URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Submission: On February 12 via manual from US

Summary

This website contacted 59 IPs in 6 countries across 41 domains to perform 236 HTTP transactions. The main IP is 2606:4700::6811:7763, located in United States and belongs to CLOUDFLARENET - Cloudflare, Inc., US. The main domain is www.darkreading.com.
TLS certificate: Issued by COMODO ECC Domain Validation Secure S... on January 18th 2019. Valid for: 6 months.
This is the only time www.darkreading.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 9 2606:4700::68... 13335 (CLOUDFLAR...)
2 2a00:1450:400... 15169 (GOOGLE)
15 2606:4700:30:... 13335 (CLOUDFLAR...)
9 2606:4700:30:... 13335 (CLOUDFLAR...)
3 2606:4700:20:... 13335 (CLOUDFLAR...)
1 151.139.239.5 33438 (HIGHWINDS2)
1 172.217.18.2 15169 (GOOGLE)
42 2606:4700:30:... 13335 (CLOUDFLAR...)
10 2606:2800:234... 15133 (EDGECAST)
2 2600:9000:200... 16509 (AMAZON-02)
1 2 2606:2800:234... 15133 (EDGECAST)
12 52.222.152.30 16509 (AMAZON-02)
2 52.213.106.142 16509 (AMAZON-02)
2 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
7 2a00:1450:400... 15169 (GOOGLE)
2 172.82.228.18 15224 (OMNITURE)
1 1 66.117.28.86 15224 (OMNITURE)
11 216.58.207.66 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 66.117.29.11 15224 (OMNITURE)
1 23.111.11.217 33438 (HIGHWINDS2)
1 1 2606:4700::68... 13335 (CLOUDFLAR...)
1 54.146.200.135 14618 (AMAZON-AES)
1 4 23.43.115.95 20940 (AKAMAI-ASN1)
5 2a03:2880:f01... 32934 (FACEBOOK)
2 46.105.202.39 16276 (OVH)
6 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 204.79.197.200 8068 (MICROSOFT...)
1 54.194.108.5 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
7 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
4 2a03:2880:f11... 32934 (FACEBOOK)
1 2 2600:9000:200... 16509 (AMAZON-02)
1 52.59.88.202 16509 (AMAZON-02)
16 52.222.150.151 16509 (AMAZON-02)
1 52.222.150.144 16509 (AMAZON-02)
3 23.211.0.4 16625 (AKAMAI-AS)
1 2620:103::192... 19994 (RACKSPACE)
1 184.31.90.134 20940 (AKAMAI-ASN1)
5 2a00:1450:400... 15169 (GOOGLE)
1 2606:2800:134... 15133 (EDGECAST)
1 2 199.16.156.21 13414 (TWITTER)
1 2 142.0.160.13 7160 (NETDYNAMICS)
1 2 209.167.231.17 7160 (NETDYNAMICS)
3 2a00:1450:400... 15169 (GOOGLE)
2 2.18.232.7 16625 (AKAMAI-AS)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
10 34.233.187.252 14618 (AMAZON-AES)
6 93.184.220.70 15133 (EDGECAST)
1 2 23.211.8.12 16625 (AKAMAI-AS)
2 52.202.190.15 14618 (AMAZON-AES)
1 2a00:1450:400... 15169 (GOOGLE)
1 52.222.150.69 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
2 23.211.1.39 16625 (AKAMAI-AS)
2 54.220.0.18 16509 (AMAZON-02)
236 59
Apex Domain
Subdomains
Transfer
42 deusm.com
img.deusm.com
290 KB
30 celtra.com
ads.celtra.com
cache-ssl.celtra.com
track.celtra.com
359 KB
15 twimgs.com
twimgs.com
285 KB
12 doubleclick.net
securepubads.g.doubleclick.net
googleads.g.doubleclick.net
105 KB
12 boltdns.net
cf-images.us-east-1.prod.boltdns.net
40 KB
12 twitter.com
platform.twitter.com
syndication.twitter.com
119 KB
11 googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
298 KB
9 ubm-us.net
i.ubm-us.net
dsimg.ubm-us.net
120 KB
9 darkreading.com
www.darkreading.com
51 KB
7 twimg.com
cdn.syndication.twimg.com
pbs.twimg.com
ton.twimg.com
74 KB
7 teads.tv
a.teads.tv
t.teads.tv
sync.teads.tv
187 KB
7 ampproject.org
cdn.ampproject.org
134 KB
7 googletagservices.com
www.googletagservices.com
95 KB
5 facebook.com
www.facebook.com
staticxx.facebook.com
396 B
4 adroll.com
s.adroll.com
d.adroll.com
79 KB
4 eloqua.com
s657486201.t.eloqua.com
s2150.t.eloqua.com
2 KB
4 facebook.net
connect.facebook.net
115 KB
4 scorecardresearch.com
sb.scorecardresearch.com
2 KB
4 flipboard.com
cdn.flipboard.com
fpn.flipboard.com
5 KB
3 appspot.com
amp-error-reporting.appspot.com
192 B
3 gstatic.com
www.gstatic.com
fonts.gstatic.com
104 KB
3 omtrdc.net
ubmtech.d3.sc.omtrdc.net
ubm.tt.omtrdc.net
2 KB
3 demdex.net
dpm.demdex.net
ubm.demdex.net
2 KB
3 adsnative.com
static.adsnative.com
api-cache.adsnative.com
rudy.adsnative.com
19 KB
3 ubmcanon.com
epromos.ubmcanon.com
67 KB
2 bing.com
bat.bing.com
7 KB
2 heatmap.it
u.heatmap.it
10 KB
2 google.de
adservice.google.de
www.google.de
287 B
2 google-analytics.com
ssl.google-analytics.com
17 KB
2 google.com
www.google.com
694 B
2 linkedin.com
platform.linkedin.com
55 KB
2 googleapis.com
fonts.googleapis.com
899 B
1 ytimg.com
s.ytimg.com
8 KB
1 youtube.com
www.youtube.com
923 B
1 consensu.org
cmp.teads.mgr.consensu.org
1 en25.com
img.en25.com
3 KB
1 techweb.com
ng.techweb.com
1 lightreading.com
img.lightreading.com
355 B
1 cwkuki.com
t.cwkuki.com
196 B
1 everesttech.net
cm.everesttech.net
527 B
1 googleadservices.com
www.googleadservices.com
9 KB
236 41
Domain Requested by
42 img.deusm.com www.darkreading.com
securepubads.g.doubleclick.net
www.googletagservices.com
17 cache-ssl.celtra.com ads.celtra.com
www.darkreading.com
15 twimgs.com www.darkreading.com
12 track.celtra.com www.darkreading.com
12 cf-images.us-east-1.prod.boltdns.net www.darkreading.com
11 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
www.darkreading.com
10 platform.twitter.com www.darkreading.com
platform.twitter.com
9 www.darkreading.com 1 redirects www.darkreading.com
7 cdn.ampproject.org securepubads.g.doubleclick.net
7 www.googletagservices.com www.darkreading.com
securepubads.g.doubleclick.net
6 tpc.googlesyndication.com securepubads.g.doubleclick.net
www.darkreading.com
6 i.ubm-us.net www.darkreading.com
5 pagead2.googlesyndication.com www.darkreading.com
4 www.facebook.com www.darkreading.com
connect.facebook.net
4 connect.facebook.net www.darkreading.com
connect.facebook.net
4 sb.scorecardresearch.com 1 redirects www.darkreading.com
3 ton.twimg.com platform.twitter.com
www.darkreading.com
3 pbs.twimg.com www.darkreading.com
3 amp-error-reporting.appspot.com cdn.ampproject.org
3 a.teads.tv securepubads.g.doubleclick.net
a.teads.tv
3 dsimg.ubm-us.net www.darkreading.com
3 epromos.ubmcanon.com www.darkreading.com
2 d.adroll.com s.adroll.com
2 s.adroll.com www.darkreading.com
s.adroll.com
2 sync.teads.tv 1 redirects a.teads.tv
2 t.teads.tv www.darkreading.com
2 s2150.t.eloqua.com 1 redirects www.darkreading.com
2 s657486201.t.eloqua.com 1 redirects www.darkreading.com
2 syndication.twitter.com 1 redirects www.darkreading.com
2 fpn.flipboard.com 1 redirects www.darkreading.com
2 fonts.gstatic.com securepubads.g.doubleclick.net
www.darkreading.com
2 bat.bing.com www.darkreading.com
2 u.heatmap.it www.darkreading.com
u.heatmap.it
2 ubmtech.d3.sc.omtrdc.net epromos.ubmcanon.com
www.darkreading.com
2 ssl.google-analytics.com www.darkreading.com
2 www.google.com dsimg.ubm-us.net
www.darkreading.com
2 dpm.demdex.net epromos.ubmcanon.com
www.darkreading.com
2 platform.linkedin.com 1 redirects www.darkreading.com
2 cdn.flipboard.com www.darkreading.com
2 fonts.googleapis.com www.darkreading.com
1 s.ytimg.com www.youtube.com
1 www.youtube.com www.darkreading.com
1 cmp.teads.mgr.consensu.org a.teads.tv
1 cdn.syndication.twimg.com platform.twitter.com
1 img.en25.com twimgs.com
1 ng.techweb.com twimgs.com
1 img.lightreading.com www.darkreading.com
1 ads.celtra.com www.darkreading.com
1 staticxx.facebook.com connect.facebook.net
1 www.google.de www.darkreading.com
1 www.gstatic.com www.google.com
1 ubm.demdex.net epromos.ubmcanon.com
1 googleads.g.doubleclick.net www.googleadservices.com
1 t.cwkuki.com www.darkreading.com
1 rudy.adsnative.com 1 redirects
1 api-cache.adsnative.com static.adsnative.com
1 ubm.tt.omtrdc.net epromos.ubmcanon.com
1 adservice.google.de www.googletagservices.com
1 cm.everesttech.net 1 redirects
1 www.googleadservices.com www.darkreading.com
1 static.adsnative.com www.darkreading.com
236 61
Subject Issuer Validity Valid
ssl764998.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-01-18 -
2019-07-27
6 months crt.sh
*.googleapis.com
Google Internet Authority G3
2019-01-23 -
2019-04-17
3 months crt.sh
sni136658.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-01-18 -
2019-07-27
6 months crt.sh
sni136530.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-01-13 -
2019-07-22
6 months crt.sh
ssl378091.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-12-28 -
2019-07-06
6 months crt.sh
*.adsnative.com
DigiCert SHA2 Secure Server CA
2018-04-20 -
2019-04-25
a year crt.sh
www.googleadservices.com
Google Internet Authority G3
2019-01-23 -
2019-04-17
3 months crt.sh
sni137786.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-11-26 -
2019-06-04
6 months crt.sh
*.twimg.com
DigiCert SHA2 High Assurance Server CA
2018-11-19 -
2019-11-27
a year crt.sh
*.flipboard.com
DigiCert SHA2 High Assurance Server CA
2017-10-19 -
2019-11-06
2 years crt.sh
platform.linkedin.com
DigiCert SHA2 Secure Server CA
2017-10-25 -
2019-10-30
2 years crt.sh
*.prod.boltdns.net
Amazon
2019-01-02 -
2020-02-02
a year crt.sh
*.demdex.net
DigiCert SHA2 High Assurance Server CA
2018-01-09 -
2021-02-12
3 years crt.sh
www.google.com
Google Internet Authority G3
2019-01-23 -
2019-04-17
3 months crt.sh
*.google-analytics.com
Google Internet Authority G3
2019-01-23 -
2019-04-17
3 months crt.sh
*.g.doubleclick.net
Google Internet Authority G3
2019-01-23 -
2019-04-17
3 months crt.sh
*.d3.sc.omtrdc.net
DigiCert SHA2 High Assurance Server CA
2016-05-04 -
2019-05-23
3 years crt.sh
*.google.com
Google Internet Authority G3
2019-01-23 -
2019-04-17
3 months crt.sh
*.tt.omtrdc.net
DigiCert SHA2 High Assurance Server CA
2017-10-19 -
2020-11-25
3 years crt.sh
*.cwkuki.com
Amazon
2019-02-11 -
2020-03-11
a year crt.sh
*.scorecardresearch.com
COMODO RSA Organization Validation Secure Server CA
2018-11-28 -
2019-12-26
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-01-21 -
2019-04-21
3 months crt.sh
*.heatmap.it
COMODO RSA Domain Validation Secure Server CA
2016-06-05 -
2019-06-27
3 years crt.sh
tpc.googlesyndication.com
Google Internet Authority G3
2019-01-23 -
2019-04-17
3 months crt.sh
www.bing.com
Microsoft IT TLS CA 5
2017-07-20 -
2019-07-10
2 years crt.sh
misc-sni.google.com
Google Internet Authority G3
2019-01-23 -
2019-04-17
3 months crt.sh
www.google.de
Google Internet Authority G3
2019-01-23 -
2019-04-17
3 months crt.sh
*.celtra.com
Go Daddy Secure Certificate Authority - G2
2018-05-15 -
2020-06-15
2 years crt.sh
img.lightreading.com
Amazon
2018-03-21 -
2019-04-21
a year crt.sh
teads.tv
Let's Encrypt Authority X3
2019-01-02 -
2019-04-02
3 months crt.sh
ng.techweb.com
Let's Encrypt Authority X3
2019-01-17 -
2019-04-17
3 months crt.sh
*.en25.com
DigiCert SHA2 Secure Server CA
2018-04-25 -
2019-07-25
a year crt.sh
syndication.twitter.com
DigiCert SHA2 High Assurance Server CA
2016-06-29 -
2019-09-16
3 years crt.sh
*.t.eloqua.com
DigiCert SHA2 Secure Server CA
2019-01-14 -
2020-03-14
a year crt.sh
*.appspot.com
Google Internet Authority G3
2019-01-23 -
2019-04-17
3 months crt.sh
teads.mgr.consensu.org
Let's Encrypt Authority X3
2018-11-27 -
2019-02-25
3 months crt.sh
*.adroll.com
DigiCert SHA2 Secure Server CA
2018-12-19 -
2020-03-19
a year crt.sh

This page contains 22 frames:

Primary Page: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Frame ID: DF6B2A2CD1DC35307D3B204F68809D2A
Requests: 166 HTTP requests in this frame

Frame: https://ubm.demdex.net/dest5.html?d_nsid=0
Frame ID: 8EAD0DB30EA5A3AD22A0A5FA5F5F198E
Requests: 1 HTTP requests in this frame

Frame: https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Frame ID: 1CE9D34A7465FEB37DCDD264988B96CD
Requests: 4 HTTP requests in this frame

Frame: https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Frame ID: 8EA25CB18E2415EFF79E5517808CC278
Requests: 4 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js
Frame ID: EBB52AA777BBA5BA6579D94F7649C590
Requests: 7 HTTP requests in this frame

Frame: https://i.ubm-us.net/oas/welcomeAd/ad_units/dr_640x480.html
Frame ID: 64EC9F026513B75DF06E39ED84D9FAC9
Requests: 1 HTTP requests in this frame

Frame: https://staticxx.facebook.com/connect/xd_arbiter/r/vy-MhgbfL4v.js?version=44
Frame ID: 9B037B6BB1E45BDED26827E0345479D0
Requests: 1 HTTP requests in this frame

Frame: https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Frame ID: C0CE0B5121D919221C9A09FAC0D34FC8
Requests: 3 HTTP requests in this frame

Frame: https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Frame ID: D013F4A8D785B1F2C73C9FD1132DD40C
Requests: 6 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js
Frame ID: B2B2FF7E6FEDEE37F1EC3325322E511B
Requests: 7 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js
Frame ID: EDA05778E17731AAD7FEEB08F0E50FCA
Requests: 6 HTTP requests in this frame

Frame: https://a.teads.tv/page/11512/tag
Frame ID: DD37E6680538F3E23CA948FD9153F289
Requests: 4 HTTP requests in this frame

Frame: https://ng.techweb.com/authds/login/login.jsp?type=iframe&cdsocket_client=https://www.darkreading.com/cdsocket_proxy.html
Frame ID: C4B0B789CB05E24522BA7AC198ACB89C
Requests: 1 HTTP requests in this frame

Frame: https://www.facebook.com/connect/ping?client_id=640989409269461&domain=www.darkreading.com&origin=1&redirect_uri=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter%2Fr%2Fvy-MhgbfL4v.js%3Fversion%3D44%23cb%3Df3648e340fb0364%26domain%3Dwww.darkreading.com%26origin%3Dhttps%253A%252F%252Fwww.darkreading.com%252Ff17b1919cf42b68%26relation%3Dparent&response_type=token%2Csigned_request&sdk=joey
Frame ID: AEE0A27BD15B0927B124DFE9CCCC3A17
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/widget_iframe.5b0c4d3ea3997aa2c22eac39be510646.html?origin=https%3A%2F%2Fwww.darkreading.com&settingsEndpoint=https%3A%2F%2Fsyndication.twitter.com%2Fsettings
Frame ID: 66E9B2A87524F911A33F6A9DCC325041
Requests: 1 HTTP requests in this frame

Frame: https://www.facebook.com/plugins/like.php?app_id=640989409269461&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter%2Fr%2Fvy-MhgbfL4v.js%3Fversion%3D44%23cb%3Df103d5d06da65c8%26domain%3Dwww.darkreading.com%26origin%3Dhttps%253A%252F%252Fwww.darkreading.com%252Ff17b1919cf42b68%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&layout=button&locale=en_US&sdk=joey&send=false&show_faces=false&width=87
Frame ID: 280F4BEBC4AB69343DDCB61724CBFD85
Requests: 1 HTTP requests in this frame

Frame: https://cmp.teads.mgr.consensu.org/index.html
Frame ID: 4D7D54DE422F9AAE4F86DEF27AC0E1CA
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/tweet_button.5b0c4d3ea3997aa2c22eac39be510646.en.html
Frame ID: CB1EDED5306255639C6F394578301246
Requests: 1 HTTP requests in this frame

Frame: https://pbs.twimg.com/card_img/1095322822560366592/xKpbWBHq?format=jpg&name=144x144_2
Frame ID: E6BE83AD17A433937D64E8C21BD36384
Requests: 8 HTTP requests in this frame

Frame: https://sync.teads.tv/iframe/redirect
Frame ID: 873B27E99525A811DE2C5300EA8B8C09
Requests: 1 HTTP requests in this frame

Frame: https://fonts.googleapis.com/css?family=Lato:400&text=%20BCDEGILMORSTUVWadeor
Frame ID: FCDF8BB52A363B55145B23CBEE3B1811
Requests: 21 HTTP requests in this frame

Frame: https://platform.twitter.com/jot.html
Frame ID: 66258531F8F24115BBEE438358A0527F
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • script /jit.*\.js/i

Overall confidence: 100%
Detected patterns
  • script /jquery\.mobile(?:-([\d.]+rc\d))?.*\.js(?:\?ver=([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • env /^adroll_/i

Overall confidence: 100%
Detected patterns
  • headers server /cloudflare/i

Overall confidence: 100%
Detected patterns
  • env /^elq(?:SiteID|Load|CurESite)$/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^\/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • env /^__google_ad_/i
  • env /^Goog_AdSense_/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|(analytics))\.js/i
  • env /^gaGlobal$/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Overall confidence: 100%
Detected patterns
  • env /^googletag$/i

Overall confidence: 100%
Detected patterns
  • env /^s_(?:account|objectID|code|INST)$/i

Overall confidence: 100%
Detected patterns
  • script /\/\/platform\.twitter\.com\/widgets\.js/i

Overall confidence: 100%
Detected patterns
  • html /<iframe[^>]* (?:id="comscore"|scr=[^>]+comscore)|\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • script /\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • env /^_?COMSCORE$/i

Overall confidence: 100%
Detected patterns
  • script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
  • script /jquery.*\.js/i
  • env /^jQuery$/i
  • script /jquery\.mobile(?:-([\d.]+rc\d))?.*\.js(?:\?ver=([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • env /^Recaptcha$/i

Page Statistics

236
Requests

100 %
HTTPS

50 %
IPv6

41
Domains

61
Subdomains

59
IPs

6
Countries

2665 kB
Transfer

7401 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 45
  • https://platform.linkedin.com/in.js HTTP 302
  • https://platform.linkedin.com/xdoor/scripts/in.js
Request Chain 78
  • https://www.darkreading.com/client_pathlog.asp?p=%2Fdarkreading%2Fsection%2F314&f=%2Fdarkreading%2Fsection%2F314%2F1333825&rndserial=41247 HTTP 302
  • https://img.deusm.com/images/spacer.gif
Request Chain 86
  • https://cm.everesttech.net/cm/dd?d_uuid=69699466201725194961355641266719465763 HTTP 302
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=XGLz8QAADmPK_Dx0
Request Chain 91
  • https://rudy.adsnative.com/cm.gif HTTP 302
  • https://t.cwkuki.com/cs/anPaK0
Request Chain 107
  • https://sb.scorecardresearch.com/b?c1=2&c2=3005435&ns__t=1549988849523&ns_c=windows-1252&cv=3.1e&c8=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...&c7=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=3005435&ns__t=1549988849523&ns_c=windows-1252&cv=3.1e&c8=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...&c7=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&c9=
Request Chain 140
  • https://fpn.flipboard.com/pix/__fpn.gif?utm_source=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825 HTTP 307
  • https://fpn.flipboard.com/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fattacks-breaches%25252Fransomware-attack-via-msp-locks-customers-out-of-systems%25252Fd%25252Fd-id%25252F1333825&rh=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fransomware-attack-via-msp-locks-customers-out-of-systems%252Fd%252Fd-id%252F1333825
Request Chain 182
  • https://s657486201.t.eloqua.com/visitor/v200/svrGP?pps=3&siteid=657486201&ref2=elqNone&tzo=0&ms=603&optin=disabled HTTP 302
  • https://s657486201.t.eloqua.com/visitor/v200/svrGP.aspx?pps=3&siteid=657486201&ref2=elqNone&tzo=0&ms=603&optin=disabled&elqCookie=1
Request Chain 183
  • https://s2150.t.eloqua.com/visitor/v200/svrGP?pps=3&siteid=2150&ref2=elqNone&tzo=0&ms=603&optin=disabled HTTP 302
  • https://s2150.t.eloqua.com/visitor/v200/svrGP.aspx?pps=3&siteid=2150&ref2=elqNone&tzo=0&ms=603&optin=disabled&elqCookie=1
Request Chain 199
  • https://sync.teads.tv/iframe?pid=21882&userId=cb612ddb-8a95-4fc2-9ae3-38d4c47ad374&gdprIab={%22status%22:22,%22consent%22:%22%22,%22reason%22:220}&1549988852436 HTTP 302
  • https://sync.teads.tv/iframe/redirect
Request Chain 237
  • https://syndication.twitter.com/i/jot HTTP 302
  • https://platform.twitter.com/jot.html

236 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request 1333825
www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/
152 KB
28 KB
Document
General
Full URL
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7763 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
5d5a78c83ee6fe3c6256631a4b198baf859a6ed155d8e14108aafdb8ac158e12
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:method
GET
:authority
www.darkreading.com
:scheme
https
:path
/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
date
Tue, 12 Feb 2019 16:27:27 GMT
content-type
text/html
set-cookie
__cfduid=d5c1de47d30e5bcbf7b8f09c1985de6ce1549988847; expires=Wed, 12-Feb-20 16:27:27 GMT; path=/; domain=.darkreading.com; HttpOnly darkreading_lastvisit=2/12/2019 11:27:27 AM; expires=Sun, 12-Feb-2034 15:27:27 GMT; path=/; HttpOnly darkreading_lastvisit=2/12/2019 11:27:27 AM; expires=Sun, 12-Feb-2034 15:27:27 GMT; path=/; HttpOnly cplChannelTagID=; path=/ darkreading%2Dmeter=1333825; expires=Wed, 13-Feb-2019 05:00:00 GMT; path=/ darkreading%5Fvisits=2; expires=Sun, 12-Feb-2034 05:00:00 GMT; path=/
vary
Accept-Encoding
cache-control
private
x-pingback
http://www.staging.new.informationweek.com/xmlrpc.asp
x-powered-by
ASP.NET
x-frame-options
SAMEORIGIN
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
4a806c3948d364b1-FRA
content-encoding
gzip
css
fonts.googleapis.com/
2 KB
614 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto+Slab:700
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
0fb0f3abed20c1112a0eb52745ba589a5ec9c2fe0582f82b40c1208a5aebaaf6
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Tue, 12 Feb 2019 16:27:27 GMT
server
ESF
access-control-allow-origin
*
date
Tue, 12 Feb 2019 16:27:27 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
x-xss-protection
1; mode=block
expires
Tue, 12 Feb 2019 16:27:27 GMT
darkreading.css
twimgs.com/nojitter/css/
17 KB
3 KB
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/darkreading.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
cf167be72549318f78f8c03d0d93b923f8e8e290acec47b870a1cede920e859b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 27 Apr 2017 09:38:14 GMT
server
cloudflare
etag
W/"45f8-54e22b7428d80"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=14400
cf-ray
4a806c3ccecc9780-FRA
expires
Tue, 12 Feb 2019 20:27:28 GMT
pano-framework.css
www.darkreading.com/styles/
124 KB
9 KB
Stylesheet
General
Full URL
https://www.darkreading.com/styles/pano-framework.css?v1.26
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7763 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
2466b97bcdbd9ad0e026385c5767a433425243f95012cedb1712925dfe91dcb4
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/styles/pano-framework.css?v1.26
pragma
no-cache
cookie
__cfduid=d5c1de47d30e5bcbf7b8f09c1985de6ce1549988847; darkreading_lastvisit=2/12/2019 11:27:27 AM; cplChannelTagID=; darkreading%2Dmeter=1333825; darkreading%5Fvisits=2
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
www.darkreading.com
referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
:scheme
https
:method
GET
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:27 GMT
content-encoding
gzip
vary
Accept-Encoding
cf-cache-status
HIT
last-modified
Mon, 26 Nov 2018 11:03:37 GMT
server
cloudflare
x-powered-by
ASP.NET
etag
W/"2a1f41ae7785d41:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
text/css
status
200
cache-control
public, max-age=7200
cf-ray
4a806c3bcba964b1-FRA
expires
Tue, 12 Feb 2019 18:27:27 GMT
styles.css
www.darkreading.com/styles/
292 B
306 B
Stylesheet
General
Full URL
https://www.darkreading.com/styles/styles.css?v7
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7763 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
a8fc74838ba253a4076b8eb46aeed79c10341380609dcfe11bed40d974d1fd10
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/styles/styles.css?v7
pragma
no-cache
cookie
__cfduid=d5c1de47d30e5bcbf7b8f09c1985de6ce1549988847; darkreading_lastvisit=2/12/2019 11:27:27 AM; cplChannelTagID=; darkreading%2Dmeter=1333825; darkreading%5Fvisits=2
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
www.darkreading.com
referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
:scheme
https
:method
GET
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:27 GMT
content-encoding
gzip
vary
Accept-Encoding
cf-cache-status
HIT
last-modified
Mon, 03 Apr 2017 14:07:44 GMT
server
cloudflare
x-powered-by
ASP.NET
etag
W/"b08d92aa83acd21:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
text/css
status
200
cache-control
public, max-age=7200
cf-ray
4a806c3bcbaa64b1-FRA
expires
Tue, 12 Feb 2019 18:27:27 GMT
dr_nativead.css
i.ubm-us.net/oas/nativead/css/
2 KB
943 B
Stylesheet
General
Full URL
https://i.ubm-us.net/oas/nativead/css/dr_nativead.css?v3
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::6818:7875 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
f5932acd6c5f2796f354dedc5e8dfe30e206787365186bbf0f9789d083472a75

