www-cultofmac-com.cdn.ampproject.org Open in urlscan Pro
2a00:1450:4001:824::2001  Public Scan

Submitted URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_j...
Effective URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_j...
Submission: On January 08 via api from US

Summary

This website contacted 12 IPs in 3 countries across 9 domains to perform 24 HTTP transactions. The main IP is 2a00:1450:4001:824::2001, located in Frankfurt am Main, Germany and belongs to GOOGLE - Google LLC, US. The main domain is www-cultofmac-com.cdn.ampproject.org.
TLS certificate: Issued by GTS CA 1O1 on December 3rd 2019. Valid for: 3 months.
This is the only time www-cultofmac-com.cdn.ampproject.org was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 2a00:1450:400... 15169 (GOOGLE)
13 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 3.121.173.160 16509 (AMAZON-02)
1 2a03:2880:f11... 32934 (FACEBOOK)
2 18.197.0.7 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
1 52.4.100.16 14618 (AMAZON-AES)
1 2a00:1450:400... 15169 (GOOGLE)
24 12
Domain Requested by
9 cdn.ampproject.org www-cultofmac-com.cdn.ampproject.org
cdn.ampproject.org
3 cdn-cultofmac-com.cdn.ampproject.org www-cultofmac-com.cdn.ampproject.org
2 www.cultofmac.com cdn.ampproject.org
1 amp-error-reporting.appspot.com cdn.ampproject.org
1 ping.chartbeat.net
1 www.google-analytics.com cdn.ampproject.org
1 www.facebook.com cdn.ampproject.org
1 g.ezoic.net cdn.ampproject.org
1 www.googletagservices.com cdn.ampproject.org
1 3p.ampproject.net cdn.ampproject.org
1 d-25034154402567933835.ampproject.net cdn.ampproject.org
1 secure-gravatar-com.cdn.ampproject.org www-cultofmac-com.cdn.ampproject.org
1 www-cultofmac-com.cdn.ampproject.org
24 13
Subject Issuer Validity Valid
misc-sni.google.com
GTS CA 1O1
2019-12-03 -
2020-02-25
3 months crt.sh
*.g.doubleclick.net
GTS CA 1O1
2019-12-03 -
2020-02-25
3 months crt.sh
*.ezoic.net
COMODO RSA Domain Validation Secure Server CA
2017-03-15 -
2020-03-14
3 years crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-12-06 -
2020-03-05
3 months crt.sh
www.cultofmac.com
COMODO RSA Domain Validation Secure Server CA
2017-06-20 -
2020-06-19
3 years crt.sh
*.google-analytics.com
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
*.chartbeat.net
Thawte RSA CA 2018
2019-12-16 -
2020-12-30
a year crt.sh
*.appspot.com
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh

This page contains 2 frames:

Primary Page: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Frame ID: 84E51540B1DAFACD6E0F412A9E378D20
Requests: 25 HTTP requests in this frame

Frame: https://www.facebook.com/plugins/like.php?href=https://www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/&width=152&layout=button_count&action=like&size=large&show_faces=false&share=true&height=32&appId=249151412165931
Frame ID: EA723F34839B1DC848C48C198FF01649
Requests: 1 HTTP requests in this frame

Screenshot


Page Statistics

24
Requests

100 %
HTTPS

73 %
IPv6

9
Domains

13
Subdomains

12
IPs

3
Countries

281 kB
Transfer

907 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

24 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/
66 KB
12 KB
Document
General
Full URL
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
41f6a6f4d8736ff658b31d20a16b7eb930eef3d84366b7984791c9bf6dc329b4
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www-cultofmac-com.cdn.ampproject.org
:scheme
https
:path
/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
sec-fetch-mode
navigate
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Sec-Fetch-User
?1

