URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_me...
Submission: On May 12 via manual from IN

Summary

This website contacted 49 IPs in 8 countries across 39 domains to perform 224 HTTP transactions. The main IP is 35.173.160.135, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is threatpost.com.
TLS certificate: Issued by Thawte EV RSA CA 2018 on June 17th 2019. Valid for: a year.
This is the only time threatpost.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
19 35.173.160.135 14618 (AMAZON-AES)
11 52.222.190.120 16509 (AMAZON-02)
5 2606:4700:303... 13335 (CLOUDFLAR...)
12 2a00:1450:400... 15169 (GOOGLE)
8 2600:9000:215... 16509 (AMAZON-02)
11 2600:9000:20e... 16509 (AMAZON-02)
1 7 2a00:1450:400... 15169 (GOOGLE)
25 185.220.205.220 41436 (CLOUDWEBM...)
6 172.217.18.98 15169 (GOOGLE)
24 2a00:1450:400... 15169 (GOOGLE)
4 69.173.144.143 26667 (RUBICONPR...)
3 23.210.249.164 16625 (AKAMAI-AS)
1 72.251.249.9 29791 (VOXEL-DOT...)
4 37.252.173.38 29990 (ASN-APPNEX)
5 34.95.120.147 15169 (GOOGLE)
1 167.172.1.14 14061 (DIGITALOC...)
10 15 2606:2800:233... 15133 (EDGECAST)
4 185.64.189.112 62713 (AS-PUBMATIC)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2 2a00:1450:400... 15169 (GOOGLE)
1 91.228.74.152 27281 (QUANTCAST)
1 151.101.12.157 54113 (FASTLY)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 104.244.42.197 13414 (TWITTER)
11 2a00:1450:400... 15169 (GOOGLE)
1 2600:9000:20e... 16509 (AMAZON-02)
2 143.204.90.242 16509 (AMAZON-02)
2 2a00:1450:400... 15169 (GOOGLE)
4 23.210.249.92 16625 (AKAMAI-AS)
11 185.167.96.211 41436 (CLOUDWEBM...)
1 2 52.58.23.168 16509 (AMAZON-02)
1 1 138.201.86.121 24940 (HETZNER-AS)
1 2a00:1450:400... 15169 (GOOGLE)
1 2 91.228.74.169 27281 (QUANTCAST)
4 18.184.66.147 16509 (AMAZON-02)
4 2a00:1450:400... 15169 (GOOGLE)
1 104.244.42.131 13414 (TWITTER)
1 2a03:2880:f01... 32934 (FACEBOOK)
1 2a05:f500:10:... 14413 (LINKEDIN)
1 199.232.53.140 54113 (FASTLY)
4 52.57.231.210 16509 (AMAZON-02)
2 151.101.113.108 54113 (FASTLY)
2 104.111.230.142 16625 (AKAMAI-AS)
2 3 34.249.135.160 16509 (AMAZON-02)
5 5 54.93.140.209 16509 (AMAZON-02)
1 5 18.156.0.31 16509 (AMAZON-02)
1 2 2a00:1288:110... 34010 (YAHOO-IRD)
1 1 172.217.16.130 15169 (GOOGLE)
1 1 165.227.252.242 14061 (DIGITALOC...)
1 205.185.216.10 20446 (HIGHWINDS3)
1 2a02:fa8:8806... 41041 (VCLK-EU-)
224 49
Apex Domain
Subdomains
Transfer
37 threatpost.com
threatpost.com
assets.threatpost.com
media.threatpost.com
999 KB
36 sekindo.com
live.sekindo.com
video.sekindo.com
514 KB
28 googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
406 KB
24 advertising.com
adserver-us.adtech.advertising.com
ads.adaptv.advertising.com
pixel.advertising.com
11 KB
12 doubleclick.net
securepubads.g.doubleclick.net
stats.g.doubleclick.net
googleads.g.doubleclick.net
cm.g.doubleclick.net
96 KB
11 adlightning.com
tagan.adlightning.com
280 KB
10 rubiconproject.com
fastlane.rubiconproject.com
prebid-server.rubiconproject.com
eus.rubiconproject.com
5 KB
10 google.com
www.google.com
adservice.google.com
2 KB
8 pubmatic.com
hbopenbid.pubmatic.com
ads.pubmatic.com
292 B
8 googletagservices.com
www.googletagservices.com
207 KB
7 yahoo.com
ups.analytics.yahoo.com
pr-bh.ybp.yahoo.com
6 KB
6 adnxs.com
ib.adnxs.com
acdn.adnxs.com
3 KB
5 openx.net
teachingaids-d.openx.net
u.openx.net
eu-u.openx.net
1 KB
5 google.de
adservice.google.de
www.google.de
797 B
5 admetricspro.com
qd.admetricspro.com
163 KB
4 ampproject.org
cdn.ampproject.org
150 KB
3 adsrvr.org
match.adsrvr.org
1 KB
3 quantserve.com
secure.quantserve.com
pixel.quantserve.com
9 KB
3 casalemedia.com
as-sec.casalemedia.com
3 KB
2 bidswitch.net
x.bidswitch.net
914 B
2 googleapis.com
fonts.googleapis.com
1 KB
2 amazon-adsystem.com
c.amazon-adsystem.com
29 KB
2 google-analytics.com
www.google-analytics.com
18 KB
2 gstatic.com
www.gstatic.com
fonts.gstatic.com
132 KB
2 serverbid.com
e.serverbid.com
sync.serverbid.com
267 B
1 dotomi.com
aol-match.dotomi.com
104 B
1 digitaloceanspaces.com
serverbid-sync.nyc3.cdn.digitaloceanspaces.com
1 reddit.com
www.reddit.com
3 KB
1 linkedin.com
www.linkedin.com
1 facebook.com
graph.facebook.com
450 B
1 twitter.com
analytics.twitter.com
385 B
1 loopme.me
csync.loopme.me
225 B
1 quantcount.com
rules.quantcount.com
354 B
1 t.co
t.co
449 B
1 ads-twitter.com
static.ads-twitter.com
2 KB
1 googletagmanager.com
www.googletagmanager.com
35 KB
1 lijit.com
ap.lijit.com
702 B
1 kasperskycontenthub.com
kasperskycontenthub.com
398 B
0 adap.tv Failed
sync.adap.tv Failed
224 39
Domain Requested by
25 live.sekindo.com threatpost.com
live.sekindo.com
18 threatpost.com threatpost.com
securepubads.g.doubleclick.net
17 pagead2.googlesyndication.com tagan.adlightning.com
threatpost.com
pagead2.googlesyndication.com
securepubads.g.doubleclick.net
15 adserver-us.adtech.advertising.com 10 redirects threatpost.com
11 video.sekindo.com threatpost.com
11 tpc.googlesyndication.com tagan.adlightning.com
threatpost.com
cdn.ampproject.org
11 media.threatpost.com threatpost.com
11 tagan.adlightning.com threatpost.com
tagan.adlightning.com
8 assets.threatpost.com threatpost.com
8 www.googletagservices.com threatpost.com
tagan.adlightning.com
securepubads.g.doubleclick.net
7 www.google.com 1 redirects threatpost.com
tagan.adlightning.com
6 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
threatpost.com
5 ups.analytics.yahoo.com 1 redirects threatpost.com
5 pixel.advertising.com 5 redirects
5 qd.admetricspro.com threatpost.com
4 googleads.g.doubleclick.net tagan.adlightning.com
4 prebid-server.rubiconproject.com live.sekindo.com
4 cdn.ampproject.org securepubads.g.doubleclick.net
threatpost.com
4 ads.adaptv.advertising.com live.sekindo.com
4 ads.pubmatic.com live.sekindo.com
qd.admetricspro.com
4 hbopenbid.pubmatic.com qd.admetricspro.com
live.sekindo.com
4 ib.adnxs.com qd.admetricspro.com
live.sekindo.com
4 fastlane.rubiconproject.com qd.admetricspro.com
4 adservice.google.de tagan.adlightning.com
3 match.adsrvr.org 2 redirects threatpost.com
3 adservice.google.com tagan.adlightning.com
3 teachingaids-d.openx.net qd.admetricspro.com
live.sekindo.com
3 as-sec.casalemedia.com qd.admetricspro.com
live.sekindo.com
2 pr-bh.ybp.yahoo.com 1 redirects threatpost.com
2 eus.rubiconproject.com live.sekindo.com
qd.admetricspro.com
2 acdn.adnxs.com live.sekindo.com
qd.admetricspro.com
2 pixel.quantserve.com 1 redirects threatpost.com
2 x.bidswitch.net 1 redirects threatpost.com
2 fonts.googleapis.com live.sekindo.com
2 c.amazon-adsystem.com live.sekindo.com
c.amazon-adsystem.com
2 www.google-analytics.com 1 redirects www.googletagmanager.com
1 aol-match.dotomi.com threatpost.com
1 serverbid-sync.nyc3.cdn.digitaloceanspaces.com qd.admetricspro.com
1 sync.serverbid.com 1 redirects
1 eu-u.openx.net qd.admetricspro.com
1 cm.g.doubleclick.net 1 redirects
1 u.openx.net live.sekindo.com
1 www.reddit.com threatpost.com
1 www.linkedin.com threatpost.com
1 graph.facebook.com threatpost.com
1 analytics.twitter.com tagan.adlightning.com
1 fonts.gstatic.com live.sekindo.com
1 csync.loopme.me 1 redirects
1 rules.quantcount.com secure.quantserve.com
1 t.co threatpost.com
1 www.google.de threatpost.com
1 stats.g.doubleclick.net 1 redirects
1 static.ads-twitter.com www.googletagmanager.com
1 secure.quantserve.com www.googletagmanager.com
1 www.gstatic.com www.google.com
1 www.googletagmanager.com threatpost.com
1 e.serverbid.com qd.admetricspro.com
1 ap.lijit.com qd.admetricspro.com
1 kasperskycontenthub.com threatpost.com
0 sync.adap.tv Failed threatpost.com
224 60
Subject Issuer Validity Valid
threatpost.com
Thawte EV RSA CA 2018
2019-06-17 -
2020-06-17
a year crt.sh
*.adlightning.com
Amazon
2019-08-19 -
2020-09-19
a year crt.sh
sni.cloudflaressl.com
CloudFlare Inc ECC CA-2
2020-02-04 -
2020-10-09
8 months crt.sh
*.g.doubleclick.net
GTS CA 1O1
2020-04-15 -
2020-07-08
3 months crt.sh
assets.threatpost.com
Amazon
2020-03-04 -
2021-04-04
a year crt.sh
kasperskycontenthub.com
Thawte RSA CA 2018
2019-06-14 -
2020-06-13
a year crt.sh
media.threatpost.com
Amazon
2020-03-04 -
2021-04-04
a year crt.sh
www.google.com
GTS CA 1O1
2020-04-15 -
2020-07-08
3 months crt.sh
www.sekindo.com
Go Daddy Secure Certificate Authority - G2
2019-05-23 -
2020-06-18
a year crt.sh
*.google.de
GTS CA 1O1
2020-04-15 -
2020-07-08
3 months crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2019-01-10 -
2021-01-14
2 years crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2020-03-02 -
2021-04-01
a year crt.sh
*.lijit.com
Go Daddy Secure Certificate Authority - G2
2020-03-11 -
2021-05-10
a year crt.sh
*.adnxs.com
DigiCert ECC Secure Server CA
2019-01-23 -
2021-03-08
2 years crt.sh
*.openx.net
GeoTrust RSA CA 2018
2018-01-04 -
2020-07-09
3 years crt.sh
e.serverbid.com
Let's Encrypt Authority X3
2020-03-24 -
2020-06-22
3 months crt.sh
*.adtech.advertising.com
DigiCert SHA2 Secure Server CA
2020-04-16 -
2022-04-21
2 years crt.sh
*.pubmatic.com
Sectigo RSA Organization Validation Secure Server CA
2019-02-22 -
2021-02-21
2 years crt.sh
*.google-analytics.com
GTS CA 1O1
2020-04-15 -
2020-07-08
3 months crt.sh
*.gstatic.com
GTS CA 1O1
2020-04-15 -
2020-07-08
3 months crt.sh
*.quantserve.com
DigiCert SHA2 High Assurance Server CA
2019-10-04 -
2020-10-07
a year crt.sh
ads-twitter.com
DigiCert SHA2 High Assurance Server CA
2019-08-14 -
2020-08-18
a year crt.sh
www.google.de
GTS CA 1O1
2020-04-15 -
2020-07-08
3 months crt.sh
t.co
DigiCert SHA2 High Assurance Server CA
2020-03-05 -
2021-03-02
a year crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2020-04-28 -
2020-07-21
3 months crt.sh
c.amazon-adsystem.com
Amazon
2019-10-07 -
2020-09-29
a year crt.sh
upload.video.google.com
GTS CA 1O1
2020-04-15 -
2020-07-08
3 months crt.sh
*.bidswitch.net
Sectigo RSA Domain Validation Secure Server CA
2020-04-23 -
2022-05-04
2 years crt.sh
*.v.ssp.yahoo.com
DigiCert SHA2 High Assurance Server CA
2020-03-01 -
2020-08-28
6 months crt.sh
misc-sni.google.com
GTS CA 1O1
2020-04-15 -
2020-07-08
3 months crt.sh
*.twitter.com
DigiCert SHA2 High Assurance Server CA
2020-03-05 -
2021-03-02
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2020-04-15 -
2020-07-14
3 months crt.sh
www.linkedin.com
DigiCert SHA2 Secure Server CA
2020-03-09 -
2020-09-09
6 months crt.sh
*.reddit.com
DigiCert SHA2 Secure Server CA
2020-04-06 -
2020-10-03
6 months crt.sh
*.google.com
GTS CA 1O1
2020-04-15 -
2020-07-08
3 months crt.sh
cdn.adnxs.com
GlobalSign CloudSSL CA - SHA256 - G3
2020-04-13 -
2021-04-14
a year crt.sh
ups.analytics.yahoo.com
DigiCert SHA2 High Assurance Server CA
2020-02-13 -
2020-08-11
6 months crt.sh
*.ybp.yahoo.com
DigiCert SHA2 High Assurance Server CA
2020-01-04 -
2020-07-02
6 months crt.sh
*.nyc3.cdn.digitaloceanspaces.com
DigiCert SHA2 Secure Server CA
2020-03-11 -
2021-04-14
a year crt.sh
*.dotomi.com
GlobalSign RSA OV SSL CA 2018
2019-06-19 -
2021-08-31
2 years crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2019-03-07 -
2021-04-19
2 years crt.sh

This page contains 31 frames:

Primary Page: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Frame ID: 26496C82D055C3424265611DCBD09E67
Requests: 93 HTTP requests in this frame

Frame: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1589283673&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=undefined&flowCloseButtonPosition=right
Frame ID: 0BD9D31CDC4A989807C02C9731B855B3
Requests: 36 HTTP requests in this frame

Frame: https://fonts.googleapis.com/css?family=Roboto&display=swap
Frame ID: 40B5E9FD624DF306BFC46C6577879692
Requests: 5 HTTP requests in this frame

Frame: https://fonts.googleapis.com/css?family=Roboto&display=swap
Frame ID: 9E23AE4D1E0FA86457346C3145564945
Requests: 22 HTTP requests in this frame

Frame: https://ads.pubmatic.com/AdServer/js/user_sync.html?p=159196&userIdMacro=PM_UID&gdpr=1&gdpr_consent=&predirect=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D91%26advUuid%3DPM_UID%26gdpr%3D1%26gdpr_consent%3D
Frame ID: FD769A5575531AF7E0D1D721DDCF616B
Requests: 1 HTTP requests in this frame

Frame: https://tagan.adlightning.com/math-aids-threatpost/bl-2a28c82-32762cff.js
Frame ID: 8CB02BE6678EE2C05C0D16FAFB8BD403
Requests: 14 HTTP requests in this frame

Frame: https://tagan.adlightning.com/math-aids-threatpost/bl-2a28c82-32762cff.js
Frame ID: 78E01ED2BF40BEB0F3AEBDEBD8D42A50
Requests: 14 HTTP requests in this frame

Frame: https://tagan.adlightning.com/math-aids-threatpost/bl-2a28c82-32762cff.js
Frame ID: D955A17E26E9C8F27BA59B70376E7903
Requests: 13 HTTP requests in this frame

