techradar
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.61 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif02.web.future.net.uk
Software
/
Resource Hash
6b7248b759b624dab9733e225ee7601ef1a53b1f66e13ffff893576e8af7729a

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 28 May 2020 13:40:29 GMT
Content-Encoding
gzip
Xkey
techradar-article, techradar-article-latest, techradar-article-api-7db7df769f-j75mv
Age
37
Transfer-Encoding
chunked
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
van-prod
X-Backend
default
X-FTR-Cache-Status
HIT
X-FTR-Balancer
apiproxyprodred
X-FTR-Request-ID
00000000:7F94_00000000:01BB_5ECFBF4D_C3EC9:06A1
X-Served-By
cache-api-79cb4f9fbc-tz9pw
Vary
Accept-Encoding, Origin
Content-Type
application/json; charset=utf-8
X-FTR-Backend-Server
http.van-prod
Cache-Control
public,max-age=900
Access-Control-Allow-Origin
https://www.techradar.com
Expires
Thu, 28 May 2020 13:54:51 UTC
missing-image.svg
vanilla.futurecdn.net/techradar/media/img/
3 KB
2 KB
Image
General
Full URL
https://vanilla.futurecdn.net/techradar/media/img/missing-image.svg
Requested by
Host: vanilla.futurecdn.net
URL: https://vanilla.futurecdn.net/techradar/182136/media/shared/js/app.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.253.95.245 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
131423a5b0117aa6fddbde39abed88048b2ee6a147ade1fbf040b551614ab2d2

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 22 May 2020 19:38:16 GMT
Content-Encoding
gzip
Age
496933
X-FTR-Backend-Server
ftefrontprod-172-20-9-86
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
1061
X-FTR-Balancer
webproxyprod01
X-FTR-Request-ID
00000000:A4D9_00000000:0050_5EC82A28_1AAC5:7685
Last-Modified
Fri, 22 May 2020 13:48:30 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5ec7d82e-a6b"
access-control-allow-methods
GET
Content-Type
image/svg+xml
access-control-allow-origin
*
Cache-Control
max-age=2592000
access-control-allow-credentials
true
Accept-Ranges
bytes
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Sun, 21 Jun 2020 19:38:16 GMT
analytics.js
www.google-analytics.com/
45 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: vanilla.futurecdn.net
URL: https://vanilla.futurecdn.net/techradar/182136/media/shared/js/app.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
2f1fd973e6c48489ae07c467e3278635b856c698d1f502e06af3ab555937deac
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 30 Apr 2020 21:54:13 GMT
server
Golfe2
age
2650
date
Thu, 28 May 2020 12:56:19 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18433
expires
Thu, 28 May 2020 14:56:19 GMT
collect
www.google-analytics.com/
35 B
96 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j82&a=1515924664&t=event&ni=1&_s=2&dl=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&ul=en-us&de=UTF-8&dt=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&ec=Performance%20Metrics&ea=TTI&el=1327&ev=1327&_u=6HDAgEABBAQC~&jid=2035591828&gjid=483722976&cid=1121561642.1590673227&tid=UA-48894329-1&_gid=1153192048.1590673227&cd57=null&cd40=Password&cd41=Malware%7CDiscord%7CTrojan_horse_computing%7CUser_computing%7CAnarchyGrabber3_AnarchyGrabber3&cd42=Software&cd45=Password&cd46=Computing&cd47=Malware_turns_Discord_client_into_password_stealer&cd50=5&cd51=false&cd58=Computing&cd74=&cd13=false&cd10=US&cd5=XUeVg74qQZwxrcTVTXpDSk&cm1=6993&cm29=377&z=1422575670
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 18 May 2020 22:57:55 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
830558
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j82&tid=UA-48894329-1&cid=1121561642.1590673227&jid=2035591828&gjid=483722976&_gid=1153192048.1590673227&_u=6HDAgEABBAQC~&z=515231478
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1121561642.1590673227&jid=2035591828&_v=j82&z=515231478
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1121561642.1590673227&jid=2035591828&_v=j82&z=515231478&slf_rd=1&random=1885769797
42 B
106 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1121561642.1590673227&jid=2035591828&_v=j82&z=515231478&slf_rd=1&random=1885769797
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 28 May 2020 13:40:33 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 28 May 2020 13:40:33 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1121561642.1590673227&jid=2035591828&_v=j82&z=515231478&slf_rd=1&random=1885769797
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Verdicts & Comments Add Verdict or Comment