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 06 Feb 2019 18:48:56 GMT
server
cloudflare
etag
W/"861-5813e2d913600"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
expires
Tue, 12 Feb 2019 20:27:28 GMT
cache-control
public, max-age=14400
cf-polished
origSize=2145
cf-ray
4a806c3d2a4ac2ba-FRA
cf-bgj
minify
nativead.js
i.ubm-us.net/oas/nativead/js/
1 KB
464 B
Script
General
Full URL
https://i.ubm-us.net/oas/nativead/js/nativead.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::6818:7875 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
984cd1fa5dd20c2b1b8fd77b6bb876a3a211cdf14aaaed6bc1481e3c98027544

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 30 Jul 2015 14:31:41 GMT
server
cloudflare
cf-polished
origSize=1373
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
expires
Wed, 13 Feb 2019 16:27:28 GMT
cache-control
public, max-age=86400
cf-ray
4a806c3d2a50c2ba-FRA
cf-bgj
minify
dr_nativead.js
i.ubm-us.net/oas/nativead/js/
8 KB
1 KB
Script
General
Full URL
https://i.ubm-us.net/oas/nativead/js/dr_nativead.js?v3
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::6818:7875 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
b309c9c4a6c27c7cfc64ab2bc7f545e8d7b41a795c46202ab2a9c633f7128287

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 06 Oct 2017 16:50:20 GMT
server
cloudflare
cf-polished
origSize=8434
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
expires
Wed, 13 Feb 2019 16:27:28 GMT
cache-control
public, max-age=86400
cf-ray
4a806c3d2a4ec2ba-FRA
cf-bgj
minify
respond.min.js
www.darkreading.com/script/
4 KB
2 KB
Script
General
Full URL
https://www.darkreading.com/script/respond.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7763 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
cf7bdb0487590885c13a3cc0a2a1450b3ac649a465de267af12f552be8bcb5fe
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/script/respond.min.js
pragma
no-cache
cookie
__cfduid=d5c1de47d30e5bcbf7b8f09c1985de6ce1549988847; darkreading_lastvisit=2/12/2019 11:27:27 AM; cplChannelTagID=; darkreading%2Dmeter=1333825; darkreading%5Fvisits=2
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.darkreading.com
referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
:scheme
https
:method
GET
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
gzip
vary
Accept-Encoding
cf-cache-status
HIT
last-modified
Mon, 22 Sep 2014 21:04:30 GMT
server
cloudflare
x-powered-by
ASP.NET
etag
W/"03ccda8d6cf1:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
application/x-javascript
status
200
cache-control
public, max-age=7200
cf-ray
4a806c3c2c0564b1-FRA
expires
Tue, 12 Feb 2019 18:27:28 GMT
jquery.mobile.custom.min.js
www.darkreading.com/script/
8 KB
3 KB
Script
General
Full URL
https://www.darkreading.com/script/jquery.mobile.custom.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7763 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
b4cf7d6d50b6a36f070f6c49e975198a9a8930838695b64e480bf1f6199f0572
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/script/jquery.mobile.custom.min.js
pragma
no-cache
cookie
__cfduid=d5c1de47d30e5bcbf7b8f09c1985de6ce1549988847; darkreading_lastvisit=2/12/2019 11:27:27 AM; cplChannelTagID=; darkreading%2Dmeter=1333825; darkreading%5Fvisits=2
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.darkreading.com
referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
:scheme
https
:method
GET
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
gzip
vary
Accept-Encoding
cf-cache-status
HIT
last-modified
Mon, 22 Sep 2014 21:04:30 GMT
server
cloudflare
x-powered-by
ASP.NET
etag
W/"03ccda8d6cf1:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
application/x-javascript
status
200
cache-control
public, max-age=7200
cf-ray
4a806c3c2c0664b1-FRA
expires
Tue, 12 Feb 2019 18:27:28 GMT
complete.js
twimgs.com/nojitter/js/
45 KB
9 KB
Script
General
Full URL
https://twimgs.com/nojitter/js/complete.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
8420f59cd348cf0e10e05482724523ad6b83f88467bbfacf6826eaadd3a03985

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 05 May 2017 06:04:53 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
4a806c3cceda9780-FRA
expires
Wed, 13 Feb 2019 16:27:28 GMT
jquery-1.11.min.js
twimgs.com/nojitter/js/
94 KB
32 KB
Script
General
Full URL
https://twimgs.com/nojitter/js/jquery-1.11.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
b294e973896f8f874e90a8eb1a8908ac790980d034c4c4bdf0fc3d37b8abf682

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 05 May 2017 06:05:04 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
4a806c3cced89780-FRA
expires
Wed, 13 Feb 2019 16:27:28 GMT
darkreading.js
twimgs.com/nojitter/darkreading/
27 KB
4 KB
Script
General
Full URL
https://twimgs.com/nojitter/darkreading/darkreading.js?v9
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
c5a37d18a14fb428d01bfe23b0e28db9b7a189e886513a7098683cb01f0929ee

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Mon, 23 Apr 2018 13:44:42 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
4a806c3ccedb9780-FRA
expires
Wed, 13 Feb 2019 16:27:28 GMT
VisitorAPI.js
epromos.ubmcanon.com/
45 KB
14 KB
Script
General
Full URL
https://epromos.ubmcanon.com/VisitorAPI.js?ormzkk
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:552 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
aa92b44ae441805b86a9603ffea3890a8df348fb2269d716c557b6970c11e9f4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Tue, 24 Apr 2018 23:42:00 GMT
server
cloudflare
etag
W/"1010b6-b435-56aa0b35ea1a3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=14400
cf-ray
4a806c3d6a19c2fb-FRA
expires
Tue, 12 Feb 2019 20:27:28 GMT
at.js
epromos.ubmcanon.com/
106 KB
33 KB
Script
General
Full URL
https://epromos.ubmcanon.com/at.js?ormzkk
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:552 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
42eb48be2f9f6fc91fcda10af9802cb6aa0733e2dd007c224570ae6ece3dac33

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 12 Apr 2018 15:42:52 GMT
server
cloudflare
etag
W/"1000c4-1a7c1-569a89bca3df7"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=14400
cf-ray
4a806c3d6a1ac2fb-FRA
expires
Tue, 12 Feb 2019 20:27:28 GMT
jplayer.blue.monday.css
twimgs.com/nojitter/css/
12 KB
3 KB
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/jplayer.blue.monday.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
0a4f12795a11d0957a7e476cdd2516967e3e00f54841456fbd8c0dd607984d92

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 05 May 2017 07:28:28 GMT
server
cloudflare
etag
W/"2f89-54ec1d5e89f00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=14400
cf-ray
4a806c3cced09780-FRA
expires
Tue, 12 Feb 2019 20:27:28 GMT
style.css
twimgs.com/nojitter/css/
912 B
393 B
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/style.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
3a08be5766c0e198ba8171f7decd09065c08a5c850276325cc1792f25e7b356e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 05 May 2017 07:30:36 GMT
server
cloudflare
etag
W/"390-54ec1dd89bf00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=14400
cf-ray
4a806c3ccece9780-FRA
expires
Tue, 12 Feb 2019 20:27:28 GMT
jquery.jplayer.min.js
twimgs.com/nojitter/js/
48 KB
11 KB
Script
General
Full URL
https://twimgs.com/nojitter/js/jquery.jplayer.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
cddbf405266cd4b3e66229592e63666012dbceaaad02635af5da9d303bfd3ed1

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 27 Apr 2017 11:20:55 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
4a806c3cced29780-FRA
expires
Wed, 13 Feb 2019 16:27:28 GMT
jquery.tablesorter.min.js
twimgs.com/nojitter/js/
16 KB
5 KB
Script
General
Full URL
https://twimgs.com/nojitter/js/jquery.tablesorter.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
b90279154254e108748dc80dd226eab336e2c320e4a40569952b46dc5d785536

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 27 Apr 2017 11:21:05 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
4a806c3cced49780-FRA
expires
Wed, 13 Feb 2019 16:27:28 GMT
ubm-widget-style.css
dsimg.ubm-us.net/ubm-widget/css/
29 KB
5 KB
Stylesheet
General
Full URL
https://dsimg.ubm-us.net/ubm-widget/css/ubm-widget-style.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::6818:7875 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
1e97210e22581e4b07521a644b8874bf38e72bf51fb77691c4394aecbac3081b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 11 Apr 2018 16:31:21 GMT
server
cloudflare
etag
W/"7393-569952b4c0840"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=14400
cf-ray
4a806c3d5b17c2ba-FRA
expires
Tue, 12 Feb 2019 20:27:28 GMT
ubm-widget-min.js
dsimg.ubm-us.net/ubm-widget/js/
192 KB
50 KB
Script
General
Full URL
https://dsimg.ubm-us.net/ubm-widget/js/ubm-widget-min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::6818:7875 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
ffcaeef328a1e67717f714997426aaf936e4b9d378a5fbe1bd2a063dfeb50750

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 11 Apr 2018 17:29:33 GMT
server
cloudflare
etag
W/"2fe99-56995fb6fbbe3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=14400
cf-ray
4a806c3d5b22c2ba-FRA
expires
Tue, 12 Feb 2019 20:27:28 GMT
ng_forms.js
www.darkreading.com/script/
31 KB
7 KB
Script
General
Full URL
https://www.darkreading.com/script/ng_forms.js?v7.9
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7763 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
c85a0459dea5ca94496b30f7dbd4121bcac56fb77bb48059e3c1906806b33f5c
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/script/ng_forms.js?v7.9
pragma
no-cache
cookie
__cfduid=d5c1de47d30e5bcbf7b8f09c1985de6ce1549988847; darkreading_lastvisit=2/12/2019 11:27:27 AM; cplChannelTagID=; darkreading%2Dmeter=1333825; darkreading%5Fvisits=2
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.darkreading.com
referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
:scheme
https
:method
GET
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
gzip
vary
Accept-Encoding
cf-cache-status
HIT
last-modified
Wed, 10 Oct 2018 09:37:18 GMT
server
cloudflare
x-powered-by
ASP.NET
etag
W/"5d057d67c60d41:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
application/x-javascript
status
200
cache-control
public, max-age=7200
cf-ray
4a806c3c9c9664b1-FRA
expires
Tue, 12 Feb 2019 18:27:28 GMT
widget-extra.css
twimgs.com/nojitter/css/
443 B
294 B
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/widget-extra.css?v1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
61494fd1b573b217034bef7e22044bda91962797d68efada6726910d32bb995b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 13 Sep 2017 07:28:37 GMT
server
cloudflare
etag
W/"1bb-5590d1ba81340"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=14400
cf-ray
4a806c3cced19780-FRA
expires
Tue, 12 Feb 2019 20:27:28 GMT
render.v1.js
static.adsnative.com/static/js/
58 KB
18 KB
Script
General
Full URL
https://static.adsnative.com/static/js/render.v1.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.139.239.5 Dallas, United States, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
6f15e73a7ab391b586b6f91cc44e85f9263a80183c33a082b42dc018c71a0635

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
gzip
last-modified
Fri, 08 Feb 2019 20:30:09 GMT
server
NetDNA-cache/2.2
x-amz-request-id
2787AC0E36A24F64
etag
W/"5efd1cc923b6d16b380280fb6cfe5bd7"
x-cache
HIT
content-language
en
status
200
content-type
application/javascript
access-control-allow-origin
*
x-amz-version-id
Ifq5xn.ndxora.NMSlERCxvrnLtjLs1b
x-amz-id-2
HztpElOWyxAR5bWbRlH636qNYkyMWHlBpFm9NkdHi5lVM+mvhDWEPecJISUOu2FF0npz968ddgQ=
conversion.js
www.googleadservices.com/pagead/
24 KB
9 KB
Script
General
Full URL
https://www.googleadservices.com/pagead/conversion.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.217.18.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s28-in-f2.1e100.net
Software
cafe /
Resource Hash
2d1a995992a738edec851a8b6579e2805f6d4533e97218bf0b5d2da44c804b8b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
9137
x-xss-protection
1; mode=block
server
cafe
etag
11165928448987042972
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Tue, 12 Feb 2019 16:27:28 GMT
iwk-it-network-dr.gif
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/iwk-it-network-dr.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
d6df7d1f2b9c65c06c5ae1e798650b6c388f26f6852b8814f942557d712b9745

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Wed, 02 Nov 2016 13:53:05 GMT
server
cloudflare
etag
"abc-54051c29ab240"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
4a806c3ddf922726-FRA
content-length
2748
DR_mobile_User_nav.png
img.deusm.com/darkreading/
1 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_mobile_User_nav.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
7b02cdb496b954e874c4b87d48eb1ea16f088258786ed0d2f0771acc3d01649e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:03 GMT
server
cloudflare
etag
"5be-4f2ebd21a06c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c3ddf932726-FRA
content-length
1470
spacer.gif
img.deusm.com/images/
49 B
146 B
Image
General
Full URL
https://img.deusm.com/images/spacer.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
3c5b83e390d046c3623c4b8e35b58aaf64a7481bb2372fb51ae2e0e7818f7407

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Fri, 13 Oct 2000 01:54:07 GMT
server
cloudflare
etag
"31-3737c29f20dc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
4a806c41abad2726-FRA
content-length
49
DR_search.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_search.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
dafb72bcf008c9b9754482b88e8ba8b8e854f1a69483f0753b1c3f12101c1a9f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:03 GMT
server
cloudflare
etag
"7e9-4f2ebd21a06c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c41abb02726-FRA
content-length
2025
DR_mobile_SM.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_mobile_SM.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
bfc1797e85a0565d0cfba1621eac801dc5ebd78a02f45e0ab8de5c6c2eb3f987

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:03 GMT
server
cloudflare
etag
"864-4f2ebd21a06c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c41abb12726-FRA
content-length
2148
DR-sections-nav.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-sections-nav.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
4f89a03faa36f0b6eeb92b9a8f0b8d2f9d3e564ba8bf13bb169bf05b126ca81e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:03 GMT
server
cloudflare
etag
"9aa-4f2ebd21a06c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c41cbe72726-FRA
content-length
2474
mobile_close.jpg
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/mobile_close.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
b5c543f59d71e1e4f6b51c896febf86975206dcf9e34757f475b125d64d16ea6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Thu, 13 Mar 2014 12:44:20 GMT
server
cloudflare
etag
"638-4f47c4fdf5100"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
4a806c41cbe82726-FRA
content-length
1592
DR_logo_314x49.png
img.deusm.com/darkreading/
7 KB
7 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_logo_314x49.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
0615fb751c4db849533b1e432f05428e307591466902876f8ab30d7873b7f38b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Mon, 15 Oct 2018 10:02:43 GMT
server
cloudflare
etag
"1b78-5784189c2b6f8"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c41cbec2726-FRA
content-length
7032
DR_Join_Interop_V2.png
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_Join_Interop_V2.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
d752f713e203c62dbc776dd030354ceb8337f0fc7cb07be2b2f905119b177221

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Thu, 20 Dec 2018 17:34:15 GMT
server
cloudflare
etag
"b2c-57d778a1893c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c41cbee2726-FRA
content-length
2860
Jai-Vijayan.jpg
img.deusm.com/informationweek/
11 KB
11 KB
Image
General
Full URL
https://img.deusm.com/informationweek/Jai-Vijayan.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2e9b6fed568a85ee88f1eb2aa1d51cb2073d907cbb0109a5dd703f0b1e5651d6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Mon, 29 Sep 2014 13:34:14 GMT
server
cloudflare
etag
"2c67-5043452972180"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
4a806c41cbf22726-FRA
content-length
11367
editor-TW.png
img.deusm.com/informationweek/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/editor-TW.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
32821e69d091e71a62b9dbefcd09516c2133b50c50a3f8d597207d9cab5d59b8

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Thu, 14 Nov 2013 19:33:41 GMT
server
cloudflare
etag
"60d-4eb2828b4cf40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c41cbf42726-FRA
content-length
1549
editor-IN.png
img.deusm.com/informationweek/
1 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/editor-IN.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e5cc2027e2da5b3d553fba6a4d2d7276aafa604001e9b0321e18d1fd62b03b3f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Thu, 14 Nov 2013 19:33:41 GMT
server
cloudflare
etag
"5b7-4eb2828b4cf40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c41cbf52726-FRA
content-length
1463
editor-RSS.png
img.deusm.com/informationweek/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/editor-RSS.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
a8f4fa7376444ffe05d0f7b296439401fb9729bdee84d760ee6286e7b663c753

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Thu, 14 Nov 2013 19:33:41 GMT
server
cloudflare
etag
"6fa-4eb2828b4cf40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c41cbf72726-FRA
content-length
1786
editor-email.png
img.deusm.com/informationweek/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/editor-email.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
190f689e0f479324a217a5ea88c1acc132b66d24b16559052d59b892ff5dcba2

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Thu, 14 Nov 2013 19:33:40 GMT
server
cloudflare
etag
"70f-4eb2828a58d00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c41cbf82726-FRA
content-length
1807
DR-comment.png
img.deusm.com/darkreading/
1011 B
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-comment.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
63484bd691450c081b848e5159315bfcd02720741d3f72a69717643d6630e578

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:02 GMT
server
cloudflare
etag
"3f3-4f2ebd20ac480"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c41cbf92726-FRA
content-length
1011
thumbs-up.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/thumbs-up.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
0c9111d9514a49ad97e7c6d5fd97a00f3232b73537e9155726f32f123eb69b5a

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Fri, 14 Mar 2014 16:09:21 GMT
server
cloudflare
etag
"607-4f4934ae90e40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c41cbfa2726-FRA
content-length
1543
thumbs-down.png
img.deusm.com/informationweek/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/thumbs-down.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
b19f14d674857362b6e10d0dcb1703b149d9dda6f350d1737562fc36e4e67a81

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Wed, 20 Nov 2013 19:20:31 GMT
server
cloudflare
etag
"624-4eba0acaa9dc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c41cbfc2726-FRA
content-length
1572
email-decode.min.js
www.darkreading.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/
1 KB
807 B
Script
General
Full URL
https://www.darkreading.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7763 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2595496fe48df6fcf9b1bc57c29a744c121eb4dd11566466bc13d2e52e6bbcc8
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js
pragma
no-cache
cookie
__cfduid=d5c1de47d30e5bcbf7b8f09c1985de6ce1549988847; darkreading_lastvisit=2/12/2019 11:27:27 AM; cplChannelTagID=; darkreading%2Dmeter=1333825; darkreading%5Fvisits=2
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.darkreading.com
referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
:scheme
https
:method
GET
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
gzip
vary
Accept-Encoding
last-modified
Mon, 11 Feb 2019 17:08:51 GMT
server
cloudflare
etag
W/"5c61ac23-4d7"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
application/javascript
status
200
cache-control
max-age=172800 public
cf-ray
4a806c3e6e8c64b1-FRA
expires
Thu, 14 Feb 2019 16:27:28 GMT
widgets.js
platform.twitter.com/
93 KB
28 KB
Script
General
Full URL
https://platform.twitter.com/widgets.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/4198) /
Resource Hash
edec3d5d129ff6f29ef5211d16862b9e6390227e6712e5dcf90b46023a19073b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 16:27:28 GMT
Content-Encoding
gzip
Last-Modified
Wed, 06 Feb 2019 23:37:50 GMT
Server
ECS (fcn/4198)
Etag
"bd29d9845873b291d46dd0df9ef27aa6+gzip"
Vary
Accept-Encoding
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Cache-Control
public, max-age=1800
Content-Type
application/javascript; charset=utf-8
Content-Length
27996
flipboard_srsw.png
cdn.flipboard.com/badges/
322 B
745 B
Image
General
Full URL
https://cdn.flipboard.com/badges/flipboard_srsw.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:200c:fc00:e:5a70:ca47:86e1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
44fc0a3d10c47ae5aa6c77c76b4b8f81aa08022ca464ef235005ddd86570eb5b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 14:52:34 GMT
via
1.1 bb93dfaee440e32ac88831363641e2c2.cloudfront.net (CloudFront)
last-modified
Wed, 07 Feb 2018 22:03:59 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
atime:1518040945/ctime:1518040834/gid:20/gname:staff/md5:37351783e1813119a3e0710c16137273/mode:33152/mtime:1518064798/uid:502/uname:jlee
age
55390
etag
"37351783e1813119a3e0710c16137273"
x-cache
Hit from cloudfront
content-type
image/png
status
200
accept-ranges
bytes
content-length
322
x-amz-cf-id
nFHSgApfx2IWIxORKO6KzGcewrJ_BsDTOqxqguy1qMd5sh2Oqkp4DQ==
flbuttons.min.js
cdn.flipboard.com/web/buttons/js/
7 KB
4 KB
Script
General
Full URL
https://cdn.flipboard.com/web/buttons/js/flbuttons.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:200c:fc00:e:5a70:ca47:86e1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
8e7ad8de87781f6ad65b36a7d3243b44d80dc182df6af076484a2bec85051550

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 07:50:16 GMT
content-encoding
gzip
last-modified
Wed, 11 Oct 2017 00:24:00 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:502/gname:staff/uname:alee/gid:20/mode:33188/mtime:1507680760/atime:1507680783/md5:ec6e4306e5e274d25c4f9afde663da81/ctime:1507680760
age
58473
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-id
tp1obzmPujoL0VJtjTfJ8xrkdw9PzID7T_gQzMc09joEMKFQqPcOTw==
via
1.1 bb93dfaee440e32ac88831363641e2c2.cloudfront.net (CloudFront)
in.js
platform.linkedin.com/xdoor/scripts/
Redirect Chain
  • https://platform.linkedin.com/in.js
  • https://platform.linkedin.com/xdoor/scripts/in.js
181 KB
55 KB
Script
General
Full URL
https://platform.linkedin.com/xdoor/scripts/in.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:b6ab:6556:9a85:ba61:ee81 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FB) /
Resource Hash
67ef1c6ecf6e8a6a63b651ca353f22bee3ca64d45f7f645e8824c488edc005e1

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
gzip
x-cdn-client-ip-version
IPV6
x-cdn
ECST
x-cache
HIT
status
200
x-cdn-proto
HTTP2
x-li-pop
prod-efr5
content-length
55977
x-li-uuid
fb2APDSqghUAKd2PfSsAAA==
last-modified
Tue, 12 Feb 2019 16:19:23 GMT
server
ECS (fcn/40FB)
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=900
accept-ranges
bytes
x-li-proto
http/1.1
x-li-fabric
prod-lor1
expires
Tue, 12 Feb 2019 16:34:23 GMT

Redirect headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
gzip
x-cdn-client-ip-version
IPV6
x-cdn
ECST
x-cache
MISS
p3p
CP="CAO CUR ADM DEV PSA PSD OUR"
status
302
x-cdn-proto
HTTP2
x-li-pop
prod-efr5
content-length
20
x-li-uuid
cruRRaWqghVAksFTaisAAA==
server
Apache-Coyote/1.1
vary
Accept-Encoding
x-li-fabric
prod-lva1
location
https://platform.linkedin.com/xdoor/scripts/in.js
cache-control
max-age=31536000
x-li-proto
http/1.1
expires
Wed, 12 Feb 2020 16:27:28 GMT
INT19-Logo-HorizDates-3035.png
img.deusm.com/darkreading/MarilynCohodas/
7 KB
7 KB
Image
General
Full URL
https://img.deusm.com/darkreading/MarilynCohodas/INT19-Logo-HorizDates-3035.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
f95e67a383d9303db5f3d27bb1e8d0a155f881dbd89edf15cda37fba28e67bc1

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Fri, 01 Feb 2019 18:57:42 GMT
server
cloudflare
etag
"1cc4-580d9b7b67744"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c41dc0c2726-FRA
content-length
7364
John-Callahan.png
img.deusm.com/darkreading/authors/
26 KB
26 KB
Image
General
Full URL
https://img.deusm.com/darkreading/authors/John-Callahan.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
bb41afff810be9b376512c29ec49a60368d86d3866bdee6ee6119a024b053ce3

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Fri, 08 Feb 2019 21:46:39 GMT
server
cloudflare
etag
"6946-58168e4d06dc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c41dc0e2726-FRA
content-length
26950
Kelly_Jackson_Higgins.jpg
twimgs.com/nojitter/informationweek/resources/images/
23 KB
24 KB
Image
General
Full URL
https://twimgs.com/nojitter/informationweek/resources/images/Kelly_Jackson_Higgins.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
bf298157a19ff06a7b27a36eb4a3be2994016452a5f9c1ad6b480aa7ce3799ff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Wed, 12 Jul 2017 11:38:18 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
cache-control
public, max-age=86400
accept-ranges
bytes
cf-ray
4a806c41df9e9780-FRA
content-length
24037
expires
Wed, 13 Feb 2019 16:27:28 GMT
NL-icon.png
img.deusm.com/informationweek/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/informationweek/NL-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
d8b7ea5cc75abc79d502a95c5ccac8f97aa82fd8c13acc74c84c754eb86cc4c3

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Fri, 08 Nov 2013 15:09:43 GMT
server
cloudflare
etag
"a27-4eaabc5a3dbc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c41dc0f2726-FRA
content-length
2599
ubm-tech.png
img.deusm.com/darkreading/
7 KB
7 KB
Image
General
Full URL
https://img.deusm.com/darkreading/ubm-tech.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
7b6908c1ddefad4b526966ba3f51d6e03f1f40747b658fbe64b9e3471ce6faf8

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Tue, 25 Feb 2014 18:55:37 GMT
server
cloudflare
etag
"1cb3-4f33fa2395c40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c41dc102726-FRA
content-length
7347
video-arrow_left_off.gif
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/video-arrow_left_off.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
9f61400081191bf755c967c186a8fd356b02010fac3412f84cf83d5dfe10dd5d

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Fri, 14 Mar 2014 16:02:37 GMT
server
cloudflare
etag
"53e-4f49332d48140"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
4a806c41dc122726-FRA
content-length
1342
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/0ad17f2e-83b0-4817-9f85-83bb523f6066/main/160x90/2m39s29ms/match/
4 KB
5 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/0ad17f2e-83b0-4817-9f85-83bb523f6066/main/160x90/2m39s29ms/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.152.30 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-152-30.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
9c03ac026e206115e0583f90338c9dcb06ea48ad5241067a166a1c394f9ee591

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 04:08:34 GMT
Via
1.1 44d7d28132a47c2b5760c4ec3dd7aa89.cloudfront.net (CloudFront)
Age
44335
X-Powered-From
us-east-1c
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
0dPsGi9w2-7MrX_vEc5q4u0BwZGBjNDpOZepyY2BTbPYQD4robIr0Q==
comment.png
img.deusm.com/informationweek/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/informationweek/comment.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
4f65ccd30d1c95588b51035a804dd49090d7fbe6c2829a576a31d1b6a3e0f86b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Wed, 20 Nov 2013 19:22:53 GMT
server
cloudflare
etag
"446-4eba0b5215d40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c41dc172726-FRA
content-length
1094
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/a8e7c148-a432-459e-8181-ba378d8da6c1/1e828d79-2292-4df0-835e-ce200355dc3e/160x90/match/
3 KB
3 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/a8e7c148-a432-459e-8181-ba378d8da6c1/1e828d79-2292-4df0-835e-ce200355dc3e/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.152.30 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-152-30.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
9dc3847fd8d296e1570d5b6752b4d9e3044993257b2f0e4bd5cfdedcf61e0f59

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 15:12:14 GMT
Via
1.1 44d7d28132a47c2b5760c4ec3dd7aa89.cloudfront.net (CloudFront)
Age
4515
X-Powered-From
us-east-1a
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
s-cjVrev7Az3RMJ3h3AKoXTlQP2Bpk2P50-WOpFwmIho6iUZCjw-Jg==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/7882da0f-da1d-4785-96ab-c55ef8ee63de/a3978046-d9ef-4024-aa8d-eae6b8da0f45/160x90/match/
3 KB
3 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/7882da0f-da1d-4785-96ab-c55ef8ee63de/a3978046-d9ef-4024-aa8d-eae6b8da0f45/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.152.30 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-152-30.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
7e92cb972a0c5c33a960ba9135f7542284b23c9e51fba36b3ae77dd170fd65c5