Response headers

status
200
nel
{"report_to":"nel","max_age":604800,"success_fraction":0.05}
report-to
{"group":"nel","max_age":604800,"endpoints":[{"url":"https://beacons.gcp.gvt2.com/nel/upload-nel"},{"url":"https://beacons.gvt2.com/nel/upload-nel"}]}
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
br
content-type
text/html
x-page-speed
0.9.10.99-9999
link
<https://cdn.ampproject.org/rtv/011912201827130/v0.js>; rel=preload; as=script
content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-length
10966
date
Wed, 08 Jan 2020 01:24:42 GMT
expires
Wed, 08 Jan 2020 01:24:42 GMT
cache-control
private, max-age=86400
last-modified
Wed, 08 Jan 2020 00:25:30 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
v0.js
cdn.ampproject.org/rtv/011912201827130/
252 KB
68 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011912201827130/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
6687f27c41424a3b76582441a239b9eb128fcbf4da4a85bff3f60ef1a99b85e5
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
1572799
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
69865
x-xss-protection
0
server
sffe
date
Fri, 20 Dec 2019 20:31:23 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"e8d9537b72423aeb"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 19 Dec 2020 20:31:23 GMT
amp-viewer-integration-0.1.js
cdn.ampproject.org/rtv/011912201827130/v0/
18 KB
7 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011912201827130/v0/amp-viewer-integration-0.1.js
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
b0a643900271ad3a19c1ebfb52e6be235c4d9d0d213b4a72a26018b915afe8d4
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
1572798
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
6552
x-xss-protection
0
server
sffe
date
Fri, 20 Dec 2019 20:31:24 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"590cabc96c390d60"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 19 Dec 2020 20:31:24 GMT
amp-access-0.1.js
cdn.ampproject.org/rtv/011912201827130/v0/
52 KB
16 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011912201827130/v0/amp-access-0.1.js
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
71cdf45a47a6c9b82fe3fce80a92fd6549c90b3c5e0306725fb6a62bd79e5228
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
1572788
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
16014
x-xss-protection
0
server
sffe
date
Fri, 20 Dec 2019 20:31:34 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"224e263c291b5c89"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 19 Dec 2020 20:31:34 GMT
amp-ad-0.1.js
cdn.ampproject.org/rtv/011912201827130/v0/
61 KB
19 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011912201827130/v0/amp-ad-0.1.js
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
6213732199dfc9b29bfed208d856c8d0eb3b5bc054bf2142e0d69e529fcda33c
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
1572799
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
18371
x-xss-protection
0
server
sffe
date
Fri, 20 Dec 2019 20:31:23 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"5d800f3bb189a55d"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 19 Dec 2020 20:31:23 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/011912201827130/v0/
152 KB
41 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011912201827130/v0/amp-analytics-0.1.js
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
ad70c6325712cf8a73d426ede911e7eb3a4fd6ba55f93d4f239c8e4b7ef8dc28
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
1572799
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
41596
x-xss-protection
0
server
sffe
date
Fri, 20 Dec 2019 20:31:23 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"9c73d379000df978"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 19 Dec 2020 20:31:23 GMT
amp-iframe-0.1.js
cdn.ampproject.org/rtv/011912201827130/v0/
22 KB
8 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011912201827130/v0/amp-iframe-0.1.js
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
d971c790ccd635b50debfa83240afd78efec4b92f58c2ea1ff6f208e4dbf3a54
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
1572799
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
8106
x-xss-protection
0
server
sffe
date
Fri, 20 Dec 2019 20:31:23 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"cf652191067dc99f"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 19 Dec 2020 20:31:23 GMT
amp-sticky-ad-1.0.js
cdn.ampproject.org/rtv/011912201827130/v0/
7 KB
3 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011912201827130/v0/amp-sticky-ad-1.0.js
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
91f8612a702468a929df95c4c4e2b0611728fe4b86bfa5e48bd522c68a9bea29
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
1572798
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
2583
x-xss-protection
0
server
sffe
date
Fri, 20 Dec 2019 20:31:24 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"08d01fcb242f200c"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 19 Dec 2020 20:31:24 GMT
placeholder-icon.png
cdn-cultofmac-com.cdn.ampproject.org/i/s/cdn.cultofmac.com/wp-content/plugins/amp/assets/images/
243 B
1 KB
Image
General
Full URL
https://cdn-cultofmac-com.cdn.ampproject.org/i/s/cdn.cultofmac.com/wp-content/plugins/amp/assets/images/placeholder-icon.png
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
42e6220dff25baa367692a306a16bd96bc87c84e03baecd065519914aa41c48d
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
x-content-type-options
nosniff
last-modified
Sat, 21 Dec 2019 21:21:10 GMT
server
sffe
date
Wed, 08 Jan 2020 01:24:42 GMT
content-type
image/png
status
200
cache-control
private, max-age=31536000
content-disposition
attachment
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
243
x-xss-protection
0
expires
Wed, 08 Jan 2020 01:24:42 GMT
truncated
/
83 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d9c79f96fccf51c99109888c2900bed53b528f2427b89186029d30cf81e163d0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
84 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
103b01c461655e0deb5843dad225e2bda773a69da88e166be7d9a94cd51b93c9