Frame: https://tagan.adlightning.com/math-aids-threatpost/bl-2a28c82-32762cff.js
Frame ID: 10DA7635863C823D726C5B9BB2CD2A3F
Requests: 10 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=JPZ52lNx97aD96bjM7KaA0bo&theme=standard&size=normal&cb=frmt7oszg3do
Frame ID: 1177D271251569222A159AAF8A34A854
Requests: 1 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LehhAETAAAAAAcsm2ZGDsLCqyGhesy4Yn43WNBe&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=JPZ52lNx97aD96bjM7KaA0bo&theme=light&size=normal&cb=ta4wxkaehntu
Frame ID: 08315B1A78BF0CCE83699758BEB611D1
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20200506/r20190131/zrt_lookup.html
Frame ID: 56905C2CC4A4EC84450B18F57A3C16E4
Requests: 1 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/bframe?hl=en&v=JPZ52lNx97aD96bjM7KaA0bo&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&cb=l8ifoeigz9m8
Frame ID: 19583EFF90FE1126BE9FB79A67A442E3
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7500593236707325&output=html&h=90&slotname=5620800026&adk=2236077833&adf=3173046728&w=970&psa=0&guci=1.2.0.0.2.2.0.0&format=970x90&url=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&ea=0&flash=0&wgl=1&adsid=NT&dt=1589283674851&bpp=30&bdt=573&idt=523&shv=r20200506&cbv=r20190131&ptt=9&saldr=aa&correlator=5869267208876&frm=23&ife=4&pv=2&ga_vid=754605376.1589283674&ga_sid=1589283676&ga_hid=1483783621&ga_fc=1&iag=3&icsg=8362&nhd=1&dssz=14&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=308&ady=10&biw=1585&bih=1200&isw=970&ish=90&ifk=1299019832&scr_x=0&scr_y=0&eid=21065531%2C21066085&oid=3&pvsid=256106765155426&pem=143&rx=0&eae=2&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C970%2C90&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=8212&bc=31&ifi=1&uci=1.3rmtgleybp3c&fsb=1&dtd=709
Frame ID: D0606BDB5EEC99BCF78EB22B96D4178E
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7500593236707325&output=html&h=250&slotname=7286959315&adk=2838937357&adf=3173046727&w=300&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&ea=0&flash=0&wgl=1&adsid=NT&dt=1589283674907&bpp=3&bdt=618&idt=670&shv=r20200506&cbv=r20190131&ptt=9&saldr=aa&correlator=5869267208876&frm=23&ife=4&pv=1&ga_vid=754605376.1589283674&ga_sid=1589283676&ga_hid=1670314711&ga_fc=1&iag=3&icsg=8362&nhd=1&dssz=14&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1075&ady=257&biw=1585&bih=1200&isw=300&ish=250&ifk=408740871&scr_x=0&scr_y=0&eid=21065531%2C21066085&oid=3&pvsid=2476001864918825&pem=143&rx=0&eae=2&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=8212&bc=31&ifi=1&uci=1.e9r1nxrgxuv7&fsb=1&dtd=675
Frame ID: B64545CBAD51EC2DC74ADBF6BE8A4138
Requests: 1 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/bframe?hl=en&v=JPZ52lNx97aD96bjM7KaA0bo&k=6LehhAETAAAAAAcsm2ZGDsLCqyGhesy4Yn43WNBe&cb=lwlsniybgxs5
Frame ID: 27D49B68373E44D945E76C3CAC38E13B
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7500593236707325&output=html&h=250&slotname=2376748102&adk=2477513961&adf=3173046726&w=300&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&ea=0&flash=0&wgl=1&adsid=NT&dt=1589283674968&bpp=2&bdt=672&idt=647&shv=r20200506&cbv=r20190131&ptt=9&saldr=aa&correlator=5869267208876&frm=23&ife=4&pv=1&ga_vid=754605376.1589283674&ga_sid=1589283676&ga_hid=1756047493&ga_fc=1&iag=3&icsg=8362&nhd=1&dssz=14&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1075&ady=1587&biw=1585&bih=1200&isw=300&ish=250&ifk=1972745306&scr_x=0&scr_y=0&eid=21065531%2C21066085&oid=3&pvsid=3096197003707693&pem=143&rx=0&eae=2&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&pfx=0&fu=8212&bc=31&ifi=1&uci=1.bpssvey0y9rr&btvi=1&fsb=1&dtd=657
Frame ID: 214FE89FB427AEFF0CFA99097BA422FF
Requests: 1 HTTP requests in this frame

Frame: https://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
Frame ID: 1BF5323C283CD35FE9D26F264C4045C0
Requests: 1 HTTP requests in this frame

Frame: https://ads.pubmatic.com/AdServer/js/showad.js
Frame ID: 81A9CBF16C674F56AB819B9D61584333
Requests: 1 HTTP requests in this frame

Frame: https://u.openx.net/w/1.0/pd?gdpr=1&gdpr_consent=
Frame ID: 40517C0D231E33A296F8F10E053F2712
Requests: 1 HTTP requests in this frame

Frame: https://ads.pubmatic.com/AdServer/js/showad.js
Frame ID: 35E386097049FF7432B05F56DFC7740C
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html?gdpr=1&gdpr_consent=
Frame ID: 1B6A03B72C90016B3570B97063FBCDB3
Requests: 1 HTTP requests in this frame

Frame: https://ads.pubmatic.com/AdServer/js/showad.js
Frame ID: 8A6A9D9BBC0091F95457E58F4F891BE5
Requests: 1 HTTP requests in this frame

Frame: https://eu-u.openx.net/w/1.0/pd?plm=6&ph=e1b1f5e1-3c2c-4287-9806-317cfbf3bd12&gdpr=1
Frame ID: A65ADF38AF80A4267AB0BDD6848C9939
Requests: 1 HTTP requests in this frame

Frame: https://serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/2000891.html
Frame ID: 6D157A394E3A017CF74C535DCC87E3B9
Requests: 1 HTTP requests in this frame

Frame: https://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
Frame ID: 0ECB488D32DEEA9F8140EBC5BE47A2BC
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html
Frame ID: 2DDD7FAE93279132F014D4434BD45F59
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Frame ID: 3F6AE59C052AF67A539443F584A067DD
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Frame ID: 6B0B1B9A128C8CF21BE406A13979DD24
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Frame ID: 928524E10C5FE506526DAD2FEB352EEC
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Frame ID: 0438C8F7E87365B86FC81EE755E93804
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /googletagservices\.com\/tag\/js\/gpt(?:_mobile)?\.js/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • script /\/prebid\.js/i

Overall confidence: 100%
Detected patterns
  • script /\.quantserve\.com\/quant\.js/i

Page Statistics

224
Requests

100 %
HTTPS

40 %
IPv6

39
Domains

60
Subdomains

49
IPs

8
Countries

3072 kB
Transfer

7189 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 45
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=46a47aaaedf4de2;misc=1589283673249; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;cfp=1;rndc=1589283672;v=2;cmd=bid;cors=yes;alias=46a47aaaedf4de2;misc=1589283673249 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;apid=1A7b8b8cec-9445-11ea-88cb-12052abf3156;cfp=1;rndc=1589283672;v=2;cmd=bid;cors=yes;alias=46a47aaaedf4de2;misc=1589283673249
Request Chain 46
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=476863965b896f2;misc=1589283673249; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;cfp=1;rndc=1589283672;v=2;cmd=bid;cors=yes;alias=476863965b896f2;misc=1589283673249 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;apid=1A7b8abe7a-9445-11ea-8d8d-12794b40da64;cfp=1;rndc=1589283673;v=2;cmd=bid;cors=yes;alias=476863965b896f2;misc=1589283673249
Request Chain 47
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=48a1f598dbd984f;misc=1589283673250; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;cfp=1;rndc=1589283672;v=2;cmd=bid;cors=yes;alias=48a1f598dbd984f;misc=1589283673250 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;apid=1A7b8b8dc8-9445-11ea-a141-12a779b12fd4;cfp=1;rndc=1589283672;v=2;cmd=bid;cors=yes;alias=48a1f598dbd984f;misc=1589283673250
Request Chain 48
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=49e173b451cbbc6;misc=1589283673250; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;cfp=1;rndc=1589283673;v=2;cmd=bid;cors=yes;alias=49e173b451cbbc6;misc=1589283673250 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;apid=1A7b88b7f6-9445-11ea-89a6-12bd5c3e34a0;cfp=1;rndc=1589283673;v=2;cmd=bid;cors=yes;alias=49e173b451cbbc6;misc=1589283673250
Request Chain 49
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=5070ca1a60982d2;misc=1589283673250; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;cfp=1;rndc=1589283672;v=2;cmd=bid;cors=yes;alias=5070ca1a60982d2;misc=1589283673250 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;apid=1A7b89946e-9445-11ea-a847-120d915f11b6;cfp=1;rndc=1589283672;v=2;cmd=bid;cors=yes;alias=5070ca1a60982d2;misc=1589283673250
Request Chain 76
  • https://www.google-analytics.com/r/collect?v=1&_v=j82&aip=1&a=417819229&t=pageview&_s=1&dl=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&ul=en-us&de=UTF-8&dt=Microsoft%20Teams%20Impersonation%20Attacks%20Flood%20Inboxes%20%7C%20Threatpost&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=YEBAAEAB~&jid=1993136885&gjid=1360722046&cid=754605376.1589283674&tid=UA-35676203-21&_gid=447062235.1589283674&_r=1&gtm=2wg4t0PM29HLF&z=1944393540 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-35676203-21&cid=754605376.1589283674&jid=1993136885&_gid=447062235.1589283674&gjid=1360722046&_v=j82&z=1944393540 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=754605376.1589283674&jid=1993136885&_v=j82&z=1944393540 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=754605376.1589283674&jid=1993136885&_v=j82&z=1944393540&slf_rd=1&random=2081072759
Request Chain 96
  • https://x.bidswitch.net/sync?ssp=sekindo&user_id=5eba8b596cf00&custom_data=5eba8b596cf00&gdpr=1&gdpr_consent= HTTP 302
  • https://x.bidswitch.net/ul_cb/sync?ssp=sekindo&user_id=5eba8b596cf00&custom_data=5eba8b596cf00&gdpr=1&gdpr_consent=
Request Chain 97
  • https://csync.loopme.me/?redirect=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D93%26advUuid%3D%7Bdevice_id%7D HTTP 307
  • https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=93&advUuid=87a9488b-363f-4022-b1a5-f877f7f0410a
Request Chain 181
  • https://sync-tm.everesttech.net/upi/pid/m7y5t93k?redir=https%3A%2F%2Fsync.adap.tv%2Fsync%3Ftype%3Dgif%26key%3Dtubemogul%26uid%3D%24%7BUSER_ID%7D HTTP 302
  • https://sync-tm.everesttech.net/ct/upi/pid/m7y5t93k?redir=https%3A%2F%2Fsync.adap.tv%2Fsync%3Ftype%3Dgif%26key%3Dtubemogul%26uid%3D%24%7BUSER_ID%7D&_test=XrqLWwAAAJkLbyTo HTTP 302
  • https://sync.adap.tv/sync?type=gif&key=tubemogul&uid=XrqLWwAAAJkLbyTo&_test=XrqLWwAAAJkLbyTo
Request Chain 182
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=adaptv&ttd_tpi=1 HTTP 302
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=adaptv&ttd_tpi=1 HTTP 302
  • https://pixel.advertising.com/ups/55953/sync?uid=f3329c59-48b0-4cee-a0c4-b9b5eb0e2b69&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=f3329c59-48b0-4cee-a0c4-b9b5eb0e2b69 HTTP 302
  • https://ups.analytics.yahoo.com/ups/55953/sync?uid=f3329c59-48b0-4cee-a0c4-b9b5eb0e2b69&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=f3329c59-48b0-4cee-a0c4-b9b5eb0e2b69&apid=1A7b8b8dc8-9445-11ea-a141-12a779b12fd4
Request Chain 184
  • https://cm.g.doubleclick.net/pixel?google_nid=adaptv_dbm&google_cm&google_sc HTTP 302
  • https://pixel.advertising.com/ups/57304/sync?uid=CAESELRbMW0syvKs940rK8aZc50&google_cver=1 HTTP 302
  • https://ups.analytics.yahoo.com/ups/57304/sync?uid=CAESELRbMW0syvKs940rK8aZc50&google_cver=1&apid=1A7b8b8dc8-9445-11ea-a141-12a779b12fd4
Request Chain 191
  • https://sync.serverbid.com/ss/2000891.html HTTP 302
  • https://serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/2000891.html
Request Chain 195
  • https://pixel.quantserve.com/pixel/p-NcBg8UA4xqUFp.gif?idmatch=0&gdpr=1&gdpr_consent= HTTP 302
  • https://pixel.advertising.com/ups/55965/sync?_origin=0&gdpr=1&uid=l-W9upri6rqPtLq-muLyuJHkvLiPtei-k7GtFCpk HTTP 302
  • https://ups.analytics.yahoo.com/ups/55965/sync?_origin=0&gdpr=1&uid=l-W9upri6rqPtLq-muLyuJHkvLiPtei-k7GtFCpk&apid=1A7b8b8dc8-9445-11ea-a141-12a779b12fd4
Request Chain 196
  • https://pixel.advertising.com/ups/56465/sync?_origin=0&redir=true&gdpr=1&gdpr_consent= HTTP 302
  • https://ups.analytics.yahoo.com/ups/56465/sync?_origin=0&redir=true&gdpr=1&gdpr_consent=&apid=1A7b8b8dc8-9445-11ea-a141-12a779b12fd4 HTTP 302
  • https://pr-bh.ybp.yahoo.com/sync/adtech/1A7b8b8dc8-9445-11ea-a141-12a779b12fd4?gdpr=1&gdpr_consent= HTTP 302
  • https://pixel.advertising.com/ups/56465/sync?uid=y-2yqWAPp1lxkiMBkzBYspadqNjTuMkh.vw767&_origin=0&nsync=0 HTTP 302
  • https://ups.analytics.yahoo.com/ups/56465/sync?uid=y-2yqWAPp1lxkiMBkzBYspadqNjTuMkh.vw767&_origin=0&nsync=0&apid=1A7b8b8dc8-9445-11ea-a141-12a779b12fd4

224 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
threatpost.com/microsoft-teams-impersonation-attacks/155404/
80 KB
21 KB
Document
General
Full URL
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
db3fdb647aafbf8e17f913a9bea2e964be616bec8872cb477b195e75acc5f3f0
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Host
threatpost.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Server
nginx
Date
Tue, 12 May 2020 11:41:12 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
close
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Link
<https://threatpost.com/wp-json/>; rel="https://api.w.org/" <https://threatpost.com/?p=155404>; rel=shortlink
X-Frame-Options
SAMEORIGIN
X-Debug-Auth
off
X-Request-Host
threatpost.com
x-cache-hit
HIT
Content-Encoding
gzip
main.css
threatpost.com/wp-content/themes/threatpost-2018/assets/css/
236 KB
36 KB
Stylesheet
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1588841065
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
7d9944f6f4e2d0330ca2a9d758a404fdca5937f4a0ddf939247ca3505f9f0bbc

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Tue, 12 May 2020 11:41:12 GMT
Content-Encoding
gzip
Last-Modified
Thu, 07 May 2020 08:44:25 GMT
Server
nginx
ETag
W/"5eb3ca69-3b1cb"
Transfer-Encoding
chunked
Content-Type
text/css
Cache-Control
max-age=604800, public
Connection
close
Expires
Tue, 19 May 2020 11:41:12 GMT
op.js
tagan.adlightning.com/math-aids-threatpost/
33 KB
12 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/op.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.190.120 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-190-120.ham50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
64922adee3eb5dd1186a23332561aa6699bb7ecf05a78bbcec141d72458a7ede

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:13 GMT
content-encoding
gzip
x-amz-cf-pop
HAM50-C2
x-cache
Miss from cloudfront
status
200
content-length
12160
x-amz-meta-git_commit
0d4dfcb
last-modified
Mon, 11 May 2020 22:58:21 GMT
server
AmazonS3
etag
"c1ea8d1db66b8eb9fcbf7a6f139b9828"
x-amz-version-id
dHt_5LoGWH5dLNEe6FS6bWdExkwxP2rq
via
1.1 b448bc80d67210455b28a7dbefe37288.cloudfront.net (CloudFront)
cache-control
max-age=900
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
Cz0KbFiQ1f795XA7LydqIuvCKhRBNcubwl-KQZPoWEzWuwkvcVQ5eQ==
ros-layout.js
qd.admetricspro.com/js/threatpost/
18 KB
2 KB
Script
General
Full URL
https://qd.admetricspro.com/js/threatpost/ros-layout.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3035::6812:2130 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
5e00db38c7c200422a1b2604eccaee91db1aa7dd5aead5383f62b85cead19068

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:12 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Mon, 23 Mar 2020 17:20:59 GMT
server
cloudflare
status
200
etag
W/"4871-5a188dbd16705-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=14400
cf-ray
5923de8828b8d6c9-FRA
cf-request-id
02aa4969160000d6c9b1956200000001
expires
Tue, 12 May 2020 11:42:52 GMT
gpt.js
www.googletagservices.com/tag/js/
43 KB
14 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f33dfc8afa05ede47e0127a56e9dcbde645ee93988f261c5ef214ce6fc15d76e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"513 / 88 of 1000 / last-modified: 1589232442"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
14474
x-xss-protection
0
expires
Tue, 12 May 2020 11:41:12 GMT
cmp.js
qd.admetricspro.com/js/threatpost/
218 KB
61 KB
Script
General
Full URL
https://qd.admetricspro.com/js/threatpost/cmp.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3035::6812:2130 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
aaf45a172ec90c76bcecd61c68d998c2256fe9b1700371e80011d1161c5ab629

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:12 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 27 Sep 2019 21:07:46 GMT
server
cloudflare
status
200
etag
W/"367ba-5938f47194c80-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=14400
cf-ray
5923de8828bdd6c9-FRA
cf-request-id
02aa4969160000d6c9b1957200000001
expires
Tue, 12 May 2020 11:48:05 GMT
targeting.js
qd.admetricspro.com/js/threatpost/
275 B
260 B
Script
General
Full URL
https://qd.admetricspro.com/js/threatpost/targeting.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3035::6812:2130 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
6cdc57f82f4b0d09e5b4e584ca4736cd3871f20563d4ce25120b057d8ffb4eb2

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:12 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Sat, 08 Feb 2020 20:49:18 GMT
server
cloudflare
status
200
etag
W/"113-59e16a3cfb471-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=14400
cf-ray
5923de8828c2d6c9-FRA
cf-request-id
02aa4969160000d6c9b1958200000001
expires
Tue, 12 May 2020 11:50:24 GMT
prebid.js
qd.admetricspro.com/js/threatpost/
294 KB
86 KB
Script
General
Full URL
https://qd.admetricspro.com/js/threatpost/prebid.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3035::6812:2130 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
9f40f7297122393e1425eec62e78a75c3211f7ad3f6b09a356aa317fcedc2cf3

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:12 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 26 Feb 2020 03:30:32 GMT
server
cloudflare
status
200
etag
W/"49929-59f723a0fd39e-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=14400
cf-ray
5923de8828c3d6c9-FRA
cf-request-id
02aa4969160000d6c9b1959200000001
expires
Tue, 12 May 2020 11:44:23 GMT
engine.js
qd.admetricspro.com/js/threatpost/
16 KB
12 KB
Script
General
Full URL
https://qd.admetricspro.com/js/threatpost/engine.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3035::6812:2130 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
bcf391dd0b006a87698ac0894d71039d610480913d24fcdaa1f2fdeeeda943e3