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 15:12:15 GMT
Via
1.1 b8b7a48d4425abc8f20c14956fccf2e5.cloudfront.net (CloudFront)
Age
4514
X-Powered-From
us-east-1d
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
K1AZYbpP0p5wUqypnjBSo3AS_2YF1l-H7r-q1UVQAdEitaIGnEbwYg==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/f2fdd737-6d3e-4c36-a8b8-cdacb607bc8a/5de61e8d-e394-4f66-a277-4278da525064/160x90/match/
3 KB
3 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/f2fdd737-6d3e-4c36-a8b8-cdacb607bc8a/5de61e8d-e394-4f66-a277-4278da525064/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.152.30 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-152-30.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
7bfeae359d7815e91aee4eaa70e8b803b785c2b9ef4fbbda9eca1311274126d4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 15:12:15 GMT
Via
1.1 ae3e6ab763f755c867a3b493d306312c.cloudfront.net (CloudFront)
Age
4514
X-Powered-From
us-east-1c
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
GeiXzQmjfrl0Dii2Y7_mUwIRz8mMDhQPFjPVLOMcxX8p9H8Qe8UEQQ==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/dd1f5a44-3ec8-465b-9575-a274ea802b3c/079b60eb-4986-4356-a850-c0cc7167e762/160x90/match/
3 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/dd1f5a44-3ec8-465b-9575-a274ea802b3c/079b60eb-4986-4356-a850-c0cc7167e762/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.152.30 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-152-30.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
132e19a7feb870e59a7fd2266b90a0229d4c0f98479999303f1a5c6a2d13120f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 15:12:15 GMT
Via
1.1 492376a657ddc8d381dbc676ab798325.cloudfront.net (CloudFront)
Age
4514
X-Powered-From
us-east-1d
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
vx6aYZN5nwHFKdUyPq8u6im5DB36b7IXQ69YvzTJKohhHZkd74YK-A==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/b7a6fca4-04fb-4b07-9017-1025e92ceee0/57da7b4a-c38e-4c02-8d4c-bab6d1d9364e/160x90/match/
2 KB
3 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/b7a6fca4-04fb-4b07-9017-1025e92ceee0/57da7b4a-c38e-4c02-8d4c-bab6d1d9364e/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.152.30 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-152-30.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
4a6857f46af89d2160c950fdacccafa7d00bec93f38c90779708dc0c0625d3ed

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 15:12:15 GMT
Via
1.1 831ce605dd77f58786c993787cdac90b.cloudfront.net (CloudFront)
Age
4514
X-Powered-From
us-east-1e
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
ztsLdJOKS3TIuo16xF1qTGYzMSv6pStSFNqFk8U_Hz-KfoL7KFF3Kg==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/92828275-2d5a-4358-8803-5b8da5885232/d3c87fc5-0a46-495f-b10a-64720cfb95fe/160x90/match/
3 KB
3 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/92828275-2d5a-4358-8803-5b8da5885232/d3c87fc5-0a46-495f-b10a-64720cfb95fe/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.152.30 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-152-30.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
e4a73b26661f72b70c74a515c07c380f9cd673b037fd0def630c9d6ac8229fce

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 15:12:15 GMT
Via
1.1 44d7d28132a47c2b5760c4ec3dd7aa89.cloudfront.net (CloudFront)
Age
4513
X-Powered-From
us-east-1c
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
VB3tVadazHprnbHg78EjSEDWUr34UOa8S9yLO_c7P6WQpqbPtxx6Kw==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/ecfa4cdd-511e-40f8-8c90-ea48f3c490b0/4f7f5dd1-0228-42ce-b696-155d552e5288/160x90/match/
3 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/ecfa4cdd-511e-40f8-8c90-ea48f3c490b0/4f7f5dd1-0228-42ce-b696-155d552e5288/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.152.30 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-152-30.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
60f84e180d9241f98dfaac54fc319fff8be52a2977f9959b564d842ee8bc04c6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 15:12:16 GMT
Via
1.1 44d7d28132a47c2b5760c4ec3dd7aa89.cloudfront.net (CloudFront)
Age
4513
X-Powered-From
us-east-1d
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
21P4dF6wBcs0cQD8lr5uJ0_KDMNbt4SjPTj8RqHchQH6_gciRlxCjw==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/177ffcf5-f5e4-4b90-b127-872357b2d82d/8bfde697-77bd-4f22-8796-7f222e0b216f/160x90/match/
3 KB
3 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/177ffcf5-f5e4-4b90-b127-872357b2d82d/8bfde697-77bd-4f22-8796-7f222e0b216f/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.152.30 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-152-30.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
f114c01e65a025ba9b36cecae835b7d85bfaf27100a49d225b27414ca14a0bae

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 05:31:57 GMT
Via
1.1 831ce605dd77f58786c993787cdac90b.cloudfront.net (CloudFront)
Age
39332
X-Powered-From
us-east-1d
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
Ecz72coEji0vx0agAvHDTj-truAtuhIjSu1GUL2_YNZmeFc2N8R7Fg==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/987ef41f-4071-4272-8ebc-7f113239e5d4/f022d7c9-b480-4a31-a4fc-af5ba23c8a30/160x90/match/
3 KB
3 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/987ef41f-4071-4272-8ebc-7f113239e5d4/f022d7c9-b480-4a31-a4fc-af5ba23c8a30/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.152.30 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-152-30.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
e7c11470406c01438564eeb2d76119d52470d572f5ae04b39cea9cc4e5ee6022

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 14:35:15 GMT
Via
1.1 492376a657ddc8d381dbc676ab798325.cloudfront.net (CloudFront)
Age
6734
X-Powered-From
us-east-1c
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
KBcsekOTP6dDle1sj2gsNXejfNYSd6ZZEUdUnH7ldbl-4s-eKrMQGA==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/c5a884f5-d10e-4b06-8f7e-6bc54379fe32/92db0e1c-64d8-428c-95ed-6066339ada8e/160x90/match/
3 KB
3 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/c5a884f5-d10e-4b06-8f7e-6bc54379fe32/92db0e1c-64d8-428c-95ed-6066339ada8e/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.152.30 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-152-30.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
9860a8d4dad7b5dcc531c5ec839274a273a05786ad6b74d08d8199259bfa4509

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 14:35:15 GMT
Via
1.1 ae3e6ab763f755c867a3b493d306312c.cloudfront.net (CloudFront)
Age
6734
X-Powered-From
us-east-1d
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
RlntpXcyfJ3ftswcXzXaf4OY8cOK6e82dDLv8YppnNadpYYXRLeAHw==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/c5023478-5b52-410d-866c-439728d041a1/main/160x90/1m22s389ms/match/
3 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/c5023478-5b52-410d-866c-439728d041a1/main/160x90/1m22s389ms/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.152.30 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-152-30.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
9b25230c2a3962d55b1535f6f8aa484d04b5d9f9164c0b9b698ab319604ec778

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Mon, 11 Feb 2019 19:03:13 GMT
Via
1.1 b8b7a48d4425abc8f20c14956fccf2e5.cloudfront.net (CloudFront)
Age
77056
X-Powered-From
us-east-1c
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
RQ4H5Iu-nvAH64byuObeDyR9medx5bGt3g2GrrI1tegT-HFyTU5jow==
video-arrow_right_on.gif
img.deusm.com/darkreading/
2 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/video-arrow_right_on.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
c7d1ee4f5a608fa05b8f9c6cbd47e3eab7516facc3380d704b7332805877afff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Fri, 14 Mar 2014 15:55:19 GMT
server
cloudflare
etag
"9f7-4f49318b927c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
4a806c41dc182726-FRA
content-length
2551
JK-February-self-drivingcar.jpg
img.deusm.com/darkreading/MarilynCohodas/
172 KB
172 KB
Image
General
Full URL
https://img.deusm.com/darkreading/MarilynCohodas/JK-February-self-drivingcar.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
5580503887258e90db4ce59e8a65c69e07b63a92ec91286b9fd29bc3dd0be4c6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Fri, 08 Feb 2019 13:40:24 GMT
server
cloudflare
etag
"2af2a-5816219d94200"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
4a806c41dc192726-FRA
content-length
175914
DR19_Feb1_Thumbnail.JPG
dsimg.ubm-us.net/asset/405503/591693/
58 KB
59 KB
Image
General
Full URL
https://dsimg.ubm-us.net/asset/405503/591693/DR19_Feb1_Thumbnail.JPG
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::6818:7875 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
46b2c6207ab97c409fe0e2713f0d83551beb7f71a827ccd96a1efea231b08874

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Thu, 07 Feb 2019 19:38:02 GMT
server
cloudflare
etag
"e9a3-58152fb00faea"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
cache-control
public, max-age=14400
accept-ranges
bytes
cf-ray
4a806c41dde1c2ba-FRA
content-length
59811
expires
Tue, 12 Feb 2019 20:27:28 GMT
survey_jspage.asp
www.darkreading.com/
7 KB
1 KB
Script
General
Full URL
https://www.darkreading.com/survey_jspage.asp?survey_id=130&cbust=197118
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7763 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
3f425dd0b2d02d28484158627724fd7f108100abed86656ae430d3f820f3068c
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/survey_jspage.asp?survey_id=130&cbust=197118
pragma
no-cache
cookie
__cfduid=d5c1de47d30e5bcbf7b8f09c1985de6ce1549988847; darkreading_lastvisit=2/12/2019 11:27:27 AM; cplChannelTagID=; darkreading%2Dmeter=1333825; darkreading%5Fvisits=2; AMCV_77FB1CFE532B22840A490D45%40AdobeOrg=-330454231%7CMCIDTS%7C17940%7CvVersion%7C3.1.2; check=true
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.darkreading.com
referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
:scheme
https
:method
GET
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
gzip
server
cloudflare
x-frame-options
SAMEORIGIN
x-powered-by
ASP.NET
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/html
status
200
cache-control
private
set-cookie
darkreading_lastvisit=2/12/2019 11:27:28 AM; expires=Sun, 12-Feb-2034 15:27:28 GMT; path=/; HttpOnly darkreading%5Fvisits=3; expires=Sun, 12-Feb-2034 05:00:00 GMT; path=/
cf-ray
4a806c3f9fb364b1-FRA
DRR_ENT.JPG
twimgs.com/custom_content/
191 KB
191 KB
Image
General
Full URL
https://twimgs.com/custom_content/DRR_ENT.JPG
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
d07f1ea820b5b946f4baf83c9ca81fda8b8f43d3271ae124caf04572352fa806

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Fri, 30 Nov 2018 14:18:47 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
cache-control
public, max-age=86400
accept-ranges
bytes
cf-ray
4a806c41df9f9780-FRA
content-length
195490
expires
Wed, 13 Feb 2019 16:27:28 GMT
DR-bug.png
img.deusm.com/darkreading/
1 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-bug.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
f30d5c0433d74c8224a2343a3c6c08468015909c22315b8693f9bdee33f48217

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:01 GMT
server
cloudflare
etag
"5d2-4f2ebd1fb8240"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c41dc1a2726-FRA
content-length
1490
dr-footer-logo-new.jpg
img.deusm.com/darkreading/
5 KB
5 KB
Image
General
Full URL
https://img.deusm.com/darkreading/dr-footer-logo-new.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
04f784c83e6dde0588704c7fcc52d62e657f5b09012bb62a1d309d3adc774306

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Wed, 09 Nov 2016 07:03:32 GMT
server
cloudflare
etag
"125e-540d8dad41900"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
4a806c41dc1c2726-FRA
content-length
4702
footergreyblack.css
twimgs.com/nojitter/css/
3 KB
1 KB
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/footergreyblack.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
4587735e3d5dc5ef5149eae835aeb69f971575da9d4a293d9bffbb1dc25afa6b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 27 Apr 2017 10:50:58 GMT
server
cloudflare
etag
W/"d11-54e23bb5fe880"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=14400
cf-ray
4a806c3ccecf9780-FRA
expires
Tue, 12 Feb 2019 20:27:28 GMT
UBM_Logo_PMS669.png
img.deusm.com/images/
1 KB
2 KB
Image
General
Full URL
https://img.deusm.com/images/UBM_Logo_PMS669.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
902118c5436b3d46d79f44c3f8e7012eb9acc9b4b341e034e7bf0259aca4b425

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Thu, 16 Feb 2017 13:10:17 GMT
server
cloudflare
etag
"5c4-548a584b7e040"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c41dc1d2726-FRA
content-length
1476
elqCfg.js
twimgs.com/informationweek/elqNow/
3 KB
1 KB
Script
General
Full URL
https://twimgs.com/informationweek/elqNow/elqCfg.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
45e31bcb4f072d9f442333ad139c3085bcf881955711d866035342f3028f4558

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 04 May 2011 21:27:53 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
4a806c40cdd29780-FRA
expires
Wed, 13 Feb 2019 16:27:28 GMT
elqImg.js
twimgs.com/informationweek/elqNow/
713 B
351 B
Script
General
Full URL
https://twimgs.com/informationweek/elqNow/elqImg.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
c94ad448b05002218551938d40e2baf3617a3d56a4455729d84993a5b7b311cf

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Mon, 28 Oct 2013 20:43:21 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
4a806c40de0a9780-FRA
expires
Wed, 13 Feb 2019 16:27:28 GMT
dev_adBlockerTrack.js
twimgs.com/nojitter/js/
2 KB
763 B
Script
General
Full URL
https://twimgs.com/nojitter/js/dev_adBlockerTrack.js?v1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681f:5172 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
d9053ec3a7a0bdbdcb96173299c0ba89bc15f3134849fff570e37d6322676304

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 14 Feb 2018 09:08:10 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
4a806c40fe429780-FRA
expires
Wed, 13 Feb 2019 16:27:28 GMT
ubm-tech-global-app-measurement.js
epromos.ubmcanon.com/s_code/
56 KB
20 KB
Script
General
Full URL
https://epromos.ubmcanon.com/s_code/ubm-tech-global-app-measurement.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:552 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
924b3a471d549de6251aea0e74fe6eb136141d3f0a8bf001906fff933dec45d4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Sat, 14 Jul 2018 00:08:25 GMT
server
cloudflare
etag
W/"180789-df4a-570ea6525b8fa"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=14400
cf-ray
4a806c412899c2fb-FRA
expires
Tue, 12 Feb 2019 20:27:28 GMT
spacer.gif
img.deusm.com/images/
Redirect Chain
  • https://www.darkreading.com/client_pathlog.asp?p=%2Fdarkreading%2Fsection%2F314&f=%2Fdarkreading%2Fsection%2F314%2F1333825&rndserial=41247
  • https://img.deusm.com/images/spacer.gif
49 B
166 B
Image
General
Full URL
https://img.deusm.com/images/spacer.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
3c5b83e390d046c3623c4b8e35b58aaf64a7481bb2372fb51ae2e0e7818f7407

Request headers

:path
/images/spacer.gif
pragma
no-cache
cookie
__cfduid=d684a749af2078a77bacd934327f38a591549988848
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
img.deusm.com
referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
:scheme
https
:method
GET
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:29 GMT
cf-cache-status
HIT
last-modified
Fri, 13 Oct 2000 01:54:07 GMT
server
cloudflare
etag
"31-3737c29f20dc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
4a806c442ec52726-FRA
content-length
49

Redirect headers

date
Tue, 12 Feb 2019 16:27:29 GMT
server
cloudflare
status
302
x-powered-by
ASP.NET
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
text/html
location
https://img.deusm.com/images/spacer.gif
cache-control
private
set-cookie
darkreading_lastvisit=2/12/2019 11:27:29 AM; expires=Sun, 12-Feb-2034 15:27:29 GMT; path=/; HttpOnly darkreading%5Fvisits=4; expires=Sun, 12-Feb-2034 05:00:00 GMT; path=/
cf-ray
4a806c41d9ba64b1-FRA
lightreading_rating_dot_10x7.gif
img.deusm.com/lightreading/
49 B
146 B
Image
General
Full URL
https://img.deusm.com/lightreading/lightreading_rating_dot_10x7.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
3c5b83e390d046c3623c4b8e35b58aaf64a7481bb2372fb51ae2e0e7818f7407

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Wed, 25 Sep 2013 21:21:36 GMT
server
cloudflare
etag
"31-4e73bd694b800"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
4a806c41dc1e2726-FRA
content-length
49
twitter_intevol_18x18.gif
img.deusm.com/darkreading/
619 B
838 B
Image
General
Full URL
https://img.deusm.com/darkreading/twitter_intevol_18x18.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
ebe3a0272a317857bf566a0deec42181bf0e89d280bb3143bba14da1ae1ddb10

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Fri, 09 Feb 2018 10:56:35 GMT
server
cloudflare
etag
"26b-564c561c21ec0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
4a806c41dc202726-FRA
content-length
619
id
dpm.demdex.net/
362 B
1 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=3.1.2&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_orgid=77FB1CFE532B22840A490D45%40AdobeOrg&d_nsid=0&ts=1549988848440
Requested by
Host: epromos.ubmcanon.com
URL: https://epromos.ubmcanon.com/VisitorAPI.js?ormzkk
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.213.106.142 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-213-106-142.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
975748ff9986b1ab2bf05f0f805a9857a25316c3d585ac74ed00057fdcc16b2c

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Origin
https://www.darkreading.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v018-058ae9db6.edge-irl1.demdex.com 5.47.3.20190129122145 4ms
Pragma
no-cache
Content-Encoding
gzip
X-TID
1+plJLL1Qac=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://www.darkreading.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
300
Expires
Thu, 01 Jan 1970 00:00:00 GMT
api.js
www.google.com/recaptcha/
833 B
569 B
Script
General
Full URL
https://www.google.com/recaptcha/api.js?onload=rcCallback&render=explicit
Requested by
Host: dsimg.ubm-us.net
URL: https://dsimg.ubm-us.net/ubm-widget/js/ubm-widget-min.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:809::2004 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
GSE /
Resource Hash
7dc493f36acfb1da786b136f37286e72c1207e2e1d8d966586c1cbd2ccce05b1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
GSE
x-frame-options
SAMEORIGIN
content-type
text/javascript; charset=UTF-8
status
200
cache-control
private, max-age=300
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
468
x-xss-protection
1; mode=block
expires
Tue, 12 Feb 2019 16:27:28 GMT
ga.js
ssl.google-analytics.com/
45 KB
17 KB
Script
General
Full URL
https://ssl.google-analytics.com/ga.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:814::2008 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
1259ea99bd76596239bfd3102c679eb0a5052578dc526b0452f4d42f8bcdd45f
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 16 Jan 2019 20:01:45 GMT
server
Golfe2
age
6445
date
Tue, 12 Feb 2019 14:40:03 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
17168
expires
Tue, 12 Feb 2019 16:40:03 GMT
gpt.js
www.googletagservices.com/tag/js/
30 KB
10 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81f::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8917d4a75d0f49ff718e5a39aeea39df6f461bb675fd9f1c323a615e1759db02
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"80 / 581 of 1000 / last-modified: 1549987828"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
10174
x-xss-protection
1; mode=block
expires
Tue, 12 Feb 2019 16:27:28 GMT
id
ubmtech.d3.sc.omtrdc.net/
3 B
484 B
XHR
General
Full URL
https://ubmtech.d3.sc.omtrdc.net/id?d_visid_ver=3.1.2&d_fieldgroup=A&mcorgid=77FB1CFE532B22840A490D45%40AdobeOrg&mid=79471191171466830672027705815909244880&ts=1549988848632
Requested by
Host: epromos.ubmcanon.com
URL: https://epromos.ubmcanon.com/VisitorAPI.js?ormzkk
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.82.228.18 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
*.d3.sc.omtrdc.net
Software
Omniture DC/2.0.0 /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Origin
https://www.darkreading.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Date
Tue, 12 Feb 2019 16:27:28 GMT
X-Content-Type-Options
nosniff
Server
Omniture DC/2.0.0
xserver
www183
Vary
Origin
X-C
ms-6.6.0
P3P
CP="This is not a P3P policy"
Access-Control-Allow-Origin
https://www.darkreading.com
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/x-javascript
Content-Length
3
X-XSS-Protection
1; mode=block
ibs:dpid=411&dpuuid=XGLz8QAADmPK_Dx0
dpm.demdex.net/
Redirect Chain
  • https://cm.everesttech.net/cm/dd?d_uuid=69699466201725194961355641266719465763
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=XGLz8QAADmPK_Dx0
42 B
769 B
Image
General
Full URL
https://dpm.demdex.net/ibs:dpid=411&dpuuid=XGLz8QAADmPK_Dx0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.213.106.142 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-213-106-142.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

DCS
dcs-prod-irl1-v018-032bcfb9d.edge-irl1.demdex.com 5.47.3.20190129122145 3ms
Pragma
no-cache
X-TID
9Uc6Y5c2QDA=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT

Redirect headers

Date
Tue, 12 Feb 2019 16:27:29 GMT
Server
AMO-cookiemap/1.1
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Location
https://dpm.demdex.net/ibs:dpid=411&dpuuid=XGLz8QAADmPK_Dx0
Cache-Control
no-cache
Connection
Keep-Alive
Keep-Alive
timeout=15,max=100
Content-Length
0
pubads_impl_306.js
securepubads.g.doubleclick.net/gpt/
182 KB
62 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_306.js?21063187
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
3639b6fb0d7357164929309ad5516dd4735675cb1bdc7f2649ca6dad94dfd8d2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 11 Feb 2019 15:17:29 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
63538
x-xss-protection
1; mode=block
expires
Tue, 12 Feb 2019 16:27:28 GMT
integrator.sync.js
adservice.google.de/adsid/
113 B
178 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.sync.js?domain=www.darkreading.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81d::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ea03bfd7fdda1eac185ebc3e8e74b33065b04c8e0adc48cbbd4136748dbd2742
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
108
x-xss-protection
1; mode=block
json
ubm.tt.omtrdc.net/m2/ubm/mbox/
97 B
605 B
XHR
General
Full URL
https://ubm.tt.omtrdc.net/m2/ubm/mbox/json?mbox=target-global-mbox&mboxSession=6b26a308543349398069827c2da9e258&mboxPC=&mboxPage=3834066aed364076bc1e5d2417eb748e&mboxVersion=1.0.0&mboxCount=1&mboxTime=1549988848780&mboxHost=www.darkreading.com&mboxURL=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&mboxReferrer=&mboxXDomain=enabled&browserHeight=1200&browserWidth=1600&browserTimeOffset=0&screenHeight=1200&screenWidth=1600&colorDepth=24&mboxMCGVID=79471191171466830672027705815909244880&mboxAAMB=6G1ynYcLPuiQxYZrsz_pkqfLG9yMXBpb2zX5dvJdYQJzPXImdj0y&mboxMCAVID=&mboxMCGLH=6&vst.trk=ubmtech.d3.sc.omtrdc.net&vst.trks=ubmtech.d3.sc.omtrdc.net&mboxMCSDID=0ADEA3B5CDDC28B2-5550AD7A79C46002
Requested by
Host: epromos.ubmcanon.com
URL: https://epromos.ubmcanon.com/at.js?ormzkk
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
66.117.29.11 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
Software
/
Resource Hash
71d1cc3d54314407e1644af6f3a85e14c334e64e4950472fd7eb7941998f1a8f

Request headers

Accept
application/json
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Origin
https://www.darkreading.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 Feb 2019 16:27:28 GMT
content-type
application/json;charset=UTF-8
status
200
vary
Origin, Access-Control-Request-Method, Access-Control-Request-Headers
p3p
CP="NOI DSP CURa OUR STP COM", CP="NOI DSP CURa OUR STP COM"
access-control-allow-origin
https://www.darkreading.com
cache-control
no-cache
access-control-allow-credentials
true
timing-allow-origin
*
content-length
97
x-request-id
f0220e05-ea2c-4178-8663-866031388402
/
api-cache.adsnative.com/v1/host/www.darkreading.com/
23 B
1016 B
Script
General
Full URL
https://api-cache.adsnative.com/v1/host/www.darkreading.com/?&callback=an_callback_lookup
Requested by
Host: static.adsnative.com
URL: https://static.adsnative.com/static/js/render.v1.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.111.11.217 Phoenix, United States, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
bec4f2f082be46c47ba8f2398813bb3c90495d69405fa0981506b1fd13ba29d6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 16:27:29 GMT
Content-Encoding
gzip
Transfer-Encoding
chunked
X-Cache
EXPIRED
Connection
keep-alive
CF-RAY
4a806c42fda2646f-FRA
Server
NetDNA-cache/2.2
Vary
Accept-Encoding, Accept-Language
Access-Control-Allow-Methods
GET, PUT, POST, DELETE, PATCH, OPTIONS
Content-Language
en
Access-Control-Allow-Origin
*
Cache-Control
max-age=900, no-cache, must-revalidate
Access-Control-Allow-Credentials
true
X-From
frontline-production-5cc6f645fd-ft8l7
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Authorization
anPaK0
t.cwkuki.com/cs/
Redirect Chain
  • https://rudy.adsnative.com/cm.gif
  • https://t.cwkuki.com/cs/anPaK0
0
196 B
Image
General
Full URL
https://t.cwkuki.com/cs/anPaK0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.146.200.135 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-146-200-135.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Connection
keep-alive
Date
Tue, 12 Feb 2019 16:27:29 GMT

Redirect headers

date
Tue, 12 Feb 2019 16:27:29 GMT
vary
Accept-Encoding
cf-cache-status
MISS
server
cloudflare
access-control-allow-origin
*
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
location
https://t.cwkuki.com/cs/anPaK0
access-control-allow-methods
GET, PUT, POST, DELETE, PATCH, OPTIONS
content-type
text/html; charset=UTF-8
status
302
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
cf-ray
4a806c42fe0e640f-FRA
access-control-allow-headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Authorization
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.43.115.95 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-43-115-95.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
76c393f564f53c19e795307e622edc8657a603f7a816c2646385697286d11313

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 16:27:29 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
902
Expires
Wed, 13 Feb 2019 16:27:29 GMT
fbevents.js
connect.facebook.net/en_US/
52 KB
16 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:216:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
222d6a37b66b79384926caa02c4dd11d56ab1d64ffb239fd5db9ebf1abfaf6b5
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
15892
x-xss-protection
0
pragma
public
x-fb-debug
P/0oyoPtFQ2Lqgx/afn4K4wMDNv1CQvwfcTUiWJIFB07dq5tt15wyW/YwoKNmMSRGH++Xjnz/zuI5aRMV3ThYw==
date
Tue, 12 Feb 2019 16:27:29 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
log.js
u.heatmap.it/
26 KB
10 KB
Script
General
Full URL
https://u.heatmap.it/log.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
46.105.202.39 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
/
Resource Hash
ecded18536426e30f5af01e39779ff4f66c52fd762ba75729188b80e37f7cfac

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:29 GMT
content-encoding
br
last-modified
Thu, 25 Oct 2018 10:53:36 GMT
x-cdn-pop-ip
137.74.120.32/27
etag
W/"5bd1a0b0-6804"
x-cacheable
Matched cache
vary
Accept-Encoding
content-type
application/x-javascript; charset=UTF-8
status
200
cache-control
max-age=2592000
x-cdn-pop
sbg
accept-ranges
bytes
content-length
10194
expires
Sat, 02 Feb 2019 04:37:20 GMT
background-pattern.png
img.deusm.com/darkreading/
493 B
569 B
Image
General
Full URL
https://img.deusm.com/darkreading/background-pattern.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_306.js?21063187
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
98fb88ec226feae902fb7f98528a41db7abd7de155a6d7b65658c6ab7f2b95f4

