loginapp-updatededonline.systemlinkeds.workers.dev
Open in
urlscan Pro
2606:4700:3032::ac43:ad7b
Malicious Activity!
Public Scan
Effective URL: https://loginapp-updatededonline.systemlinkeds.workers.dev/sso/login/wicket:interface/eedyr/:0:loginUnifiedPanel:loginForm::IFormSubmitListener::
Submission Tags: @phish_report
Submission: On January 28 via api from FI — Scanned from NL
Summary
TLS certificate: Issued by GTS CA 1P5 on January 27th 2024. Valid for: 3 months.
This is the only time loginapp-updatededonline.systemlinkeds.workers.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BDO Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2a06:98c1:312... 2a06:98c1:3121::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 7 | 2606:4700:303... 2606:4700:3032::ac43:ad7b | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
7 | 23.37.34.2 23.37.34.2 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
13 | 2 |
ASN13335 (CLOUDFLARENET, US)
loginapp-updatededonline.systemlinkeds.workers.dev |
ASN16625 (AKAMAI-AS, US)
PTR: a23-37-34-2.deploy.static.akamaitechnologies.com
online.bdo.com.ph |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
bdo.com.ph
online.bdo.com.ph — Cisco Umbrella Rank: 333012 |
123 KB |
7 |
workers.dev
1 redirects
loginapp-updatededonline.systemlinkeds.workers.dev |
33 KB |
1 |
shot.vin
1 redirects
shot.vin |
934 B |
13 | 3 |
Domain | Requested by | |
---|---|---|
7 | online.bdo.com.ph |
loginapp-updatededonline.systemlinkeds.workers.dev
|
7 | loginapp-updatededonline.systemlinkeds.workers.dev |
1 redirects
loginapp-updatededonline.systemlinkeds.workers.dev
|
1 | shot.vin | 1 redirects |
13 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
systemlinkeds.workers.dev GTS CA 1P5 |
2024-01-27 - 2024-04-26 |
3 months | crt.sh |
www.bdo.com.ph DigiCert SHA2 Extended Validation Server CA |
2024-01-16 - 2024-02-07 |
23 days | crt.sh |
This page contains 1 frames:
Primary Page:
https://loginapp-updatededonline.systemlinkeds.workers.dev/sso/login/wicket:interface/eedyr/:0:loginUnifiedPanel:loginForm::IFormSubmitListener::
Frame ID: 0754C07211AD12F93920DB821F5EE427
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
Banco De OroPage URL History Show full URLs
-
http://shot.vin/BdoApp_Verify
HTTP 301
https://loginapp-updatededonline.systemlinkeds.workers.dev/redirect HTTP 302
https://loginapp-updatededonline.systemlinkeds.workers.dev/sso/login/wicket:interface/eedyr/:0:loginUnifiedPanel:loginForm::IFormSubmit... Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- jquery-ui.*\.js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://shot.vin/BdoApp_Verify
HTTP 301
https://loginapp-updatededonline.systemlinkeds.workers.dev/redirect HTTP 302
https://loginapp-updatededonline.systemlinkeds.workers.dev/sso/login/wicket:interface/eedyr/:0:loginUnifiedPanel:loginForm::IFormSubmitListener:: Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
:0:loginUnifiedPanel:loginForm::IFormSubmitListener::
loginapp-updatededonline.systemlinkeds.workers.dev/sso/login/wicket:interface/eedyr/ Redirect Chain
|
32 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
loginid.css
loginapp-updatededonline.systemlinkeds.workers.dev/resources/com.ccti.citrine.sso.web.login.LoginUnifiedPage/css/ |
64 KB 12 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
component.style.css
loginapp-updatededonline.systemlinkeds.workers.dev/resources/com.ccti.citrine.sso.CitrineUnifiedLoginApplication/web/css/ |
16 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui-1.8.2.custom.css
online.bdo.com.ph/sso/resources/com.ccti.citrine.sso.CitrineUnifiedLoginApplication/web/themes/theme-bdo/ |