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:12 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Sun, 24 Nov 2019 00:06:08 GMT
server
cloudflare
status
200
etag
W/"41f6-5980c69fe949d-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=14400
cf-ray
5923de8828c5d6c9-FRA
cf-request-id
02aa4969160000d6c9b195a200000001
expires
Tue, 12 May 2020 11:43:03 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
77 KB
17 KB
Stylesheet
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-includes/css/dist/block-library/style.min.css,wp-content/plugins/wds-rss-builder/includes/css/select2.min.css,wp-content/plugins/wds-rss-builder/includes/css/wds-rss.css,wp-content/plugins/honeypot-comments/public/assets/css/public.css,wp-content/plugins/kspr_twitter_pullquote/css/style.css,wp-content/plugins/pullquote-shortcode/css/pullquote-shortcode.css,wp-content/plugins/kaspersky-social-sharing/assets/css/style.css,wp-content/plugins/kaspersky-social-sharing/assets/css/custom.css&ver=f818c007
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2156:2400:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
a9ccdefe0a821df80b8292afc4991c8f61a16a5d1b6507bc0409a50d7cd805d1
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:12 GMT
content-encoding
gzip
x-amz-cf-pop
FRA50-C1
x-cache
Miss from cloudfront
status
200
content-length
16546
x-cache-hit
HIT
last-modified
Thu, 07 May 2020 08:44:25 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
text/css; charset=utf-8
via
1.1 b912dc97777020eb19579888add26978.cloudfront.net (CloudFront)
cache-control
max-age=86400
x-debug-auth
off
x-request-host
assets.threatpost.com
x-amz-cf-id
oz4BaQxlkD4vMPdxcLALQAsmWoV6rjsFhdWgRBYbDQriP2h0SMpS0g==
expires
Tue, 12 May 2020 20:29:48 GMT
jquery.js
threatpost.com/wp-includes/js/jquery/
95 KB
37 KB
Script
General
Full URL
https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
1db21d816296e6939ba1f42962496e4134ae2b0081e26970864c40c6d02bb1df

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Tue, 12 May 2020 11:41:12 GMT
Content-Encoding
gzip
Last-Modified
Wed, 18 Dec 2019 22:32:15 GMT
Server
nginx
ETag
W/"5dfaa8ef-17a69"
Transfer-Encoding
chunked
Content-Type
application/x-javascript
Cache-Control
max-age=604800, public
Connection
close
Expires
Tue, 19 May 2020 11:41:12 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
175 KB
55 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/kaspersky-cookies-notification/scripts/alert_text.js,wp-content/plugins/kaspersky-cookies-notification/scripts/alert.js,wp-content/plugins/honeypot-comments/public/assets/js/public.js,wp-content/plugins/kspr_twitter_pullquote/js/kaspersky-twitter-pullquote.js,wp-content/themes/threatpost-2018/assets/js/main.js,wp-content/themes/threatpost-2018/assets/js/loadmore.js,wp-content/plugins/kaspersky-social-sharing/assets/js/social-share.js&ver=f818c007
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2156:2400:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
3dbd06bf1d690a4c0fcbfcd77c26a032558b9f9698bb7261191bfb19656bf8ca
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:12 GMT
content-encoding
gzip
x-amz-cf-pop
FRA50-C1
x-cache
Miss from cloudfront
status
200
content-length
55954
x-cache-hit
HIT
last-modified
Thu, 07 May 2020 08:44:26 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
via
1.1 b912dc97777020eb19579888add26978.cloudfront.net (CloudFront)
cache-control
max-age=86400
x-debug-auth
off
x-request-host
assets.threatpost.com
x-amz-cf-id
tY-NcW1qXJaiU3nV5qJ2BE7TVmGsI5gFzedTqdjeUIy1y-VvKGbAMA==
expires
Tue, 12 May 2020 20:29:48 GMT
/
kasperskycontenthub.com/
0
398 B
Script
General
Full URL
https://kasperskycontenthub.com/?dm=ed1f9e435dc885292eab65620c51f3fb&action=load&blogid=103&siteid=1&t=673015810&back=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 May 2020 11:41:12 GMT
X-Content-Type-Options
nosniff
Server
nginx
X-Frame-Options
SAMEORIGIN
Connection
close
Content-Type
application/javascript
x-cache-hit
HIT
Transfer-Encoding
chunked
X-Debug-Auth
off
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Request-Host
kasperskycontenthub.com
X-XSS-Protection
1; mode=block
Microsoft-Teams.jpg
media.threatpost.com/wp-content/uploads/sites/103/2020/04/27010549/
222 KB
222 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/04/27010549/Microsoft-Teams.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:2200:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
760076dda5d92bc8014c3940384b1f8a952eb2a8390106fb0f0da0e0fe599e2d

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 27 Apr 2020 05:21:45 GMT
via
1.1 0f820adb6671fcc6033a9aa95ec8e0fb.cloudfront.net (CloudFront), 1.1 1ac3fd533bf6be1b511077f8b8e23bfd.cloudfront.net (CloudFront)
last-modified
Mon, 27 Apr 2020 05:05:51 GMT
server
AmazonS3
age
1318769
etag
"309e16754db444776c27af9be80662a9"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA54, FRA2-C1
accept-ranges
bytes
content-length
226882
x-amz-cf-id
jWwfZ41WELgv1KtKM4sdDVhm9bVGQc_I7MOuhHQ-4_eT-BpzFgqyNg==
expires
Tue, 27 Apr 2021 05:05:49 GMT
Tara-headshot.jpg
media.threatpost.com/wp-content/uploads/sites/103/2018/08/15114841/
13 KB
13 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2018/08/15114841/Tara-headshot.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:2200:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
89ce08431545cd3c6d42419d99ee0152027a68c1d0c7c82838cc9a51d9d52451

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 28 Apr 2020 00:39:13 GMT
via
1.1 c771900addaa417be1d0b79ff157a3f9.cloudfront.net (CloudFront), 1.1 1ac3fd533bf6be1b511077f8b8e23bfd.cloudfront.net (CloudFront)
last-modified
Fri, 17 Aug 2018 16:22:08 GMT
server
AmazonS3
age
1249321
etag
"dee18dfeea6de13bec60c1e5237eb723"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA54, FRA2-C1
accept-ranges
bytes
content-length
13097
x-amz-cf-id
Pz3SOrz98wqh0Kz25yBhgy34w-vQWDT_7MSMVA6IOJmChwuetsi9wg==
expires
Sat, 17 Aug 2019 16:22:07 GMT
subscribe2.jpg
media.threatpost.com/wp-content/uploads/sites/103/2019/02/19151457/
8 KB
9 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/02/19151457/subscribe2.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:2200:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
aa64fa30a3263fa3105736228a6feaaa4f7d32d8ef96b12e56f6fb95511b66a7

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 15 Feb 2020 06:22:32 GMT
via
1.1 7ce1191b390045e05b9cc74f7514b77b.cloudfront.net (CloudFront), 1.1 1ac3fd533bf6be1b511077f8b8e23bfd.cloudfront.net (CloudFront)
last-modified
Tue, 19 Feb 2019 20:14:58 GMT
server
AmazonS3
age
7535922
etag
"5ba45563f793f39ef6baf02645651654"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA6-C1, FRA2-C1
accept-ranges
bytes
content-length
8281
x-amz-cf-id
ZBxiYI4F-v9CUxWuAZFyOmnD0ep9PjKQqvEZaFwFmLzfPeF0bbXk4g==
expires
Wed, 19 Feb 2020 20:14:57 GMT
shutterstock_205806643-540x270.jpg
media.threatpost.com/wp-content/uploads/sites/103/2017/03/06225623/
16 KB
16 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2017/03/06225623/shutterstock_205806643-540x270.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:2200:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
312c4b20ae3c38f2ef520b99a13da2ae3219995ecba556a53d5a94c313ec2808

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 08 May 2020 15:36:20 GMT
via
1.1 0f820adb6671fcc6033a9aa95ec8e0fb.cloudfront.net (CloudFront), 1.1 1ac3fd533bf6be1b511077f8b8e23bfd.cloudfront.net (CloudFront)
last-modified
Tue, 03 Jul 2018 01:41:46 GMT
server
AmazonS3
age
331494
etag
"7fd416c1434fc03a33ad42cf361e9158"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA54, FRA2-C1
accept-ranges
bytes
content-length
16324
x-amz-cf-id
c6EWpj-81Q_93d37TNMziV3tD7EioQh3ESbX7xV3T5QRnaW8rPlFBg==
expires
Wed, 03 Jul 2019 01:41:44 GMT
zoom4-540x270.png
media.threatpost.com/wp-content/uploads/sites/103/2020/05/07122447/
165 KB
166 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/05/07122447/zoom4-540x270.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:2200:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
3fcfae50f2d05fd72292084d29dce27f032184fe9072c168e8c7efa6b8aa8f87

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 07 May 2020 16:44:20 GMT
via
1.1 d76fac2b5a2f460a1cbffb76189f59ef.cloudfront.net (CloudFront), 1.1 1ac3fd533bf6be1b511077f8b8e23bfd.cloudfront.net (CloudFront)
last-modified
Thu, 07 May 2020 16:25:12 GMT
server
AmazonS3
age
413814
etag
"dfdace95774bd5e2c11b19e14141e0c7"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA54, FRA2-C1
accept-ranges
bytes
content-length
169459
x-amz-cf-id
KiDFCEe2BJyMvDI92vj0lWF8ivcDo3vP9DzS7AwaVLgJ-nHWOCpVAQ==
expires
Fri, 07 May 2021 16:25:08 GMT
Dumpster-540x270.jpg
media.threatpost.com/wp-content/uploads/sites/103/2020/05/07084255/
39 KB
39 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/05/07084255/Dumpster-540x270.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:2200:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
7f3e59cba6e98d7c9be47372a2f92d9c3af282ea0d74074065b4becec8d32758

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 07 May 2020 12:55:09 GMT
via
1.1 09f4ecc806a7e34780fd19a93b984724.cloudfront.net (CloudFront), 1.1 1ac3fd533bf6be1b511077f8b8e23bfd.cloudfront.net (CloudFront)
last-modified
Thu, 07 May 2020 12:42:59 GMT
server
AmazonS3
age
427565
etag
"5a341c660021ec5e3949da6107d7aa46"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA54, FRA2-C1
accept-ranges
bytes
content-length
39770
x-amz-cf-id
YQuW-rgOH2kPG6cVXktnVexaeO3M4RWdTMIo5YEVHP9W0_BcjJoEZA==
expires
Fri, 07 May 2021 12:42:58 GMT
api.js
www.google.com/recaptcha/
674 B
637 B
Script
General
Full URL
https://www.google.com/recaptcha/api.js?hl=en
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
8276117bcc362352b6d3a5f09093ad1955601fbe77fc4f11cb823df7ecdbc8f4
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self'
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
GSE
x-frame-options
SAMEORIGIN
content-type
text/javascript; charset=UTF-8
status
200
cache-control
private, max-age=300
content-security-policy
frame-ancestors 'self'
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
446
x-xss-protection
1; mode=block
expires
Tue, 12 May 2020 11:41:12 GMT
forcepoint-vpn-64x64.jpeg
media.threatpost.com/wp-content/uploads/sites/103/2019/09/20105955/
2 KB
2 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/09/20105955/forcepoint-vpn-64x64.jpeg
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:2200:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
22bce61f4ab1cabf0df284f75cf064654e2c82fd992de9b8bd951f3bb43a87ca

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 04 May 2020 16:08:55 GMT
via
1.1 befe3b8553d90339ecf78e5d7cefa60b.cloudfront.net (CloudFront), 1.1 1ac3fd533bf6be1b511077f8b8e23bfd.cloudfront.net (CloudFront)
last-modified
Fri, 20 Sep 2019 14:59:58 GMT
server
AmazonS3
age
675139
etag
"f99bca485823b84c6c1ecf501c34469c"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1, FRA2-C1
accept-ranges
bytes
content-length
1822
x-amz-cf-id
ZPK4CAkwVHdVsr0sBQpotTYzAmjomguxWZFIuELXegiYJdo_UL9jJA==
expires
Sat, 19 Sep 2020 14:59:55 GMT
Cloud_Security-64x64.png
media.threatpost.com/wp-content/uploads/sites/103/2019/12/30144523/
10 KB
10 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/12/30144523/Cloud_Security-64x64.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:2200:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
25cbfbe95753b2b7cc509e199271f8ab339b45f4c4b28a098e3cc7b40ae644cb

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 Apr 2020 19:28:22 GMT
via
1.1 8d31bbd9d6638cdacab37047b8045da4.cloudfront.net (CloudFront), 1.1 1ac3fd533bf6be1b511077f8b8e23bfd.cloudfront.net (CloudFront)
last-modified
Mon, 30 Dec 2019 19:45:26 GMT
server
AmazonS3
age
1008772
etag
"e0c44979b2a4d9528a72a1630d5e8652"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1, FRA2-C1
accept-ranges
bytes
content-length
10225
x-amz-cf-id
NqsGj7jC6aLqFlGg2eNMzMWkSRygPI5cVgxm7cOROCHoXoLGjYSlpw==
expires
Tue, 29 Dec 2020 19:45:23 GMT
georgia-cyberattack-64x64.jpeg
media.threatpost.com/wp-content/uploads/sites/103/2019/10/29085447/
2 KB
2 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/10/29085447/georgia-cyberattack-64x64.jpeg
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:2200:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
c9fff884f49d2eb540f6d6d4dadd4817909c8c90d28dade868c5344baf68a2ba

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 23 Apr 2020 15:28:23 GMT
via
1.1 e1e056e45a0f8d6bc22b223900511170.cloudfront.net (CloudFront), 1.1 1ac3fd533bf6be1b511077f8b8e23bfd.cloudfront.net (CloudFront)
last-modified
Tue, 29 Oct 2019 12:54:50 GMT
server
AmazonS3
age
1627971
etag
"6fedc25eeb3b0b57727f204f291f52a1"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA2-C2, FRA2-C1
accept-ranges
bytes
content-length
1648
x-amz-cf-id
UwuyA459q78KGUhblCf0eoC_cHIhVlfw8ZghruadyruFWsVd7VDNiw==
expires
Wed, 28 Oct 2020 12:54:47 GMT
Artificial-Intelligence-64x64.jpg
media.threatpost.com/wp-content/uploads/sites/103/2018/08/23105243/
3 KB
3 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2018/08/23105243/Artificial-Intelligence-64x64.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:2200:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
c093719869fa0fa0375b76f64d9d01908527177983a0740ec475e2bf8dae79c9

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 21 Apr 2020 13:26:15 GMT
via
1.1 129372028f60828d8c084fb619a69bc0.cloudfront.net (CloudFront), 1.1 1ac3fd533bf6be1b511077f8b8e23bfd.cloudfront.net (CloudFront)
last-modified
Thu, 23 Aug 2018 14:52:46 GMT
server
AmazonS3
age
1808099
etag
"89110595e41b038a49ae024d66f9354e"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
DUS51-C1, FRA2-C1
accept-ranges
bytes
content-length
2924
x-amz-cf-id
q7njnz_Q3o43te3S9Wfn57wOPcQBFnkcGunoK7r40f7KAicRFXHNUQ==
expires
Fri, 23 Aug 2019 14:52:43 GMT
data-center-64x64.png
media.threatpost.com/wp-content/uploads/sites/103/2020/01/15162631/
8 KB
9 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/01/15162631/data-center-64x64.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:2200:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1d36800d5a9c72e02424db4f2ee2d3e3391388e8b7e863533f73c788df14ab5e

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 16 Feb 2020 06:15:20 GMT
via
1.1 a75b67932d84d80b40e12159613deb17.cloudfront.net (CloudFront), 1.1 1ac3fd533bf6be1b511077f8b8e23bfd.cloudfront.net (CloudFront)
last-modified
Wed, 15 Jan 2020 21:26:52 GMT
server
AmazonS3
age
7449954
etag
"93668d327fc4fcc8e57177484d96236e"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1, FRA2-C1
accept-ranges
bytes
content-length
8414
x-amz-cf-id
DWLUUVIpAIf-JlEkmf-s71LtSXBxF2FV7JvzQS2jUfhQQYTdsHrtNg==
expires
Thu, 14 Jan 2021 21:26:49 GMT
liveView.php
live.sekindo.com/live/
25 KB
8 KB
Script
General
Full URL
https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.17
Resource Hash
053d373bab6f84e514a7ce6e654d7787a8ae9c1264e1ab725073ef4665c14116

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:13 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.17
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/javascript; charset=utf-8
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
2 KB
1 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/gravityforms/js/jquery.json.min.js&ver=f818c007
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2156:2400:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
172314ff74044b918766ed4763279b5e8798622087c0a2930f59c9d44662213d
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:13 GMT
content-encoding
gzip
x-amz-cf-pop
FRA50-C1
x-cache
Miss from cloudfront
status
200
content-length
926
x-cache-hit
HIT
last-modified
Thu, 07 May 2020 08:44:23 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
via
1.1 b912dc97777020eb19579888add26978.cloudfront.net (CloudFront)
cache-control
max-age=86400
x-debug-auth
off
x-request-host
assets.threatpost.com
x-amz-cf-id
lSqTo9BAJ5DuLe8kAr1G_lfv8okTQv7qfadvcnLqfr-1QUJqX7ej5Q==
expires
Tue, 12 May 2020 20:29:48 GMT
gravityforms.min.js
threatpost.com/wp-content/plugins/gravityforms/js/
34 KB
12 KB
Script
General
Full URL
https://threatpost.com/wp-content/plugins/gravityforms/js/gravityforms.min.js?ver=2.4.17.15
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
3097d0444becd9d089b52b7074072f19201525de874d0775012572fb375b7838

