![](/screenshots/cf0c3293-55b8-440b-a288-63c45a8baf5d.png)
asc.research.mcgill.ca
Open in
urlscan Pro
132.206.27.20
Malicious Activity!
Public Scan
Submission Tags: @phish_report
Submission: On June 18 via api from FI — Scanned from CA
Summary
TLS certificate: Issued by R3 on June 2nd 2024. Valid for: 3 months.
This is the only time asc.research.mcgill.ca was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Juno (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 132.206.27.20 132.206.27.20 | 376 (RISQ-AS) (RISQ-AS) | |
10 | 1 |
ASN376 (RISQ-AS, CA)
PTR: dvhost.mcgill.ca
asc.research.mcgill.ca |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
mcgill.ca
asc.research.mcgill.ca |
70 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
10 | asc.research.mcgill.ca |
asc.research.mcgill.ca
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
asc.research.mcgill.ca R3 |
2024-06-02 - 2024-08-31 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://asc.research.mcgill.ca/WAMI/img/satisfying/src/
Frame ID: 0D8B68B6174C3CCFBCB69421E724A09B
Requests: 10 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
asc.research.mcgill.ca/WAMI/img/satisfying/src/ |
7 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
common-j.css
asc.research.mcgill.ca/WAMI/img/satisfying/src/ |
51 KB 51 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
j_logo-black.gif
asc.research.mcgill.ca/WAMI/img/satisfying/src/ |
4 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
j_sign-in-btn.gif
asc.research.mcgill.ca/WAMI/img/satisfying/src/ |
2 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
j_signin-issue.gif
asc.research.mcgill.ca/WAMI/img/satisfying/src/ |
470 B 712 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
j_netzero-store.gif
asc.research.mcgill.ca/WAMI/img/satisfying/src/ |
402 B 644 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pv.gif
asc.research.mcgill.ca/WAMI/img/satisfying/src/ |
43 B 284 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
common-print.css
asc.research.mcgill.ca/WAMI/img/satisfying/src/ |
388 B 628 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
j_header-keyline.gif
asc.research.mcgill.ca/WAMI/img/satisfying/src/ |
1 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
webicon_j.ico
asc.research.mcgill.ca/WAMI/img/satisfying/src/ |
1 KB 2 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Juno (Telecommunication)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
undefined| event object| fence object| sharedStorage0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
asc.research.mcgill.ca
132.206.27.20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