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
amp-loader-0.1.js
cdn.ampproject.org/rtv/011912201827130/v0/
9 KB
3 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011912201827130/v0/amp-loader-0.1.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/011912201827130/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
a3bbc5108a64799eaa7bd1bafd66f3c01ff5a038c6eff715d3511af18cc3ca37
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Origin
https://www-cultofmac-com.cdn.ampproject.org

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
350500
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
2989
x-xss-protection
0
server
sffe
date
Sat, 04 Jan 2020 00:03:02 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"459e14f15d732a2c"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 03 Jan 2021 00:03:02 GMT
head_amp32x32.png
cdn-cultofmac-com.cdn.ampproject.org/ii/w39/s/cdn.cultofmac.com/wp-content/themes/com2014/images/
1 KB
1 KB
Image
General
Full URL
https://cdn-cultofmac-com.cdn.ampproject.org/ii/w39/s/cdn.cultofmac.com/wp-content/themes/com2014/images/head_amp32x32.png
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
f05f7c80628920befd64bf338eb9cf3b1a8b5bf50884998a90454c4f575e0fa8
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
x-content-type-options
nosniff
last-modified
Sat, 21 Dec 2019 22:33:12 GMT
server
sffe
date
Wed, 08 Jan 2020 01:24:42 GMT
content-type
image/png
status
200
cache-control
private, max-age=31536000
content-disposition
attachment
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
1189
x-xss-protection
0
expires
Wed, 08 Jan 2020 01:24:42 GMT
1f42e583825bf8b1907851f7c9866f21
secure-gravatar-com.cdn.ampproject.org/ii/w39/s/secure.gravatar.com/avatar/
446 B
611 B
Image
General
Full URL
https://secure-gravatar-com.cdn.ampproject.org/ii/w39/s/secure.gravatar.com/avatar/1f42e583825bf8b1907851f7c9866f21?s=24&d=mm&r=g
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
a8ae18d4d6bc25dbc021c9dee26ead02629778c7ed32d8c51159d5dabc91a75c
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
x-content-type-options
nosniff
last-modified
Wed, 18 Dec 2019 02:38:09 GMT
server
sffe
date
Wed, 08 Jan 2020 01:24:42 GMT
vary
Accept,Save-Data
content-type
image/webp
status
200
cache-control
private, max-age=299
content-disposition
attachment
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
446
x-xss-protection
0
expires
Wed, 08 Jan 2020 01:24:42 GMT
Backlit_keyboard-780x439.jpg
cdn-cultofmac-com.cdn.ampproject.org/ii/w820/s/cdn.cultofmac.com/wp-content/uploads/2016/01/
34 KB
34 KB
Image
General
Full URL
https://cdn-cultofmac-com.cdn.ampproject.org/ii/w820/s/cdn.cultofmac.com/wp-content/uploads/2016/01/Backlit_keyboard-780x439.jpg
Requested by
Host: www-cultofmac-com.cdn.ampproject.org
URL: https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
885eea92a107f8a4a4f6f36df6861dcb1390351cf4f5a13f19614ff6be67ab8b
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
x-content-type-options
nosniff
last-modified
Sun, 15 Dec 2019 05:07:39 GMT
server
sffe
date
Wed, 08 Jan 2020 01:24:42 GMT
vary
Accept,Save-Data
content-type
image/webp
status
200
cache-control
private, max-age=31536000
content-disposition
attachment
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
34692
x-xss-protection
0
expires
Wed, 08 Jan 2020 01:24:42 GMT
frame.html
d-25034154402567933835.ampproject.net/1912201827130/
0
0
Other
General
Full URL
https://d-25034154402567933835.ampproject.net/1912201827130/frame.html
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/011912201827130/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