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Tue, 12 May 2020 11:41:14 GMT
Content-Encoding
gzip
Last-Modified
Thu, 07 May 2020 08:44:22 GMT
Server
nginx
ETag
W/"5eb3ca66-88c2"
Transfer-Encoding
chunked
Content-Type
application/x-javascript
Cache-Control
max-age=604800, public
Connection
close
Expires
Tue, 19 May 2020 11:41:14 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
7 KB
3 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/gravityforms/js/conditional_logic.min.js&ver=f818c007
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2156:2400:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
f75166e3f70100b65a6ce1d4128bc15286e92b19a546fa7709f739e9bcfe52c6
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:13 GMT
content-encoding
gzip
x-amz-cf-pop
FRA50-C1
x-cache
Miss from cloudfront
status
200
content-length
2685
x-cache-hit
HIT
last-modified
Thu, 07 May 2020 08:44:22 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
via
1.1 b912dc97777020eb19579888add26978.cloudfront.net (CloudFront)
cache-control
max-age=86400
x-debug-auth
off
x-request-host
assets.threatpost.com
x-amz-cf-id
-39tyHOpH2DJel27-E2WxISjmJi6mKHwAcUaF0bJPXwOz2Itay2vIA==
expires
Tue, 12 May 2020 20:29:48 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
5 KB
2 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/gravityforms/js/placeholders.jquery.min.js&ver=f818c007
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2156:2400:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
d62a7b7ec5313469ebff5c006b9068dc44d6d1c122cf787ffa29a10113b34060
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:13 GMT
content-encoding
gzip
x-amz-cf-pop
FRA50-C1
x-cache
Miss from cloudfront
status
200
content-length
1747
x-cache-hit
HIT
last-modified
Thu, 07 May 2020 08:44:23 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
via
1.1 b912dc97777020eb19579888add26978.cloudfront.net (CloudFront)
cache-control
max-age=86400
x-debug-auth
off
x-request-host
assets.threatpost.com
x-amz-cf-id
llzoaax94nXcmMRrkTamL75YS2Pg8YRAEbzz-xzQGSNWHHjfw6-CiA==
expires
Tue, 12 May 2020 20:30:04 GMT
api.js
www.google.com/recaptcha/
676 B
541 B
Script
General
Full URL
https://www.google.com/recaptcha/api.js?hl=en&render=explicit&ver=5.3.2
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
f9c1c61861d1e9a7fc38e95ff08933dfd808bb8b8bcdf92f097cb329550f6a89
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self'
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
GSE
x-frame-options
SAMEORIGIN
content-type
text/javascript; charset=UTF-8
status
200
cache-control
private, max-age=300
content-security-policy
frame-ancestors 'self'
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
447
x-xss-protection
1; mode=block
expires
Tue, 12 May 2020 11:41:13 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
2 KB
1 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-includes/js/wp-embed.min.js,wp-content/plugins/akismet/_inc/form.js&ver=f818c007
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2156:2400:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
a2e2059610101cb4718d6d9cf8d6e44243838304968710f35ed7f44188a9c279
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:13 GMT
content-encoding
gzip
x-amz-cf-pop
FRA50-C1
x-cache
Miss from cloudfront
status
200
content-length
947
x-cache-hit
HIT
last-modified
Wed, 18 Dec 2019 22:32:15 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
via
1.1 b912dc97777020eb19579888add26978.cloudfront.net (CloudFront)
cache-control
max-age=86400
x-debug-auth
off
x-request-host
assets.threatpost.com
x-amz-cf-id
UatoWKL83SlYrLUuVLec_C2KKJYcy1_kZ2dFPYF3SciwZh9lrKrlYQ==
expires
Tue, 12 May 2020 20:30:04 GMT
b-0d4dfcb.js
tagan.adlightning.com/math-aids-threatpost/
36 KB
13 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.190.120 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-190-120.ham50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
667a53e3145f4c8b641a886082ce900423662980c5fe3d784383c3d481de2320

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 08 May 2020 19:59:37 GMT
content-encoding
gzip
age
315697
x-cache
Hit from cloudfront
status
200
content-length
12549
x-amz-meta-git_commit
0d4dfcb
last-modified
Wed, 22 Apr 2020 03:15:52 GMT
server
AmazonS3
etag
"17acdbb1a7a117b8f53f3f84e0db205b"
x-amz-version-id
HwMWPPcis1b0hnhKcUJr6rhRxxqLZtvX
via
1.1 b448bc80d67210455b28a7dbefe37288.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
HAM50-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
UgFQEtbtcyOLEq-07eyWQwRODlN7dOWRwITTd-Kz0gVscP4W73pTiA==
bl-2a28c82-32762cff.js
tagan.adlightning.com/math-aids-threatpost/
97 KB
41 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/bl-2a28c82-32762cff.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.190.120 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-190-120.ham50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
fb817c79f2a559d6870074fa7700993bf3d884b932dfc33de95c50c92af5ede4

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 11 May 2020 23:30:04 GMT
content-encoding
gzip
age
43870
x-cache
Hit from cloudfront
status
200
content-length
41270
x-amz-meta-git_commit
2a28c82
last-modified
Mon, 11 May 2020 22:58:08 GMT
server
AmazonS3
etag
"e7e719b00660de866367232eadc0ae46"
x-amz-version-id
l9KKfhnEd29jDfagdtU65VfoK7Hd1epd
via
1.1 b448bc80d67210455b28a7dbefe37288.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
HAM50-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
7voB7mteFhc84S4NGvlHNU7xJ8M5X7EmlQq96BdYZZFN1Hyo1pQk5A==
pubads_impl_2020050602.js
securepubads.g.doubleclick.net/gpt/
243 KB
87 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.18.98 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
zrh04s05-in-f98.1e100.net
Software
sffe /
Resource Hash
c4b5c1f949f059e3abb05ddcb7cc9944f8c16811e0eb1db9003bc5f8a4eb0634
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Tue, 12 May 2020 11:41:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 06 May 2020 17:23:28 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
89224
x-xss-protection
0
expires
Tue, 12 May 2020 11:41:12 GMT
integrator.sync.js
adservice.google.de/adsid/
113 B
175 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.sync.js?domain=threatpost.com
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ea03bfd7fdda1eac185ebc3e8e74b33065b04c8e0adc48cbbd4136748dbd2742
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 12 May 2020 11:41:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
108
x-xss-protection
0
fastlane.json
fastlane.rubiconproject.com/a/api/
306 B
788 B
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=19254&site_id=300372&zone_id=1509502&size_id=2&alt_size_ids=55%2C57&p_pos=atf&rp_schain=1.0,1!admetricspro.com,1005,1,,,&rf=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&tk_flint=pbjs_lite_v3.8.0&x_source.tid=4332f5b9-369b-4325-a9b4-278c80d2aa9f&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.5827781878712857
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
69.173.144.143 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
756ee365d84bd2d3bcbb9138f2cd0366756fc7ba2ffa26444c9068c26ca61eeb

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:13 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=295
Content-Length
306
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
284 B
766 B
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=19254&site_id=300372&zone_id=1509502&size_id=15&alt_size_ids=16&p_pos=atf&rp_schain=1.0,1!admetricspro.com,1005,1,,,&rf=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&tk_flint=pbjs_lite_v3.8.0&x_source.tid=95a8f9f9-d65a-4b65-84dc-83f2ebbe2a42&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.38979444980691347
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
69.173.144.143 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
d4d5a6c4e6afae6473392a5dff72f2a35e0e539913e7fa362fa60ce5dc446934

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:13 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=261
Content-Length
284
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
304 B
785 B
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=19254&site_id=300372&zone_id=1509506&size_id=15&alt_size_ids=10&p_pos=atf&rp_schain=1.0,1!admetricspro.com,1005,1,,,&rf=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&tk_flint=pbjs_lite_v3.8.0&x_source.tid=398bef0e-1228-4d92-9333-2e510f8695a8&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.24490477899817842
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
69.173.144.143 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
45c239782451315ded68ac5e7948af5016e0db966d8c7228af35fb54cfb96905

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:13 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=38
Content-Length
304
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
304 B
786 B
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=19254&site_id=300372&zone_id=1509502&size_id=15&alt_size_ids=10&p_pos=atf&rp_schain=1.0,1!admetricspro.com,1005,1,,,&rf=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&tk_flint=pbjs_lite_v3.8.0&x_source.tid=398bef0e-1228-4d92-9333-2e510f8695a8&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.20063813669840824
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
69.173.144.143 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
3ee8aa5085839aa7db9d7d5caa1137b4df567e8b0414f0e9dbedf926cb8994f1

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:13 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=325
Content-Length
304
Expires
Wed, 17 Sep 1975 21:32:10 GMT
cygnus
as-sec.casalemedia.com/
24 B
987 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?s=438654&v=7.2&r=%7B%22id%22%3A%22661268060246c6%22%2C%22imp%22%3A%5B%7B%22id%22%3A%2272b1294d7d8412%22%2C%22ext%22%3A%7B%22siteID%22%3A%22438654%22%2C%22sid%22%3A%22728x90%22%7D%2C%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%7D%2C%7B%22id%22%3A%22861badc571ddbe%22%2C%22ext%22%3A%7B%22siteID%22%3A%22438649%22%2C%22sid%22%3A%22300x250%22%7D%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%7D%2C%7B%22id%22%3A%2294ab1080032cb9%22%2C%22ext%22%3A%7B%22siteID%22%3A%22438650%22%2C%22sid%22%3A%22300x250%22%7D%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%7D%5D%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle%22%7D%2C%22ext%22%3A%7B%22source%22%3A%22prebid%22%7D%2C%22source%22%3A%7B%22ext%22%3A%7B%22schain%22%3A%7B%22ver%22%3A%221.0%22%2C%22complete%22%3A1%2C%22nodes%22%3A%5B%7B%22asi%22%3A%22admetricspro.com%22%2C%22sid%22%3A%221005%22%2C%22hp%22%3A1%7D%5D%7D%7D%7D%7D&ac=j&sd=1&
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.164 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-164.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
4efb91de13dbcf6d765af13a85001095ed2ffc0d8df5ff01bb89a686114af2f6

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:13 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Content-Length
44
Expires
Tue, 12 May 2020 11:41:13 GMT
bid
ap.lijit.com/rtb/
24 B
702 B
XHR
General
Full URL
https://ap.lijit.com/rtb/bid?src=prebid_prebid_3.8.0
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
72.251.249.9 Amsterdam, Netherlands, ASN29791 (VOXEL-DOT-NET, US),
Reverse DNS
Software
nginx /
Resource Hash
72efa1a6e9628af5b9d3c68c4d53270fdf8d03602c36a2b56804a14617f027ac

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Date
Tue, 12 May 2020 11:41:13 GMT
Content-Encoding
gzip
Server
nginx
Vary
Accept-Encoding, User-Agent
Access-Control-Allow-Methods
GET, POST, DELETE, PUT
Content-Type
application/json
Access-Control-Allow-Origin
https://threatpost.com
Access-Control-Allow-Credentials
true
X-Sovrn-Pod
ad_ap3ams1
Access-Control-Allow-Headers
X-Requested-With, Content-Type
Content-Length
44
prebid
ib.adnxs.com/ut/v3/
19 B
709 B
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
37.252.173.38 , Ascension Island, ASN29990 (ASN-APPNEX, US),
Reverse DNS
537.bm-nginx-loadbalancer.mgmt.fra1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
0c09c070833c786cb25be38bc30992b30bad578f817dbc9e34beacd8b8ea44c5
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:15 GMT
X-Proxy-Origin
194.99.105.99; 194.99.105.99; 537.bm-nginx-loadbalancer.mgmt.fra1; *.adnxs.com; 37.252.172.46:80
AN-X-Request-Uuid
ab3f9fde-448c-4671-912e-c3a3860f9735
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
19
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
arj
teachingaids-d.openx.net/w/1.0/
173 B
449 B
XHR
General
Full URL
https://teachingaids-d.openx.net/w/1.0/arj?ju=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&ch=UTF-8&res=1600x1200x24&ifr=false&tz=-120&tws=1600x1200&be=1&bc=hb_pb_3.0.1&dddid=4332f5b9-369b-4325-a9b4-278c80d2aa9f%2C4332f5b9-369b-4325-a9b4-278c80d2aa9f%2C95a8f9f9-d65a-4b65-84dc-83f2ebbe2a42%2C398bef0e-1228-4d92-9333-2e510f8695a8%2C398bef0e-1228-4d92-9333-2e510f8695a8&nocache=1589283673247&pubcid=2883a7ec-9993-418a-abd1-b82987413820&schain=1.0%2C1!admetricspro.com%2C1005%2C1%2C%2C%2C&aus=728x90%2C970x250%2C970x90%7C728x90%2C970x250%2C970x90%7C300x250%2C336x280%7C300x250%2C300x600%7C300x250%2C300x600&divIds=div-gpt-ad-6794670-2%2Cdiv-gpt-ad-6794670-2%2Cdiv-gpt-ad-6794670-3%2Cdiv-gpt-ad-6794670-5%2Cdiv-gpt-ad-6794670-5&auid=540932704%2C540932709%2C540932713%2C540932715%2C540932720&
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.185.0 /
Resource Hash
934278a996893ca53e03f070867a66f330c9c16129fb6426b4aacfcc1b8092b6

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:13 GMT
content-encoding
gzip
server
OXGW/16.185.0
status
200
vary
Accept, Accept-Encoding
p3p
CP="CUR ADM OUR NOR STA NID"
access-control-allow-origin
https://threatpost.com
cache-control
private, max-age=0, no-cache
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
content-length
165
via
1.1 google
expires
Mon, 26 Jul 1997 05:00:00 GMT
prebid
ib.adnxs.com/ut/v3/
19 B
709 B
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
37.252.173.38 , Ascension Island, ASN29990 (ASN-APPNEX, US),
Reverse DNS
537.bm-nginx-loadbalancer.mgmt.fra1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
0c09c070833c786cb25be38bc30992b30bad578f817dbc9e34beacd8b8ea44c5
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:15 GMT
X-Proxy-Origin
194.99.105.99; 194.99.105.99; 537.bm-nginx-loadbalancer.mgmt.fra1; *.adnxs.com; 37.252.173.43:80
AN-X-Request-Uuid
7e7d600b-02ba-4b0e-8f24-afac4272e252
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
19
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
v2
e.serverbid.com/api/
16 B
168 B
XHR
General
Full URL
https://e.serverbid.com/api/v2
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
167.172.1.14 , United States, ASN14061 (DIGITALOCEAN-ASN, US),
Reverse DNS
Software
/
Resource Hash
903eb8f1cc364e01930ba03579f049a72794aa91d1a5842a2edb6365e436bb7c

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

status
200
date
Tue, 12 May 2020 11:41:13 GMT
access-control-allow-credentials
true
access-control-allow-origin
https://threatpost.com
content-length
16
vary
Origin
content-type
application/json
ADTECH;apid=1A7b8b8cec-9445-11ea-88cb-12052abf3156;cfp=1;rndc=1589283672;v=2;cmd=bid;cors=yes;alias=46a47aaaedf4de2;misc=1589283673249
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=46a47aaaedf4de2;misc=1589283673249;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;cfp=1;rndc=1589283672;v=2;cmd=bid;cors=yes;alias=46a47aaaedf4de2;misc=1589283673249
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;apid=1A7b8b8cec-9445-11ea-88cb-12052abf3156;cfp=1;rndc=1589283672;v=2;cmd=bid;cors=yes;alias=46a47aaaedf4de2;misc=15...
945 B
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;apid=1A7b8b8cec-9445-11ea-88cb-12052abf3156;cfp=1;rndc=1589283672;v=2;cmd=bid;cors=yes;alias=46a47aaaedf4de2;misc=1589283673249
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:97b6:26be:138a:cba8:bb01 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
1540639fe9eb3321d98c91ffe9d63a0ee173943a4c5b162485461af899c223e2

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:13 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
945
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:13 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;apid=1A7b8b8cec-9445-11ea-88cb-12052abf3156;cfp=1;rndc=1589283672;v=2;cmd=bid;cors=yes;alias=46a47aaaedf4de2;misc=1589283673249
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A7b8abe7a-9445-11ea-8d8d-12794b40da64;cfp=1;rndc=1589283673;v=2;cmd=bid;cors=yes;alias=476863965b896f2;misc=1589283673249
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=476863965b896f2;misc=1589283673249;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;cfp=1;rndc=1589283672;v=2;cmd=bid;cors=yes;alias=476863965b896f2;misc=1589283673249
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;apid=1A7b8abe7a-9445-11ea-8d8d-12794b40da64;cfp=1;rndc=1589283673;v=2;cmd=bid;cors=yes;alias=476863965b896f2;misc=15...
945 B
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;apid=1A7b8abe7a-9445-11ea-8d8d-12794b40da64;cfp=1;rndc=1589283673;v=2;cmd=bid;cors=yes;alias=476863965b896f2;misc=1589283673249
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:97b6:26be:138a:cba8:bb01 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
317919328ed72f19433562bf1f379cbfde7e05dd1fc8363e4f7f3c892b613fae

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:13 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
945
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:13 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;apid=1A7b8abe7a-9445-11ea-8d8d-12794b40da64;cfp=1;rndc=1589283673;v=2;cmd=bid;cors=yes;alias=476863965b896f2;misc=1589283673249
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A7b8b8dc8-9445-11ea-a141-12a779b12fd4;cfp=1;rndc=1589283672;v=2;cmd=bid;cors=yes;alias=48a1f598dbd984f;misc=1589283673250
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=48a1f598dbd984f;misc=1589283673250;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;cfp=1;rndc=1589283672;v=2;cmd=bid;cors=yes;alias=48a1f598dbd984f;misc=1589283673250
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;apid=1A7b8b8dc8-9445-11ea-a141-12a779b12fd4;cfp=1;rndc=1589283672;v=2;cmd=bid;cors=yes;alias=48a1f598dbd984f;misc=15...
945 B
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;apid=1A7b8b8dc8-9445-11ea-a141-12a779b12fd4;cfp=1;rndc=1589283672;v=2;cmd=bid;cors=yes;alias=48a1f598dbd984f;misc=1589283673250
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:97b6:26be:138a:cba8:bb01 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
c576ee8137401655e465693036e62c675d4941395045f926d5d0f7820142500f