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.26
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:28 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:01 GMT
server
cloudflare
etag
"1ed-4f2ebd1fb8240"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c41dc2e2726-FRA
content-length
493
ads
securepubads.g.doubleclick.net/gampad/
83 KB
16 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2423101658502414&correlator=1824935655455999&output=ldjh&callback=googletag.impl.pubads.callbackProxy1&impl=fifs&adsid=NT&json_a=1&eid=21063187%2C21063178%2C21062069%2C21062456%2C21062887&vrg=306&guci=1.2.0.0.2.2.0.0&plat=1%3A32776%2C2%3A32776%2C8%3A32776&sc=1&sfv=1-0-32&iu_parts=2441%2Cdarkreading%2Cattacks_breaches&enc_prev_ius=%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2&prev_iu_szs=2x2%2C5x5%2C300x250%7C336x280%7C300x600%7C336x850%2C6x6%2C1x2%2C728x90%7C970x250%2C336x27%2C300x250%7C336x280%7C300x600%7C336x850%2C300x60%2C3x3%2C4x4%2C8x2%2C8x4&prev_scp=pos%3Dwelcome%7Cpos%3DTAPunit%7Cpos%3Drec1%7Cpos%3Dpromo%7Cpos%3Dwallpaper%7Cpos%3Dtop%7Cpos%3Dlogo%7Cpos%3Drec2%7Cpos%3Deventpromo%7Cpos%3Dribbon%7Cpos%3Dvideo%7Cpos%3Dnative%7Cpos%3Dinsight&cust_params=kw%3DAdvanced_Threats%252CApplications%252CAttacks%252CAttacks-Breaches%252CBreaches%26aid%3D1333825&cookie_enabled=1&bc=15&abxe=1&lmt=1549988848&dt=1549988848931&dlt=1549988847949&idt=853&frm=20&biw=1600&bih=1200&oid=3&adxs=0%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9&adys=0%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9&adks=770981021%2C2285942263%2C4220632109%2C4159207384%2C2332965166%2C2966194094%2C2269036440%2C4220632108%2C1032152201%2C885452677%2C693593060%2C929715771%2C3939335409&ucis=1%7C2%7C3%7C4%7C5%7C6%7C7%7C8%7C9%7Ca%7Cb%7Cc%7Cd&ifi=1&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&dssz=38&icsg=16106140320&std=0&csl=93&vis=1&dmc=8&scr_x=0&scr_y=0&ga_vid=1784456074.1549988849&ga_sid=1549988849&ga_hid=1185909834&fws=0%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_306.js?21063187
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
60009abfd2b8347e811622a07e9fa3a3cc690810c4767e84e17724536e66719f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Origin
https://www.darkreading.com

Response headers

date
Tue, 12 Feb 2019 16:27:29 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
16291
x-xss-protection
1; mode=block
google-lineitem-id
4490350311,4895861703,4895861703,-2,4895861703,4934390146,-2,4846682076,-2,-2,42403476,4880894798,-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138217035443,138255595212,138255595218,-2,138255595215,138258373162,-2,138248772804,-2,-2,138212589663,138253088669,-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.darkreading.com
access-control-expose-headers
x-google-amp-ad-validated-version
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_306.js
securepubads.g.doubleclick.net/gpt/
67 KB
25 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_306.js?21063187
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_306.js?21063187
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
68f871e1478465cc991026e2e2238097fbd45e270acbc51ceece00afcce1e937
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 11 Feb 2019 15:17:29 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
25443
x-xss-protection
1; mode=block
expires
Tue, 12 Feb 2019 16:27:29 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-32/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-32/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_306.js?21063187
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:820::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Purpose
prefetch
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

/
googleads.g.doubleclick.net/pagead/viewthroughconversion/1007530244/
2 KB
1 KB
Script
General
Full URL
https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1007530244/?random=1549988849314&cv=9&fst=1549988849314&num=1&guid=ON&resp=GooglemKTybQhCsO&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=0&u_java=false&u_nplug=0&u_nmime=0&sendb=1&frm=0&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&tiba=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...&rfmt=3&fmt=4
Requested by
Host: www.googleadservices.com
URL: https://www.googleadservices.com/pagead/conversion.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:820::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
d0ade701d94eb617af86d181ebcb9f8efb57d2f31c306b32e1c6927b961b4bc7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 Feb 2019 16:27:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
text/javascript; charset=UTF-8
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
no-cache, must-revalidate
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
988
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
bat.js
bat.bing.com/
22 KB
7 KB
Script
General
Full URL
https://bat.bing.com/bat.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
204.79.197.200 Redmond, United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
a-0001.a-msedge.net
Software
/
Resource Hash
9e03d610493a32cfa7a9750ac0c194f807c46926270e565fc8b41ee71053a52d

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:29 GMT
content-encoding
gzip
last-modified
Fri, 04 Jan 2019 00:35:47 GMT
x-msedge-ref
Ref A: E504A3B0FF5448ECABB3E67E424BF0BA Ref B: FRAEDGE0306 Ref C: 2019-02-12T16:27:29Z
access-control-allow-origin
*
etag
"80b3316fc5a3d41:0"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
private,max-age=1800
accept-ranges
bytes
content-length
6891
all.js
connect.facebook.net/en_US/
3 KB
2 KB
Script
General
Full URL
https://connect.facebook.net/en_US/all.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:216:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
57f2808630ddc1d71e5019f7966b9a1ac65f76792147e348ff86e9e415ef9427
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
6NLL3I+GucCAsYxd4fJxmA==
status
200
vary
Accept-Encoding
content-length
1745
x-xss-protection
0
x-fb-debug
5X1oPTLmv5Y861aTimvNgPe06fD5Nw4Vr/gLpXuGcCdcE/Hq/qWFgTtoYdtHmFDIJI81PEDIMj0QXgLCiEnWbg==
x-fb-content-md5
b2fbf27c2e4cdd6d94d7800f75f1be3a
date
Tue, 12 Feb 2019 16:27:29 GMT
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-FB-Content-MD5
cache-control
public,max-age=1200,stale-while-revalidate=3600
access-control-allow-credentials
true
etag
"2299135903e09674d28fb79c2a54a6bc"
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
timing-allow-origin
*
expires
Tue, 12 Feb 2019 16:38:43 GMT
Cookie set dest5.html
ubm.demdex.net/ Frame 8EAD
0
0
Document
General
Full URL
https://ubm.demdex.net/dest5.html?d_nsid=0
Requested by
Host: epromos.ubmcanon.com
URL: https://epromos.ubmcanon.com/VisitorAPI.js?ormzkk
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.108.5 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-108-5.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash

Request headers

Host
ubm.demdex.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Accept-Encoding
gzip, deflate, br
Cookie
demdex=69699466201725194961355641266719465763
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825

Response headers

Accept-Ranges
bytes
Cache-Control
max-age=21600
Content-Encoding
gzip
Content-Type
text/html
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified
Fri, 01 Feb 2019 14:30:27 GMT
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Pragma
no-cache
Set-Cookie
demdex=69699466201725194961355641266719465763;Path=/;Domain=.demdex.net;Expires=Sun, 11-Aug-2019 16:27:29 GMT;Max-Age=15552000
Vary
Accept-Encoding, User-Agent
X-TID
omfpd2AYScE=
Content-Length
2764
Connection
keep-alive
__utm.gif
ssl.google-analytics.com/r/
35 B
101 B
Image
General
Full URL
https://ssl.google-analytics.com/r/__utm.gif?utmwv=5.7.2&utms=1&utmn=137534040&utmhn=www.darkreading.com&utmcs=windows-1252&utmsr=1600x1200&utmvp=1585x1200&utmsc=24-bit&utmul=en-us&utmje=0&utmfl=-&utmdt=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...&utmhid=1185909834&utmr=-&utmp=%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&utmht=1549988849428&utmac=UA-30302365-1&utmcc=__utma%3D199458747.1784456074.1549988849.1549988849.1549988849.1%3B%2B__utmz%3D199458747.1549988849.1.1.utmcsr%3D(direct)%7Cutmccn%3D(direct)%7Cutmcmd%3D(none)%3B&utmjid=651148952&utmredir=1&utmu=qBAAAAAAAAAAAAAAAAQAAAAE~
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:814::2008 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 Feb 2019 16:27:29 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
*
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
recaptcha__en.js
www.gstatic.com/recaptcha/api2/v1549298964057/
260 KB
90 KB
Script
General
Full URL
https://www.gstatic.com/recaptcha/api2/v1549298964057/recaptcha__en.js
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api.js?onload=rcCallback&render=explicit
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:825::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
0fa7af06f58b3f97160c0b7a1255156e5794747fb7ff51d0319b25fc0d800ec8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 06 Feb 2019 20:09:08 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 05 Feb 2019 23:15:00 GMT
server
sffe
age
505101
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
92244
x-xss-protection
1; mode=block
expires
Thu, 06 Feb 2020 20:09:08 GMT
832000476880185
connect.facebook.net/signals/config/
185 KB
44 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/832000476880185?v=2.8.40&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:216:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
506dc59882896de7d75860940a7e4c3490cac59d233466f6ff4e54ad71b21434
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
x-xss-protection
0
pragma
public
x-fb-debug
bcV7TZMkgM6MJ5CDeiETHeMPi/y87Jcz/FSlc4XQjqRWwvXqhlvnI6/WoNNJZsrOAvC74TT0X5fZv+QZp99V3w==
date
Tue, 12 Feb 2019 16:27:29 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
www.darkreading.com.js
u.heatmap.it/conf/
0
139 B
Script
General
Full URL
https://u.heatmap.it/conf/www.darkreading.com.js
Requested by
Host: u.heatmap.it
URL: https://u.heatmap.it/log.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
46.105.202.39 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
date
Tue, 12 Feb 2019 16:27:29 GMT
cache-control
max-age=60
x-cdn-pop
sbg
x-cacheable
Cacheable
x-cdn-pop-ip
137.74.120.32/27
expires
Tue, 12 Feb 2019 16:32:30 GMT
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=3005435&ns__t=1549988849523&ns_c=windows-1252&cv=3.1e&c8=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...&c7=https%3A%2F%2Fwww.darkrea...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=3005435&ns__t=1549988849523&ns_c=windows-1252&cv=3.1e&c8=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...&c7=https%3A%2F%2Fwww.darkre...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=3005435&ns__t=1549988849523&ns_c=windows-1252&cv=3.1e&c8=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...&c7=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&c9=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.43.115.95 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-43-115-95.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Feb 2019 16:27:29 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=3005435&ns__t=1549988849523&ns_c=windows-1252&cv=3.1e&c8=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...&c7=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&c9=
Pragma
no-cache
Date
Tue, 12 Feb 2019 16:27:29 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
all.js
connect.facebook.net/en_US/
171 KB
53 KB
Script
General
Full URL
https://connect.facebook.net/en_US/all.js?hash=f643d9582ddb53de40a1968663df0acc&ua=modern_es6
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/all.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:216:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
c6d5e8fed70b86a2a9a2fcacbf3ad29c614446b7d9b664173c0ae0eccbf6a889
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
Zo90qiotHJ30yC366XFUgw==
status
200
vary
Accept-Encoding
content-length
54377
x-xss-protection
0
x-fb-debug
dMNuy9xnW8xadcE9lLFTfsONkHBjwXI4xOzo/lsat+Plp5Y5m/bFcaOaCkumSKHqkOkmV0R80mhsXGTt0V22Mw==
x-fb-content-md5
1638a7d8c4d47d26ad85ef5a0b57fc04
date
Tue, 12 Feb 2019 16:27:29 GMT
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-FB-Content-MD5
cache-control
public,max-age=31536000,stale-while-revalidate=3600,immutable
access-control-allow-credentials
true
etag
"fb0a7178bad9b819fdac1325dd883c66"
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
timing-allow-origin
*
expires
Wed, 12 Feb 2020 16:02:25 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 1CE9
78 KB
29 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_306.js?21063187
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81f::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
ee1aa009d10739151d5d518289782456ca3e667471452e343d4cf3bc4b7a49f8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1549887464363732"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
29149
x-xss-protection
1; mode=block
expires
Tue, 12 Feb 2019 16:27:29 GMT
rss-icon.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/rss-icon.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_306.js?21063187
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
7bb0d75d42e3ccf1a9d1a055bcddfbc23003ed3ab75bb0eb49c05ba747bce8c9

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:29 GMT
cf-cache-status
HIT
last-modified
Mon, 24 Feb 2014 16:00:47 GMT
server
cloudflare
etag
"649-4f329132149c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c45d8aa2726-FRA
content-length
1609
tw-icon.png
img.deusm.com/darkreading/
1 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/tw-icon.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_306.js?21063187
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
48d211ee8f54e0f314ee98a2b63e6e470b33fb1de29d326c742be16125bda71a

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:29 GMT
cf-cache-status
HIT
last-modified
Mon, 24 Feb 2014 16:00:47 GMT
server
cloudflare
etag
"56e-4f329132149c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c45d8ac2726-FRA
content-length
1390
flipboard-icon.png
img.deusm.com/darkreading/
425 B
524 B
Image
General
Full URL
https://img.deusm.com/darkreading/flipboard-icon.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_306.js?21063187
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
22c53eeed2c33c21657590793b89fed83648ee555686c0e9ff90b39c1dab406f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:29 GMT
cf-cache-status
HIT
last-modified
Fri, 30 Nov 2018 12:31:36 GMT
server
cloudflare
etag
"1a9-57be0fae8ba00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c45d8b02726-FRA
content-length
425
facebook-icon.png
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/facebook-icon.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_306.js?21063187
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
4e19e8f9902a8b9ec4840aaf54110d6f502c5fb500303dc605f8776c40f7fb67

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:29 GMT
cf-cache-status
HIT
last-modified
Mon, 24 Feb 2014 16:00:47 GMT
server
cloudflare
etag
"4a9-4f329132149c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c45d8b12726-FRA
content-length
1193
li-icon.png
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/li-icon.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_306.js?21063187
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
976aabc512994a6ecc5981a85c489d1bb242ba6734b746a964d69db615f72875

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:29 GMT
cf-cache-status
HIT
last-modified
Mon, 24 Feb 2014 16:00:47 GMT
server
cloudflare
etag
"54b-4f329132149c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c45d8b22726-FRA
content-length
1355
reb-border.png
img.deusm.com/darkreading/
331 B
431 B
Image
General
Full URL
https://img.deusm.com/darkreading/reb-border.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_306.js?21063187
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
523296d1a2c9a67ee707b5e0bc582f488e5786ec9b343c7b3da58a0d162d643b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:29 GMT
cf-cache-status
HIT
last-modified
Thu, 03 Nov 2016 06:29:01 GMT
server
cloudflare
etag
"14b-5405fac56e540"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c45d8b32726-FRA
content-length
331
nav-background.png
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/nav-background.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_306.js?21063187
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
a6595372db2688a9dfb0991bc6cea16343042dd3caa33483b393d21a77d1c4be

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.26
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:29 GMT
cf-cache-status
HIT
last-modified
Sat, 22 Feb 2014 17:43:38 GMT
server
cloudflare
etag
"af8-4f30247448680"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c45e8b72726-FRA
content-length
2808
BngRUXZYTXPIvIBgJJSb6u92w7CGwR2oefDo.woff2
fonts.gstatic.com/s/robotoslab/v7/
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/robotoslab/v7/BngRUXZYTXPIvIBgJJSb6u92w7CGwR2oefDo.woff2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_306.js?21063187
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81f::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8c055f4fc89b73bc480ac07d607782cb3482fc98cbec6f89135ff76ce5512280
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Roboto+Slab:700
Origin
https://www.darkreading.com

Response headers

date
Tue, 29 Jan 2019 09:04:10 GMT
x-content-type-options
nosniff
last-modified
Wed, 11 Oct 2017 18:32:29 GMT
server
sffe
age
1236199
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
11096
x-xss-protection
1; mode=block
expires
Wed, 29 Jan 2020 09:04:10 GMT
osd.js
www.googletagservices.com/activeview/js/current/
77 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_306.js?21063187
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81f::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
0cae673cc7b73e2cb3da0602cda9173bfced55705c4943460534cef380a84e7a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1549887464363732"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
28626
x-xss-protection
1; mode=block
expires
Tue, 12 Feb 2019 16:27:29 GMT
amp4ads-host-v0.js
cdn.ampproject.org/rtv/011901312147090/
19 KB
8 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011901312147090/amp4ads-host-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_306.js?21063187
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:808::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
c8827cfb183f6fb4c662749cbbbf49e9ed9121ffb9c812d647f1e53303bcd0ee
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
gzip
x-content-type-options
nosniff
age
591232
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
7801
x-xss-protection
1; mode=block
server
sffe
date
Tue, 05 Feb 2019 20:13:37 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"5393078a0ee95cc6"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 05 Feb 2020 20:13:37 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 8EA2
78 KB
29 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_306.js?21063187
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81f::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
ee1aa009d10739151d5d518289782456ca3e667471452e343d4cf3bc4b7a49f8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1549887464363732"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
29149
x-xss-protection
1; mode=block
expires
Tue, 12 Feb 2019 16:27:29 GMT
imgad
tpc.googlesyndication.com/pagead/
191 KB
191 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/imgad?id=CICAgKDb__-_HBABGAEyCORXy-AstYTm
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_306.js?21063187
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:820::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ce592593ada4241ade20bb3942e0d4d0f713c7c76399eb8e72594d872be87f50
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 06 Feb 2019 04:51:17 GMT
x-content-type-options
nosniff
server
cafe
age
560172
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=604800
content-type
image/jpeg
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
195592
x-xss-protection
1; mode=block
expires
Wed, 13 Feb 2019 04:51:17 GMT
amp4ads-v0.js
cdn.ampproject.org/rtv/011901312147090/ Frame EBB5
265 KB
84 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_306.js?21063187
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:808::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
9e9fd1ea171323698595c75eadd7c5a895e8ad172540b01fa60b5271c46acdeb
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
gzip
x-content-type-options
nosniff
age
69413
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
86206
x-xss-protection
1; mode=block
server
sffe
date
Mon, 11 Feb 2019 21:10:36 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"7f6b514b400edf5e"
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 11 Feb 2020 21:10:36 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/011901312147090/v0/ Frame EBB5
134 KB
42 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011901312147090/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_306.js?21063187
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:808::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
0caac85ee3e9f457831709c810d2e45f0990693126e01b38e771e99b54cf9837
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
gzip
x-content-type-options
nosniff
age
879804
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
42909
x-xss-protection
1; mode=block
server
sffe
date
Sat, 02 Feb 2019 12:04:05 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"8445f9d34b1cbd0a"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 02 Feb 2020 12:04:05 GMT
truncated
/ Frame EBB5
220 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
bfabb934baf1857924efd3700527d94c27a69ce22c8f6e2d78145bbdd9cf4d15

Request headers

Response headers

Content-Type
image/png
view
securepubads.g.doubleclick.net/pcs/ Frame 1CE9
0
47 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsv4JekXN9vfxzWLDkpXT1YU_fZ4WDT6jUzxELWTZ167VonSeLeoysM5VPBgjU2Nn2sjG_dtynJET7Rpkxnlni85uy_4D74HsUJPutlcn9ZDPzHDqIuXyD6gvSXAsEGigoyaKPktKYcHFaaZi6jIU0DpF7X458uhBPPIiAefTqOTMQgpCYU8TY5DRwPxfw0YE0f8-IhY4uyJfF3v4VYrA5CIfokCsj_MI8UK8-ONMY11-m_61X6SlYey6IlTGaZVa7-VLJin7uTvMgkWC7jxH--7reTx9UAmujT4c5sio_CMOw&sai=AMfl-YTFpjBI7RdHj7fbRoQNJNktTR7MW4AKSF1Nb1nGzGXQT8iFSxvg6lgIsFkcpuyICB7ohDlZn-0gVjO88E8P5RhVamXr_uaKdM7DiKxg&sig=Cg0ArKJSzGVSSfReUoOjEAE&urlfix=1&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:29 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
0
x-xss-protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame 8EA2
0
47 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsv9F921FfYPmojnPrENQbNJbjHxcc3WTLY6DBiVDoGGEaXXgh-Sel2AVWRrJJbIt9nJ0iQ6QbUxLdQFiGyU8767dK1aKNwpVIh_mP1ouvsDUXu-bQK1hmsmcXy-FANMjf8vyy84H9bFFjmMNMOiMiQ5yFdr8lbHH7HJtIYjxeVyOLwSFrUXP_dU2CYtY0zd9Yo0MujgMH2z-lYlHaxSGvWeopnyGHw_PSStfUwpPLkYkF91Vxjp82RI1wQmLCf6Nk663m8KiIbxWSG3i1KfLF8qJAp-D3Fz&sai=AMfl-YTSE6taRfvVO88XGe-5-4qmlqTs2vo2rVHnubCOJR1s1K7IDKyz9U4RQfB1OpQSZQgfRN1H_xcQtJ-_4qoGiJLdLp-YnysoL6sa8xAe&sig=Cg0ArKJSzP2c-lXYt6PFEAE&urlfix=1&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:29 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
0
x-xss-protection
1; mode=block
13657187190995966019
tpc.googlesyndication.com/simgad/ Frame EBB5
19 KB
20 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/13657187190995966019
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:820::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
fc031b7df0b1c33cab340f6065dad819ab323a090dae0d5dbc90c089312460cf
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 01 Feb 2019 06:32:01 GMT
x-content-type-options
nosniff
age
986128
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
19847
x-xss-protection
1; mode=block
last-modified
Fri, 25 Jan 2019 16:17:36 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 01 Feb 2020 06:32:01 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame EBB5
0
47 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvOMF8pYrBQYXmmL5cclpF5YJsOPLpqMZNW8GnOl26OiMDUF6TpOPMkaKwebD1OLUtp1crNREZXUtdU-hN2gv_55gdjHg4TPVP2VxZIcD9IjwuvTbXgsMXhcunXpGOx0UQemiwVtcFeDcTY0L4d8shDgVQtgJGFqYwsGxmgz8ZAXlcZvqO3tCnjZLbKmwLFwbAsBnGlKsANqW7gENhIldzYeb6WKuW5cs6ausCN5TjhTYDuu_ZIZk4v4pWmVupNtOo-8S0PI9nDuvzjI_rRRyQ&sai=AMfl-YRR2sJLXk4GN3BlOhneWPEPJCUuISfGux0q8Aw2_AT5BmCnfgAjnBiN5uSsJjGN7_zxaFyxm1_LctSdpLWkuoZmK_jd0BR5stfV07Wk&sig=Cg0ArKJSzAHkCXpZnEVNEAE&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:29 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
0
x-xss-protection
1; mode=block
/
www.google.com/pagead/1p-user-list/1007530244/
42 B
125 B
Image
General
Full URL
https://www.google.com/pagead/1p-user-list/1007530244/?random=1549988849314&cv=9&fst=1549987200000&num=1&guid=ON&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=0&u_java=false&u_nplug=0&u_nmime=0&sendb=1&frm=0&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&tiba=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...&fmt=3&cdct=2&is_vtc=1&random=2034794896&resp=GooglemKTybQhCsO&rmt_tld=0&ipr=y
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:809::2004 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 Feb 2019 16:27:29 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
www.google.de/pagead/1p-user-list/1007530244/
42 B
109 B
Image
General
Full URL
https://www.google.de/pagead/1p-user-list/1007530244/?random=1549988849314&cv=9&fst=1549987200000&num=1&guid=ON&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=0&u_java=false&u_nplug=0&u_nmime=0&sendb=1&frm=0&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&tiba=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...&fmt=3&cdct=2&is_vtc=1&random=2034794896&resp=GooglemKTybQhCsO&rmt_tld=1&ipr=y
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:815::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 Feb 2019 16:27:29 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
0
bat.bing.com/action/
0
148 B
Image
General
Full URL
https://bat.bing.com/action/0?ti=5476211&Ver=2&mid=fa5fa54c-d3b3-07ab-5321-85cfd24cb57a&pi=0&lg=en-US&sw=1600&sh=1200&sc=24&tl=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...&p=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&r=&evt=pageLoad&msclkid=N&rn=867425
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
204.79.197.200 Redmond, United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
a-0001.a-msedge.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
pragma
no-cache
date
Tue, 12 Feb 2019 16:27:29 GMT
cache-control
no-cache, must-revalidate
x-msedge-ref
Ref A: 28D433DAD6804F9E8F33F95056A4F774 Ref B: FRAEDGE0306 Ref C: 2019-02-12T16:27:29Z
access-control-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
blank.gif
i.ubm-us.net/oas/welcomeAd/assets/
43 B
180 B
Image
General
Full URL
https://i.ubm-us.net/oas/welcomeAd/assets/blank.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::6818:7875 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:29 GMT
cf-cache-status
HIT
last-modified
Wed, 07 Feb 2018 15:22:50 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
public, max-age=86400
accept-ranges
bytes
cf-ray
4a806c47690cc2ba-FRA
content-length
43
expires
Wed, 13 Feb 2019 16:27:29 GMT
WelcomeAd-CloseButton.png
i.ubm-us.net/oas/welcomeAd/assets/
4 KB
4 KB
Image
General
Full URL
https://i.ubm-us.net/oas/welcomeAd/assets/WelcomeAd-CloseButton.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::6818:7875 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
10aa6e248d0d304c90cc6a433de2bbb8e9301332191754d05b27b818fbacdcfd

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:29 GMT
cf-cache-status
HIT
last-modified
Mon, 16 Oct 2017 15:36:20 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=86400
accept-ranges
bytes
cf-ray
4a806c47796dc2ba-FRA
content-length
4177
expires
Wed, 13 Feb 2019 16:27:29 GMT
truncated
/ Frame 1CE9
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c94992c7372f2feb24701c6090ad47e4e175799468a2abe06c2bd0d4006bee5e

Request headers

Response headers

Content-Type
image/png
/
www.facebook.com/tr/
44 B
249 B
Image
General
Full URL
https://www.facebook.com/tr/?id=832000476880185&ev=PageView&dl=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&rl=&if=false&ts=1549988849959&sw=1600&sh=1200&v=2.8.40&r=stable&ec=0&o=30&fbp=fb.1.1549988849957.1404698091&it=1549988849482&coo=false&rqm=GET
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8083:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:29 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
content-length
44
expires
Tue, 12 Feb 2019 16:27:29 GMT
truncated
/ Frame 8EA2
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ab41e0179c51831b98cad4c9308cde1b0139192eeb65d24afb5b51447127f5dd

Request headers

Response headers

Content-Type
image/png
dr_640x480.html
i.ubm-us.net/oas/welcomeAd/ad_units/ Frame 64EC
0
0
Document
General
Full URL
https://i.ubm-us.net/oas/welcomeAd/ad_units/dr_640x480.html
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::6818:7875 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

:method
GET
:authority
i.ubm-us.net
:scheme
https
:path
/oas/welcomeAd/ad_units/dr_640x480.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
accept-encoding
gzip, deflate, br
cookie
__cfduid=d78f15e0596cc17af8c01ab1f7ebe1f4b1549988848
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825

Response headers

status
200
date
Tue, 12 Feb 2019 16:27:30 GMT
content-type
text/html; charset=UTF-8
last-modified
Wed, 01 Nov 2017 17:41:21 GMT
vary
Accept-Encoding
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
4a806c499abec2ba-FRA
content-encoding
br
vy-MhgbfL4v.js
staticxx.facebook.com/connect/xd_arbiter/r/ Frame 9B03
0
0
Document
General
Full URL
https://staticxx.facebook.com/connect/xd_arbiter/r/vy-MhgbfL4v.js?version=44
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/all.js?hash=f643d9582ddb53de40a1968663df0acc&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:216:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
staticxx.facebook.com
:scheme
https
:path
/connect/xd_arbiter/r/vy-MhgbfL4v.js?version=44
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
accept-encoding
gzip, deflate, br
cookie
fr=0xJCgmBJbO4WYAvxk..BcYvPx...1.0.BcYvPx.
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825