access-control-allow-origin
*
f.js
3p.ampproject.net/1912201827130/
172 KB
46 KB
Other
General
Full URL
https://3p.ampproject.net/1912201827130/f.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/011912201827130/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
e8643cfa379590f48164bcc0aa728c96d190d19c03e863b5535dd42ec63d4c02
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Fri, 20 Dec 2019 20:31:22 GMT
content-encoding
br
x-content-type-options
nosniff
age
1572800
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
47192
x-xss-protection
0
last-modified
Fri, 20 Dec 2019 19:45:00 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
expires
Sat, 19 Dec 2020 20:31:22 GMT
gpt.js
www.googletagservices.com/tag/js/
52 KB
16 KB
Other
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/011912201827130/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
43fd6ae5651fef974ed910a1bf59da5f6918eaec9adc49737394cad541565f85
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 01:24:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"391 / 380 of 1000 / last-modified: 1578434528"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
15928
x-xss-protection
0
expires
Wed, 08 Jan 2020 01:24:42 GMT
ampad.js
g.ezoic.net/ezoic/
1 KB
1 KB
Other
General
Full URL
https://g.ezoic.net/ezoic/ampad.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/011912201827130/v0.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.121.173.160 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-3-121-173-160.eu-central-1.compute.amazonaws.com
Software
nginx/1.16.0 /
Resource Hash
eea9c54783f4fadc9b6de90cae6aed2e33b84318c5756c903315d45aee1adc90

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 01:24:42 GMT
server
nginx/1.16.0
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=31536000
content-length
1031
expires
Thu, 07 Jan 2021 01:24:42 GMT
amp-auto-lightbox-0.1.js
cdn.ampproject.org/rtv/011912201827130/v0/
6 KB
3 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011912201827130/v0/amp-auto-lightbox-0.1.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/011912201827130/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
681f52271114ce20848c2a415fc76edbf88cddd27fbaeb3d8863a48c554d373d
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Origin
https://www-cultofmac-com.cdn.ampproject.org

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
350358
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
2405
x-xss-protection
0
server
sffe
date
Sat, 04 Jan 2020 00:05:24 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"a1bd59a0abdbf2c5"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 03 Jan 2021 00:05:24 GMT
like.php
www.facebook.com/plugins/ Frame EA72
0
0
Document
General
Full URL
https://www.facebook.com/plugins/like.php?href=https://www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/&width=152&layout=button_count&action=like&size=large&show_faces=false&share=true&height=32&appId=249151412165931
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/011912201827130/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www.facebook.com
:scheme
https
:path
/plugins/like.php?href=https://www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/&width=152&layout=button_count&action=like&size=large&show_faces=false&share=true&height=32&appId=249151412165931
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D