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:13 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
945
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:13 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;apid=1A7b8b8dc8-9445-11ea-a141-12a779b12fd4;cfp=1;rndc=1589283672;v=2;cmd=bid;cors=yes;alias=48a1f598dbd984f;misc=1589283673250
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A7b88b7f6-9445-11ea-89a6-12bd5c3e34a0;cfp=1;rndc=1589283673;v=2;cmd=bid;cors=yes;alias=49e173b451cbbc6;misc=1589283673250
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=49e173b451cbbc6;misc=1589283673250;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;cfp=1;rndc=1589283673;v=2;cmd=bid;cors=yes;alias=49e173b451cbbc6;misc=1589283673250
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;apid=1A7b88b7f6-9445-11ea-89a6-12bd5c3e34a0;cfp=1;rndc=1589283673;v=2;cmd=bid;cors=yes;alias=49e173b451cbbc6;misc=15...
943 B
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;apid=1A7b88b7f6-9445-11ea-89a6-12bd5c3e34a0;cfp=1;rndc=1589283673;v=2;cmd=bid;cors=yes;alias=49e173b451cbbc6;misc=1589283673250
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:97b6:26be:138a:cba8:bb01 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
edb78ce0aba1807f9601717a7193f809cd387159c291339cd821b699a0a891c3

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:13 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
x-adtech-meta
{"Debug": {"IP": "0.0.0.0", "Selector": "pri-select024c.us-east-1.prod.adtech.aolcloud.net", "UserId": "BE623D562DD7834979A4839FF669D209"}}
content-type
application/json
content-length
943
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:13 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;apid=1A7b88b7f6-9445-11ea-89a6-12bd5c3e34a0;cfp=1;rndc=1589283673;v=2;cmd=bid;cors=yes;alias=49e173b451cbbc6;misc=1589283673250
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A7b89946e-9445-11ea-a847-120d915f11b6;cfp=1;rndc=1589283672;v=2;cmd=bid;cors=yes;alias=5070ca1a60982d2;misc=1589283673250
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=5070ca1a60982d2;misc=1589283673250;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;cfp=1;rndc=1589283672;v=2;cmd=bid;cors=yes;alias=5070ca1a60982d2;misc=1589283673250
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;apid=1A7b89946e-9445-11ea-a847-120d915f11b6;cfp=1;rndc=1589283672;v=2;cmd=bid;cors=yes;alias=5070ca1a60982d2;misc=15...
945 B
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;apid=1A7b89946e-9445-11ea-a847-120d915f11b6;cfp=1;rndc=1589283672;v=2;cmd=bid;cors=yes;alias=5070ca1a60982d2;misc=1589283673250
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:97b6:26be:138a:cba8:bb01 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
1f9dac2780fe33ed527005c2b5b8948f0b71dfb862af79d5435fd13143490b9e

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:13 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
x-adtech-meta
{"Debug": {"IP": "0.0.0.0", "Selector": "pri-select026c.us-east-1.prod.adtech.aolcloud.net", "UserId": "2D8289F8D916490442137EE9F12B9417"}}
content-type
application/json
content-length
945
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:13 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;apid=1A7b89946e-9445-11ea-a847-120d915f11b6;cfp=1;rndc=1589283672;v=2;cmd=bid;cors=yes;alias=5070ca1a60982d2;misc=1589283673250
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
translator
hbopenbid.pubmatic.com/
0
115 B
XHR
General
Full URL
https://hbopenbid.pubmatic.com/translator?source=prebid-client
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.112 , United Kingdom, ASN62713 (AS-PUBMATIC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

status
204
date
Tue, 12 May 2020 11:41:13 GMT
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
access-control-allow-origin
https://threatpost.com
gtm.js
www.googletagmanager.com/
108 KB
35 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-PM29HLF
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
3dca97fad187c2100c007d80658097ff85d5807dcf8c9d8f05259d0c834ed14c
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:13 GMT
content-encoding
br
vary
Accept-Encoding
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35736
x-xss-protection
0
last-modified
Tue, 12 May 2020 09:00:00 GMT
server
Google Tag Manager
strict-transport-security
max-age=31536000; includeSubDomains
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Tue, 12 May 2020 11:41:13 GMT
icons.svg
threatpost.com/wp-content/themes/threatpost-2018//assets/sprite/
11 KB
4 KB
Other
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018//assets/sprite/icons.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
76ba07e059d9e2113f9c940f1a31efc95bd9d5badd68bbc3637177e892a08099

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Tue, 12 May 2020 11:41:14 GMT
Content-Encoding
gzip
Last-Modified
Thu, 07 May 2020 08:44:25 GMT
Server
nginx
ETag
W/"5eb3ca69-2b9f"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Tue, 19 May 2020 11:41:14 GMT
icons.svg
threatpost.com/wp-content/themes/threatpost-2018/assets/sprite/
11 KB
4 KB
Other
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/sprite/icons.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
76ba07e059d9e2113f9c940f1a31efc95bd9d5badd68bbc3637177e892a08099

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Tue, 12 May 2020 11:41:14 GMT
Content-Encoding
gzip
Last-Modified
Thu, 07 May 2020 08:44:25 GMT
Server
nginx
ETag
W/"5eb3ca69-2b9f"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Tue, 19 May 2020 11:41:14 GMT
recaptcha__en.js
www.gstatic.com/recaptcha/releases/JPZ52lNx97aD96bjM7KaA0bo/
299 KB
122 KB
Script
General
Full URL
https://www.gstatic.com/recaptcha/releases/JPZ52lNx97aD96bjM7KaA0bo/recaptcha__en.js
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api.js?hl=en
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5330600f68293b69db933eba611413ffaa46ad7c992116b06933c620d7a3c43c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 11 May 2020 21:43:31 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 11 May 2020 19:09:25 GMT
server
sffe
age
50262
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
124431
x-xss-protection
0
expires
Tue, 11 May 2021 21:43:31 GMT
logo.png
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
19 KB
19 KB
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/logo.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
39af7c1116fb967a330e8770f775e6b5ee871add01ed45c98a1634911cebfb0a

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1588841065
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Tue, 12 May 2020 11:41:14 GMT
Last-Modified
Thu, 07 May 2020 08:44:25 GMT
Server
nginx
ETag
"5eb3ca69-4a32"
Content-Type
image/png
Cache-Control
max-age=604800, public
Connection
close
Accept-Ranges
bytes
Content-Length
18994
Expires
Tue, 19 May 2020 11:41:14 GMT
museosans-300-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-300-webfont.woff2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
45ddc09b0ad6ab916bd9a0282070b161045e186fc025303f4aa1aa821fc45ac7

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1588841065
Origin
https://threatpost.com

Response headers

Pragma
public
Date
Tue, 12 May 2020 11:41:13 GMT
Last-Modified
Thu, 07 May 2020 08:44:25 GMT
Server
nginx
ETag
"5eb3ca69-51b8"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
20920
Expires
Wed, 12 May 2021 11:41:13 GMT
museosans-700-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-700-webfont.woff2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
ae00ae9c862bc8b8923efd1d9a18befa912678a869d4dd01179a59ed3de731be

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1588841065
Origin
https://threatpost.com

Response headers

Pragma
public
Date
Tue, 12 May 2020 11:41:13 GMT
Last-Modified
Thu, 07 May 2020 08:44:26 GMT
Server
nginx
ETag
"5eb3ca6a-51a4"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
20900
Expires
Wed, 12 May 2021 11:41:13 GMT
museosans-100-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-100-webfont.woff2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
06fc565587b8b700936a1677218cb269a6cc31ca5f701eb45461e86a3d54d5c7

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1588841065
Origin
https://threatpost.com

Response headers

Pragma
public
Date
Tue, 12 May 2020 11:41:13 GMT
Last-Modified
Thu, 07 May 2020 08:44:25 GMT
Server
nginx
ETag
"5eb3ca69-50c8"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
20680
Expires
Wed, 12 May 2021 11:41:13 GMT
museosans-500-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-500-webfont.woff2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
2de77164bb9924542e1dea4ee4a0ff27d40b51a3d7939dac7db11a95045c9b7d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1588841065
Origin
https://threatpost.com

Response headers

Pragma
public
Date
Tue, 12 May 2020 11:41:13 GMT
Last-Modified
Thu, 07 May 2020 08:44:26 GMT
Server
nginx
ETag
"5eb3ca6a-5194"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
20884
Expires
Wed, 12 May 2021 11:41:13 GMT
museosans-700italic-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
15 KB
16 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-700italic-webfont.woff2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
859faa9b9ed0990288b2f393a102b1fe2668ac79088b113b6f0beaee521221eb

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1588841065
Origin
https://threatpost.com

Response headers

Pragma
public
Date
Tue, 12 May 2020 11:41:13 GMT
Last-Modified
Thu, 07 May 2020 08:44:25 GMT
Server
nginx
ETag
"5eb3ca69-3dcc"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
15820
Expires
Wed, 12 May 2021 11:41:13 GMT
museosans-300italic-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
23 KB
23 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-300italic-webfont.woff2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
f8a2b5b62eb722c3379b30cf0cc58d3176ee6be48036d6ad2aa838d2029c4189

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1588841065
Origin
https://threatpost.com

Response headers

Pragma
public
Date
Tue, 12 May 2020 11:41:13 GMT
Last-Modified
Thu, 07 May 2020 08:44:26 GMT
Server
nginx
ETag
"5eb3ca6a-5bac"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
23468
Expires
Wed, 12 May 2021 11:41:13 GMT
mail-plane-light.svg
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
828 B
722 B
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/mail-plane-light.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
5a7ed822968963e31d88424c96387ad9f4fd4f4b5a5b581a33f65e3784d162cf

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1588841065
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Tue, 12 May 2020 11:41:14 GMT
Content-Encoding
gzip
Last-Modified
Thu, 07 May 2020 08:44:26 GMT
Server
nginx
ETag
W/"5eb3ca6a-33c"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Tue, 19 May 2020 11:41:14 GMT
twitter-blue.svg
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
868 B
847 B
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/twitter-blue.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
420508fc523520f35de5c851905543294123d7676b5a5668744691f2abe9e730

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1588841065
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Tue, 12 May 2020 11:41:14 GMT
Content-Encoding
gzip
Last-Modified
Thu, 07 May 2020 08:44:25 GMT
Server
nginx
ETag
W/"5eb3ca69-364"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Tue, 19 May 2020 11:41:14 GMT
liveView.php
live.sekindo.com/live/ Frame 0BD9
2 KB
2 KB
Script
General
Full URL
https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1589283673&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=undefined&flowCloseButtonPosition=right
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.17
Resource Hash
10f43fa1b2be579d4d7e4afcad0ca58794d485db155ea7eabac80f925a1ea858

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:12 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.17
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/javascript; charset=utf-8
mail-plane-large-dark.svg
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
812 B
722 B
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/mail-plane-large-dark.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
a9d2b2df99c1a115d5394c70a898d8801092208dc582f8bd6fb01b35c30d6b22

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1588841065
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Tue, 12 May 2020 11:41:14 GMT
Content-Encoding
gzip
Last-Modified
Thu, 07 May 2020 08:44:26 GMT
Server
nginx
ETag
W/"5eb3ca6a-32c"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Tue, 19 May 2020 11:41:14 GMT
logo-white.png
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
10 KB
10 KB
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/logo-white.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
e4058d4ee9da1ceaddfa91ddb63650ba67285f1bbfee487d9dfe648bced669a0

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1588841065
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Tue, 12 May 2020 11:41:14 GMT
Last-Modified
Thu, 07 May 2020 08:44:26 GMT
Server
nginx
ETag
"5eb3ca6a-260a"
Content-Type
image/png
Cache-Control
max-age=604800, public
Connection
close
Accept-Ranges
bytes
Content-Length
9738
Expires
Tue, 19 May 2020 11:41:14 GMT
analytics.js
www.google-analytics.com/
45 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-PM29HLF
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
2f1fd973e6c48489ae07c467e3278635b856c698d1f502e06af3ab555937deac
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 30 Apr 2020 21:54:13 GMT
server
Golfe2
age
2694
date
Tue, 12 May 2020 10:56:19 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18433
expires
Tue, 12 May 2020 12:56:19 GMT
quant.js
secure.quantserve.com/
21 KB
8 KB
Script
General
Full URL
https://secure.quantserve.com/quant.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-PM29HLF
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.152 , United Kingdom, ASN27281 (QUANTCAST, US),
Reverse DNS
Software
QS /
Resource Hash
b68b4d1e6d63eabb8a4f663f7755454028aa22d9a0edc88d5b77c58e932d7fa0
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 May 2020 11:41:13 GMT
Content-Encoding
gzip
Last-Modified
Tue, 12-May-2020 11:41:13 GMT
Server
QS
Etag
M0-004a9efe
Vary
Accept-Encoding
Connection
keep-alive
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=604800
Strict-Transport-Security
max-age=86400
Content-Length
8025
Expires
Tue, 19 May 2020 11:41:13 GMT
uwt.js
static.ads-twitter.com/
5 KB
2 KB
Script
General
Full URL
https://static.ads-twitter.com/uwt.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-PM29HLF
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.12.157 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
319949c8c08b86e9c35ea542c0dc0c30cedaa9b8d3d3c3327a36c91aefbd8af5

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:13 GMT
content-encoding
gzip
age
41882
x-cache
HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
1954
x-served-by
cache-fra19124-FRA
last-modified
Tue, 23 Jan 2018 20:09:00 GMT
x-timer
S1589283674.600038,VS0,VE0
etag
"b7b33882a4f3ffd5cbf07434f3137166+gzip"
vary
Accept-Encoding,Host
content-type
application/javascript; charset=utf-8
via
1.1 varnish
cache-control
no-cache
accept-ranges
bytes
iab_consent_sdk.v1.0.js
live.sekindo.com/content/ClientDetections/ Frame 0BD9
19 KB
6 KB
Script
General
Full URL
https://live.sekindo.com/content/ClientDetections/iab_consent_sdk.v1.0.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1589283673&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=undefined&flowCloseButtonPosition=right
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
a3336e3373c170b40764f5a62d121335bec4243b0034e561937194dfe2e413fd

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 May 2020 11:41:13 GMT
Content-Encoding
gzip
Last-Modified
Wed, 12 Feb 2020 15:01:36 GMT
Server
nginx
ETag
W/"5e441350-4be0"
Transfer-Encoding
chunked
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Expires
Wed, 12 May 2021 11:41:13 GMT
DetectGDPR2.v1.0.js
live.sekindo.com/content/ClientDetections/ Frame 0BD9
8 KB
3 KB
Script
General
Full URL
https://live.sekindo.com/content/ClientDetections/DetectGDPR2.v1.0.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1589283673&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=undefined&flowCloseButtonPosition=right
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
ace61d80f3fe90bbb02ab328d9705b57a9c8a95d3a0bf6b4cd510d4dacd033df

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 May 2020 11:41:13 GMT
Content-Encoding
gzip
Last-Modified
Sun, 26 Jan 2020 18:48:12 GMT
Server
nginx
ETag
W/"5e2ddeec-211f"
Transfer-Encoding
chunked
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Expires
Wed, 12 May 2021 11:41:13 GMT
DetectGDPR.v1.0.js
live.sekindo.com/content/ClientDetections/ Frame 0BD9
7 KB
3 KB
Script
General
Full URL
https://live.sekindo.com/content/ClientDetections/DetectGDPR.v1.0.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1589283673&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=undefined&flowCloseButtonPosition=right
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
993ebc45d9927d420801f05819222e8cc1aa523187e4c0b290df02b23ce18093

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 May 2020 11:41:12 GMT
Content-Encoding
gzip
Last-Modified
Sun, 26 Jan 2020 11:58:13 GMT
Server
nginx
ETag
W/"5e2d7ed5-1d87"
Transfer-Encoding
chunked
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Expires
Wed, 12 May 2021 11:41:12 GMT
hls.0.12.4_1.min.js
live.sekindo.com/content/video/hls/ Frame 0BD9
247 KB
85 KB
Script
General
Full URL
https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1589283673&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=undefined&flowCloseButtonPosition=right
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
7d0492c66125b1c2bdc419641e41542857e7d90e323d355ee0b8bb268da121fb

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 May 2020 11:41:13 GMT
Content-Encoding
gzip
Last-Modified
Mon, 06 Jan 2020 15:31:56 GMT
Server
nginx
ETag
W/"5e1352ec-3dcb9"
Transfer-Encoding
chunked
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Expires
Wed, 12 May 2021 11:41:13 GMT
prebidVid.2.44.3_4.min.js
live.sekindo.com/content/prebid/ Frame 0BD9
272 KB
101 KB
Script
General
Full URL
https://live.sekindo.com/content/prebid/prebidVid.2.44.3_4.min.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1589283673&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=undefined&flowCloseButtonPosition=right
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
2c167f4042d1338b33e2822f3b3dca3646bffcac14747d934c50794192dc3c2b

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 May 2020 11:41:13 GMT
Content-Encoding
gzip
Last-Modified
Mon, 04 May 2020 09:21:08 GMT
Server
nginx
ETag
W/"5eafde84-4415a"
Transfer-Encoding
chunked
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Expires
Wed, 12 May 2021 11:41:13 GMT
liveVideo.php
live.sekindo.com/live/ Frame 0BD9
411 KB
116 KB
Script
General
Full URL
https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30352D31325F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386756305A4D6157317064434176494445674C7941784D413D3D7D7B4C363631357DFEFE&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+WFLimit+%2F+1+%2F+10&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5eba8b596cf00&debugInfo=12348808_ABT+%2F+WFLimit+%2F+1+%2F+10&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.15890121459961&geoLong=21.000499725341797&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1589283673&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=undefined&flowCloseButtonPosition=right
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.17
Resource Hash
40241cf406333acae54b8a6bfaf47a19b305f658fc4a8669183a7042b6dd58c4