290 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| startFramesMeasurement undefined| xhr object| vanilla object| VAN object| __tti string| hostname object| hostGroups object| urlSearchParams string| FORCED_DOMAIN_QUERY_PARAM function| cmpStubFunction function| checkIfCmpIsReady number| cmpInterval boolean| askForConsent boolean| waitForConsent function| __cmp object| ccpaAppliesPromise function| resolveFEP object| processFEP object| reliableDOMContentLoaded object| reliablePageLoad object| reliableConsentGiven object| wadoinawdoijzxioznelknsdf string| hawk_css_endpoint object| adParameters object| head object| font boolean| gaCookieSet function| handleHeaderError object| bordeaux object| FEP_object function| getConnectionDimensions function| missingImage string| ga_code object| analytics_ga_data string| version string| GoogleAnalyticsObject function| ga object| optimizely object| FEP boolean| trailingSlash object| onesignalConfig boolean| isIE function| amIIE object| taboola_lists function| taboola_is_device object| _taboola function| loadHawklinks object| siteTargeting string| pageTags object| vanL10N object| _comscore object| dfp_config object| vanillaComponents object| require object| ffte object| xkeys object| templateVariables string| ftr_request_id object| OneSignal object| google_tag_data object| gaplugins object| bordeauxJsonp object| _adsShimCommunication function| _ object| fastdom object| purchs2s object| purchs2sutils object| tmntag boolean| gdprUser string| PURCHS2S_VERSION function| uuidv4 string| defuuid object| baseObj function| tmntag_ready function| tmntag_render function| tmntag_triggerEvent function| purchs2s_checkCommands boolean| bluekaiEnabled boolean| iasOptimiseEnabled function| setImmediate function| clearImmediate function| init_background_skin object| feat function| slotifyDebug boolean| headerExecuted string| indexExchangeDeviceType object| bordeauxAds object| bdx boolean| disablePurchS2SDFPRefresh boolean| indexExchangeEnabled boolean| amazonA9Enabled boolean| rampS2SEnabled object| chronos function| debugAds object| internalDebugAds function| udm_ object| ns_p object| COMSCORE object| PARSELY function| respimage object| respimgCFG object| webpackJsonp object| core object| __core-js_shared__ object| __translator function| legacyRenderSponsoredPost boolean| leadGenMVP function| stickyFooterInit string| ULTIMEDIA_mdtk string| ULTIMEDIA_zone string| ULTIMEDIA_target boolean| ULTIMEDIA_async function| updateShareCountWithFacebookShareCount function| updateShareCountWithTwitterTweetCount function| updateShareCountWithPinterestPinCount boolean| suggestionBoxPresent object| internalEvent$ object| BOOMR object| lazyLoadInstance function| __uspapi object| gaGlobal object| gaData function| renderSponsoredPost function| zkckcosdoiaioawqnmzsdqw object| asdinwawisuihzejsahzl function| hiriyyyteetaqgthyu object| pppasoeommmsmzrvbr object| dfp object| Cyclejs function| advertsDebugFilter object| advertsDebug object| advertsDebugStream object| regeneratorRuntime object| hawkWebpackJsonP object| hawk object| ULTIMEDIA_param number| ULTIMEDIA_param_length function| _um_smart_deploy string| _ultimedia_host number| um_date object| _ultimedia_script object| _ultimedia_script_notif object| _ultimedia_script_visi number| _ultimedia_widget_id string| ULTIMEDIA_ACTION object| ULTIMEDIA_metas object| metas object| title object| h1 object| h2 object| times object| ULTIMEDIA_exclude object| match string| ULTIMEDIA_LOADING_SRC string| ULTIMEDIA_layout function| _appendUltimediaWidget function| _ultimedia_set_widget_params function| _ultimedia_checkIfScrollable function| _ultimedia_auto_append function| _ultimedia_load_synchronous_widget function| _ultimedia_loadWidget function| _ultimedia_isWidgetAtTop function| _ultimedia_attachEventListeners string| ULTIMEDIA_search string| ULTIMEDIA_mode string| ULTIMEDIA_date string| ULTIMEDIA_index string| ULTIMEDIA_host string| ULTIMEDIA_nb string| ULTIMEDIA_urlfacebook string| ULTIMEDIA_ad string| ULTIMEDIA_callback string| ULTIMEDIA_widget_title string| ULTIMEDIA_widget_footer string| ULTIMEDIA_widget_header string| ULTIMEDIA_overlay_title