Response headers

status
200
content-type
text/html; charset=utf-8
expires
Tue, 11 Feb 2020 19:24:26 GMT
cache-control
public,max-age=31536000,immutable
strict-transport-security
max-age=15552000; preload
content-encoding
br
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
expect-ct
max-age=86400, report-uri="https://reports.fb.com/expectct/"
x-fb-debug
YHkgunyvJpYTiTvbB9vddIsCDPDoxp47UliZHJfrZD5qa6YxiAz8jcW1Wf078ujK3gS+HsuKALTGl+Pf/zV7hg==
content-length
11040
date
Tue, 12 Feb 2019 16:27:31 GMT
/
www.facebook.com/tr/
44 B
147 B
Image
General
Full URL
https://www.facebook.com/tr/?id=832000476880185&ev=Microdata&dl=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&rl=&if=false&ts=1549988850518&cd[Schema.org]=%5B%5D&cd[OpenGraph]=%7B%22og%3Atitle%22%3A%22Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20Systems%22%2C%22og%3Atype%22%3A%22article%22%2C%22og%3Aimage%22%3A%22https%3A%2F%2Ftwimgs.com%2Fnojitter%2Fdarkreading%2Fdr-logo.jpg%22%2C%22og%3Aurl%22%3A%22https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825%22%2C%22og%3Asite_name%22%3A%22Dark%20Reading%22%2C%22og%3Adescription%22%3A%22Vulnerable%20plugin%20for%20a%20remote%20management%20tool%20gave%20attackers%20a%20way%20to%20encrypt%20systems%20belonging%20to%20all%20customers%20of%20a%20US-based%20MSP.%22%7D&cd[Meta]=%7B%22title%22%3A%22Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...%22%2C%22meta%3Adescription%22%3A%22Vulnerable%20plugin%20for%20a%20remote%20management%20tool%20gave%20attackers%20a%20way%20to%20encrypt%20systems%20belonging%20to%20all%20customers%20of%20a%20US-based%20MSP.%22%7D&cd[DataLayer]=%5B%5D&cd[JSON-LD]=%5B%5D&sw=1600&sh=1200&v=2.8.40&r=stable&ec=1&o=30&fbp=fb.1.1549988849957.1404698091&it=1549988849482&coo=false&es=automatic&rqm=GET
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8083:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:30 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
content-length
44
expires
Tue, 12 Feb 2019 16:27:30 GMT
__fpn.gif
fpn.flipboard.com/tr/
Redirect Chain
  • https://fpn.flipboard.com/pix/__fpn.gif?utm_source=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825
  • https://fpn.flipboard.com/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fattacks-breaches%25252Fransomware-attack-via-msp-locks-customers-out-of-systems%25252Fd%...
35 B
341 B
Image
General
Full URL
https://fpn.flipboard.com/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fattacks-breaches%25252Fransomware-attack-via-msp-locks-customers-out-of-systems%25252Fd%25252Fd-id%25252F1333825&rh=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fransomware-attack-via-msp-locks-customers-out-of-systems%252Fd%252Fd-id%252F1333825
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:200c:7c00:14:85db:2b40:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 06:06:41 GMT
via
1.1 412049da39a44d4e9af054ecc17534dd.cloudfront.net (CloudFront)
last-modified
Thu, 12 Oct 2017 18:19:12 GMT
server
AmazonS3
age
90605
etag
"28d6814f309ea289f847c69cf91194c6"
x-cache
Hit from cloudfront
content-type
image/gif
status
200
accept-ranges
bytes
content-length
35
x-amz-cf-id
y7-_ZWr5H1RFKt8foWbxW6cwzAWIWQ_3Iu7igYJQB22n_Mp5kxcIIA==

Redirect headers

pragma
no-cache
date
Tue, 12 Feb 2019 16:27:30 GMT
via
1.1 412049da39a44d4e9af054ecc17534dd.cloudfront.net (CloudFront)
server
CloudFront
location
/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fattacks-breaches%25252Fransomware-attack-via-msp-locks-customers-out-of-systems%25252Fd%25252Fd-id%25252F1333825&rh=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fransomware-attack-via-msp-locks-customers-out-of-systems%252Fd%252Fd-id%252F1333825
x-cache
LambdaGeneratedResponse from cloudfront
status
307
cache-control
no-cache, no-store, must-revalidate
content-length
0
x-amz-cf-id
-Km9qjIVhgHC14QgSzKUTiFZ29iTGesDM2kvgqvFSAbuIuHZitZOVA==
expires
Thu, 01 Dec 1994 16:00:00 GMT
bullet.png
img.deusm.com/informationweek/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/informationweek/bullet.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_306.js?21063187
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
9e0e2ad3a93ec78d016efee0993b5856ba9b4acafcee3aa4d6f7162f039fcce4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:30 GMT
cf-cache-status
HIT
last-modified
Sat, 02 Nov 2013 00:57:26 GMT
server
cloudflare
etag
"41e-4ea272a96e980"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c4ca89a2726-FRA
content-length
1054
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame C0CE
78 KB
0
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_306.js?21063187
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81f::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
ee1aa009d10739151d5d518289782456ca3e667471452e343d4cf3bc4b7a49f8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

date
Tue, 12 Feb 2019 16:27:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1549887464363732"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
29149
x-xss-protection
1; mode=block
expires
Tue, 12 Feb 2019 16:27:29 GMT
truncated
/ Frame C0CE
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ae880680426242570603bac8fd7a3c09d27c1e576aaaca2f7e2981ebc779eb8b

Request headers

Response headers

Content-Type
image/png
view
securepubads.g.doubleclick.net/pcs/ Frame C0CE
0
56 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsu03kO4eF6B92LbxaZjo4m4Yj3hVNTNIXTtSJAhZS1TnzfAb7qDRAToUHeBOaVweNn6v_lWTK2X8KaEzYWlLM5nFJaNvmiQ0-FBBeojw0qPJYAjHoPrliLoiM8vbjiKfGbR5w3yw2HQMy3CwkeMK0k-FOa9hDw7todnHpwAKyFtpwOcftQYakVGPEHkW2nMer6bZ3-b7Z6QFSLblnUDsfYFEA4q3t-OOz-VEwbYImo_-SsSPrKZvSHlg68-HW4NARX9hvgKWjKBeFnagHE27m8_wE8&sai=AMfl-YSQui_JzxtGEbk0qenZ11C0Hk9dHrjWohUhcSkevi7VVtFXEY7jjNnoWUBJQnXzataHOacV6JQiWMSE2VBfGFdcDSYYqZ7NrzxTGSwS&sig=Cg0ArKJSzIv38QybGj3oEAE&urlfix=1&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:30 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
0
x-xss-protection
1; mode=block
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame D013
78 KB
0
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_306.js?21063187
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81f::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
ee1aa009d10739151d5d518289782456ca3e667471452e343d4cf3bc4b7a49f8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

date
Tue, 12 Feb 2019 16:27:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1549887464363732"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
29149
x-xss-protection
1; mode=block
expires
Tue, 12 Feb 2019 16:27:29 GMT
truncated
/ Frame D013
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b4dd2244acbc74d4243b2cd7389a8f72e53b4f35620ecf19c8b2eb7d8630360b

Request headers

Response headers

Content-Type
image/png
view
securepubads.g.doubleclick.net/pcs/ Frame D013
0
56 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstYYZnLJuOzc3q7FBaRUlSMvnohdj7jeYKmy0A5XdHoAC3r7edAp_xasTofRhIw6CIPhFM8a2i-ta-LW67fWSeqsm4WzJoivAZmvyS93rMH6TfQYy-kxujUm81_StUh7jhUZhYawiI8YVTe2wj3I_QTCDUOJwSqy169vr3icLWyFOORaPlYbH3Z7QRiPOVVwIXnOR6KIWnq_TLNckn95vOLKZwrWmK7BhUdw3MjjCoZVjSrf_LSv6Q63f832n_JBqt438Nw0Cc-tXOWVs_BRSbBFw1Z&sai=AMfl-YSmajheRkRUKFAFDQCArF8C4Rfm1MGmFNT5qbKoSrl8x1ML4v9y3wj-RsT5KbM3PfONnKJifPGPOMbLwPmx7oFNKqfWN62b2FIgvEIb&sig=Cg0ArKJSzPpK8zzfLIXUEAE&urlfix=1&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:30 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
0
x-xss-protection
1; mode=block
amp4ads-v0.js
cdn.ampproject.org/rtv/011901312147090/ Frame B2B2
265 KB
0
Script
General
Full URL
https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_306.js?21063187
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:808::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
9e9fd1ea171323698595c75eadd7c5a895e8ad172540b01fa60b5271c46acdeb
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
gzip
x-content-type-options
nosniff
age
69413
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
86206
x-xss-protection
1; mode=block
server
sffe
date
Mon, 11 Feb 2019 21:10:36 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"7f6b514b400edf5e"
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 11 Feb 2020 21:10:36 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/011901312147090/v0/ Frame B2B2
134 KB
0
Script
General
Full URL
https://cdn.ampproject.org/rtv/011901312147090/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_306.js?21063187
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:808::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
0caac85ee3e9f457831709c810d2e45f0990693126e01b38e771e99b54cf9837
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
gzip
x-content-type-options
nosniff
age
879804
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
42909
x-xss-protection
1; mode=block
server
sffe
date
Sat, 02 Feb 2019 12:04:05 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"8445f9d34b1cbd0a"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 02 Feb 2020 12:04:05 GMT
truncated
/ Frame B2B2
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
25ef57fa7988263865e0604cf660d29dbd91873d895159b1e61abae698df9936

Request headers

Response headers

Content-Type
image/png
3966622344932206261
tpc.googlesyndication.com/simgad/ Frame B2B2
51 KB
51 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/3966622344932206261
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:820::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
4d91d1fb32315ee13506c0a56be1b65980fa80f5304d2b2a5f74c052ea0c4faf
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 05:39:51 GMT
x-content-type-options
nosniff
age
38859
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
51887
x-xss-protection
1; mode=block
last-modified
Fri, 28 Dec 2018 19:02:25 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 12 Feb 2020 05:39:51 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame B2B2
0
47 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstCg4aHLc4LnoaCDvpuI-7zkGYE99phSKmbaC3GyFILwEEuoaBzpELohKM8c5CNiQvbeHQmHQnjHgF3EQYadIIj3jXvAImC7pLtqymDnlRFMrGfjpBpRJfNGNNsN4n7Rrc08aHR0tHTFHe1Af8a1xNL4Szz_MEuGnv4F2jLVHTSNXuZ-4Erzks5EcSn_7E7wMTXyBWJITZ7rrJiEuF68BhyLPwc4WGkcOWAsGbiFdGzVQAIfrkLdcpyqpuplU6hm__15ZGj2u1AX4_ikRYHpoWHixHY&sai=AMfl-YTMqx4-5_wrpSRV-jcrR55lQFe7Dc19xvDuuX82uMzGyyVi8NirdK6EiFTRnlbkl-cBUG9zmf6CW3DBcenywLzAJq4iYM7z-bZmA7Nr&sig=Cg0ArKJSzIVdMVdQ_6FiEAE&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:30 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
0
x-xss-protection
1; mode=block
DR-hot-topics-comment.png
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-hot-topics-comment.png
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
9182e8a1e20a5437d2f311b096b2a98a33d54e94d4d9d6d01c5db3861460d04e

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.26
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:30 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:02 GMT
server
cloudflare
etag
"4a5-4f2ebd20ac480"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c4d89a52726-FRA
content-length
1189
web.js
ads.celtra.com/7b3985f9/ Frame D013
11 KB
4 KB
Script
General
Full URL
https://ads.celtra.com/7b3985f9/web.js?&clickUrl=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjst5TzC8yQpEcR4RhANsr3FORRCOnZfs7L5WDptwEnFMWhrupus7KYYS0qr3QtPLbwPFMqpLUmH5U28uLvKGevimhEGWrf1Mb8N-snDbZnUoXOaEB2L0iF_aQ7K4bilH9NP8ArVQksx6F5fBjxV3Ji2NHVAGl-iNXodfXekBj2OS3-b1FDlFeHpafFwLPj_yTOjHaZJjfI46rMjb0TxnibRh_nz4RyS2VWmoIn9J6sDMFL1tEFH-fKJ9O_SBS42vEIYXEUMTlxspycLEQZyMgxxj%26sai%3DAMfl-YRmhfLS0FbHm1LyYlQXxijPS5Nu5cgcPi35XthnvpRkCtYAUpscf23iF45cYtJpEu80kYe3T64kkBw-7-7P5jHmgiB5i8YaizgRevJX%26sig%3DCg0ArKJSzOE350epkNPzEAE%26urlfix%3D1%26adurl%3D&expandDirection=undefined&clickEvent=advertiser&iosAdvId=&androidAdvId=&externalAdServer=DFPPremium&tagVersion=4&externalCreativeId=138255595212&externalPlacementId=43863396&externalSiteId=27868836&externalSiteName=darkreading.com&externalLineItemId=4895861703&scriptId=celtra-script-1&clientTimestamp=1549988850.816&clientTimeZoneOffsetInMinutes=0&hostPageLoadId=6022099742897067
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.59.88.202 Frankfurt, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-59-88-202.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
dddb93b41c9fdd3ba745d3e28dc73b44c0c510bac42cebccdbdb46cd8f9f7332

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Feb 2019 16:27:30 GMT
Content-Encoding
gzip
Content-Type
application/javascript; charset=UTF-8
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Length
3906
Expires
0
NL-button.png
img.deusm.com/informationweek/
2 KB
3 KB
Image
General
Full URL
https://img.deusm.com/informationweek/NL-button.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_306.js?21063187
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:8a16 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
7b5688f8b168e06251901442c4f2f72b30c4477cb472833cde7979a8dca0a862

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.26
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:30 GMT
cf-cache-status
HIT
last-modified
Fri, 08 Nov 2013 15:09:43 GMT
server
cloudflare
etag
"9c6-4eaabc5a3dbc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
4a806c4dda2c2726-FRA
content-length
2502
amp4ads-v0.js
cdn.ampproject.org/rtv/011901312147090/ Frame EDA0
265 KB
0
Script
General
Full URL
https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_306.js?21063187
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:808::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
9e9fd1ea171323698595c75eadd7c5a895e8ad172540b01fa60b5271c46acdeb
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
gzip
x-content-type-options
nosniff
age
69413
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
86206
x-xss-protection
1; mode=block
server
sffe
date
Mon, 11 Feb 2019 21:10:36 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"7f6b514b400edf5e"
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 11 Feb 2020 21:10:36 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/011901312147090/v0/ Frame EDA0
134 KB
0
Script
General
Full URL
https://cdn.ampproject.org/rtv/011901312147090/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_306.js?21063187
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:808::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
0caac85ee3e9f457831709c810d2e45f0990693126e01b38e771e99b54cf9837
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
gzip
x-content-type-options
nosniff
age
879804
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
42909
x-xss-protection
1; mode=block
server
sffe
date
Sat, 02 Feb 2019 12:04:05 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"8445f9d34b1cbd0a"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 02 Feb 2020 12:04:05 GMT
truncated
/ Frame EDA0
213 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
cca88e4d57c204af3c1296ac972e39f83d9f3a57cd2d7ff5a26147835efdb2b1

Request headers

Response headers

Content-Type
image/png
1170722494819429215
tpc.googlesyndication.com/simgad/ Frame EDA0
23 KB
23 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/1170722494819429215
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:820::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
a7877f70fdb28fd11bb08d5c8984613d024651f433690ce835b38e0fcb195263
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 11:52:33 GMT
x-content-type-options
nosniff
age
16497
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
23596
x-xss-protection
1; mode=block
last-modified
Wed, 31 Oct 2018 20:06:22 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 12 Feb 2020 11:52:33 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame EDA0
0
56 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsv59VIHe707orr-aIPjdDRMuJt25x22h921UjMInMr-hDxa5JobsgYa2qLhuAq7Af9MqWbTbo4VOvaq4i39tmGO1mu2GPPUN_EDO_3VGulB7qxDL2Rtgqb-5hF1yGgVQGGJ0HGti_6D3eOr8lfUwP0kc_WPt1yAgB53cqvk4DmwWSm4HbhnzbR0sPJOTGWc8GDM5OZsUb9xTQjyb8jaAOMWm0ABEnim3jmh5Ui1yVOIIvbToEC9nChLqUt96gNiqIXPsyL7VpY0kaUJ1KUKq28&sai=AMfl-YT1BxaO4k_SoQE6QaI9AkyIZ3dI9IVSIA4pStFRy6cyoaBUDfo7Uy9aoTPXkKZ0KExOAGZD01hdp8r2yAqFwbwe4f-RO7rKQQJkuM7o&sig=Cg0ArKJSzPOwb2AUMf4NEAE&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:30 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
0
x-xss-protection
1; mode=block
web.js
cache-ssl.celtra.com/api/creatives/e9db5431/compiled/ Frame D013
769 KB
161 KB
Script
General
Full URL
https://cache-ssl.celtra.com/api/creatives/e9db5431/compiled/web.js?v=48-6cf1ac5419&secure=1&cachedVariantChoices=W10-&inmobi=0&adx-in-banner-video=1
Requested by
Host: ads.celtra.com
URL: https://ads.celtra.com/7b3985f9/web.js?&clickUrl=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjst5TzC8yQpEcR4RhANsr3FORRCOnZfs7L5WDptwEnFMWhrupus7KYYS0qr3QtPLbwPFMqpLUmH5U28uLvKGevimhEGWrf1Mb8N-snDbZnUoXOaEB2L0iF_aQ7K4bilH9NP8ArVQksx6F5fBjxV3Ji2NHVAGl-iNXodfXekBj2OS3-b1FDlFeHpafFwLPj_yTOjHaZJjfI46rMjb0TxnibRh_nz4RyS2VWmoIn9J6sDMFL1tEFH-fKJ9O_SBS42vEIYXEUMTlxspycLEQZyMgxxj%26sai%3DAMfl-YRmhfLS0FbHm1LyYlQXxijPS5Nu5cgcPi35XthnvpRkCtYAUpscf23iF45cYtJpEu80kYe3T64kkBw-7-7P5jHmgiB5i8YaizgRevJX%26sig%3DCg0ArKJSzOE350epkNPzEAE%26urlfix%3D1%26adurl%3D&expandDirection=undefined&clickEvent=advertiser&iosAdvId=&androidAdvId=&externalAdServer=DFPPremium&tagVersion=4&externalCreativeId=138255595212&externalPlacementId=43863396&externalSiteId=27868836&externalSiteName=darkreading.com&externalLineItemId=4895861703&scriptId=celtra-script-1&clientTimestamp=1549988850.816&clientTimeZoneOffsetInMinutes=0&hostPageLoadId=6022099742897067
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.150.151 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-150-151.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
f3627377e91fbf8cb75c4dd41af5991c7b683d4475a4e55b8cd2215593e5cf30

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 05 Feb 2019 09:35:14 GMT
content-encoding
gzip
age
629536
x-cache
Hit from cloudfront
status
200
content-length
164236
via
1.1 varnish (Varnish/5.0), 1.1 65715c6e447bfc4ebcfb81f088c7e3f3.cloudfront.net (CloudFront)
server
Apache
etag
"b70a4d67d9a00d10214b48ab5809eedf69caec2150ee8f72cf0c3da1108065ad"
vary
Accept-Encoding
x-varnish
6425898
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
ZWrIpv1ap-mUnZ0cUMcJcEIfop6e8w-Jkqx9VryQDVtoh-A_5M86gg==
spacer.gif
img.lightreading.com/images/
49 B
355 B
Image
General
Full URL
https://img.lightreading.com/images/spacer.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.150.144 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-150-144.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
3c5b83e390d046c3623c4b8e35b58aaf64a7481bb2372fb51ae2e0e7818f7407

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 22 Sep 2016 19:35:05 GMT
via
1.1 e8929a64b6920fabf88f772b8cd0125c.cloudfront.net (CloudFront)
last-modified
Fri, 20 Jun 2014 19:05:53 GMT
server
AmazonS3
age
73325
etag
"4909631c93ffa90e65247e3fd4454f2d"
x-cache
Hit from cloudfront
content-type
image/gif
status
200
accept-ranges
bytes
content-length
49
x-amz-cf-id
8HUpRsnhQhmBUDgdga16eDgztQXKNOpadjd56JSfJx2xzYXepPh8HQ==
tag
a.teads.tv/page/11512/ Frame DD37
1 KB
858 B
Script
General
Full URL
https://a.teads.tv/page/11512/tag
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_306.js?21063187
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.211.0.4 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-211-0-4.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c5cfc527894a919282ef88af933d000c2acd9c82ff1ba41701feed18119e66ee

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:31 GMT
content-encoding
gzip
access-control-allow-origin
*
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200
cache-control
private, must-revalidate, max-age=3600
access-control-allow-credentials
true
content-length
592
expires
Tue, 12 Feb 2019 17:27:31 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame DD37
78 KB
0
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_306.js?21063187
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81f::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
ee1aa009d10739151d5d518289782456ca3e667471452e343d4cf3bc4b7a49f8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

date
Tue, 12 Feb 2019 16:27:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1549887464363732"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
29149
x-xss-protection
1; mode=block
expires
Tue, 12 Feb 2019 16:27:29 GMT
truncated
/ Frame DD37
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0179b504ad7e2390940e4836f0e34aa800004d05f4a54bac1d29b8e290d01139

Request headers

Response headers

Content-Type
image/png
view
securepubads.g.doubleclick.net/pcs/ Frame DD37
0
56 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsur9CsmFn_G0pHXgZ7iuQ9rCA7ZHt-7CcJikbhvcrrkS1mZPCMmfAyuDVX6ZgL3ssCnHzi3SOcSJaSzOsGQdgTSUBEZWwwaBT_Umyoxrxt_-h4wcc3v-Mey4xqVd3KLkpXXZ2skhQq52FtW8E35sS0zoA7W_7bgcvxdv0hxLoDn21P-qOaCcK__caHyQjLsbTrBPpZEMZsuN3BmCXVXIDW-tqrWKyplhj56dl1cn2-bwb6KafDniVHzSCGcYOba7dEfR1riV8ZcKiAiVJHSmg&sai=AMfl-YSqF45sjDkEPAexMIyjMp6mHfxHCqd786Aial-b8p_FSWz2MOmw3AMWs17qx8soPob7QH2AUz0pWcKbLyaScoN7pMA1y3c3qXi60LxN&sig=Cg0ArKJSzAOdKffD_y_TEAE&urlfix=1&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:31 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
0
x-xss-protection
1; mode=block
s79527505576300
ubmtech.d3.sc.omtrdc.net/b/ss/cmpglobalvista/1/JS-2.8.2/
43 B
592 B
Image
General
Full URL
https://ubmtech.d3.sc.omtrdc.net/b/ss/cmpglobalvista/1/JS-2.8.2/s79527505576300?AQB=1&ndh=1&pf=1&t=12%2F1%2F2019%2016%3A27%3A31%202%200&sdid=0ADEA3B5CDDC28B2-5550AD7A79C46002&mid=79471191171466830672027705815909244880&aamlh=6&ce=UTF-8&ns=ubmtech&pageName=darkreading.com%20attacks%2Fbreaches%20jai%20vijayan%20ransomware%20attack%20via%20msp%20locks%20customers%20out%20of%20systems&g=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&cc=USD&events=event5&aamb=6G1ynYcLPuiQxYZrsz_pkqfLG9yMXBpb2zX5dvJdYQJzPXImdj0y&h1=Dark%20Reading%7CAttacks%2FBreaches&c2=1333825&v2=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20...&c3=Dark%20Reading%20%7C%201333825%20%7C%20Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20Systems&c4=Ransomware%20Attack%20Via%20MSP%20Locks%20Customers%20Out%20of%20Systems&c5=Attacks%2FBreaches%20-%20Attacks%2FBreaches&c7=Jai%20Vijayan&c8=2a01%3A4f8%3A202%3Aa9%3A0%3A0%3A0%3A2%20%7C%20Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_13_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F67.0.3396.87%20Safari%2F537.36&v10=tuesday%7C11%3A00am&c11=News%20Analysis&v12=1333825&c13=tuesday%7C11%3A00am&v13=www.darkreading.com&v15=First%20Visit&c17=New&v17=New&c19=Un-Registered&c20=20190207&c22=First%20Visit&c23=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&v28=Jai%20Vijayan&v37=News%20Analysis&c41=4&c48=1&v48=1&c50=2.8.2&v61=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&s=1600x1200&c=24&j=1.6&v=N&k=Y&bw=1600&bh=1200&mcorgid=77FB1CFE532B22840A490D45%40AdobeOrg&AQE=1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.82.228.18 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
*.d3.sc.omtrdc.net
Software
Omniture DC/2.0.0 /
Resource Hash
a1ecbaed793a1f564c49c671f2dd0ce36f858534ef6d26b55783a06b884cc506
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 16:27:31 GMT
X-Content-Type-Options
nosniff
X-C
ms-6.6.0
P3P
CP="This is not a P3P policy"
Connection
keep-alive
Content-Length
43
X-XSS-Protection
1; mode=block
Pragma
no-cache
Last-Modified
Wed, 13 Feb 2019 16:27:31 GMT
Server
Omniture DC/2.0.0
xserver
www268
ETag
"3328575712191905792-5000298681606404772"
Vary
*
Content-Type
image/gif
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Expires
Mon, 11 Feb 2019 16:27:31 GMT
Cookie set login.jsp
ng.techweb.com/authds/login/ Frame C4B0
0
0
Document
General
Full URL
https://ng.techweb.com/authds/login/login.jsp?type=iframe&cdsocket_client=https://www.darkreading.com/cdsocket_proxy.html
Requested by
Host: twimgs.com
URL: https://twimgs.com/nojitter/js/jquery-1.11.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
2620:103::192:155:48:119 , United States, ASN19994 (RACKSPACE - Rackspace Hosting, US),
Reverse DNS
Software
NG /
Resource Hash

Request headers

Host
ng.techweb.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825

Response headers

Set-Cookie
JSESSIONID=65F13C736BC2ED40F237F1D9379DED2D; Path=/; Secure; HttpOnly
vary
accept-encoding
Content-Type
text/html;charset=ISO-8859-1
Content-Length
755
Date
Tue, 12 Feb 2019 16:27:31 GMT
Server
NG
Content-Encoding
gzip
Connection
Keep-Alive
ping
www.facebook.com/connect/ Frame AEE0
0
0
Document
General
Full URL
https://www.facebook.com/connect/ping?client_id=640989409269461&domain=www.darkreading.com&origin=1&redirect_uri=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter%2Fr%2Fvy-MhgbfL4v.js%3Fversion%3D44%23cb%3Df3648e340fb0364%26domain%3Dwww.darkreading.com%26origin%3Dhttps%253A%252F%252Fwww.darkreading.com%252Ff17b1919cf42b68%26relation%3Dparent&response_type=token%2Csigned_request&sdk=joey
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/all.js?hash=f643d9582ddb53de40a1968663df0acc&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8083:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www.facebook.com
:scheme
https
:path
/connect/ping?client_id=640989409269461&domain=www.darkreading.com&origin=1&redirect_uri=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter%2Fr%2Fvy-MhgbfL4v.js%3Fversion%3D44%23cb%3Df3648e340fb0364%26domain%3Dwww.darkreading.com%26origin%3Dhttps%253A%252F%252Fwww.darkreading.com%252Ff17b1919cf42b68%26relation%3Dparent&response_type=token%2Csigned_request&sdk=joey
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
accept-encoding
gzip, deflate, br
cookie
fr=0xJCgmBJbO4WYAvxk..BcYvPx...1.0.BcYvPx.
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825