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 May 2020 11:41:13 GMT
Content-Encoding
gzip
Server
nginx
X-Powered-By
PHP/7.3.17
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j82&aip=1&a=417819229&t=pageview&_s=1&dl=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyo...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-35676203-21&cid=754605376.1589283674&jid=1993136885&_gid=447062235.1589283674&gjid=1360722046&_v=j82&z=1944393540
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=754605376.1589283674&jid=1993136885&_v=j82&z=1944393540
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=754605376.1589283674&jid=1993136885&_v=j82&z=1944393540&slf_rd=1&random=2081072759
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=754605376.1589283674&jid=1993136885&_v=j82&z=1944393540&slf_rd=1&random=2081072759
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:13 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:13 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=754605376.1589283674&jid=1993136885&_v=j82&z=1944393540&slf_rd=1&random=2081072759
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
adsct
t.co/i/
43 B
449 B
Image
General
Full URL
https://t.co/i/adsct?p_id=Twitter&p_user_id=0&txn_id=ntt0j&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.197 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=0
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
content-length
65
x-xss-protection
0
x-response-time
112
pragma
no-cache
last-modified
Tue, 12 May 2020 11:41:13 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=0
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
2075f0f4b39c570452191dff563af8fe
x-transaction
007548240089033a
expires
Tue, 31 Mar 1981 05:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
28 KB
8 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=1912889216903941&correlator=2424756415436652&output=ldjh&impl=fifs&adsid=NT&vrg=2020050602&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200512&iu_parts=21707124336%2CThreatPost-970x250-ATF%2CThreatPost-300x250-ATF%2CThreatPost-300x600-ATF%2CThreatPost-2x2-Skin&enc_prev_ius=%2F0%2F1%2C%2F0%2F2%2C%2F0%2F3%2C%2F0%2F4&prev_iu_szs=728x90%7C970x250%7C970x90%2C300x250%7C336x280%2C300x250%7C300x600%2C2x2&eri=1&cust_params=urlhost%3Dhttps%253A%252F%252Fthreatpost.com%252F%26urlpath%3D%252Fmicrosoft-teams-impersonation-attacks%252F155404%252F%26urlquery%3Dgoogfc%26contentid%3D155404%26category%3Dcloud-security%26contenttags%3Dabnormal-security%252Ccisa-warning%252Ccredential-theft%252Ccyberattacks%252Cemail-attacks%252Cimpersonation%252Cmicrosoft-teams%252Coffice-365%252Cphishing&cookie_enabled=1&bc=31&abxe=1&lmt=1589283673&dt=1589283673706&dlt=1589283672286&idt=881&frm=20&biw=1585&bih=1200&oid=3&adxs=429%2C1075%2C1075%2C0&adys=10%2C257%2C1585%2C0&adks=1015519800%2C654286612%2C375389812%2C3385906655&ucis=1%7C2%7C3%7C4&ifi=1&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&dssz=40&icsg=176173059&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=728x90%7C300x250%7C300x250%7C1585x2&msz=728x90%7C300x250%7C300x250%7C1585x2&ga_vid=754605376.1589283674&ga_sid=1589283674&ga_hid=417819229&fws=0%2C0%2C0%2C0&ohw=0%2C0%2C0%2C0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.18.98 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
zrh04s05-in-f98.1e100.net
Software
cafe /
Resource Hash
66852915d857370a739afdc833bfb50d9506b32641e81c704d85838ce6416a48
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:14 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
7880
x-xss-protection
0
google-lineitem-id
5256160727,5192374023,5192770279,5283645110
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138298726560,138290277593,138293210928,138301519116
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://threatpost.com
access-control-expose-headers
x-google-amp-ad-validated-version
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

rules-p-_7kVx0t9Jqj90.js
rules.quantcount.com/
3 B
354 B
Script
General
Full URL
https://rules.quantcount.com/rules-p-_7kVx0t9Jqj90.js
Requested by
Host: secure.quantserve.com
URL: https://secure.quantserve.com/quant.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:2c00:6:44e3:f8c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:39:33 GMT
via
1.1 3aed5a4f89d72775aaf2cc5a5f642386.cloudfront.net (CloudFront)
last-modified
Fri, 03 Mar 2017 23:52:35 GMT
server
AmazonS3
age
102
etag
"8a80554c91d9fca8acb82f023de02f11"
x-cache
Error from cloudfront
content-type
application/x-javascript
status
200
cache-control
max-age=300
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-length
3
x-amz-cf-id
hilQ_IPHRsgeAnbNKKayFKTTzvEt5aaAQGZ-H_mNudR2iiBsBU4UiQ==
apstag.js
c.amazon-adsystem.com/aax2/ Frame 0BD9
101 KB
26 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30352D31325F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386756305A4D6157317064434176494445674C7941784D413D3D7D7B4C363631357DFEFE&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+WFLimit+%2F+1+%2F+10&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5eba8b596cf00&debugInfo=12348808_ABT+%2F+WFLimit+%2F+1+%2F+10&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.15890121459961&geoLong=21.000499725341797&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.90.242 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-90-242.fra50.r.cloudfront.net
Software
Server /
Resource Hash
0875862efc0b3318a2104d27726d71f6f61d95a6e04ef6becb2793e66b2bc27a

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 11 May 2020 14:04:57 GMT
content-encoding
gzip
server
Server
age
77776
etag
ad48a5f558eb50f381edaa87211f6c91
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=86400
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
timing-allow-origin
*
x-amz-cf-id
X3i7gNNGFTH9UdIO20YNWOGBojvDXZeMJ6ncQewTOJmKfy3rmWMhRw==
via
1.1 baaf38f0a0d54e4834bf934fa5189ceb.cloudfront.net (CloudFront)
css
fonts.googleapis.com/ Frame 40B5
2 KB
684 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto&display=swap
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30352D31325F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386756305A4D6157317064434176494445674C7941784D413D3D7D7B4C363631357DFEFE&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+WFLimit+%2F+1+%2F+10&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5eba8b596cf00&debugInfo=12348808_ABT+%2F+WFLimit+%2F+1+%2F+10&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.15890121459961&geoLong=21.000499725341797&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
00d4fbacbadc6ecbd73be323ec77febf3d856ce00dc5334d06462a315c7da8e7
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Tue, 12 May 2020 11:41:13 GMT
server
ESF
date
Tue, 12 May 2020 11:41:13 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Tue, 12 May 2020 11:41:13 GMT
css
fonts.googleapis.com/ Frame 9E23
2 KB
684 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto&display=swap
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30352D31325F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386756305A4D6157317064434176494445674C7941784D413D3D7D7B4C363631357DFEFE&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+WFLimit+%2F+1+%2F+10&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5eba8b596cf00&debugInfo=12348808_ABT+%2F+WFLimit+%2F+1+%2F+10&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.15890121459961&geoLong=21.000499725341797&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
00d4fbacbadc6ecbd73be323ec77febf3d856ce00dc5334d06462a315c7da8e7
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Tue, 12 May 2020 11:41:14 GMT
server
ESF
date
Tue, 12 May 2020 11:41:14 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Tue, 12 May 2020 11:41:14 GMT
user_sync.html
ads.pubmatic.com/AdServer/js/ Frame FD76
0
0
Document
General
Full URL
https://ads.pubmatic.com/AdServer/js/user_sync.html?p=159196&userIdMacro=PM_UID&gdpr=1&gdpr_consent=&predirect=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D91%26advUuid%3DPM_UID%26gdpr%3D1%26gdpr_consent%3D
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30352D31325F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386756305A4D6157317064434176494445674C7941784D413D3D7D7B4C363631357DFEFE&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+WFLimit+%2F+1+%2F+10&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5eba8b596cf00&debugInfo=12348808_ABT+%2F+WFLimit+%2F+1+%2F+10&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.15890121459961&geoLong=21.000499725341797&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.92 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-92.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) /
Resource Hash

Request headers

Host
ads.pubmatic.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article

Response headers

Last-Modified
Tue, 14 Apr 2020 10:28:34 GMT
ETag
"1300708-2eae-5a33da96f833f"
Server
Apache/2.2.15 (CentOS)
Accept-Ranges
bytes
Content-Encoding
gzip
P3P
CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC", CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Content-Length
4169
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=76428
Expires
Wed, 13 May 2020 08:55:02 GMT
Date
Tue, 12 May 2020 11:41:14 GMT
Connection
keep-alive
Vary
Accept-Encoding
placeHolder.png
live.sekindo.com/content/video/splayer/assets/
23 KB
24 KB
Image
General
Full URL
https://live.sekindo.com/content/video/splayer/assets/placeHolder.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
76102878c1198de858725194952ba1c6b35bdee0f870cc6a124e93d17385e64e

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 May 2020 11:41:13 GMT
Last-Modified
Sun, 11 Jun 2017 08:03:58 GMT
Server
nginx
ETag
"593cf96e-5dbf"
Content-Type
image/png
Cache-Control
no-cache, private
Accept-Ranges
bytes
Content-Length
23999
Expires
Tue, 12 May 2020 11:41:12 GMT
vid5d27a94dbd11b325394733.jpg
video.sekindo.com/uploads/cn2/video/users/converted/24485/video_5c74e337b0b1c456249184/ Frame 9E23
16 KB
17 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn2/video/users/converted/24485/video_5c74e337b0b1c456249184/vid5d27a94dbd11b325394733.jpg?cbuster=1567601184
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.96.211 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
be80ad5e82c559e08cea242584f1ed7d1a7741ba00ddb8b71ab792fd236c0efb
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 May 2020 11:41:13 GMT
Last-Modified
Thu, 11 Jul 2019 21:30:24 GMT
Server
Tengine
ETag
"5d27aa70-40a6"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
16550
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5eb0405c255a4496381919.jpg
video.sekindo.com/uploads/cn13/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 9E23
7 KB
8 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn13/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5eb0405c255a4496381919.jpg?cbuster=1588609119
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.96.211 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
5ba8ef0da1dcc34d139660c846ec54fb0d775940b11966251d235c1578ff6f87
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 May 2020 11:41:13 GMT
Last-Modified
Mon, 04 May 2020 16:53:05 GMT
Server
Tengine
ETag
"5eb04871-1de1"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
7649
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5ea9b134a2572065315780.jpg
video.sekindo.com/uploads/cn14/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 9E23
10 KB
10 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn14/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5ea9b134a2572065315780.jpg?cbuster=1588179256
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.96.211 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
2264d1adc9a2943dff769c67f74bb3451f92c0e22de0bfd265d43cad7960ba3f
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 May 2020 11:41:13 GMT
Last-Modified
Wed, 29 Apr 2020 17:19:23 GMT
Server
Tengine
ETag
"5ea9b71b-27b6"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
10166
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5ea9b1310b068262966464.jpg
video.sekindo.com/uploads/cn14/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 9E23
20 KB
21 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn14/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5ea9b1310b068262966464.jpg?cbuster=1588179252
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.96.211 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
e06616d095afb6debcaa29e8708a95d1aad89145aabbcf104f205f8331ed7728
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 May 2020 11:41:13 GMT
Last-Modified
Wed, 29 Apr 2020 17:19:18 GMT
Server
Tengine
ETag
"5ea9b716-51d7"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
20951
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5ea9b12a2b080511747751.jpg
video.sekindo.com/uploads/cn14/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 9E23
12 KB
13 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn14/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5ea9b12a2b080511747751.jpg?cbuster=1588179246
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.96.211 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
3bc8c6062c104270a0fdd4a021264fd8cc70a25dc9513f2367082e15b3ded839
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 May 2020 11:41:13 GMT
Last-Modified
Wed, 29 Apr 2020 17:19:14 GMT
Server
Tengine
ETag
"5ea9b712-313b"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
12603
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5eac29a89cbdc513790848.jpg
video.sekindo.com/uploads/cn13/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 9E23
16 KB
16 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn13/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5eac29a89cbdc513790848.jpg?cbuster=1588341172
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.96.211 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
85055b2bd2813119f5d846f6084e183be9800ea624cf0ed4540ec7655f870eb3
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 May 2020 11:41:13 GMT
Last-Modified
Fri, 01 May 2020 14:01:48 GMT
Server
Tengine
ETag
"5eac2bcc-3e29"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
15913
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5eb427ad3921b097296914.jpg
video.sekindo.com/uploads/cn15/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 9E23
15 KB
16 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn15/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5eb427ad3921b097296914.jpg?cbuster=1588864944
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.96.211 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
683e1b018e8f26073c9d28cc27d021f3bb04a624bb12322d1c9015ae0be5561c
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 May 2020 11:41:13 GMT
Last-Modified
Thu, 07 May 2020 15:39:11 GMT
Server
Tengine
ETag
"5eb42b9f-3cf7"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
15607
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5eac29a4d3159436361928.jpg
video.sekindo.com/uploads/cn13/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 9E23
22 KB
23 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn13/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5eac29a4d3159436361928.jpg?cbuster=1588341160
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.96.211 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
00e3d76bc28c0bba7a096ce2072223eac6fb0e704c7d95262e0a2eb1fe4aa7d2
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 May 2020 11:41:13 GMT
Last-Modified
Fri, 01 May 2020 14:01:42 GMT
Server
Tengine
ETag
"5eac2bc6-5892"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
22674
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5eaabd17d0e07203293976.jpg
video.sekindo.com/uploads/cn14/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 9E23
7 KB
8 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn14/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5eaabd17d0e07203293976.jpg?cbuster=1588247839
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.96.211 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
e8a8c38a4d34ff1b394ec479ab194b2e0659c402f027fb04b9eb90881d3b23f3
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 May 2020 11:41:13 GMT
Last-Modified
Thu, 30 Apr 2020 12:05:31 GMT
Server
Tengine
ETag
"5eaabf0b-1d8c"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
7564
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5eab197cb7742854461958.jpg
video.sekindo.com/uploads/cn13/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 9E23
4 KB
4 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn13/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5eab197cb7742854461958.jpg?cbuster=1588271494
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.96.211 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
def79cde0ac4d7ee1bd4e8ce443b36005949f3f727561279b24b73ae253b2443
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 May 2020 11:41:13 GMT
Last-Modified
Thu, 30 Apr 2020 19:02:19 GMT
Server
Tengine
ETag
"5eab20bb-ff4"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
4084
Expires
Thu, 31 Dec 2037 23:55:55 GMT
sync
x.bidswitch.net/ul_cb/ Frame 0BD9
Redirect Chain
  • https://x.bidswitch.net/sync?ssp=sekindo&user_id=5eba8b596cf00&custom_data=5eba8b596cf00&gdpr=1&gdpr_consent=
  • https://x.bidswitch.net/ul_cb/sync?ssp=sekindo&user_id=5eba8b596cf00&custom_data=5eba8b596cf00&gdpr=1&gdpr_consent=
43 B
378 B
Image
General
Full URL
https://x.bidswitch.net/ul_cb/sync?ssp=sekindo&user_id=5eba8b596cf00&custom_data=5eba8b596cf00&gdpr=1&gdpr_consent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.58.23.168 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-58-23-168.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Tue, 12 May 2020 11:41:14 GMT
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
content-length
43
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"

Redirect headers

status
302
date
Tue, 12 May 2020 11:41:14 GMT
cache-control
no-cache, no-store, must-revalidate
content-length
0
location
https://x.bidswitch.net/ul_cb/sync?ssp=sekindo&user_id=5eba8b596cf00&custom_data=5eba8b596cf00&gdpr=1&gdpr_consent=
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
liveCS.php
live.sekindo.com/live/ Frame 0BD9
Redirect Chain
  • https://csync.loopme.me/?redirect=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D93%26advUuid%3D%7Bdevice_id%7D
  • https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=93&advUuid=87a9488b-363f-4022-b1a5-f877f7f0410a
0
347 B
Image
General
Full URL
https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=93&advUuid=87a9488b-363f-4022-b1a5-f877f7f0410a
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.17
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:13 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.17
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Cache-Control
no-store
Content-Type
text/html; charset=utf-8

Redirect headers

status
307
date
Tue, 12 May 2020 11:41:14 GMT
content-length
0
location
https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=93&advUuid=87a9488b-363f-4022-b1a5-f877f7f0410a
vid5d27a94dbd11b325394733.jpg
video.sekindo.com/uploads/cn2/video/users/converted/24485/video_5c74e337b0b1c456249184/ Frame 40B5
16 KB
17 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn2/video/users/converted/24485/video_5c74e337b0b1c456249184/vid5d27a94dbd11b325394733.jpg?cbuster=1567601184
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.96.211 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
be80ad5e82c559e08cea242584f1ed7d1a7741ba00ddb8b71ab792fd236c0efb
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://amli.sekindo.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 May 2020 11:41:13 GMT
Last-Modified
Thu, 11 Jul 2019 21:30:24 GMT
Server
Tengine
ETag
"5d27aa70-40a6"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
16550
Expires
Thu, 31 Dec 2037 23:55:55 GMT
truncated
/ Frame 40B5
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame 40B5
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
liveView.php
live.sekindo.com/live/ Frame 0BD9
82 KB
4 KB
XHR
General
Full URL
https://live.sekindo.com/live/liveView.php?s=58057&vid_vastTimeout=-1&vid_vastType=3&vid_playerVer=3.0.0&vid_viewabilityState=1&vid_playbackMethod=auto&vid_content_url=https%3A%2F%2Fvideo.sekindo.com%2Fuploads%2Fcn2%2Fvideo%2Fusers%2Fconverted%2F24485%2Fvideo_5c74e337b0b1c456249184%2Fvid5d27a94dbd11b325394733.mp4&vid_content_id=436857&vid_content_desc=Slack+Faces+Stiff+Competition+From+Microsoft+Teams&vid_content_title=Slack+Faces+Stiff+Competition+From+Microsoft+Teams&vid_content_duration=265&debugInformation=ABT%20/%20WFLimit%20/%201%20/%2010&x=400&y=225&fpl=0&pubUrl=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&ri=6C69766553746174737C736B317B54307D7B64323032302D30352D31325F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386756305A4D6157317064434176494445674C7941784D413D3D7D7B4C363631357DFEFE&isApp=0&geoLati=52.15890121459961&geoLong=21.000499725341797&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5eba8b596cf00&cbuster=1589283674033&gdpr=1&gdprConsent=&isWePassGdpr=0
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30352D31325F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386756305A4D6157317064434176494445674C7941784D413D3D7D7B4C363631357DFEFE&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+WFLimit+%2F+1+%2F+10&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5eba8b596cf00&debugInfo=12348808_ABT+%2F+WFLimit+%2F+1+%2F+10&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.15890121459961&geoLong=21.000499725341797&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.17
Resource Hash
3e4f988d0409ec1005daf83751d74c22ea9ad1b086be57d4946defe4d818ca07