string| ULTIMEDIA_show_tooltips string| ULTIMEDIA_autoplay string| ULTIMEDIA_playlist string| ULTIMEDIA_width string| ULTIMEDIA_height string| ULTIMEDIA_jw_version string| ULTIMEDIA_default_videolist string| ULTIMEDIA_default_zone string| ULTIMEDIA_default_widget_title string| ULTIMEDIA_css_title_font_color string| ULTIMEDIA_css_title_font string| ULTIMEDIA_css_title_text_align string| ULTIMEDIA_css_title_background_color string| ULTIMEDIA_css_panel_position string| ULTIMEDIA_css_panel_font_size string| ULTIMEDIA_css_panel_font_color string| ULTIMEDIA_css_panel_text_align string| ULTIMEDIA_css_thumb_background_color string| ULTIMEDIA_css_thumb_border_color string| ULTIMEDIA_css_thumb_infos_font_color string| ULTIMEDIA_css_thumb_infos_font string| ULTIMEDIA_css_thumb_background_color_hover string| ULTIMEDIA_css_thumb_border_color_hover string| ULTIMEDIA_css_thumb_infos_font_color_hover string| ULTIMEDIA_css_thumb_infos_font_hover string| ULTIMEDIA_css_list_overflow_x string| ULTIMEDIA_css_list_overflow_y string| ULTIMEDIA_css_list_background_color string| ULTIMEDIA_css_photosgallery_selected_border string| ULTIMEDIA_css_photosgallery_nav_background_color string| ULTIMEDIA_css_photosgallery_button_nav_font_color string| ULTIMEDIA_css_photosgallery_button_nav_background_color string| ULTIMEDIA_css_photosgallery_button_nav_font_color_hover string| ULTIMEDIA_css_photosgallery_button_nav_background_color_hover string| ULTIMEDIA_css_title_widget_uppercase string| ULTIMEDIA_css_panel_text_uppercase string| ULTIMEDIA_css_thumb_text_uppercase string| ULTIMEDIA_css_footer_font_color string| ULTIMEDIA_css_footer_text_align string| ULTIMEDIA_css_background_color string| ULTIMEDIA_css_background_image string| ULTIMEDIA_css_background_repeat string| ULTIMEDIA_css_background_position string| ULTIMEDIA_source_logo_brand string| ULTIMEDIA_url_logo_brand string| ULTIMEDIA_css_header_font string| ULTIMEDIA_css_header_font_color string| ULTIMEDIA_css_header_border string| ULTIMEDIA_resize string| ULTIMEDIA_validated_videos_only function| __cmpui object| hawklinks object| ultimediaVisiblePlayer object| ultimediaNotification object| visibilityStats object| _sp_ function| spBootstrap string| _ultimedia_widget_position_place object| um_js_script object| um_js_prior undefined| $ undefined| jQuery function| jQueryUM function| um_ultimedia_wrapper_SendHoverMessage function| um_ultimedia_wrapper_SendScrollMessage function| um_ultimedia_wrapper_GetPageRect function| um_ultimedia_wrapper_GetElementRect function| um_ultimedia_wrapper_RectsIntersect function| um_ultimedia_wrapper_RectsIntersectBis boolean| um_ultimedia_wrapper_ScrollToCheck boolean| um_ultimedia_wrapper_ScrollToRecheck function| um_ultimedia_wrapper_ScrollToPlay function| um_ultimedia_wrapper_ScrollToPlayForced boolean| um_ultimedia_wrapper_OverToCheck function| um_ultimedia_wrapper_OverToPlay function| um_ultimedia_wrapper_HasClass function| um_ultimedia_wrapper_AddClass function| um_ultimedia_wrapper_RemoveClass function| um_ultimedia_wrapper_ShowADPMessage function| um_ultimedia_wrapper_SwitchVideo string| um_ultimedia_wrapper_path number| um_ultimedia_wrapper_width number| um_ultimedia_wrapper_height string| um_ultimedia_wrapper_mdtk number| um_ultimedia_wrapper_zone number| um_ultimedia_wrapper_display_adp_message boolean| um_ultimedia_wrapper_playlistActive object| um_ultimedia_wrapper_titles object| um_ultimedia_wrapper_labels string| um_ultimedia_wrapper_urlfacebook string| um_ultimedia_wrapper_ad object| um_ultimedia_wrapper_params_iframe_id object| um_ultimedia_wrapper_params_iframe_type boolean| um_ultimedia_wrapper_no_change_title string| um_ultimedia_wrapper_widget_title boolean| um_ultimedia_wrapper_from_playlist number| um_ultimedia_wrapper_playlist_index number| um_ultimedia_wrapper_ori_start object| umStylestarget object| umStyleElement object| jQuery19105772492225658021 function| um_ultimedia_wrapper_ultimediaEndRoll boolean| um_ultimedia_wrapper_hoveredOnce boolean| um_ultimedia_wrapper_muteForced object| wa object| wa_s object| _thq object| true object| BT object| TasteHit boolean| um_ultimedia_wrapper_muteState number| 2f1acc6c3a606b082e5eef5e54414ffb