31 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.4.2.min.js
online.bdo.com.ph/sso/resources/org.odlabs.wiquery.core.commons.CoreJavaScriptResourceReference/jquery/ |
70 KB 25 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
ui.core.min.js
loginapp-updatededonline.systemlinkeds.workers.dev/resources/org.odlabs.wiquery.ui.core.CoreUIJavaScriptResourceReference/ |
8 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
ccti.js
loginapp-updatededonline.systemlinkeds.workers.dev/resources/com.ccti.base.web.js.BaseJavascriptBehavior/ |
17 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
base.css
loginapp-updatededonline.systemlinkeds.workers.dev/resources/com.ccti.base.web.js.BaseJavascriptBehavior/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.rc4.js
online.bdo.com.ph/sso/resources/com.ccti.base.web.js.jquery.rc4.PasswordEncryptionBehavior/ |
5 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
profile-white.png
online.bdo.com.ph/sso/resources/com.ccti.citrine.sso.web.login.LoginUnifiedPage/css/ |
20 KB 20 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bdo-logo.jpg
online.bdo.com.ph/sso/resources/com.ccti.citrine.sso.web.login.LoginUnifiedPage/css/ |
35 KB 36 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arrow-white.png
online.bdo.com.ph/sso/resources/com.ccti.citrine.sso.web.login.LoginUnifiedPage/css/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Login_Advisory_1.png
online.bdo.com.ph/sso/resources/com.ccti.citrine.sso.web.login.LoginUnifiedPage/css/ |
25 KB 26 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BDO Bank (Banking)37 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| SXI function| hideSideTips2 function| initializePage function| initializeFormComponents function| initializeModal function| decorateTextBoxes function| toggleSearchList function| initializeSearchButtons function| initializeSearchModalButtons function| initializeDeleteMultipleButtons function| initializeSelectMultipleButtons function| emptyOverridePanel function| hideSideTips function| clearFeedback function| initializeDatepicker function| toggleCheckboxes function| setupFunc function| hideBusysign function| showBusysign function| clickFunc function| checkHref function| SelectAll function| imposeJSMaxLength function| imposeMaxLength function| initializeUI function| constrainTableWidth function| fixTableWidth function| getTableWidth function| showErrorMessage function| redirectOnError function| bindKeypressBehavior function| asdf function| clearPassword object| textboxes boolean| proceed0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
loginapp-updatededonline.systemlinkeds.workers.dev
online.bdo.com.ph
shot.vin
23.37.34.2
2606:4700:3032::ac43:ad7b
2a06:98c1:3121::3
29f672b7e49992f1017f9ecb93ab9dc011866f0bfb3231bf5755e41bb571445e
2e0c1f1bf15a4f9090343c206442cbadd45d5e01b079dc673fac77851a95d020
328d300e2048d2554bee8bd5a6e157eef91c5b24bc518fd67546c1cbd6e0efe4
3344cd39965187255bccb7ad24c99ee18526962edab7a4e7ee5c318bcde18bc7
3e72af5babd1f7f1077a4091d1ced174710e72a7bd5047a8826bd5dac5412cce
5225eebca373ae103c2e83513cb277b4eecd319df532a4bb41868a20341e71fe
6f00354f9cf6e97202404904515633aee9f5a5ef27f8b0c8386e24ceabc768be
77c0bd6969615670ebfa974cf73555ba238c28cfc88709213aa4f38aac51ca40
877a35ef37e3b8581c24f44fb4af98a7482926be7c77e887dbc7311544efbbae
a59f5f38a7270239dc531964285e97bfb3fb41396b4b5d90d092ecab511c1354
b251a887a7e03b38996ee85feb93cfbb423e6af5c8342ca331f743dafafdf223
deaf9fe05c5b41c9c6132ed36ecf40f69e9825a0d2d1845721ef3ae4dcf34b3f
e17ae9c26c4f360fcaef638b4adae6303305b1d7293c1b074d0258c4e3c9db9a