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:13 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.17
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json; charset=utf-8
Content-Length
3528
liveView.php
live.sekindo.com/live/ Frame 0BD9
82 KB
4 KB
XHR
General
Full URL
https://live.sekindo.com/live/liveView.php?s=58057&vid_vastTimeout=-1&vid_vastType=3&vid_playerVer=3.0.0&vid_viewabilityState=1&vid_playbackMethod=auto&vid_content_url=https%3A%2F%2Fvideo.sekindo.com%2Fuploads%2Fcn2%2Fvideo%2Fusers%2Fconverted%2F24485%2Fvideo_5c74e337b0b1c456249184%2Fvid5d27a94dbd11b325394733.mp4&vid_content_id=436857&vid_content_desc=Slack+Faces+Stiff+Competition+From+Microsoft+Teams&vid_content_title=Slack+Faces+Stiff+Competition+From+Microsoft+Teams&vid_content_duration=265&debugInformation=ABT%20/%20WFLimit%20/%201%20/%2010&x=320&y=180&fpl=0&pubUrl=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&ri=6C69766553746174737C736B317B54307D7B64323032302D30352D31325F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386756305A4D6157317064434176494445674C7941784D413D3D7D7B4C363631357DFEFE&isApp=0&geoLati=52.15890121459961&geoLong=21.000499725341797&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5eba8b596cf00&cbuster=1589283674034&gdpr=1&gdprConsent=&isWePassGdpr=0
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30352D31325F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386756305A4D6157317064434176494445674C7941784D413D3D7D7B4C363631357DFEFE&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+WFLimit+%2F+1+%2F+10&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5eba8b596cf00&debugInfo=12348808_ABT+%2F+WFLimit+%2F+1+%2F+10&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.15890121459961&geoLong=21.000499725341797&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.17
Resource Hash
e670474830cb81a71e9128630cc2ef795d0b8e40292f335767bf1a3aab777971

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:13 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.17
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json; charset=utf-8
Content-Length
3215
liveView.php
live.sekindo.com/live/ Frame 0BD9
31 KB
2 KB
XHR
General
Full URL
https://live.sekindo.com/live/liveView.php?s=58057&vid_vastTimeout=-1&vid_vastType=3&vid_playerVer=3.0.0&vid_viewabilityState=0&vid_playbackMethod=auto&vid_content_url=https%3A%2F%2Fvideo.sekindo.com%2Fuploads%2Fcn2%2Fvideo%2Fusers%2Fconverted%2F24485%2Fvideo_5c74e337b0b1c456249184%2Fvid5d27a94dbd11b325394733.mp4&vid_content_id=436857&vid_content_desc=Slack+Faces+Stiff+Competition+From+Microsoft+Teams&vid_content_title=Slack+Faces+Stiff+Competition+From+Microsoft+Teams&vid_content_duration=265&debugInformation=ABT%20/%20WFLimit%20/%201%20/%2010&x=400&y=225&fpl=0&pubUrl=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&ri=6C69766553746174737C736B317B54307D7B64323032302D30352D31325F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386756305A4D6157317064434176494445674C7941784D413D3D7D7B4C363631357DFEFE&isApp=0&geoLati=52.15890121459961&geoLong=21.000499725341797&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5eba8b596cf00&cbuster=1589283674035&gdpr=1&gdprConsent=&isWePassGdpr=0
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30352D31325F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386756305A4D6157317064434176494445674C7941784D413D3D7D7B4C363631357DFEFE&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+WFLimit+%2F+1+%2F+10&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5eba8b596cf00&debugInfo=12348808_ABT+%2F+WFLimit+%2F+1+%2F+10&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.15890121459961&geoLong=21.000499725341797&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.17
Resource Hash
eb026722aedb2e900400ca76613bddb9ec7ad8c2e9978ea559dc5601be68c26e

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:13 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.17
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json; charset=utf-8
Content-Length
2041
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
fonts.gstatic.com/s/roboto/v20/ Frame 40B5
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v20/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30352D31325F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386756305A4D6157317064434176494445674C7941784D413D3D7D7B4C363631357DFEFE&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+WFLimit+%2F+1+%2F+10&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5eba8b596cf00&debugInfo=12348808_ABT+%2F+WFLimit+%2F+1+%2F+10&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.15890121459961&geoLong=21.000499725341797&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5d1bc9b443f3f81fa4b4ad4634c1bb9702194c1898e3a9de0ab5e2cdc0e9f479
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Roboto&display=swap
Origin
https://threatpost.com

Response headers

date
Fri, 08 May 2020 19:19:05 GMT
x-content-type-options
nosniff
last-modified
Wed, 24 Jul 2019 01:18:50 GMT
server
sffe
age
318129
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
11016
x-xss-protection
0
expires
Sat, 08 May 2021 19:19:05 GMT
aps_csm.js
c.amazon-adsystem.com/bao-csm/aps-comm/ Frame 0BD9
6 KB
3 KB
XHR
General
Full URL
https://c.amazon-adsystem.com/bao-csm/aps-comm/aps_csm.js
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.90.242 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-90-242.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
06b99248a163333e36980a6cfb756f1a7de60fa49517162b87b1a44d5d48f844

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 07:07:30 GMT
content-encoding
gzip
vary
Origin
age
16425
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Thu, 09 Apr 2020 23:46:54 GMT
server
AmazonS3
access-control-max-age
3000
access-control-allow-methods
GET
content-type
application/javascript
via
1.1 5317564e96c9dceb46123f6c5f149a03.cloudfront.net (CloudFront)
cache-control
public, max-age=86400
x-amz-cf-pop
FRA50-C1
x-amz-cf-id
CjJ7dOJH-GUhej3LgUmpjaocBaKaGDwwrx4LzX4TaSl23wb8GZOEVQ==
pixel;r=1412981915;source=gtm;rf=0;a=p-_7kVx0t9Jqj90;url=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_m...
pixel.quantserve.com/
35 B
658 B
Image
General
Full URL
https://pixel.quantserve.com/pixel;r=1412981915;source=gtm;rf=0;a=p-_7kVx0t9Jqj90;url=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle;fpan=1;fpa=P0-2100303813-1589283674099;ns=0;ce=1;qjs=1;qv=f473609d-20200430082408;cm=;gdpr=0;ref=;je=0;sr=1600x1200x24;enc=n;dst=1;et=1589283674099;tzo=-120;ogl=image.https%3A%2F%2Fmedia%252Ethreatpost%252Ecom%2Fwp-content%2Fuploads%2Fsites%2F103%2F2020%2F04%2F27010549%2FMicro%2Ctype.article%2Ctitle.Microsoft%20Teams%20Impersonation%20Attacks%20Flood%20Inboxes%2Cdescription.Two%20separate%20attacks%20have%20targeted%20as%20many%20as%2050%252C000%20different%20Teams%20users%252C%20with%2Curl.https%3A%2F%2Fthreatpost%252Ecom%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.169 , United Kingdom, ASN27281 (QUANTCAST, US),
Reverse DNS
Software
QS /
Resource Hash
a0d3a0aff7dc3bf32d2176fc3dcda6e7aba2867c4f4d1f7af6355d2cfc6c44f8
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:14 GMT
Server
QS
Strict-Transport-Security
max-age=86400
P3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAo PSDo OUR SAMa IND COM NAV"
Cache-Control
private, no-cache, no-store, proxy-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
Fri, 04 Aug 1978 12:00:00 GMT
translator
hbopenbid.pubmatic.com/ Frame 0BD9
0
59 B
XHR
General
Full URL
https://hbopenbid.pubmatic.com/translator?source=prebid-client
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_4.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.112 , United Kingdom, ASN62713 (AS-PUBMATIC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

status
204
date
Tue, 12 May 2020 11:41:14 GMT
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
access-control-allow-origin
https://threatpost.com
openrtb
ads.adaptv.advertising.com/rtb/ Frame 0BD9
0
215 B
XHR
General
Full URL
https://ads.adaptv.advertising.com/rtb/openrtb?ext_id=TeachingAidsLLC
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_4.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.184.66.147 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-18-184-66-147.eu-central-1.compute.amazonaws.com
Software
adaptv/1.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Access-Control-Allow-Origin
https://threatpost.com
Access-Control-Allow-Credentials
true
Server
adaptv/1.0
Connection
keep-alive
Content-Length
0
Content-Type
application/json
liveView.php
live.sekindo.com/live/ Frame 9E23
43 B
463 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=6&serverTime=1589283674&s=58057&sta=12381421&x=400&y=225&msta=12348808&vid_vastType=3&vid_viewabilityState=0&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=ABT%20%2F%20WFLimit%20%2F%201%20%2F%2010&playbackMethod=auto&isApp=0&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5eba8b596cf00&rvn=${VP_RVN_MACRO}&attemptMultiplier=10&contentFileId=0&mediaPlayListId=0&playerVer=3.0.0&cbuster=1589283674128&gdpr=1&gdprConsent=&isWePassGdpr=0&ccpa=0&ccpaConsent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.17
Resource Hash
42b976597a2d977d0e300f6d06bc903db389e5c112d33c1c8c249690a522d9f2

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:13 GMT
Server
nginx
Age
0
X-Powered-By
PHP/7.3.17
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000
Content-Disposition
inline; filename="pixel.gif"
Content-Type
image/gif
Expires
Thu, 31 Dec 2037 23:55:55 GMT
liveView.php
live.sekindo.com/live/ Frame 0BD9
25 KB
2 KB
XHR
General
Full URL
https://live.sekindo.com/live/liveView.php?s=58057&vid_vastTimeout=-1&vid_vastType=3&vid_playerVer=3.0.0&vid_viewabilityState=0&vid_playbackMethod=auto&vid_content_url=https%3A%2F%2Fvideo.sekindo.com%2Fuploads%2Fcn2%2Fvideo%2Fusers%2Fconverted%2F24485%2Fvideo_5c74e337b0b1c456249184%2Fvid5d27a94dbd11b325394733.mp4&vid_content_id=436857&vid_content_desc=Slack+Faces+Stiff+Competition+From+Microsoft+Teams&vid_content_title=Slack+Faces+Stiff+Competition+From+Microsoft+Teams&vid_content_duration=265&debugInformation=ABT%20/%20WFLimit%20/%201%20/%2010&x=320&y=180&fpl=0&pubUrl=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&ri=6C69766553746174737C736B317B54307D7B64323032302D30352D31325F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386756305A4D6157317064434176494445674C7941784D413D3D7D7B4C363631357DFEFE&isApp=0&geoLati=52.15890121459961&geoLong=21.000499725341797&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5eba8b596cf00&cbuster=1589283674177&gdpr=1&gdprConsent=&isWePassGdpr=0
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30352D31325F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386756305A4D6157317064434176494445674C7941784D413D3D7D7B4C363631357DFEFE&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+WFLimit+%2F+1+%2F+10&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5eba8b596cf00&debugInfo=12348808_ABT+%2F+WFLimit+%2F+1+%2F+10&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.15890121459961&geoLong=21.000499725341797&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.17
Resource Hash
342e677d00abe8da8d2c31e9be10892deb35cbc2a46d70129a65e3f64df5e1ea

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:13 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.17
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json; charset=utf-8
Content-Length
1892
bl-2a28c82-32762cff.js
tagan.adlightning.com/math-aids-threatpost/ Frame 8CB0
97 KB
41 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/bl-2a28c82-32762cff.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.190.120 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-190-120.ham50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
fb817c79f2a559d6870074fa7700993bf3d884b932dfc33de95c50c92af5ede4

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 11 May 2020 23:30:04 GMT
content-encoding
gzip
age
43871
x-cache
Hit from cloudfront
status
200
content-length
41270
x-amz-meta-git_commit
2a28c82
last-modified
Mon, 11 May 2020 22:58:08 GMT
server
AmazonS3
etag
"e7e719b00660de866367232eadc0ae46"
x-amz-version-id
l9KKfhnEd29jDfagdtU65VfoK7Hd1epd
via
1.1 b448bc80d67210455b28a7dbefe37288.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
HAM50-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
IwSXvgawEEZNTZhCXqa33AoHOGrMhaeztMQF9QE7MQ223oGUCLEhZQ==
b-0d4dfcb.js
tagan.adlightning.com/math-aids-threatpost/ Frame 8CB0
36 KB
13 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.190.120 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-190-120.ham50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
667a53e3145f4c8b641a886082ce900423662980c5fe3d784383c3d481de2320

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 08 May 2020 19:59:37 GMT
content-encoding
gzip
age
315698
x-cache
Hit from cloudfront
status
200
content-length
12549
x-amz-meta-git_commit
0d4dfcb
last-modified
Wed, 22 Apr 2020 03:15:52 GMT
server
AmazonS3
etag
"17acdbb1a7a117b8f53f3f84e0db205b"
x-amz-version-id
HwMWPPcis1b0hnhKcUJr6rhRxxqLZtvX
via
1.1 b448bc80d67210455b28a7dbefe37288.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
HAM50-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
QSsrGinAR0inqjCMTqoGtKUHadeGRf3ZCyV5NmnlU8gUoWe8EKXgPA==
adsbygoogle.js
pagead2.googlesyndication.com/pagead/js/ Frame 8CB0
107 KB
38 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
975ee123b2e5a299c8a857798c11049fdf09f88fe363254a90ab99263b874cda
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
39186
x-xss-protection
0
server
cafe
etag
3465331680960370250
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Tue, 12 May 2020 11:41:14 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 8CB0
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
32ab9cbc82797d05b18d1a15697b8dc8e70cba544d3134a07e50c641166da1a6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1588975424504927"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28371
x-xss-protection
0
expires
Tue, 12 May 2020 11:41:14 GMT
osd.js
www.googletagservices.com/activeview/js/current/
73 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
9bb5347fd356ae8863aeb2695b9f2125a42b90449cd729e3527456dd1f20897b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1588975424504927"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
27855
x-xss-protection
0
expires
Tue, 12 May 2020 11:41:14 GMT
bl-2a28c82-32762cff.js
tagan.adlightning.com/math-aids-threatpost/ Frame 78E0
97 KB
41 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/bl-2a28c82-32762cff.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.190.120 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-190-120.ham50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
fb817c79f2a559d6870074fa7700993bf3d884b932dfc33de95c50c92af5ede4

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 11 May 2020 23:30:04 GMT
content-encoding
gzip
age
43871
x-cache
Hit from cloudfront
status
200
content-length
41270
x-amz-meta-git_commit
2a28c82
last-modified
Mon, 11 May 2020 22:58:08 GMT
server
AmazonS3
etag
"e7e719b00660de866367232eadc0ae46"
x-amz-version-id
l9KKfhnEd29jDfagdtU65VfoK7Hd1epd
via
1.1 b448bc80d67210455b28a7dbefe37288.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
HAM50-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
vnW60UBPFPzH8tbykNVIaYXym8zhRUAHoj0zl5sTl_B32eqskH2_xg==
b-0d4dfcb.js
tagan.adlightning.com/math-aids-threatpost/ Frame 78E0
36 KB
13 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.190.120 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-190-120.ham50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
667a53e3145f4c8b641a886082ce900423662980c5fe3d784383c3d481de2320

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 08 May 2020 19:59:37 GMT
content-encoding
gzip
age
315698
x-cache
Hit from cloudfront
status
200
content-length
12549
x-amz-meta-git_commit
0d4dfcb
last-modified
Wed, 22 Apr 2020 03:15:52 GMT
server
AmazonS3
etag
"17acdbb1a7a117b8f53f3f84e0db205b"
x-amz-version-id
HwMWPPcis1b0hnhKcUJr6rhRxxqLZtvX
via
1.1 b448bc80d67210455b28a7dbefe37288.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
HAM50-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
VStThF0vSdRSiPQAGeJEsZTM2CyD3Ag2BEQCm2IbOJEdyp6FcOnKVg==
adsbygoogle.js
pagead2.googlesyndication.com/pagead/js/ Frame 78E0
107 KB
38 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
975ee123b2e5a299c8a857798c11049fdf09f88fe363254a90ab99263b874cda
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
39186
x-xss-protection
0
server
cafe
etag
3465331680960370250
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Tue, 12 May 2020 11:41:14 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 78E0
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
32ab9cbc82797d05b18d1a15697b8dc8e70cba544d3134a07e50c641166da1a6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1588975424504927"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28371
x-xss-protection
0
expires
Tue, 12 May 2020 11:41:14 GMT
bl-2a28c82-32762cff.js
tagan.adlightning.com/math-aids-threatpost/ Frame D955
97 KB
41 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/bl-2a28c82-32762cff.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.190.120 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-190-120.ham50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
fb817c79f2a559d6870074fa7700993bf3d884b932dfc33de95c50c92af5ede4