Response headers

status
200
cache-control
private, no-cache, no-store, must-revalidate
pragma
no-cache
strict-transport-security
max-age=15552000; preload
content-encoding
br
timing-allow-origin
*
content-security-policy
default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
expires
Sat, 01 Jan 2000 00:00:00 GMT
content-type
text/html; charset="utf-8"
x-fb-debug
zQwFD1txhJdkuO0qlQCNSJ9bncWVBdib/i7+Tkpzi9hcpGhOFDlIUXbT3CA053myhoSTRSoR6ga5lI+YkoYoBQ==
date
Wed, 08 Jan 2020 01:24:42 GMT
alt-svc
h3-24=":443"; ma=3600
ezampdata
www.cultofmac.com/
2 B
462 B
Fetch
General
Full URL
https://www.cultofmac.com/ezampdata?url=https%3A%2F%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2Famp%2F&cid=C3B4Nongr9FGvMqtXiJL0G6YGlodDb-vCAh9znR51OXnBTt2uBzjbzSlLR_uwBWD&pid=9162&d=o611,h611,e611,e611,i611,o605,h605,e605,e605,i605,o607,h607,e607,e607,i607,o608,h608,e608,e608,i608,o609,h609,e609,e609,i609,o610,h610,e610,e610,i610,i111&wc=452&tid=167&__amp_source_origin=https%3A%2F%2Fwww.cultofmac.com
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/011912201827130/v0.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.197.0.7 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-197-0-7.eu-central-1.compute.amazonaws.com
Software
nginx/1.16.0 /
Resource Hash
44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