Response headers

status
200
cache-control
private, no-cache, no-store, must-revalidate
expires
Sat, 01 Jan 2000 00:00:00 GMT
pragma
no-cache
strict-transport-security
max-age=15552000; preload
content-encoding
br
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
expect-ct
max-age=86400, report-uri="https://reports.fb.com/expectct/"
content-type
text/html; charset="utf-8"
x-fb-debug
i0tCKqDnDnRGeAExeLbBoB825O+qJKC8/ZUE5SIPpYu6CqgQXHhECSjoC0kJ97pdwJSYAioJtRGQpfEDgF0u7A==
date
Tue, 12 Feb 2019 16:27:31 GMT
widget_iframe.5b0c4d3ea3997aa2c22eac39be510646.html
platform.twitter.com/widgets/ Frame 66E9
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/widget_iframe.5b0c4d3ea3997aa2c22eac39be510646.html?origin=https%3A%2F%2Fwww.darkreading.com&settingsEndpoint=https%3A%2F%2Fsyndication.twitter.com%2Fsettings
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41D8) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825

Response headers

Content-Encoding
gzip
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Tue, 12 Feb 2019 16:27:31 GMT
Etag
"347ce5de96d97a02c18244967b8b6532+gzip"
Last-Modified
Wed, 06 Feb 2019 23:36:53 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/41D8)
Vary
Accept-Encoding
X-Cache
HIT
Content-Length
5783
grid~moment~timeline~tweet.e6c6c9e1c7f05a1ab5b34fc90a421fbc.js
platform.twitter.com/js/
15 KB
5 KB
Script
General
Full URL
https://platform.twitter.com/js/grid~moment~timeline~tweet.e6c6c9e1c7f05a1ab5b34fc90a421fbc.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/419A) /
Resource Hash
c593bc7f38a0af012800c9d078d6ad158ebaf21c5db11e1a4b41ac21eea162d8

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 16:27:31 GMT
Content-Encoding
gzip
Last-Modified
Wed, 06 Feb 2019 23:36:45 GMT
Server
ECS (fcn/419A)
Etag
"85ec66664d77dad7f3237042434f5719+gzip"
Vary
Accept-Encoding
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Cache-Control
public, max-age=315360000
Content-Type
application/javascript; charset=utf-8
Content-Length
5151
moment~timeline~tweet.50bff1a04f1f37b6a41fa15859518e07.js
platform.twitter.com/js/
9 KB
4 KB
Script
General
Full URL
https://platform.twitter.com/js/moment~timeline~tweet.50bff1a04f1f37b6a41fa15859518e07.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/4195) /
Resource Hash
1da3db939ce70f4489f44f7466d79bdd91568aedba46ff3d8598b982e215c3a7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 16:27:31 GMT
Content-Encoding
gzip
Last-Modified
Wed, 06 Feb 2019 23:36:46 GMT
Server
ECS (fcn/4195)
Etag
"198d51c94e63ef08344a7234cb425aa1+gzip"
Vary
Accept-Encoding
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Cache-Control
public, max-age=315360000
Content-Type
application/javascript; charset=utf-8
Content-Length
3164
timeline.aaa11362f8b0ee98bfaaea3b20412494.js
platform.twitter.com/js/
37 KB
11 KB
Script
General
Full URL
https://platform.twitter.com/js/timeline.aaa11362f8b0ee98bfaaea3b20412494.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/4187) /
Resource Hash
34dd2d02e2078de476cc59a2393a726f4e73eabe678304e08875a9e520ff8eac

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 16:27:31 GMT
Content-Encoding
gzip
Last-Modified
Wed, 06 Feb 2019 23:36:46 GMT
Server
ECS (fcn/4187)
Etag
"83efe9ce5e6a6086325808a67470baa5+gzip"
Vary
Accept-Encoding
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Cache-Control
public, max-age=315360000
Content-Type
application/javascript; charset=utf-8
Content-Length
11195
button.e96bb6acc0f8bda511c0c46a84ee18e4.js
platform.twitter.com/js/
7 KB
3 KB
Script
General
Full URL
https://platform.twitter.com/js/button.e96bb6acc0f8bda511c0c46a84ee18e4.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41D8) /
Resource Hash
00ce74a18bd6071ed7e4810d9df7393b6749531165bff6b45d237ccaee9f2808

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 16:27:31 GMT
Content-Encoding
gzip
Last-Modified
Wed, 06 Feb 2019 23:36:45 GMT
Server
ECS (fcn/41D8)
Etag
"afc5be16085c49e57e5c7974de717b28+gzip"
Vary
Accept-Encoding
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Cache-Control
public, max-age=315360000
Content-Type
application/javascript; charset=utf-8
Content-Length
2300
elqCfg.min.js
img.en25.com/i/
6 KB
3 KB
Script
General
Full URL
https://img.en25.com/i/elqCfg.min.js
Requested by
Host: twimgs.com
URL: https://twimgs.com/informationweek/elqNow/elqImg.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.31.90.134 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-31-90-134.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
23818277c974e4ed1d48a04077c6a133bde3435f3d0bafe8dcca49150ebcb986
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Last-Modified
Fri, 26 Oct 2018 07:42:47 GMT
ETag
"2185547dff6cd41:0"
Vary
Accept-Encoding
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Cache-Control
no-cache, no-store
Date
Tue, 12 Feb 2019 16:27:31 GMT
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
application/x-javascript
Content-Length
2118
Expires
Tue, 12 Feb 2019 16:27:31 GMT
teads-format.min.js
a.teads.tv/media/format/v3/
697 KB
185 KB
Script
General
Full URL
https://a.teads.tv/media/format/v3/teads-format.min.js
Requested by
Host: a.teads.tv
URL: https://a.teads.tv/page/11512/tag
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.211.0.4 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-211-0-4.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
cc3246f3efded8553e073e701d9567ddba2c3a42f809d56dd2ed9616786a6588

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:31 GMT
content-encoding
gzip
last-modified
Tue, 12 Feb 2019 15:07:00 GMT
x-amz-request-id
4C9098A8A02DB3C1
etag
"243718a3c737e8b3d72b8cd2c4309be9"
vary
Accept-Encoding
content-type
text/javascript;charset=utf-8
status
200
cache-control
private, must-revalidate, max-age=600
x-bucket
1
accept-ranges
bytes
content-length
189100
x-amz-id-2
kU+jyImVcIlSY6/gpLpK3f4FiXttFQscHnpbSfBlwfDiCaFcYNbP+/BnROJ2S+SRgBkGoi787Ts=
expires
Tue, 12 Feb 2019 16:37:31 GMT
like.php
www.facebook.com/plugins/ Frame 280F
0
0
Document
General
Full URL
https://www.facebook.com/plugins/like.php?app_id=640989409269461&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter%2Fr%2Fvy-MhgbfL4v.js%3Fversion%3D44%23cb%3Df103d5d06da65c8%26domain%3Dwww.darkreading.com%26origin%3Dhttps%253A%252F%252Fwww.darkreading.com%252Ff17b1919cf42b68%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&layout=button&locale=en_US&sdk=joey&send=false&show_faces=false&width=87
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/all.js?hash=f643d9582ddb53de40a1968663df0acc&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8083:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www.facebook.com
:scheme
https
:path
/plugins/like.php?app_id=640989409269461&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter%2Fr%2Fvy-MhgbfL4v.js%3Fversion%3D44%23cb%3Df103d5d06da65c8%26domain%3Dwww.darkreading.com%26origin%3Dhttps%253A%252F%252Fwww.darkreading.com%252Ff17b1919cf42b68%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&layout=button&locale=en_US&sdk=joey&send=false&show_faces=false&width=87
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
accept-encoding
gzip, deflate, br
cookie
fr=0xJCgmBJbO4WYAvxk..BcYvPx...1.0.BcYvPx.
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825

Response headers

status
200
cache-control
private, no-cache, no-store, must-revalidate
expires
Sat, 01 Jan 2000 00:00:00 GMT
pragma
no-cache
strict-transport-security
max-age=15552000; preload
content-encoding
br
timing-allow-origin
*
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
expect-ct
max-age=86400, report-uri="https://reports.fb.com/expectct/"
content-type
text/html; charset="utf-8"
x-fb-debug
th5gMV1LDK4OhneUWoefyJEsYEnCj/pNpOiKpDHehOapkRPlzgRPYSBvBrAq2PmRAwxy8UOeD97sOwrAR0IkWA==
date
Tue, 12 Feb 2019 16:27:31 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 1CE9
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsvsYufE5IC34K56_gfezD0tU-xWZyVIDOMqjJTnF0Bx6sHt6ay6-SbJC-Rb8VfSUEqxCHvHze3LMkbff-o-qp5Y8u-mcRHKgSu_sS8&sig=Cg0ArKJSzMha5RCPOzkBEAE&adk=770981021&tt=-1&bs=1585%2C1200&mtos=1046,1046,1046,1046,1046&tos=1046,0,0,0,0&p=13,0,15,2&mcvt=1046&rs=3&ht=0&tfs=473&tls=1519&mc=1&lte=1&bas=0&bac=0&avms=geo&rst=1549988849570&rpt=618&isd=0&msd=0&lm=2&oseid=3&xdi=0&ps=1585%2C1215&ss=1600%2C1200&pt=-1&deb=1-3-8-28-9-63-53-7&tvt=1481&r=v&id=osdim&uc=9&upc=8&tgt=DIV&cl=1&cec=7&clc=0&cac=0&cd=2x2&v=20190211
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81a::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 Feb 2019 16:27:31 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 8EA2
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjst5aq2uk3B2DW2tkgQn7skWgZbS2A_3NZYx3affp1Iif15Fb_igx-nmcnJsvhcRqaUbjATBpzl20mPvxXBdg8mQINy67DLpBmBdxsE&sig=Cg0ArKJSzJOXdeRrAr0rEAE&adk=2332965166&tt=-1&bs=1585%2C1200&mtos=1046,1046,1046,1046,1046&tos=1046,0,0,0,0&p=351,293,353,294&mcvt=1046&rs=3&ht=0&tfs=473&tls=1519&mc=1&lte=1&bas=0&bac=0&avms=geo&rst=1549988849641&rpt=548&isd=0&msd=0&lm=2&oseid=3&xdi=0&ps=1585%2C1215&ss=1600%2C1200&pt=-1&deb=1-3-8-28-9-63-53-7&tvt=1481&r=v&id=osdim&uc=9&upc=8&tgt=DIV&cl=1&cec=8&clc=0&cac=0&cd=1x2&v=20190211
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81a::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 Feb 2019 16:27:31 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
profile
cdn.syndication.twimg.com/timeline/
158 KB
11 KB
Script
General
Full URL
https://cdn.syndication.twimg.com/timeline/profile?callback=__twttr.callbacks.tl_i0_profile_DarkReading_old&dnt=true&domain=www.darkreading.com&lang=en&screen_name=DarkReading&suppress_response_codes=true&t=1722209&tz=GMT%2B0000&with_replies=false
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40EA) /
Resource Hash
db62210b75be77db0360278ccd155bcdf49d9828e2d86c2bacef7b5d9eccc53b
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block; report=https://twitter.com/i/xss_report

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:31 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-cache
HIT
status
200
content-disposition
attachment; filename=jsonp.jsonp
strict-transport-security
max-age=631138519
content-length
10435
x-xss-protection
1; mode=block; report=https://twitter.com/i/xss_report
x-response-time
166
last-modified
Tue, 12 Feb 2019 16:27:30 GMT
server
ECS (fcn/40EA)
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/javascript;charset=utf-8
cache-control
must-revalidate, max-age=300
x-connection-hash
b3e561cb8f5b3c93e93f981150d95842
accept-ranges
bytes
timing-allow-origin
*
x-transaction
00e53e860024cc47
expires
Tue, 12 Feb 2019 16:32:31 GMT
syndication
syndication.twitter.com/i/jot/
43 B
170 B
Image
General
Full URL
https://syndication.twitter.com/i/jot/syndication?dnt=1&l=%7B%22_category_%22%3A%22syndicated_impression%22%2C%22triggered_on%22%3A1549988851590%2C%22dnt%22%3Atrue%2C%22event_namespace%22%3A%7B%22client%22%3A%22tfw%22%2C%22page%22%3A%22timeline%22%2C%22action%22%3A%22impression%22%7D%7D
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.16.156.21 San Francisco, United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_b /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block; report=https://twitter.com/i/xss_report

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:31 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
strict-transport-security
max-age=631138519
content-length
65
x-xss-protection
1; mode=block; report=https://twitter.com/i/xss_report
x-response-time
10
pragma
no-cache
last-modified
Tue, 12 Feb 2019 16:27:31 GMT
server
tsa_b
x-frame-options
SAMEORIGIN
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
6e6e5f4bfc4ef684a21d44339c407c48
x-transaction
00a24d0a00e4e9f9
expires
Tue, 31 Mar 1981 05:00:00 GMT
svrGP.aspx
s657486201.t.eloqua.com/visitor/v200/
Redirect Chain
  • https://s657486201.t.eloqua.com/visitor/v200/svrGP?pps=3&siteid=657486201&ref2=elqNone&tzo=0&ms=603&optin=disabled
  • https://s657486201.t.eloqua.com/visitor/v200/svrGP.aspx?pps=3&siteid=657486201&ref2=elqNone&tzo=0&ms=603&optin=disabled&elqCookie=1
49 B
373 B
Image
General
Full URL
https://s657486201.t.eloqua.com/visitor/v200/svrGP.aspx?pps=3&siteid=657486201&ref2=elqNone&tzo=0&ms=603&optin=disabled&elqCookie=1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
142.0.160.13 Redwood City, United States, ASN7160 (NETDYNAMICS - Oracle Corporation, US),
Reverse DNS
Software
/
Resource Hash
f1ccea6b7204d9f7913ab45e1afa51d79f83bd4f0319de937b0132e6e02b1aab
Security Headers
Name Value
Strict-Transport-Security max-age=31536000;
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
X-Content-Type-Options
nosniff
Date
Tue, 12 Feb 2019 16:27:31 GMT
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Cache-Control
private,no-cache, no-store
Content-Type
image/gif
Content-Length
49
Expires
-1

Redirect headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
X-Content-Type-Options
nosniff
Date
Tue, 12 Feb 2019 16:27:31 GMT
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Location
//s657486201.t.eloqua.com/visitor/v200/svrGP.aspx?pps=3&siteid=657486201&ref2=elqNone&tzo=0&ms=603&optin=disabled&elqCookie=1
Cache-Control
private,no-cache, no-store
Content-Type
text/html; charset=utf-8
Content-Length
266
Expires
-1
svrGP.aspx
s2150.t.eloqua.com/visitor/v200/
Redirect Chain
  • https://s2150.t.eloqua.com/visitor/v200/svrGP?pps=3&siteid=2150&ref2=elqNone&tzo=0&ms=603&optin=disabled
  • https://s2150.t.eloqua.com/visitor/v200/svrGP.aspx?pps=3&siteid=2150&ref2=elqNone&tzo=0&ms=603&optin=disabled&elqCookie=1
49 B
373 B
Image
General
Full URL
https://s2150.t.eloqua.com/visitor/v200/svrGP.aspx?pps=3&siteid=2150&ref2=elqNone&tzo=0&ms=603&optin=disabled&elqCookie=1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
209.167.231.17 , United States, ASN7160 (NETDYNAMICS - Oracle Corporation, US),
Reverse DNS
e017.en25.com
Software
/
Resource Hash
f1ccea6b7204d9f7913ab45e1afa51d79f83bd4f0319de937b0132e6e02b1aab
Security Headers
Name Value
Strict-Transport-Security max-age=31536000;
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
X-Content-Type-Options
nosniff
Date
Tue, 12 Feb 2019 16:27:33 GMT
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Cache-Control
private,no-cache, no-store
Content-Type
image/gif
Content-Length
49
Expires
-1

Redirect headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
X-Content-Type-Options
nosniff
Date
Tue, 12 Feb 2019 16:27:33 GMT
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Location
//s2150.t.eloqua.com/visitor/v200/svrGP.aspx?pps=3&siteid=2150&ref2=elqNone&tzo=0&ms=603&optin=disabled&elqCookie=1
Cache-Control
private,no-cache, no-store
Content-Type
text/html; charset=utf-8
Content-Length
256
Expires
-1
r
amp-error-reporting.appspot.com/ Frame EBB5
2 B
64 B
XHR
General
Full URL
https://amp-error-reporting.appspot.com/r
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:80b::2014 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/ Express
Resource Hash
565339bc4d33d72817b583024112eb7f5cdf3e5eef0252d6ec1b9c9a94e12bb3

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Origin
https://www.darkreading.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Tue, 12 Feb 2019 16:27:31 GMT
via
1.1 google
x-powered-by
Express
status
200
content-type
text/plain; charset=utf-8
access-control-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
2
p
sb.scorecardresearch.com/
43 B
309 B
Image
General
Full URL
https://sb.scorecardresearch.com/p?c1=2&c2=17198971&ns_ap_sv=2.1511.10&ns_type=hidden&ns_st_it=a&ns_st_sv=4.0.0&ns_st_ad=1&ns_st_sq=1&ns_st_id=1549988851889&ns_st_ec=1&ns_st_cn=1&ns_st_ev=play&ns_st_ct=va00&ns_st_cl=0&ns_st_pt=0&c3=*null&c4=*null&c6=*null&ns_ts=68951608&cs_ucfr=1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.43.115.95 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-43-115-95.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Feb 2019 16:27:31 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Expires
Mon, 01 Jan 1990 00:00:00 GMT
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
track
t.teads.tv/
23 B
157 B
Image
General
Full URL
https://t.teads.tv/track?action=placementCall&pageId=11512&pid=21882&gid=[insertionId]&slot=native&env=js-web&f=1&ts=1549988851886&fv=2.21.23
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.7 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-7.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
328e90a318268aea96180cc31666ae6d6f79d90d078c123bc3d98ee08a192fb7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
pragma
no-cache
date
Tue, 12 Feb 2019 16:27:32 GMT
cache-control
max-age=0, no-cache, no-store
content-type
image/gif
content-length
23
expires
Tue, 12 Feb 2019 16:27:32 GMT
track
t.teads.tv/
23 B
157 B
Image
General
Full URL
https://t.teads.tv/track?action=slotAvailable&pageId=11512&pid=21882&gid=[insertionId]&slot=native&env=js-web&f=1&ts=1549988851887&fv=2.21.23
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.7 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-7.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
328e90a318268aea96180cc31666ae6d6f79d90d078c123bc3d98ee08a192fb7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
pragma
no-cache
date
Tue, 12 Feb 2019 16:27:32 GMT
cache-control
max-age=0, no-cache, no-store
content-type
image/gif
content-length
23
expires
Tue, 12 Feb 2019 16:27:32 GMT
index.html
cmp.teads.mgr.consensu.org/ Frame 4D7D
0
0
Document
General
Full URL
https://cmp.teads.mgr.consensu.org/index.html
Requested by
Host: a.teads.tv
URL: https://a.teads.tv/media/format/v3/teads-format.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:293::2c92 , European Union, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash

Request headers

Host
cmp.teads.mgr.consensu.org
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825

Response headers

x-amz-id-2
kGI/LkmsIcd2daPyZ44T91Tgh3nqFBaPCP2I5Rt/ZLlg5M5DrVepYy/Ac/ZfkFjnOAPn7svobKA=
x-amz-request-id
B87A212102411FA1
Last-Modified
Fri, 14 Sep 2018 07:42:32 GMT
ETag
"e7d6c2974a38b7ff77a560e83789f66a"
Accept-Ranges
bytes
Content-Type
text/html
Content-Length
583
Server
AmazonS3
Cache-Control
max-age=300
Expires
Tue, 12 Feb 2019 16:32:32 GMT
Date
Tue, 12 Feb 2019 16:27:32 GMT
Connection
keep-alive
imgad
tpc.googlesyndication.com/pagead/
13 KB
13 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/imgad?id=CICAgKDbraHZ_wEQARgBMgioz3Erlc4grg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:820::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
476da90416c22c0ad3f70b64901c375ecfda972ee492166d9b2751f4e36585c0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 09 Feb 2019 10:34:10 GMT
x-content-type-options
nosniff
server
cafe
age
280402
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=604800
content-type
image/jpeg
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
13195
x-xss-protection
1; mode=block
expires
Sat, 16 Feb 2019 10:34:10 GMT
r
amp-error-reporting.appspot.com/ Frame EDA0
2 B
64 B
XHR
General
Full URL
https://amp-error-reporting.appspot.com/r
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:80b::2014 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/ Express
Resource Hash
565339bc4d33d72817b583024112eb7f5cdf3e5eef0252d6ec1b9c9a94e12bb3

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Origin
https://www.darkreading.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Tue, 12 Feb 2019 16:27:32 GMT
via
1.1 google
x-powered-by
Express
status
200
content-type
text/plain; charset=utf-8
access-control-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
2
tweet_button.5b0c4d3ea3997aa2c22eac39be510646.en.html
platform.twitter.com/widgets/ Frame CB1E
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/tweet_button.5b0c4d3ea3997aa2c22eac39be510646.en.html
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40DA) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825

Response headers

Content-Encoding
gzip
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Tue, 12 Feb 2019 16:27:32 GMT
Etag
"89cfb47ac6236687dc34b666ad2a0a26+gzip"
Last-Modified
Wed, 06 Feb 2019 23:36:50 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/40DA)
Vary
Accept-Encoding
X-Cache
HIT
Content-Length
12256
activeview
pagead2.googlesyndication.com/pcs/ Frame D013
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjstUnAhrOXgR5Fnfna9uZHoGVa71JMJcU190E1HhO5Y4xoPFN6v3s4GuKIU8OJj8qqW1yMpcXVe1AKIbEmkgX1tuEL1vY0ohgXaG9Z8&sig=Cg0ArKJSzLOj3K1WkPW0EAE&adk=2285942263&tt=-1&bs=1585%2C1200&mtos=1228,1228,1228,1228,1228&tos=1228,0,0,0,0&p=443,1100,448,1105&mcvt=1228&rs=3&ht=0&tfs=808&tls=2036&mc=1&lte=1&bas=0&bac=0&avms=geo&rst=1549988850788&rpt=1&isd=0&msd=0&lm=2&oseid=3&xdi=0&ps=1585%2C1215&ss=1600%2C1200&pt=-1&deb=1-3-8-32-10-63-61-8&tvt=2000&r=v&id=osdim&uc=6&upc=1&tgt=DIV&cl=0&cec=5&clc=0&cac=0&cd=5x0&v=20190211
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81a::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 Feb 2019 16:27:32 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
r
amp-error-reporting.appspot.com/ Frame B2B2
2 B
64 B
XHR
General
Full URL
https://amp-error-reporting.appspot.com/r
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:80b::2014 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/ Express
Resource Hash
565339bc4d33d72817b583024112eb7f5cdf3e5eef0252d6ec1b9c9a94e12bb3

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Origin
https://www.darkreading.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Tue, 12 Feb 2019 16:27:32 GMT
via
1.1 google
x-powered-by
Express
status
200
content-type
text/plain; charset=utf-8
access-control-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
2
ad
a.teads.tv/page/11512/
118 B
338 B
XHR
General
Full URL
https://a.teads.tv/page/11512/ad?windowWidth=1600&windowHeight=1200&windowDepth=1&windowReferrerUrl=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fransomware-attack-via-msp-locks-customers-out-of-systems%2Fd%2Fd-id%2F1333825&page=%7B%22id%22%3A11512%2C%22placements%22%3A%5B%7B%22id%22%3A21882%2C%22validity%22%3A%7B%22status%22%3Atrue%2C%22reasons%22%3A%5B%5D%7D%2C%22player%22%3A%7B%22width%22%3A489%2C%22height%22%3A275%7D%2C%22slotType%22%3A%22native%22%7D%5D%2C%22gdpr_iab%22%3A%7B%22status%22%3A22%2C%22consent%22%3A%22%22%2C%22reason%22%3A220%7D%7D&userId=cb612ddb-8a95-4fc2-9ae3-38d4c47ad374&formatVersion=2.21.23&env=js-web&netBw=10
Requested by
Host: a.teads.tv
URL: https://a.teads.tv/media/format/v3/teads-format.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.211.0.4 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-211-0-4.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
f50167bee40cd7fdd6c623efb794e0edddec7de87ef71f48c8b1b1413e1dfc4a

Request headers

Accept
application/json; charset=UTF-8
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Origin
https://www.darkreading.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 Feb 2019 16:27:32 GMT
content-encoding
gzip
status
200
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
https://www.darkreading.com
cache-control
max-age=0, no-cache, no-store
access-control-allow-credentials
true
content-length
129
expires
Tue, 12 Feb 2019 16:27:32 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiOjAsImNsaWVudFRpbWVzdGFtcCI6MTU0OTk4ODg1Mi4yMTMsIm5hbWUiOiJjb250YWluZXJCZWNhbWVWaWV3YWJsZSJ9XX0=?crc32c=3012348474
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.233.187.252 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-233-187-252.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Feb 2019 16:27:33 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
xKpbWBHq
pbs.twimg.com/card_img/1095322822560366592/ Frame E6BE
7 KB
7 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1095322822560366592/xKpbWBHq?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
93.184.220.70 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41A4) /
Resource Hash
c1ba095f1ecd3931eaac726c19f603f2bcb7288a8fab26582637297b9c5530a3
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-response-time
148
date
Tue, 12 Feb 2019 16:27:32 GMT
x-content-type-options
nosniff
surrogate-key
card_img card_img/bucket/2 card_img/1095322822560366592
last-modified
Tue, 12 Feb 2019 14:02:45 GMT
server
ECS (fcn/41A4)
access-control-allow-origin
*
x-cache
HIT
content-type
image/jpeg
status
200
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
e78961e178943af3020ae9cb3ea5524d
accept-ranges
bytes
content-length
7361
timeline.0940efb0bc0eb82a2de893b3e7b414bf.light.ltr.css
platform.twitter.com/css/ Frame E6BE
55 KB
13 KB
Stylesheet
General
Full URL
https://platform.twitter.com/css/timeline.0940efb0bc0eb82a2de893b3e7b414bf.light.ltr.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41A4) /
Resource Hash
7cbb0e141a91d2c3c30c06148c1a32c2437ea6452f107a4e1fb0c032708a1295

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 16:27:32 GMT
Content-Encoding
gzip
Last-Modified
Wed, 06 Feb 2019 23:36:43 GMT
Server
ECS (fcn/41A4)
Etag
"db7cf7a65ee339eb82d0f17892ef631f+gzip"
Vary
Accept-Encoding
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Cache-Control
public, max-age=315360000
Content-Type
text/css; charset=utf-8
Content-Length
12542
timeline.0940efb0bc0eb82a2de893b3e7b414bf.light.ltr.css
platform.twitter.com/css/
55 KB
55 KB
Image
General
Full URL
https://platform.twitter.com/css/timeline.0940efb0bc0eb82a2de893b3e7b414bf.light.ltr.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41A4) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 16:27:32 GMT
Content-Encoding
gzip
Last-Modified
Wed, 06 Feb 2019 23:36:43 GMT
Server
ECS (fcn/41A4)
Etag
"db7cf7a65ee339eb82d0f17892ef631f+gzip"
Vary
Accept-Encoding
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Cache-Control
public, max-age=315360000
Content-Type
text/css; charset=utf-8
Content-Length
12542
redirect
sync.teads.tv/iframe/ Frame 873B
Redirect Chain
  • https://sync.teads.tv/iframe?pid=21882&userId=cb612ddb-8a95-4fc2-9ae3-38d4c47ad374&gdprIab={%22status%22:22,%22consent%22:%22%22,%22reason%22:220}&1549988852436
  • https://sync.teads.tv/iframe/redirect
0
0
Document
General
Full URL
https://sync.teads.tv/iframe/redirect
Requested by
Host: a.teads.tv
URL: https://a.teads.tv/media/format/v3/teads-format.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.211.8.12 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-211-8-12.deploy.static.akamaitechnologies.com
Software
akka-http/10.1.5 /
Resource Hash