8 Cookies

Domain/Path Name / Value
www.techradar.com/ Name: _cmpQcif3pcsupported
Value: 1
.techradar.com/ Name: _gid
Value: GA1.2.1153192048.1590673227
.techradar.com/ Name: _parsely_session
Value: {%22sid%22:1%2C%22surl%22:%22https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer%22%2C%22sref%22:%22%22%2C%22sts%22:1590673226501%2C%22slts%22:0}
.techradar.com/ Name: _ga
Value: GA1.2.1121561642.1590673227
.techradar.com/ Name: AMP_TOKEN
Value: %24NOT_FOUND
.techradar.com/ Name: _gat
Value: 1
.techradar.com/ Name: _parsely_visitor
Value: {%22id%22:%22pid=3785c169e2d91ed85569b7b79f0cf665%22%2C%22session_count%22:1%2C%22last_session_ts%22:1590673226501}
.www.techradar.com/ Name: FTR_Country_Code
Value: CH

8 Console Messages

Source Level URL
Text
console-api log URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer(Line 159)
Message:
techradar loaded successfully.
console-api log URL: https://cdn.onesignal.com/sdks/OneSignalSDK.js(Line 1)
Message:
OneSignal: Using fallback ES5 Stub for backwards compatibility.
console-api log URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer(Line 91)
Message:
DOMContentLoaded at 239
console-api log URL: https://vanilla.futurecdn.net/techradar/182136/media/js/main.min.js(Line 28)
Message:
Lead Gen MVP: false
console-api log URL: https://vanilla.futurecdn.net/techradar/182136/media/js/main.min.js(Line 28)
Message:
No archive filter present
console-api warning URL: https://quantcast.mgr.consensu.org/cmp.js(Line 1)
Message:
init has already been called and should only be run one time.
console-api warning URL: https://static.quantcast.mgr.consensu.org/v33/cmpui-popup.js(Line 1)
Message:
Unable to get NonIab Vendor list.
console-api log URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer(Line 91)
Message:
PageLoad at 741

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

ad.doubleclick.net
ampcid.google.com
ampcid.google.de
api.vanilla.futurecdn.net
audit.quantcast.mgr.consensu.org
cdn.mos.cms.futurecdn.net
cdn.onesignal.com
cdn.parsely.com
cdn.polyfill.io
dg876rejmw3ebkm51boa0sx2-wpengine.netdna-ssl.com
gizmos.future-fie.co.uk
medialb.ultimedia.com
mos.fie.futurecdn.net
offer.slgnt.eu
orionis.techradar.com
quantcast.mgr.consensu.org
r.skimresources.com
sb.scorecardresearch.com
search-api.fie.future.net.uk
siteeuwest.slgnt.eu
srv-2020-05-28-13.pixel.parsely.com
static.quantcast.mgr.consensu.org
stats.g.doubleclick.net
targetemsecure.blob.core.windows.net
vanilla.futurecdn.net
vendorlist.consensu.org
widgets.hawk-assets.co.uk
www.google-analytics.com
www.google.com
www.google.de
www.summerhamster.com
www.techradar.com
www.ultimedia.com
13.224.95.90
13.224.96.38
185.113.25.51
185.113.25.53
185.113.25.54
185.113.25.55
185.113.25.61
2.16.46.85
2001:4860:4802:32::15
216.58.207.38
217.182.138.133
2600:9000:2190:2800:9:46dc:4700:93a1
2600:9000:2190:5c00:1:af78:4c0:93a1
2606:4700::6812:e234
2a00:1450:4001:808::200e
2a00:1450:4001:816::2003
2a00:1450:4001:81b::200e
2a00:1450:4001:81e::2004
2a00:1450:4001:821::200e
2a00:1450:400c:c00::9d
2a04:4e42:1b::621
35.157.212.16
35.168.180.84
35.190.59.101
35.233.20.168
52.239.242.148
52.28.51.75
8.241.80.252
8.241.89.124
8.253.95.245
94.31.29.99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