Request headers

Accept
application/json
Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Origin
https://www-cultofmac-com.cdn.ampproject.org
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 01:24:42 GMT
via
1.1 varnish (Varnish/6.0)
vary
Accept-Encoding
age
0
status
200
x-shard
100224228
content-length
2
amp-access-control-allow-source-origin
https://www.cultofmac.com
x-vcache
Miss
server
nginx/1.16.0
access-control-max-age
1728000
access-control-allow-methods
GET
x-varnish
25141997
access-control-allow-origin
https://www-cultofmac-com.cdn.ampproject.org
access-control-expose-headers
AMP-Access-Control-Allow-Source-Origin
cache-control
max-age=0, must-revalidate, no-cache, no-store
access-control-allow-credentials
true
accept-ranges
bytes
content-type
application/json
access-control-allow-headers
Content-Type
expires
Tue, 07 Jan 2020 01:24:42 GMT
collect
www.google-analytics.com/r/
35 B
135 B
Other
General
Full URL
https://www.google-analytics.com/r/collect?v=1&_v=a1&ds=AMP&aip&_s=1&dt=Malware%20uses%20Apple%E2%80%99s%20FairPlay%20DRM%20to%20attack%20iOS%20users%20%7C%20Cult%20of%20Mac&sr=1600x1200&_utmht=1578446682760&cid=PF7mqrMZNp6tUGaoZMnjf31wxRnWwQOoSusHkvQ2S0CeRIm0nexgdAncrhqzmP48&tid=UA-84038529-45&dl=https%3A%2F%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2Famp%2F&dr=&sd=24&ul=en-us&de=UTF-8&t=pageview&jid=0.32289850511675855&_r=1&a=9162&z=0.7558165161656523&cd1=pub_site_mobile_amp&cd2=167&cd3=0
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/011912201827130/v0/amp-analytics-0.1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Origin
https://www-cultofmac-com.cdn.ampproject.org
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Wed, 08 Jan 2020 01:24:42 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
https://www-cultofmac-com.cdn.ampproject.org
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
ping
ping.chartbeat.net/
43 B
168 B
Image
General
Full URL
https://ping.chartbeat.net/ping?h=cultofmac.com&p=%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2F&u=WyyPqaz6i7CPOm8ajxGR2OiOomL5YzAIOIOMv7d4D6JkUui8Rgn7ltHQxrTPh0AD&d=www.cultofmac.com&g=54946&g0=News%2C%20Newsstand%2C%20Top%20stories&g1=Rob%20LeFebvre&g2=&g3=&g4=&c=120&x=0&y=2214&o=1585&w=1200&j=30&R=1&W=0&I=0&E=0&r=&t=9162WyyPqaz6i7CPOm8ajxGR2OiOomL5YzAIOIOMv7d4D6JkUui8Rgn7ltHQxrTPh0AD&b=464&i=Malware%20uses%20Apple%E2%80%99s%20FairPlay%20DRM%20to%20attack%20iOS%20users%20%7C%20Cult%20of%20Mac&T=1578446682766&tz=-60&C=2&_
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.4.100.16 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-4-100-16.compute-1.amazonaws.com
Software
/
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
pragma
no-cache
date
Wed, 08 Jan 2020 01:24:43 GMT
cache-control
no-cache, no-store, must-revalidate
expires
0
content-length
43
content-type
image/gif
imp.gif
www.cultofmac.com/detroitchicago/
43 B
231 B
Other
General
Full URL
https://www.cultofmac.com/detroitchicago/imp.gif?amp=1&backgrounded=0&requestCount=1&url=https%3A%2F%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2Famp%2F&pid=9162&cid=C3B4Nongr9FGvMqtXiJL0G6YGlodDb-vCAh9znR51OXnBTt2uBzjbzSlLR_uwBWD&referrer=&tstart=1578446682769&pnv=39&pcrs=56&prt=1&pi=7&pcl=7&pc=367&pnt=0&prc=0&e=%7B%22ad_cache_level%22%3A1%2C%22ad_location_ids%22%3A%22%22%2C%22ad_transform_level%22%3A0%2C%22adx_ad_count%22%3A0%2C%22article_category%22%3A%22News%22%2C%22author%22%3A%22https%3A%2F%2Fwww.facebook.com%2Froblefwrites%22%2C%22bidder_version%22%3A3%2C%22days_since_last_visit%22%3A-1%2C%22display_ad_count%22%3A0%2C%22domain_id%22%3A27792%2C%22ds_adsize_opt_id%22%3A-1%2C%22engaged_time_visit%22%3A0%2C%22ezcache_level%22%3A1%2C%22forensiq_score%22%3A-1%2C%22form_factor_id%22%3A2%2C%22framework_id%22%3A4%2C%22has_bad_image%22%3A0%2C%22has_bad_words%22%3A0%2C%22iab_category%22%3A%22%22%2C%22is_from_recommended_pages%22%3Afalse%2C%22is_return_visitor%22%3Afalse%2C%22is_sitespeed%22%3A1%2C%22last_page_load%22%3A%22%22%2C%22last_pageview_id%22%3A%22%22%2C%22lt_cache_level%22%3A0%2C%22max_ads%22%3A5%2C%22page_ad_positions%22%3A%22%22%2C%22page_view_count%22%3A0%2C%22page_view_id%22%3A%22d9c3f49e-36ec-4bd3-5d7f-738a46017c81%22%2C%22position_selection_id%22%3A16%2C%22publish_date%22%3A%222016-03-16%22%2C%22pv_event_count%22%3A0%2C%22response_time_orig%22%3A888%2C%22serverid%22%3A%2254.67.21.204%3A20811%22%2C%22sub_page_ad_positions%22%3A%22%22%2C%22t_epoch%22%3A1578443129%2C%22template_id%22%3A167%2C%22time_on_site_visit%22%3A0%2C%22url%22%3A%22https%3A%2F%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2Famp%2F%22%2C%22user_id%22%3A0%2C%22word_count%22%3A452%2C%22worst_bad_word_level%22%3A0%7D
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/011912201827130/v0/amp-analytics-0.1.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.197.0.7 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-197-0-7.eu-central-1.compute.amazonaws.com
Software
nginx/1.16.0 /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Origin
https://www-cultofmac-com.cdn.ampproject.org
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Wed, 08 Jan 2020 01:24:42 GMT
server
nginx/1.16.0
access-control-allow-origin
https://www-cultofmac-com.cdn.ampproject.org
vary
Accept-Encoding, Accept-Encoding
access-control-allow-methods
HEAD, PUT, POST, GET, OPTIONS
content-type
image/gif
status
200
x-middleton-display
imp_sol
access-control-max-age
1728000
cache-control
no-cache, no-store, must-revalidate, max-age=0
access-control-allow-headers
Content-Type
content-length
43
r
amp-error-reporting.appspot.com/
2 B
257 B
XHR
General
Full URL
https://amp-error-reporting.appspot.com/r
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/011912201827130/v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2014 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/ Express
Resource Hash
565339bc4d33d72817b583024112eb7f5cdf3e5eef0252d6ec1b9c9a94e12bb3