Request headers

:method
GET
:authority
sync.teads.tv
:scheme
https
:path
/iframe/redirect
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
accept-encoding
gzip, deflate, br
cookie
tt_viewer=8fa1db97-4fbf-46f9-90d1-a16c96561d3a
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825

Response headers

status
200
content-type
text/html; charset=UTF-8
server
akka-http/10.1.5
content-length
1368
expires
Tue, 12 Feb 2019 16:27:32 GMT
cache-control
max-age=0, no-cache, no-store
pragma
no-cache
date
Tue, 12 Feb 2019 16:27:32 GMT
set-cookie
tt_exelate=; Expires=Wed, 13 Feb 2019 16:27:32 GMT; Domain=.teads.tv tt_bluekai=; Expires=Wed, 13 Feb 2019 16:27:32 GMT; Domain=.teads.tv tt_emetriq=; Expires=Wed, 13 Feb 2019 16:27:32 GMT; Domain=.teads.tv tt_liveramp=; Expires=Wed, 13 Feb 2019 16:27:32 GMT; Domain=.teads.tv tt_neustar=; Expires=Wed, 13 Feb 2019 16:27:32 GMT; Domain=.teads.tv

Redirect headers

status
302
content-type
text/html; charset=UTF-8
location
/iframe/redirect
server
akka-http/10.1.5
content-length
89
expires
Tue, 12 Feb 2019 16:27:32 GMT
cache-control
max-age=0, no-cache, no-store
pragma
no-cache
date
Tue, 12 Feb 2019 16:27:32 GMT
set-cookie
tt_viewer=8fa1db97-4fbf-46f9-90d1-a16c96561d3a; Expires=Tue, 11 Feb 2020 16:27:32 GMT; Max-Age=31449600; Domain=.teads.tv; Path=/
activeview
pagead2.googlesyndication.com/pcs/ Frame EBB5
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjssDdF7-k62oaMSfKI0WkLCyAoWLpXq3yx4VcHTRYCqeFUQKZ7TNuKVCpf-f4sqpfS_mEAoxXfQ_SBOnY76RN3CBqj0YUTOYDgXSAcc&sig=Cg0ArKJSzF8yc8ZD2d1cEAE&id=ampim&o=428,76&d=728,90&ss=1600,1200&bs=1600,1200&mcvt=1241&mtos=0,0,1241,1241,1241&tos=0,0,1241,0,0&tfs=1102&tls=2343&g=100&h=100&pt=859&tt=2344&rpt=859&rst=1549988849650&r=v&adk=2966194094&avms=ampa
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81a::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 Feb 2019 16:27:32 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame B2B2
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsuayaezYp3dhvC0IOTiU7Y7Pt29qDnSl0X2eeKNVEur5ay9NDYgyXGxmAtP1YQI3CTL6lex01Rz-WyxwRbmvSek5CL5zgtr3XyuK8k&sig=Cg0ArKJSzDoX8ocmg-IWEAE&id=ampim&o=953,468&d=300,250&ss=1600,1200&bs=1600,1200&mcvt=1256&mtos=0,0,1256,1256,1256&tos=0,0,1256,0,0&tfs=689&tls=1945&g=100&h=100&pt=136&tt=1945&rpt=136&rst=1549988850792&r=v&adk=4220632109&avms=ampa
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81a::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 Feb 2019 16:27:32 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39",quic=":443"; ma=2592000; v="44,43,39"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
A4mG0U5P_normal.jpg
pbs.twimg.com/profile_images/885169621795565573/ Frame E6BE
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/885169621795565573/A4mG0U5P_normal.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
93.184.220.70 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40B4) /
Resource Hash
25b438de3e944547e69c6de98e403f46a9aa4fb98e6d1bb34954fd30ebc19b56
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-response-time
228
date
Tue, 12 Feb 2019 16:27:32 GMT
x-content-type-options
nosniff
surrogate-key
profile_images profile_images/bucket/8 profile_images/885169621795565573
last-modified
Wed, 12 Jul 2017 16:08:58 GMT
server
ECS (fcn/40B4)
access-control-allow-origin
*
x-cache
HIT
content-type
image/jpeg
status
200
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
6f20ab40467a67fba2a8c4cd252665ef
accept-ranges
bytes
content-length
1883
syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
ton.twimg.com/tfw/css/ Frame E6BE
44 KB
7 KB
Stylesheet
General
Full URL
https://ton.twimg.com/tfw/css/syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
93.184.220.70 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/418C) /
Resource Hash
a549034009f79ead18a2154a8b730d8acb61e2f36c0434c0f9cff0f73df5d8cf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-ton-expected-size
45170
x-cache
HIT
status
200
content-length
6944
x-response-time
119
surrogate-key
tfw
last-modified
Fri, 25 Jan 2019 15:01:44 GMT
server
ECS (fcn/418C)
etag
"4mhImCFS9rptiUICNnLD1g=="
vary
Accept-Encoding
content-type
text/css
access-control-allow-origin
https://twitter.com
x-connection-hash
c5f043b60b3bffbbd5e1bad6ae48e89e
accept-ranges
bytes
expires
Tue, 19 Feb 2019 16:27:32 GMT
syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
ton.twimg.com/tfw/css/
44 KB
44 KB
Image
General
Full URL
https://ton.twimg.com/tfw/css/syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
93.184.220.70 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/418C) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-ton-expected-size
45170
x-cache
HIT
status
200
content-length
6944
x-response-time
119
surrogate-key
tfw
last-modified
Fri, 25 Jan 2019 15:01:44 GMT
server
ECS (fcn/418C)
etag
"4mhImCFS9rptiUICNnLD1g=="
vary
Accept-Encoding
content-type
text/css
access-control-allow-origin
https://twitter.com
x-connection-hash
c5f043b60b3bffbbd5e1bad6ae48e89e
accept-ranges
bytes
expires
Tue, 19 Feb 2019 16:27:32 GMT
truncated
/ Frame E6BE
825 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
45055babdbc02ea34c7baa53f33fc68389c4c5f73afe0bfafd6c9bc5733399bc

Request headers

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/ Frame E6BE
572 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
abd2a457215e60ab60b2a6b4f25a17583c5d80e13935f76e097236f729c5dcd6

Request headers

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/ Frame E6BE
644 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a87f4fd815fc95288f2da6efc536c950ef940bd9eb52176fd9e8e56107cc65e2

Request headers

Response headers

Content-Type
image/svg+xml;charset=utf-8
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.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?crc32c=32817277
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.233.187.252 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-233-187-252.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Feb 2019 16:27:33 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
css
fonts.googleapis.com/ Frame FCDF
272 B
285 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Lato:400&text=%20BCDEGILMORSTUVWadeor
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
a88b444f8afcfa21016c2c7dfb3b88ca273fde481b8fffb1daac6d315c40a295
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Tue, 12 Feb 2019 16:27:33 GMT
server
ESF
access-control-allow-origin
*
date
Tue, 12 Feb 2019 16:27:33 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
x-xss-protection
1; mode=block
expires
Tue, 12 Feb 2019 16:27:33 GMT
kb4_wp3_ransomware.png
cache-ssl.celtra.com/api/blobs/63b3ca1efb19c90f190932db018489f445bb6554f329d1eb19e342fb903ea2a5/ Frame FCDF
25 KB
26 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/63b3ca1efb19c90f190932db018489f445bb6554f329d1eb19e342fb903ea2a5/kb4_wp3_ransomware.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.150.151 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-150-151.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
74530f7e07406bb281a63f0850292c504b98b109ac7463a3b332190d78f37421

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 01 Jan 2019 06:18:44 GMT
via
1.1 varnish (Varnish/5.0), 1.1 65715c6e447bfc4ebcfb81f088c7e3f3.cloudfront.net (CloudFront)
age
3665328
x-cache
Hit from cloudfront
status
200
content-length
26027
server
Apache
etag
"74530f7e07406bb281a63f0850292c504b98b109ac7463a3b332190d78f37421"
x-varnish
52764793 51313992
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
746LfYlEfRJTqOmSiBgQCDFV2zO77NY-gl3KMdz2Gfv4xmrjvHjIHQ==
kb4_wp1_ceo-fraud.png
cache-ssl.celtra.com/api/blobs/dedcf59cdea9a12b1f1a21934bc6996c02574a612b3668cf518489fa4719ec41/ Frame FCDF
32 KB
32 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/dedcf59cdea9a12b1f1a21934bc6996c02574a612b3668cf518489fa4719ec41/kb4_wp1_ceo-fraud.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.150.151 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-150-151.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
70040177196022ea3b3b25bf9ea3f889238a58a15c6f06de2a84c066cbcdb91a

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 01 Jan 2019 05:45:53 GMT
via
1.1 varnish (Varnish/5.0), 1.1 65715c6e447bfc4ebcfb81f088c7e3f3.cloudfront.net (CloudFront)
age
3667300
x-cache
Hit from cloudfront
status
200
content-length
32463
server
Apache
etag
"70040177196022ea3b3b25bf9ea3f889238a58a15c6f06de2a84c066cbcdb91a"
x-varnish
53975999 51253786
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
b3sl42uPy9WEBJa8ivcyzNHBsluWZcHWMctOruuMRDCab7IrYAGw1A==
kb4_wp5_employee-worst-practices.png
cache-ssl.celtra.com/api/blobs/eaf0f34bd2f85193dc0f9f3f5736a4ece029f17fdd1ac7dc28aa60df82b9b7ce/ Frame FCDF
28 KB
29 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/eaf0f34bd2f85193dc0f9f3f5736a4ece029f17fdd1ac7dc28aa60df82b9b7ce/kb4_wp5_employee-worst-practices.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.150.151 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-150-151.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
be92c66f81b4131ebe6a31c3a4580bc826eb6e1bcc4bf90b61ba18f862f4b6ed

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 01 Jan 2019 05:45:53 GMT
via
1.1 varnish (Varnish/5.0), 1.1 65715c6e447bfc4ebcfb81f088c7e3f3.cloudfront.net (CloudFront)
age
3667300
x-cache
Hit from cloudfront
status
200
content-length
28756
server
Apache
etag
"be92c66f81b4131ebe6a31c3a4580bc826eb6e1bcc4bf90b61ba18f862f4b6ed"
x-varnish
48966095 49325524
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
AeLzK6qKAIADqCYsjOtn26zACoQ38R87fMe9fUrI9r6pdWWvTU4NlA==
kb4_wp2_endpoint-protection.png
cache-ssl.celtra.com/api/blobs/0465a787f6ec9189fc96e5fcd886248dab0d35515030176a37ce5ad00e29117e/ Frame FCDF
32 KB
32 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/0465a787f6ec9189fc96e5fcd886248dab0d35515030176a37ce5ad00e29117e/kb4_wp2_endpoint-protection.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.150.151 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-150-151.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
fcafc57676b781ec6a75cf56b3336058825be4b74aa059dffa3561b4e126858c

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 01 Jan 2019 05:41:55 GMT
via
1.1 varnish (Varnish/5.0), 1.1 65715c6e447bfc4ebcfb81f088c7e3f3.cloudfront.net (CloudFront)
age
3667538
x-cache
Hit from cloudfront
status
200
content-length
32301
server
Apache
etag
"fcafc57676b781ec6a75cf56b3336058825be4b74aa059dffa3561b4e126858c"
x-varnish
52734250 38482423
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
PIzkNgYUj6kiT78X25HlrzTId9JLyAU79fzt5I0PYKjYFZgsOebvYg==
font
fonts.gstatic.com/l/ Frame FCDF
2 KB
3 KB
Font
General
Full URL
https://fonts.gstatic.com/l/font?kit=S6uyw4BMUTPHvxw6WQevLjLIr55xq7MRmoOKXtz5bQJ_ObVoQUE&skey=2d58b92a99e1c086&v=v14
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81f::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
67cc275a80e0aed5ea4abc5bf20352bfb585e8fb96f32ab115bd10a8e3e8fc74
Security Headers
Name Value
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Lato:400&text=%20BCDEGILMORSTUVWadeor
Origin
https://www.darkreading.com

Response headers

date
Mon, 11 Feb 2019 20:34:55 GMT
last-modified
Wed, 11 Oct 2017 18:44:21 GMT
server
ESF
age
71558
x-frame-options
SAMEORIGIN
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
cache-control
private, max-age=86400
content-disposition
attachment; filename="font.woff2"; filename*=UTF-8''font.woff2
timing-allow-origin
*
access-control-allow-origin
*
content-length
2440
x-xss-protection
1; mode=block
expires
Mon, 11 Feb 2019 20:34:55 GMT
kb4_wp3_phishing-breakthrough.png
cache-ssl.celtra.com/api/blobs/56e2ae551f4b04d27920010d97a6cfa0f4d30bad33a9da06fe29200e15668d74/ Frame FCDF
25 KB
25 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/56e2ae551f4b04d27920010d97a6cfa0f4d30bad33a9da06fe29200e15668d74/kb4_wp3_phishing-breakthrough.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.150.151 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-150-151.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
c09bda5318b6e09432b9ca0ca0dcb3ac4a4093c70a5e9d75b7105f0fc9c67e3a

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 01 Jan 2019 05:41:55 GMT
via
1.1 varnish (Varnish/5.0), 1.1 65715c6e447bfc4ebcfb81f088c7e3f3.cloudfront.net (CloudFront)
age
3667538
x-cache
Hit from cloudfront
status
200
content-length
25099
server
Apache
etag
"c09bda5318b6e09432b9ca0ca0dcb3ac4a4093c70a5e9d75b7105f0fc9c67e3a"
x-varnish
52041010 49325471
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
BbM7JMhApPJuhKUkESozPAfcvSUjypx2hoEn_sfi8VwGxRzeNrjJ1Q==
tw.png
cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/ Frame FCDF
781 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/tw.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.150.151 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-150-151.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 18 Dec 2017 08:12:27 GMT
via
1.1 varnish (Varnish/5.0), 1.1 65715c6e447bfc4ebcfb81f088c7e3f3.cloudfront.net (CloudFront)
age
4868095
x-cache
Hit from cloudfront
status
200
content-length
781
server
Apache
etag
"308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96"
x-varnish
5839833
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
2-hxwcgACvSTmN6BiDmFAdhpGS4UqeC9eU7EJM8j4LkWdziLBIpGfw==
tw_hover.png
cache-ssl.celtra.com/api/blobs/f0cccd681d168932db801410643c93f0df03370d5c638ab3e4a16e92b80b3aa0/ Frame FCDF
777 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/f0cccd681d168932db801410643c93f0df03370d5c638ab3e4a16e92b80b3aa0/tw_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.150.151 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-150-151.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
1ace1b17e77ec3828eda87eb3fea3671ce2a0f706426fbd158873546c4f9366e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Sep 2017 05:30:55 GMT
via
1.1 varnish, 1.1 65715c6e447bfc4ebcfb81f088c7e3f3.cloudfront.net (CloudFront)
age
12048406
x-cache
Hit from cloudfront
status
200
content-length
777
server
Apache
etag
"1ace1b17e77ec3828eda87eb3fea3671ce2a0f706426fbd158873546c4f9366e"
x-varnish
1188842914
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
yzm-_nGuf2-BCfHBueP7KBqso8gW3XZyoSrik7-EnLYOcOb1SOmoRA==
li.png
cache-ssl.celtra.com/api/blobs/8abad5101e4e04aaad9758773bd0e6eead30303742f732e5235e7d73be899598/ Frame FCDF
608 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/8abad5101e4e04aaad9758773bd0e6eead30303742f732e5235e7d73be899598/li.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.150.151 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-150-151.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
2e8c15ba0e22d227940fcc5ae790599e1b32a636d9b28e174e864a4884ee7e48

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 18 Dec 2017 06:33:25 GMT
via
1.1 varnish (Varnish/5.0), 1.1 65715c6e447bfc4ebcfb81f088c7e3f3.cloudfront.net (CloudFront)
age
4872658
x-cache
Hit from cloudfront
status
200
content-length
608
server
Apache
etag
"2e8c15ba0e22d227940fcc5ae790599e1b32a636d9b28e174e864a4884ee7e48"
x-varnish
921792
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
w8QpveZtLrWo-Paz95gLl-dGUoo1y5h_Js4Mw5tf4DL_QNiqv6c_qw==
li_hover.png
cache-ssl.celtra.com/api/blobs/b7a1a128e1e4be19257209f345f26c688422071122ed660518782b609158ad7a/ Frame FCDF
612 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/b7a1a128e1e4be19257209f345f26c688422071122ed660518782b609158ad7a/li_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.150.151 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-150-151.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
3bb72e5a3bd7858a708f629dfc7e2f2aa9d87ee8a43b1c22b300e49cd59b09d7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 18 Dec 2017 06:33:25 GMT
via
1.1 varnish (Varnish/5.0), 1.1 65715c6e447bfc4ebcfb81f088c7e3f3.cloudfront.net (CloudFront)
age
4872659
x-cache
Hit from cloudfront
status
200
content-length
612
server
Apache
etag
"3bb72e5a3bd7858a708f629dfc7e2f2aa9d87ee8a43b1c22b300e49cd59b09d7"
x-varnish
3811320
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
0K1O__W0Sar9boZe3iahZi4cnmNw6W_5_rp7tF_uvInKYzmeyl-BGg==
yt.png
cache-ssl.celtra.com/api/blobs/13d77e3befd746d58356da2f0b0d1d20af11ba13ea0ca8cd7b73871ef1d40edd/ Frame FCDF
914 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/13d77e3befd746d58356da2f0b0d1d20af11ba13ea0ca8cd7b73871ef1d40edd/yt.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.150.151 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-150-151.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
8c792dc2527753d5f758a812c5de2225dba619ecd83b05713ce68b0db858fa28

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 09 Nov 2017 02:40:03 GMT
via
1.1 varnish, 1.1 65715c6e447bfc4ebcfb81f088c7e3f3.cloudfront.net (CloudFront)
age
8257534
x-cache
Hit from cloudfront
status
200
content-length
914
server
Apache
etag
"8c792dc2527753d5f758a812c5de2225dba619ecd83b05713ce68b0db858fa28"
x-varnish
1057753892
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
5Tym_xJ_9REI2W_jBQkDe71VxahWT1bX97P6jwV0hutAdAVfpgxjmw==
yt_hover.png
cache-ssl.celtra.com/api/blobs/05c871534a66ba01deefbc75b6ed2f9281993581e903223785a6f6a7ff82bebb/ Frame FCDF
918 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/05c871534a66ba01deefbc75b6ed2f9281993581e903223785a6f6a7ff82bebb/yt_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.150.151 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-150-151.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
6e504d72d0b8fe63b71774d746594a7d13607ee5313241cc546a1bcd47909677

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 08 Dec 2017 20:26:37 GMT
via
1.1 varnish (Varnish/5.0), 1.1 65715c6e447bfc4ebcfb81f088c7e3f3.cloudfront.net (CloudFront)
age
5687950
x-cache
Hit from cloudfront
status
200
content-length
918
server
Apache
etag
"6e504d72d0b8fe63b71774d746594a7d13607ee5313241cc546a1bcd47909677"
x-varnish
77243550
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
lhzfheLGAG118UOJ6TQsWCwy6BgDwkl25Vrd4NR1eIbAuDKTcB86AA==
rss.png
cache-ssl.celtra.com/api/blobs/b1cdc0ecb51975dba9ab6759d0985f34bf971d517bb87e169f46d806ce108101/ Frame FCDF
988 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/b1cdc0ecb51975dba9ab6759d0985f34bf971d517bb87e169f46d806ce108101/rss.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.150.151 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-150-151.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
4e668c3c5ead2707062c31387d0b2fc6883cbff5895585e08d923f3759a33140

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 08 Dec 2017 10:16:54 GMT
via
1.1 varnish (Varnish/5.0), 1.1 65715c6e447bfc4ebcfb81f088c7e3f3.cloudfront.net (CloudFront)
age
5722659
x-cache
Hit from cloudfront
status
200
content-length
988
server
Apache
etag
"4e668c3c5ead2707062c31387d0b2fc6883cbff5895585e08d923f3759a33140"
x-varnish
46114625
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
SiBTDOabBoYkx5sYUqkmoX73PNbbdAhP4aUEteURHnyDc6D41bKU1A==
rss_hover.png
cache-ssl.celtra.com/api/blobs/82a3278077b1fa57b623faca8218253948280aafcfffcf15d53c579aeff15a03/ Frame FCDF
990 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/82a3278077b1fa57b623faca8218253948280aafcfffcf15d53c579aeff15a03/rss_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.150.151 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-150-151.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
2b8322bfccaa5c0aa4a37e06b916b11d517b7a2974ce3cd810ea57ba3a1ffd68

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 18 Dec 2017 09:06:42 GMT
via
1.1 varnish (Varnish/5.0), 1.1 65715c6e447bfc4ebcfb81f088c7e3f3.cloudfront.net (CloudFront)
age
4864786
x-cache
Hit from cloudfront
status
200
content-length
990
server
Apache
etag
"2b8322bfccaa5c0aa4a37e06b916b11d517b7a2974ce3cd810ea57ba3a1ffd68"
x-varnish
2571162
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
Y55g456aapYlJb9eDSBkgpDV0j5afNZL_6HW09qXAYzENp8XXLwf2Q==
news_stroke_v1_78ce5b21fb24a7c7e528d22fc25bd9f9df7f24e2.svg
ton.twimg.com/tfw/assets/ Frame E6BE
829 B
566 B
Image
General
Full URL
https://ton.twimg.com/tfw/assets/news_stroke_v1_78ce5b21fb24a7c7e528d22fc25bd9f9df7f24e2.svg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
93.184.220.70 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41AC) /
Resource Hash
5c0f79d0286f1fd3db48e1b689358017b302c0f4babde540329e8c644cf119c7
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://ton.twimg.com/tfw/css/syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-ton-expected-size
829
x-cache
HIT
status
200
content-length
395
x-response-time
111
surrogate-key
tfw
last-modified
Fri, 25 Jan 2019 15:01:44 GMT
server
ECS (fcn/41AC)
etag
"CTUg6L9PuY+d9h5xpE0zmw=="
vary
Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
https://twitter.com
x-connection-hash
e62780529644f12639afe3aed5a22ab8
accept-ranges
bytes
expires
Tue, 19 Feb 2019 16:27:33 GMT
knowbe4-logo-no-tagline.png
cache-ssl.celtra.com/api/blobs/c4bd279d63fc85df72d59a8cfcefc185951a84e4d6ea690ae8fb98dc21346d85/ Frame FCDF
15 KB
15 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/c4bd279d63fc85df72d59a8cfcefc185951a84e4d6ea690ae8fb98dc21346d85/knowbe4-logo-no-tagline.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.150.151 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-150-151.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
c572ca09dfe579ce9c8fe0e6ad32116ac2a2706297a5c791250e7b720d52d7d5

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 01 Jan 2019 05:45:53 GMT
via
1.1 varnish (Varnish/5.0), 1.1 65715c6e447bfc4ebcfb81f088c7e3f3.cloudfront.net (CloudFront)
age
3667300
x-cache
Hit from cloudfront
status
200
content-length
15325
server
Apache
etag
"c572ca09dfe579ce9c8fe0e6ad32116ac2a2706297a5c791250e7b720d52d7d5"
x-varnish
42514403 50798240
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
pd4Z4XpEe45xOzL-DdApe_LzaC-AYuRI9eOJwukznVYFOcVT89pIiw==
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiOjIsImNsaWVudFRpbWVzdGFtcCI6MTU0OTk4ODg1My43OSwibmFtZSI6ImNyZWF0aXZlTG9hZGVkIiwidmlld2FiaWxpdHkwME1lYXN1cmFibGUiOnRydWUsInZpZXdhYmlsaXR5NTAxTWVhc3VyYWJsZSI6dHJ1ZSwidmlld2FibGVUaW1lTWVhc3VyYWJsZSI6dHJ1ZSwiY2RuVmFyaWFudCI6Im5vbmUifSx7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiOjMsImNsaWVudFRpbWVzdGFtcCI6MTU0OTk4ODg1My44OCwibmFtZSI6InZpZXdwb3J0UGxhY2VtZW50R2VvbWV0cnkiLCJwYWdlRGltZW5zaW9ucyI6eyJoZWlnaHQiOjYyOTQsIndpZHRoIjoxNTg1fSwidmlld3BvcnRQb3NpdGlvblJlY3QiOnsid2lkdGgiOjE2MDAsImhlaWdodCI6MTIwMCwibGVmdCI6MCwidG9wIjowfSwiZmlyc3RQbGFjZW1lbnRQb3NpdGlvblJlY3QiOnsibGVmdCI6OTM0LjUsInRvcCI6NDMyLjkyMTg3NSwid2lkdGgiOjMzNiwiaGVpZ2h0Ijo2MDB9fSx7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiOjQsImNsaWVudFRpbWVzdGFtcCI6MTU0OTk4ODg1My44ODcsIm5hbWUiOiJ2aWV3YWJsZTAwIiwiY3JpdGVyaW9uIjp7Im5hbWUiOiJDb3JlIiwicmF0aW8iOjAsInRpbWUiOjB9fSx7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiOjUsImNsaWVudFRpbWVzdGFtcCI6MTU0OTk4ODg1My45MTMsInVuaXROYW1lIjoiYmFubmVyIiwidW5pdFZhcmlhbnRMb2NhbElkIjpudWxsLCJzY3JlZW5Mb2NhbElkIjoxMzY4LCJzY3JlZW5UaXRsZSI6IlJlc291cmNlcyIsInNjcmVlbklzTWFzdGVyIjpmYWxzZSwib2JqZWN0TG9jYWxJZCI6bnVsbCwib2JqZWN0TmFtZSI6bnVsbCwib2JqZWN0Q2xhenoiOm51bGwsImluaXRpYXRpb25UaW1lc3RhbXAiOjE1NDk5ODg4NTMuOTEzLCJuYW1lIjoic2NyZWVuU2hvd24ifSx7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiOjYsImNsaWVudFRpbWVzdGFtcCI6MTU0OTk4ODg1My45MTMsIm5hbWUiOiJjcmVhdGl2ZVJlbmRlcmVkIn1dfQ==?crc32c=2670334702
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.233.187.252 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-233-187-252.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Feb 2019 16:27:33 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiOjcsImNsaWVudFRpbWVzdGFtcCI6MTU0OTk4ODg1My45NDQsIm5hbWUiOiJ2aWV3YWJsZVRpbWUiLCJmcm9tIjoxNTQ5OTg4ODUzLjg4OSwidG8iOjE1NDk5ODg4NTMuODg5fV19?crc32c=1940688146
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.190.15 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-190-15.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Feb 2019 16:27:34 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
user_timeline
cache-ssl.celtra.com/api/twitter/statuses/ Frame FCDF
52 KB
4 KB
Script
General
Full URL
https://cache-ssl.celtra.com/api/twitter/statuses/user_timeline?screen_name=KnowBe4&jsonp=jsonp_celtra_twitter_proxy_8247
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.150.151 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-150-151.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
44e10cbf1f83303b36ea86511f5752752f045161dc1c60c27cdc5e7d05b48064