Request headers

Referer
https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D
Origin
https://www-cultofmac-com.cdn.ampproject.org
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Wed, 08 Jan 2020 01:24:43 GMT
via
1.1 google
x-powered-by
Express
status
200
content-type
text/plain; charset=utf-8
access-control-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
2

Verdicts & Comments Add Verdict or Comment

19 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| AMP object| global object| AMP_CONFIG object| __AMP_LOG object| __AMP_ERRORS object| __AMP_MODE function| __AMP_REPORT_ERROR object| __AMP_TOP object| __AMP_SERVICES object| __AMP__EXPERIMENT_TOGGLES object| __AMP_URL_CACHE boolean| __AMP_TAG object| __AMP_EXTENDED_ELEMENTS function| __AMP_BASE_CE_CLASS number| ampAdSlotIdCounter string| __AMP_DEFAULT_BOOTSTRAP_SUBDOMAIN object| listeningFors

0 Cookies

2 Console Messages

Source Level URL
Text
console-api info URL: https://cdn.ampproject.org/rtv/011912201827130/v0.js(Line 524)
Message:
Powered by AMP ⚡ HTML – Version 1912201827130 https://www-cultofmac-com.cdn.ampproject.org/v/s/www.cultofmac.com/418020/malware-uses-apples-own-fairplay-drm-to-attack-ios-users/amp/?amp_js_v=0.1&usqp=mq331AQEKAFwAQ%3D%3D#origin%3Dhttps%3A%2F%2Fwww.google.co.uk%26prerenderSize%3D1%26visibilityState%3Dprerender%26paddingTop%3D32%26p2r%3D0%26horizontalScrolling%3D0%26csi%3D1%26aoh%3D15661572839977%26viewerUrl%3Dhttps%3A%2F%2Fwww.google.co.uk%2Famp%2Fs%2Fwww.cultofmac.com%2F418020%2Fmalware-uses-apples-own-fairplay-drm-to-attack-ios-users%2Famp%2F%26history%3D1%26storage%3D1%26cid%3D1%26cap%3DnavigateTo%2Ccid%2CfullReplaceHistory%2Cfragment%2CreplaceUrl
console-api error URL: https://cdn.ampproject.org/rtv/011912201827130/v0.js(Line 105)
Message:
localStorage not supported.

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
X-Content-Type-Options nosniff
X-Xss-Protection 0

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

3p.ampproject.net
amp-error-reporting.appspot.com
cdn-cultofmac-com.cdn.ampproject.org
cdn.ampproject.org
d-25034154402567933835.ampproject.net
g.ezoic.net
ping.chartbeat.net
secure-gravatar-com.cdn.ampproject.org
www-cultofmac-com.cdn.ampproject.org
www.cultofmac.com
www.facebook.com
www.google-analytics.com
www.googletagservices.com
18.197.0.7
2a00:1450:4001:806::2003
2a00:1450:4001:814::2001
2a00:1450:4001:815::200e
2a00:1450:4001:81b::2014
2a00:1450:4001:81e::2002
2a00:1450:4001:81e::2003
2a00:1450:4001:824::2001
2a03:2880:f11c:8183:face:b00c:0:25de
3.121.173.160
52.4.100.16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