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:12:59 GMT
content-encoding
gzip
age
874
x-cache
Hit from cloudfront
status
200
content-length
3758
via
1.1 varnish (Varnish/5.0), 1.1 65715c6e447bfc4ebcfb81f088c7e3f3.cloudfront.net (CloudFront)
server
Apache
etag
"7cefbf5199e52d420aca92d7856465f58913d9df034f8ccfd6f25cc7a8a48e73"
vary
Accept-Encoding
x-varnish
8819816
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=900
access-control-allow-credentials
false
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
UbT1C4R0-OIWWCkjwn4MIofQzb3gmKD8jLNMH_8wPx7Bavt8-DoI-g==
player_api
www.youtube.com/ Frame FCDF
859 B
923 B
Script
General
Full URL
https://www.youtube.com/player_api
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:825::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
YouTube Frontend Proxy /
Resource Hash
75312b52055e7a65b0d35173f6ed4804eb23ccc8d0a6287c4db262fcece145b9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 16:27:34 GMT
x-content-type-options
nosniff
server
YouTube Frontend Proxy
content-type
application/javascript
status
200
cache-control
no-cache
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
859
x-xss-protection
1; mode=block
expires
Tue, 27 Apr 1971 19:44:06 EST
d193ee6b674bab34a895c2762739c845d4d0898b1080a5aa4a938637e95d2133
cache-ssl.celtra.com/api/videoThumb/ Frame FCDF
17 KB
18 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/videoThumb/d193ee6b674bab34a895c2762739c845d4d0898b1080a5aa4a938637e95d2133?transform=thumbnail&width=null&height=200&position=50
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.150.69 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-150-69.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
1bab81b811e6dcacb932eade02e428b8e8f0a1dcadc1902b756df1f4cd18f83a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Origin
https://www.darkreading.com

Response headers

date
Sun, 10 Feb 2019 16:21:01 GMT
via
1.1 varnish (Varnish/5.0), 1.1 bc9bd2c59aa48e2932432099ba36a25b.cloudfront.net (CloudFront)
age
173193
x-cache
Hit from cloudfront
status
200
content-length
17689
server
Apache
etag
"1bab81b811e6dcacb932eade02e428b8e8f0a1dcadc1902b756df1f4cd18f83a"
x-varnish
441235
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
ytQnvy103cJr6DHttmouj0UY3bZMq91OV7RI6a0JnM14hNx550TnQA==
6_UOp4QH_normal.jpg
pbs.twimg.com/profile_images/942813607166844928/ Frame FCDF
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/942813607166844928/6_UOp4QH_normal.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
93.184.220.70 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40E6) /
Resource Hash
23abc1d4ee59e8e1d60ca323cccdf5054d65f0af54a768fcc26ba75d06c1c7ad
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-response-time
187
date
Tue, 12 Feb 2019 16:27:34 GMT
x-content-type-options
nosniff
surrogate-key
profile_images profile_images/bucket/0 profile_images/942813607166844928
last-modified
Mon, 18 Dec 2017 17:45:35 GMT
server
ECS (fcn/40E6)
access-control-allow-origin
*
x-cache
HIT
content-type
image/jpeg
status
200
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
e3cb848f5f3d5b72fbc66e54c55b1b39
accept-ranges
bytes
content-length
2035
www-widgetapi.js
s.ytimg.com/yts/jsbin/www-widgetapi-vflN2g023/ Frame FCDF
20 KB
8 KB
Script
General
Full URL
https://s.ytimg.com/yts/jsbin/www-widgetapi-vflN2g023/www-widgetapi.js
Requested by
Host: www.youtube.com
URL: https://www.youtube.com/player_api
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
d6d1f0f7c29c75c0bf3f35fdb95ef16b1ca016bce397885dcb56c6c8c0b8367f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 12 Feb 2019 15:48:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
2353
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
7738
x-xss-protection
1; mode=block
last-modified
Tue, 12 Feb 2019 12:52:39 GMT
server
sffe
vary
Accept-Encoding, Origin
content-type
text/javascript
cache-control
public, max-age=691200
accept-ranges
bytes
timing-allow-origin
https://www.youtube.com
expires
Wed, 20 Feb 2019 15:48:21 GMT
roundtrip.js
s.adroll.com/j/
32 KB
11 KB
Script
General
Full URL
https://s.adroll.com/j/roundtrip.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.211.1.39 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-211-1-39.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
1683cc734667c1dfc51beef0720d8bc1d085ffc37ad67f0bf02d41ba25ef7551

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
WKgVGNXri8HlRMKT77dpRv7GtBpB06oM
Content-Encoding
gzip
x-amz-request-id
7015D265DCFB0B0D
x-amz-server-side-encryption
AES256
Access-Control-Max-Age
600
Date
Tue, 12 Feb 2019 16:27:34 GMT
Connection
keep-alive
Content-Length
10234
x-amz-id-2
y6pIwMsOQvczUOjlcxKelEwfroty0qy/Jz7be8EzIktKblJ0jDM1m7CLyb8TLbTuLVmhGmCdEUI=
Last-Modified
Mon, 14 Jan 2019 20:17:40 GMT
Server
AmazonS3
ETag
"52bb7d50a9e1537cfef675909b897d91"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=3600, must-revalidate
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
TQSV74R4GVCSJITSZC2MCP
d.adroll.com/consent/check/
40 B
200 B
Script
General
Full URL
https://d.adroll.com/consent/check/TQSV74R4GVCSJITSZC2MCP?_s=476a625f53627fb6eb96916816ca2558
Requested by
Host: s.adroll.com
URL: https://s.adroll.com/j/roundtrip.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.220.0.18 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-220-0-18.eu-west-1.compute.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
6f43e1e85c42d5e449308701054501d9867a7254c9a8734406afbc89b3dfe5b4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 16:27:34 GMT
Server
nginx/1.12.1
Connection
keep-alive
Content-Length
40
Content-Type
application/javascript
consent.js
s.adroll.com/j/
67 KB
68 KB
Script
General
Full URL
https://s.adroll.com/j/consent.js
Requested by
Host: s.adroll.com
URL: https://s.adroll.com/j/roundtrip.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.211.1.39 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-211-1-39.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
4983cd18419e417077dcc013922828394049ce6c65db6a782d2d73f225d46089

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
yvF3y5OARyGYjZyuW4BqgiCbPvLhhPrH
x-amz-request-id
5D54463FD8D58601
x-amz-server-side-encryption
AES256
Date
Tue, 12 Feb 2019 16:27:34 GMT
Connection
keep-alive
Content-Length
68722
x-amz-id-2
TgiYRXIu+h64AhXrAYG33TUsRyvIta0K/6ZdJWeDi9xq5su2a4isOIDFq4QsB4TsS8oN5FHnL2s=
Last-Modified
Thu, 06 Dec 2018 16:37:43 GMT
Server
AmazonS3
ETag
"53cd26585ff224c6851303016ec98536"
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Content-Type
application/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=300, must-revalidate
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
hod
d.adroll.com/consent/
42 B
264 B
Image
General
Full URL
https://d.adroll.com/consent/hod?_e=view_banner&_s=476a625f53627fb6eb96916816ca2558&_b=626d9f6089ce68&_a=TQSV74R4GVCSJITSZC2MCP
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.220.0.18 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-220-0-18.eu-west-1.compute.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 12 Feb 2019 16:27:34 GMT
Cache-Control
no-transform,public,max-age=300,s-maxage=900
Server
nginx/1.12.1
Connection
keep-alive
Content-Length
42
Vary
Cookie
Content-Type
image/gif
jot.html
platform.twitter.com/ Frame 6625
Redirect Chain
  • https://syndication.twitter.com/i/jot
  • https://platform.twitter.com/jot.html
0
0
Document
General
Full URL
https://platform.twitter.com/jot.html
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40DB) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
Origin
null
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Accept-Ranges
bytes
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Tue, 12 Feb 2019 16:27:35 GMT
Etag
"d9592a6c704736fa4da218d4357976dd"
Last-Modified
Wed, 06 Feb 2019 23:37:50 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/40DB)
X-Cache
HIT
Content-Length
80

Redirect headers

status
302 302 Found
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
content-length
0
content-type
text/html;charset=utf-8
date
Tue, 12 Feb 2019 16:27:35 GMT
expires
Tue, 31 Mar 1981 05:00:00 GMT
last-modified
Tue, 12 Feb 2019 16:27:35 GMT
location
https://platform.twitter.com/jot.html
pragma
no-cache
server
tsa_b
strict-transport-security
max-age=631138519
x-connection-hash
6e6e5f4bfc4ef684a21d44339c407c48
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-response-time
16
x-transaction
007d721200d0f5dd
x-tsa-request-body-time
122
x-twitter-response-tags
BouncerCompliant
x-xss-protection
0
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiOjgsImNsaWVudFRpbWVzdGFtcCI6MTU0OTk4ODg1NC45MzEsIm5hbWUiOiJ2aWV3YWJsZTUwMSIsImNyaXRlcmlvbiI6eyJuYW1lIjoiNTAvMSIsInJhdGlvIjowLjUsInRpbWUiOjEwMDB9fV19?crc32c=1252777166
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.190.15 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-190-15.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Feb 2019 16:27:34 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiOjksImNsaWVudFRpbWVzdGFtcCI6MTU0OTk4ODg1NC45NTIsIm5hbWUiOiJ2aWV3YWJsZVRpbWUiLCJmcm9tIjoxNTQ5OTg4ODUzLjg4OSwidG8iOjE1NDk5ODg4NTQuOTQ1fV19?crc32c=1757041963
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.233.187.252 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-233-187-252.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Feb 2019 16:27:35 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiOjEwLCJjbGllbnRUaW1lc3RhbXAiOjE1NDk5ODg4NTUuOTY5LCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU0OTk4ODg1NC45NDUsInRvIjoxNTQ5OTg4ODU1Ljk1M31dfQ==?crc32c=4047752837
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.233.187.252 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-233-187-252.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Feb 2019 16:27:36 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiOjExLCJjbGllbnRUaW1lc3RhbXAiOjE1NDk5ODg4NTYuOTkxLCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU0OTk4ODg1NS45NTMsInRvIjoxNTQ5OTg4ODU2Ljk3fV19?crc32c=3636859969
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.233.187.252 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-233-187-252.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Feb 2019 16:27:37 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiOjEyLCJjbGllbnRUaW1lc3RhbXAiOjE1NDk5ODg4NTkuMDA4LCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU0OTk4ODg1Ni45NywidG8iOjE1NDk5ODg4NTguOTkzfV19?crc32c=1269953145
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.233.187.252 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-233-187-252.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Feb 2019 16:27:39 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiOjEzLCJjbGllbnRUaW1lc3RhbXAiOjE1NDk5ODg4NjEuMDIyLCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU0OTk4ODg1OC45OTMsInRvIjoxNTQ5OTg4ODYxLjAxNH1dfQ==?crc32c=2166607854
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.233.187.252 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-233-187-252.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Feb 2019 16:27:41 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiOjE0LCJjbGllbnRUaW1lc3RhbXAiOjE1NDk5ODg4NjMuMDM1LCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU0OTk4ODg2MS4wMTQsInRvIjoxNTQ5OTg4ODYzLjAyNH1dfQ==?crc32c=1683520100
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.233.187.252 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-233-187-252.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Feb 2019 16:27:43 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTQ5OTg4ODUweDJkMDI2Y2IzMmM3NjMyeDMwOTk0MDA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiI4ODAxNDI2MzQ3NDI2NzEzIiwiaW5kZXgiOjE1LCJjbGllbnRUaW1lc3RhbXAiOjE1NDk5ODg4NjUuMDU5LCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU0OTk4ODg2My4wMjQsInRvIjoxNTQ5OTg4ODY1LjA0Mn1dfQ==?crc32c=786484463
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.233.187.252 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-233-187-252.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/ransomware-attack-via-msp-locks-customers-out-of-systems/d/d-id/1333825
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Feb 2019 16:27:45 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0

Verdicts & Comments Add Verdict or Comment

441 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask function| displayDefaultNativeAd function| displayNativeAd function| displayLandingPageNativeAd function| displaySecondLandingPageNativeAd function| displayArticleNativeAd function| displayInsightAd function| displaySASInsightAd object| respond string| theSiteDomain string| theMsgChatQueueInclude string| theChatStatusInclude boolean| doHideShowDivOpacityFade function| MM_swapImgRestore function| MM_preloadImages function| MM_findObj function| MM_swapImage function| MM_openBrWindow function| SwitchColor function| MakeDark function| MakeLight string| pop_collection string| pop_styleObj function| GetObject function| SwitchHTML function| SwitchDivs function| HideDiv function| ShowDiv function| URLEncodeString object| opacitySliderTimeouts function| SlideObjOpacity function| ChangeObjOpacity object| heightSliderTimeouts function| SlideObjHeight function| ChangeObjHeight function| ClearTimeoutArray function| AttachEventFunctionToObject function| RemoveEventFunctionFromObject function| SetCookie function| GetCookie function| AlignObject function| MoveObject function| MoveDivToColTop function| AddEventListenerToObj function| ContentNotifyPrefsShortSubmit function| ContentNotifyPrefsShortGenerateAndDisplayRSSFeed function| RedirectConfirm function| blend function| returnPosYofObj function| returnPosXofObj function| returnCurrentWindowYOffset function| returnCurrentWindowXOffset object| menuMoverTimeouts number| menuMoverTimeoutCounter number| menuMaxOpacity function| ShowMenu function| ChangeObjectLeft function| ChangeObjectTop function| NumStepsToMove function| AddPopMenuEventListener boolean| lockPoppedMenu string| lockedPoppedMenuObjName function| PopMenu object| closeMenuTimeouts number| closeMenuTimeoutCounter function| PopMenuOff number| globalPopXDiff number| globalPopYDiff function| createSubmenu function| LRSliderHandler string| active_pop_collection string| active_pop_styleObj function| GetActiveObject function| PrintActiveContent function| LoadScript function| RemoveScript string| theRateLink function| ShowRateMenu function| ShowSaveInfo function| HideSaveInfo function| HideRateMenu function| RateThis function| ChangeRateMenuFormParam function| BuildAndLoadRateMenuScript function| ClearRateMenuForm function| ClearRateLink function| ContentConsumptionLoggedSuccess function| ContentSignUpLoggedSuccess function| ObjectFader function| PageEffectPopUp function| returnWidthofObj function| cookiesEnabled boolean| pop_ns4 boolean| pop_dom boolean| active_pop_ns4 boolean| active_pop_dom function| $ function| jQuery function| displayWhatsThisBox function| displayPartnerPerspectivesBox function| displayMalwareBytesPartnerPerspectivesBox function| displayEvidentioPartnerPerspectivesBox function| displayF5PartnerPerspectivesBox function| displayBitdefenderPartnerPerspectivesBox function| displayGeneralDynamicsFidelisPartnerPerspectivesBox function| displayPartnerPerspectivesBoxArticle function| displayMalwareBytesPartnerPerspectivesBoxArticle function| displayGigamonPartnerPerspectivesBoxArticle function| displayAuthorInfoBox function| highlightTopStory function| showMobileIconOverlay function| closeMobileOverlayMenu function| goToByScroll function| ToggleNavButtonMenu function| ToggleNavButton object| designlinesSliderHandler string| designlinesLeftArrowButtonMouseoutImgSrc string| designlinesRightArrowButtonMouseoutImgSrc number| oneScrollHeight number| currentTickerItem number| numberOfTickerItems boolean| tickerIsPopulated undefined| tickerTimeout boolean| tickerStopped function| InitializeNewsTicker function| RotateNewsTicker function| StartNewsTicker function| StopNewsTicker boolean| superNavEventsMenuOpen function| ToggleSuperNavEventsMenu function| swipeleftHandler function| swiperightHandler function| tapholdHandler function| tapholdOutHandler function| sizeAnyBrightcoveObjects function| sizeDocImageClass object| jQuery1110021839648719935334 object| visitor function| Visitor object| s_c_il number| s_c_in object| adobe object| _AT function| mboxCreate function| mboxDefine function| mboxUpdate string| thePageTitle string| ngenv string| ngserv string| omn_regtrackproduct string| omn_nltrackproduct function| CSBJs_Core function| CSBJs_OOP function| CSBJs_Resources function| CSBJs_ServiceRequest function| CSBJs_Exception function| CSBJs_Ajax function| CSBJs_Decorator function| CSBJs_Decorator_HtmlNode function| CSBJs_App function| CSBJs_App_Window function| CSBJs_App_Window_Modal function| CSBJs_App_Window_Alert function| CSBJs_App_Button function| CSBJs_App_Html function| CSBJs_App_Field function| CSBJs_App_Field_File function| CSBJs_App_Field_TextArea function| CSBJs_Timer function| CSBJs_Form function| CSBJs_Form_Group function| CSBJs_Form_Step function| CSBJs_Form_Element function| CSBJs_Form_Element_Html function| CSBJs_Form_Element_Image function| CSBJs_Form_Element_TextField function| CSBJs_Form_Element_OtherTextField function| CSBJs_Form_Element_Submit function| CSBJs_Form_Element_NextStep function| CSBJs_Form_Element_PreviousStep function| CSBJs_Form_Element_Reset function| CSBJs_Form_Element_Multi function| CSBJs_Form_Element_Select function| CSBJs_Form_Element_Password function| CSBJs_Form_Element_Dynamic function| CSBJs_Form_Element_Hidden function| CSBJs_Form_Element_Checkbox function| CSBJs_Form_Element_Checkboxes function| CSBJs_Form_Element_Radio function| CSBJs_Form_Element_TextArea function| CSBJs_Form_Validation function| CSBJs_Form_Validation_Regex function| CSBJs_Form_Validation_CompareEqual function| CSBJs_Form_Validation_Required function| CSBJs_Form_Validation_JsFunction function| CSBJs_Form_Validation_Ajax function| CSBJs_Form_Validation_JsonP function| CSBJs_Form_Observer function| CSBJs_Form_Observer_Action function| CSBJs_Form_Observer_Action_Hide function| CSBJs_Form_Observer_Action_ChangeDynamic function| CSBJs_Form_Filter function| CSBJs_Form_Filter_Replace function| UBM function| rcCallback string| siteLogo string| privacyLogo string| privacyText string| loginRedirectURL string| loginNextAction string| securityJobAction boolean| reloadOnClose object| ngconfig string| regHeaderContent string| regAction string| ngRegAsset object| loginWidget object| registrationWidget object| updateWidget object| optoutWidget object| newsletterWidget object| newsletterSignupWidget object| externalAuthSuppWidget function| openRegisterThanks function| login function| verifyToken function| securityJobsFromUpdate function| securityJobs function| loginWithMessage function| changePassword function| openForm function| updateForm function| newsletterForm function| newsletterSignupForm function| extAuthSuppForm function| ngLogoutUser function| ngCreateCookie function| ngRreadCookie function| ngEraseCookie function| trackShortRegistrationOpen function| trackSocialMediaBasicRegistration function| trackLongRegistrationOpen function| trackLoginOpen function| trackLoginSuccess function| trackPasswordResetOpen function| trackNewsletterPrefsOpen function| trackNewsletterPrefsConfirm function| trackShortRegistrationConfirm function| trackRegistrationThankYou object| welcomeLinks number| loginCheck string| loginHTML string| loginHTMLMobile function| initGatewayCheck function| setNGReg function| SubmitInPageSurvey number| _doubleclickRand function| jobalert object| _gaq object| _AdsNativeOpts object| googletag object| gptadslots object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleTokenSync object| GPT_jstiming undefined| google_measure_js_timing object| google_reactive_ads_global_state boolean| google_noFetch boolean| google_DisableInitialLoad number| __google_ad_urls_id function| $an function| an_jQuery function| md5 string| txt function| AdsNative function| an_callback_lookup object| _AdsNative object| _comscore function| fbq function| _fbq number| google_unique_id object| gaGlobal object| google_conversion_id object| google_custom_params object| google_remarketing_only function| GooglemKTybQhCsO object| google_conversion_date object| google_conversion_time number| google_conversion_snippets number| google_conversion_first_time object| google_conversion_js_version object| google_conversion_format object| google_enable_display_cookie_match object| google_conversion_type object| google_conversion_order_id object| google_conversion_language object| google_conversion_value object| google_conversion_evaluemrc object| google_conversion_currency object| google_conversion_domain object| google_conversion_label object| google_conversion_color object| google_disable_viewthrough object| google_gtag_event_data object| google_conversion_linker object| google_tag_for_child_directed_treatment object| google_tag_for_under_age_of_consent object| google_allow_ad_personalization_signals object| google_conversion_items object| google_conversion_merchant_id object| google_user_id object| onload_callback object| opt_image_generator object| google_conversion_page_url object| google_conversion_referrer_url object| google_gtm object| google_gcl_cookie_prefix object| google_read_gcl_cookie_opt_out object| google_basket_feed_country object| google_basket_feed_language object| google_basket_discount object| google_basket_transaction_type object| google_disable_merchant_reported_conversions object| google_additional_conversion_params object| uetq object| _gat object| ___grecaptcha_cfg object| grecaptcha boolean| __google_recaptcha_client object| heatmap function| udm_ object| ns_p object| COMSCORE object| FB function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter object| __google_ad_urls object| interstitialBox_4490350311138217035443 boolean| google_osd_loaded boolean| google_onload_fired object| ampInaboxIframes object| ampInaboxPendingMessages function| UET object| AMP_CONFIG object| log object| AMPErrors boolean| ampInaboxInitialized object| AMP_MODE function| reportError object| AMP object| __core-js_shared__ function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| recaptcha object| __twttrll object| twttr object| __twttr function| FlipboardWidgets object| Sslac object| IN function| Togglehottopicseditorschoice object| lwvalues string| valueToUselw function| Toggleliveeventswebinarslive object| video_reportsSliderHandler string| video_reportsLeftArrowButtonMouseoutImgSrc string| video_reportsRightArrowButtonMouseoutImgSrc string| elqSiteID string| elqVer string| elqERoot string| elqSecERoot function| elqErr string| elqCurESite string| elqAltESite number| elqWCount boolean| elqTryI string| elqStr object| elqTID boolean| elqTRun boolean| elqLoad boolean| elqFail string| elqCurE function| elqClearT function| elqWrite function| elqInit function| elqReplace function| elqQString function| elqAddQS object| _elqQ function| postIframe function| ad_block_test string| s_account object| s string| SCCodeVersion function| s_doPlugins function| getHier function| s_getLoadTime function| AppMeasurement_Module_ActivityMap function| AppMeasurement function| s_gi function| s_pgicq number| s_objectID number| s_giq undefined| s_code string| s_hour string| s_day string| s_timepart number| s_loadT string| x number| y number| d object| eo string| f0 object| s_i_cmpglobalvista string| thispage_sharelink string| adroll_adv_id string| adroll_pix_id string| adroll_segments boolean| recaptchaReady object| teadsscript object| _elq object| teads object| __CELTRA boolean| __adroll_loaded string| adroll_sid object| __adroll boolean| adroll_optout object| adroll_ext_network object| adroll_callbacks function| adroll_tpc_callback object| __adroll_consent boolean| __adroll_consent_is_gdpr object| $jscomp string| BANNER_VERSION object| __adroll_consent_banner

0 Cookies

9 Console Messages

Source Level URL
Text
console-api info URL: https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js(Line 544)
Message:
Powered by AMP ⚡ HTML – Version 1901312147090
console-api error URL: https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js(Line 137)
Message:
localStorage not supported.
console-api info URL: https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js(Line 544)
Message:
Powered by AMP ⚡ HTML – Version 1901312147090
console-api error URL: https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js(Line 137)
Message:
localStorage not supported.
console-api info URL: https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js(Line 544)
Message:
Powered by AMP ⚡ HTML – Version 1901312147090
console-api error URL: https://cdn.ampproject.org/rtv/011901312147090/amp4ads-v0.js(Line 137)
Message:
localStorage not supported.
console-api info URL: https://platform.twitter.com/widgets.js(Line 1)
Message:
You may have been affected by an update to settings in embedded timelines. See https://twittercommunity.com/t/deprecating-widget-settings/102295.
console-api log URL: https://twimgs.com/nojitter/js/dev_adBlockerTrack.js?v1(Line 47)
Message:
15
console-api log URL: https://twimgs.com/nojitter/js/dev_adBlockerTrack.js?v1(Line 49)
Message:
false

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Frame-Options SAMEORIGIN

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

a.teads.tv
ads.celtra.com
adservice.google.de
amp-error-reporting.appspot.com
api-cache.adsnative.com
bat.bing.com
cache-ssl.celtra.com
cdn.ampproject.org
cdn.flipboard.com
cdn.syndication.twimg.com
cf-images.us-east-1.prod.boltdns.net
cm.everesttech.net
cmp.teads.mgr.consensu.org
connect.facebook.net
d.adroll.com
dpm.demdex.net
dsimg.ubm-us.net
epromos.ubmcanon.com
fonts.googleapis.com
fonts.gstatic.com
fpn.flipboard.com
googleads.g.doubleclick.net
i.ubm-us.net
img.deusm.com
img.en25.com
img.lightreading.com
ng.techweb.com
pagead2.googlesyndication.com
pbs.twimg.com
platform.linkedin.com
platform.twitter.com
rudy.adsnative.com
s.adroll.com
s.ytimg.com
s2150.t.eloqua.com
s657486201.t.eloqua.com
sb.scorecardresearch.com
securepubads.g.doubleclick.net
ssl.google-analytics.com
static.adsnative.com
staticxx.facebook.com
sync.teads.tv
syndication.twitter.com
t.cwkuki.com
t.teads.tv
ton.twimg.com
tpc.googlesyndication.com
track.celtra.com
twimgs.com
u.heatmap.it
ubm.demdex.net
ubm.tt.omtrdc.net
ubmtech.d3.sc.omtrdc.net
www.darkreading.com
www.facebook.com
www.google.com
www.google.de
www.googleadservices.com
www.googletagservices.com
www.gstatic.com
www.youtube.com
142.0.160.13
151.139.239.5
172.217.18.2
172.82.228.18
184.31.90.134
199.16.156.21
2.18.232.7
204.79.197.200
209.167.231.17
216.58.207.66
23.111.11.217
23.211.0.4
23.211.1.39
23.211.8.12
23.43.115.95
2600:9000:200c:7c00:14:85db:2b40:93a1
2600:9000:200c:fc00:e:5a70:ca47:86e1
2606:2800:134:1a0d:1429:742:782:b6
2606:2800:234:59:254c:406:2366:268c
2606:2800:234:b6ab:6556:9a85:ba61:ee81
2606:4700:20::6818:552
2606:4700:30::6818:7875
2606:4700:30::681b:8a16
2606:4700:30::681f:5172
2606:4700::6811:7763
2606:4700::6813:f508
2620:103::192:155:48:119
2a00:1450:4001:806::200e
2a00:1450:4001:808::2001
2a00:1450:4001:809::2004
2a00:1450:4001:80b::2014
2a00:1450:4001:814::2008
2a00:1450:4001:814::200a
2a00:1450:4001:815::2003
2a00:1450:4001:81a::2002
2a00:1450:4001:81d::2002
2a00:1450:4001:81f::2002
2a00:1450:4001:81f::2003
2a00:1450:4001:820::2001
2a00:1450:4001:820::2002
2a00:1450:4001:825::2003
2a00:1450:4001:825::200e
2a02:26f0:6c00:293::2c92
2a03:2880:f01c:216:face:b00c:0:3
2a03:2880:f11c:8083:face:b00c:0:25de
34.233.187.252
46.105.202.39
52.202.190.15
52.213.106.142
52.222.150.144
52.222.150.151
52.222.150.69
52.222.152.30
52.59.88.202
54.146.200.135
54.194.108.5
54.220.0.18
66.117.28.86
66.117.29.11
93.184.220.70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