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 11 May 2020 23:30:04 GMT
content-encoding
gzip
age
43871
x-cache
Hit from cloudfront
status
200
content-length
41270
x-amz-meta-git_commit
2a28c82
last-modified
Mon, 11 May 2020 22:58:08 GMT
server
AmazonS3
etag
"e7e719b00660de866367232eadc0ae46"
x-amz-version-id
l9KKfhnEd29jDfagdtU65VfoK7Hd1epd
via
1.1 b448bc80d67210455b28a7dbefe37288.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
HAM50-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
vqE6hsOxYajFouOq-RKCaJDoxZkETV46yelFlPRV9qgRNO6mVouPMQ==
b-0d4dfcb.js
tagan.adlightning.com/math-aids-threatpost/ Frame D955
36 KB
13 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.190.120 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-190-120.ham50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
667a53e3145f4c8b641a886082ce900423662980c5fe3d784383c3d481de2320

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 08 May 2020 19:59:37 GMT
content-encoding
gzip
age
315698
x-cache
Hit from cloudfront
status
200
content-length
12549
x-amz-meta-git_commit
0d4dfcb
last-modified
Wed, 22 Apr 2020 03:15:52 GMT
server
AmazonS3
etag
"17acdbb1a7a117b8f53f3f84e0db205b"
x-amz-version-id
HwMWPPcis1b0hnhKcUJr6rhRxxqLZtvX
via
1.1 b448bc80d67210455b28a7dbefe37288.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
HAM50-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
be-7Ph4WqCm4h90Ci7XheT88eJhEcEkdhdEqmITHLCovRbz_1yuOuA==
adsbygoogle.js
pagead2.googlesyndication.com/pagead/js/ Frame D955
107 KB
38 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
975ee123b2e5a299c8a857798c11049fdf09f88fe363254a90ab99263b874cda
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
39186
x-xss-protection
0
server
cafe
etag
3465331680960370250
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Tue, 12 May 2020 11:41:14 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame D955
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
32ab9cbc82797d05b18d1a15697b8dc8e70cba544d3134a07e50c641166da1a6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1588975424504927"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28371
x-xss-protection
0
expires
Tue, 12 May 2020 11:41:14 GMT
bl-2a28c82-32762cff.js
tagan.adlightning.com/math-aids-threatpost/ Frame 10DA
97 KB
41 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/bl-2a28c82-32762cff.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.190.120 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-190-120.ham50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
fb817c79f2a559d6870074fa7700993bf3d884b932dfc33de95c50c92af5ede4

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 11 May 2020 23:30:04 GMT
content-encoding
gzip
age
43871
x-cache
Hit from cloudfront
status
200
content-length
41270
x-amz-meta-git_commit
2a28c82
last-modified
Mon, 11 May 2020 22:58:08 GMT
server
AmazonS3
etag
"e7e719b00660de866367232eadc0ae46"
x-amz-version-id
l9KKfhnEd29jDfagdtU65VfoK7Hd1epd
via
1.1 b448bc80d67210455b28a7dbefe37288.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
HAM50-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
Dro-pTEm4MGp7NzW1EP1BDXJlMvVoUfRZ2_dj8woeVpGqKIjhRLc-Q==
b-0d4dfcb.js
tagan.adlightning.com/math-aids-threatpost/ Frame 10DA
36 KB
13 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.190.120 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-190-120.ham50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
667a53e3145f4c8b641a886082ce900423662980c5fe3d784383c3d481de2320

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 08 May 2020 19:59:37 GMT
content-encoding
gzip
age
315698
x-cache
Hit from cloudfront
status
200
content-length
12549
x-amz-meta-git_commit
0d4dfcb
last-modified
Wed, 22 Apr 2020 03:15:52 GMT
server
AmazonS3
etag
"17acdbb1a7a117b8f53f3f84e0db205b"
x-amz-version-id
HwMWPPcis1b0hnhKcUJr6rhRxxqLZtvX
via
1.1 b448bc80d67210455b28a7dbefe37288.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
HAM50-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
kiGW_ep76xCGjfiaXup1QOrW4VBBZ-SyU1SdOrdOaT5In5p9Tl4BYg==
amp4ads-host-v0.js
cdn.ampproject.org/rtv/012005012256000/
21 KB
8 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012005012256000/amp4ads-host-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f0517f76184f899b738515a124efe8f335f585847387b8889dfa7c0fb132f75a
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
964
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
7437
x-xss-protection
0
server
sffe
date
Tue, 12 May 2020 11:25:10 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"1b9b229ae83eaa45"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 12 May 2021 11:25:10 GMT
flipboard.svg
assets.threatpost.com/wp-content/plugins/kaspersky-social-sharing/assets/img/
236 B
566 B
Image
General
Full URL
https://assets.threatpost.com/wp-content/plugins/kaspersky-social-sharing/assets/img/flipboard.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2156:2400:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
506d565f94cecbb486394c545a96e8459217f8d045496b511e8c815142abfc70

Request headers

Referer
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-includes/css/dist/block-library/style.min.css,wp-content/plugins/wds-rss-builder/includes/css/select2.min.css,wp-content/plugins/wds-rss-builder/includes/css/wds-rss.css,wp-content/plugins/honeypot-comments/public/assets/css/public.css,wp-content/plugins/kspr_twitter_pullquote/css/style.css,wp-content/plugins/pullquote-shortcode/css/pullquote-shortcode.css,wp-content/plugins/kaspersky-social-sharing/assets/css/style.css,wp-content/plugins/kaspersky-social-sharing/assets/css/custom.css&ver=f818c007
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
public
date
Tue, 12 May 2020 11:41:14 GMT
content-encoding
gzip
last-modified
Thu, 07 May 2020 08:44:24 GMT
server
nginx
x-amz-cf-pop
FRA50-C1
etag
W/"5eb3ca68-ec"
x-cache
Miss from cloudfront
content-type
image/svg+xml
status
200
cache-control
max-age=604800, public
x-amz-cf-id
UfGL9xHZjyLf0ETG4adFp0YA0prUSHH6bJ-U4iaKwoPrFBh8KQGwug==
via
1.1 b912dc97777020eb19579888add26978.cloudfront.net (CloudFront)
expires
Tue, 19 May 2020 11:41:14 GMT
fontawesome-webfont.woff2
assets.threatpost.com/wp-content/plugins/kaspersky-social-sharing/assets/fonts/
75 KB
76 KB
Font
General
Full URL
https://assets.threatpost.com/wp-content/plugins/kaspersky-social-sharing/assets/fonts/fontawesome-webfont.woff2?v=4.7.0
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2156:2400:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-includes/css/dist/block-library/style.min.css,wp-content/plugins/wds-rss-builder/includes/css/select2.min.css,wp-content/plugins/wds-rss-builder/includes/css/wds-rss.css,wp-content/plugins/honeypot-comments/public/assets/css/public.css,wp-content/plugins/kspr_twitter_pullquote/css/style.css,wp-content/plugins/pullquote-shortcode/css/pullquote-shortcode.css,wp-content/plugins/kaspersky-social-sharing/assets/css/style.css,wp-content/plugins/kaspersky-social-sharing/assets/css/custom.css&ver=f818c007
Origin
https://threatpost.com

Response headers

date
Tue, 12 May 2020 11:41:14 GMT
via
1.1 58bcd6f2e1bc29fb83f080f1743cfeca.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA50-C1
x-cache
Miss from cloudfront
status
200
content-length
77160
pragma
public
last-modified
Thu, 07 May 2020 08:44:25 GMT
server
nginx
etag
"5eb3ca69-12d68"
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000, public
accept-ranges
bytes
x-amz-cf-id
2cqgOaM2BC7SzjUo5Tp01TKa5A2Opk-O_kS94N5kpRxyciZ209yXDg==
expires
Wed, 12 May 2021 11:41:14 GMT
photo-newsletter.jpg
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
83 KB
83 KB
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/photo-newsletter.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
940e0c3385928422aae38e1a74f1d84b462d8ce1a056c686fde505a0bf3162bb

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Tue, 12 May 2020 11:41:15 GMT
Last-Modified
Thu, 07 May 2020 08:44:27 GMT
Server
nginx
ETag
"5eb3ca6b-14c88"
Content-Type
image/jpeg
Cache-Control
max-age=604800, public
Connection
close
Accept-Ranges
bytes
Content-Length
85128
Expires
Tue, 19 May 2020 11:41:15 GMT
adsct
analytics.twitter.com/i/
31 B
385 B
Script
General
Full URL
https://analytics.twitter.com/i/adsct?p_id=Twitter&p_user_id=0&txn_id=ntt0j&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0&tpx_cb=twttr.conversion.loadPixels&tw_document_href=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.131 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
df3e003cc30e9bdd0313100e8ee5d468070b4b34d11ad355f276a356d4b9c7bf
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
strict-transport-security
max-age=631138519
content-length
57
x-xss-protection
0
x-response-time
113
pragma
no-cache
last-modified
Tue, 12 May 2020 11:41:14 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
content-type
application/javascript;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
834e9675aaf73318ee8a7bab068c1d38
x-transaction
00a8c2940064dc55
expires
Tue, 31 Mar 1981 05:00:00 GMT
anchor
www.google.com/recaptcha/api2/ Frame 1177
0
0
Document
General
Full URL
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=JPZ52lNx97aD96bjM7KaA0bo&theme=standard&size=normal&cb=frmt7oszg3do
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-bZnVf+l5slzAHacHSS7Thw' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.google.com
:scheme
https
:path
/recaptcha/api2/anchor?ar=1&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=JPZ52lNx97aD96bjM7KaA0bo&theme=standard&size=normal&cb=frmt7oszg3do
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article

Response headers

status
200
content-type
text/html; charset=utf-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Tue, 12 May 2020 11:41:14 GMT
content-security-policy
script-src 'report-sample' 'nonce-bZnVf+l5slzAHacHSS7Thw' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
10320
server
GSE
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
openrtb
ads.adaptv.advertising.com/rtb/ Frame 0BD9
0
215 B
XHR
General
Full URL
https://ads.adaptv.advertising.com/rtb/openrtb?ext_id=PrimisTwoHB
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_4.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.184.66.147 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-18-184-66-147.eu-central-1.compute.amazonaws.com
Software
adaptv/1.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Access-Control-Allow-Origin
https://threatpost.com
Access-Control-Allow-Credentials
true
Server
adaptv/1.0
Connection
keep-alive
Content-Length
0
Content-Type
application/json
/
graph.facebook.com/
83 B
450 B
XHR
General
Full URL
https://graph.facebook.com/?id=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:800e:face:b00c:0:2 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
bef28a756f70942fbc73948f22ebb68fc32286c3e5d9444acd76a94f6a997f78
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; preload

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
x-fb-debug
eoGkA3dGDCZctKZMz42IC4mg+/mtekW7LdU3H+PJZ6Akhxi84xxGKCnFQahyalx0ghK3Zcaj4CLiGndgMQhxyA==
x-fb-trace-id
DkB4QyTMSGn
status
200
etag
"317b410e59eaadc1ebcf7bafae7ebadc116a101d"
strict-transport-security
max-age=15552000; preload
content-type
application/json
access-control-allow-origin
*
x-fb-request-id
A-h9HwX7WwvxswFfdFwREwg
cache-control
private, no-cache, no-store, must-revalidate
date
Tue, 12 May 2020 11:41:14 GMT
x-fb-rev
1002113579
facebook-api-version
v3.0
content-length
83
expires
Sat, 01 Jan 2000 00:00:00 GMT
share
www.linkedin.com/countserv/count/
0
0
Script
General
Full URL
https://www.linkedin.com/countserv/count/share?url=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F&format=jsonp&callback=jQuery1124017464169722500977_1589283673261&_=1589283673262
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:f500:10:101::b93f:9101 , Ireland, ASN14413 (LINKEDIN, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

info.json
www.reddit.com/api/
4 KB
3 KB
XHR
General
Full URL
https://www.reddit.com/api/info.json?url=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.232.53.140 Manchester, United Kingdom, ASN54113 (FASTLY, US),
Reverse DNS
Software
snooserv /
Resource Hash
01067302abd62bef3880d3c8434f3cb8b2dacdb8eb6546021553439e646d5358
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
access-control-allow-origin
*
x-cache
MISS
status
200
vary
accept-encoding
content-length
1617
x-xss-protection
1; mode=block
x-served-by
cache-man4139-MAN
x-moose
majestic
expires
-1
server
snooserv
x-timer
S1589283675.682248,VS0,VE136
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
application/json; charset=UTF-8
via
1.1 varnish
access-control-expose-headers
X-Moose
cache-control
private, s-maxage=0, max-age=0, must-revalidate, no-store, max-age=0, must-revalidate
x-ua-compatible
IE=edge
accept-ranges
bytes
x-cache-hits
0
view
securepubads.g.doubleclick.net/pcs/ Frame 8CB0
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssldmAZPZrR8O1A-Cv4Ulbc8m-vvLTKYUo6_9CEq5dTEQrKziwVd1Wvvg7_ecG20h7Dkf9BYqcqfs-CSxHmEFTf4XpB1_30Lb6KZJy3Rd79O8B0FKSSmRSkwPAXdgTPxt0D-zz-XwtT6yTA2JuAhG7WSIF1ietOUTXCeTiaozg5rEGE0nx2_43iPHPvjSWOk_xeNLrLzJbS1tkZDFB-okDx-yLPFhCGzsWVFrNFTObUrl4l67rbpw3__4zVKergkNjnj002fei09Mdlw_ZaRq6pLuI_&sai=AMfl-YSnzlAtbcOAiheFn3WmyUepHtnQiIjY6aPV0QV5ae7dkS59w9wHFUUVm3tmdxzt7bGLSNsTgVW6MbYOCNIszp32vEeMmLFDVqdPLYfvsg&sig=Cg0ArKJSzDt-xTerEiwvEAE&urlfix=1&adurl=
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.18.98 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
zrh04s05-in-f98.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 12 May 2020 11:41:14 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Tue, 12 May 2020 11:41:14 GMT
truncated
/ Frame 8CB0
212 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5420e50e12ab846f8ca09ab7f07ce74b05d26f1ecc2acabcb8a987af781746dc

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
view
securepubads.g.doubleclick.net/pcs/ Frame 78E0
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssMO2zWtV_FvgsqdnJF2OL5xVFHtzZt68NDU6uuk4b4xmx1vmAJj1WqL6LXBsNl_AurdsaBMoAJ31X76Ha_HN0xxp8lngFdNgglYRmxBGGDlIhgvoescHx6KKgrdkh6CK2Zyv6Qx3l5wg8RRPAasHjfQ3Sxsw1LUzjNOkDZG4xXhn39ggbKcWPdE9Sx8tXynqp7gN3EuykJKwc_V_AYwN6IrjnQGNJ4x0kh5bjxqlQpaPBu-VV0jepKEKt_45pJMEdZIIDgJd3dyb5pgTHH_yStSXhk&sai=AMfl-YTER7lq-w-XP2boh8g5wjnjdbcqP4jDnw5NKlbuVvrh803XZmg1DLDRnBy4jq_-yFxzlnwDdyDRllX0ExJBgYBxQY-HfNJVY8Y-XvZMOQ&sig=Cg0ArKJSzFBqUGggCiXLEAE&urlfix=1&adurl=
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.18.98 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
zrh04s05-in-f98.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 12 May 2020 11:41:14 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Tue, 12 May 2020 11:41:14 GMT
truncated
/ Frame 78E0
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
cbe61142c40f56bd3f48d08a856b36b180bda1b411f0a56285ce2735e6adfb64

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
view
securepubads.g.doubleclick.net/pcs/ Frame D955
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssqOcT4A01zks9zLTUX0QP3--jGqUpJLVOsoQBFPCwJUBZmcprEooWAeXAA5jfaNnwm7_8YD-cqBx-IQJCW_zZxwe8nsonAlNjg6cpbCd7IJX6PZB3DAdVb5LBEuWS5_VidRKLzig-zTJ21rhk_l7za-yA1coMiYTCnR-uJAo65pNTBEtT90vHOEyNwyhXS5JjpfDTbRi_kHWwzd01-WYqEJzkOV2uExieRwJf5LpXeJKfx6eBraNI13PYiUa7YGLxvmZnr44vWIeRdmCG7fvK8tZ_I&sai=AMfl-YQqaimiEClOl-6S2xfuWBj1989EXIKEADErNYAJeg8-3b-ozA54zp_bLFYCZDl32mk1CPKumQ1NSRfN4iwEuuWGeochr5QtGGqLh6bIjA&sig=Cg0ArKJSzH1LPjyrLj1MEAE&urlfix=1&adurl=
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.18.98 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
zrh04s05-in-f98.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 12 May 2020 11:41:14 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
truncated
/ Frame D955
206 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
01a64e8171c06414b65e5c7f22f8641bdec34659e5fe9f47d9637bf6ae905e9c

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
amp4ads-v0.js
cdn.ampproject.org/rtv/012005012256000/ Frame 10DA
204 KB
57 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012005012256000/amp4ads-v0.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
d2b891e379840927eaf16ac1147b0e270c409d7a9e2655dd866a175b996dea9c
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Origin
https://threatpost.com

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
5937
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
57019
x-xss-protection
0
server
sffe
date
Tue, 12 May 2020 10:02:17 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"bf14143de8659308"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 12 May 2021 10:02:17 GMT
amp4ads-v0.js
cdn.ampproject.org/rtv/012005012256000/ Frame 10DA
204 KB
56 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012005012256000/amp4ads-v0.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
d2b891e379840927eaf16ac1147b0e270c409d7a9e2655dd866a175b996dea9c
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
5937
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
57019
x-xss-protection
0
server
sffe
date
Tue, 12 May 2020 10:02:17 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"bf14143de8659308"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 12 May 2021 10:02:17 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012005012256000/v0/ Frame 10DA
98 KB
30 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012005012256000/v0/amp-analytics-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
dd0c4ff5bc4e85bcd1ff717afc9d15b8274efe8e644542489bc31fae0346541b
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
5939
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
30100
x-xss-protection
0
server
sffe
date
Tue, 12 May 2020 10:02:15 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"023298bf906f9a2c"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 12 May 2021 10:02:15 GMT
7464639028652035684
tpc.googlesyndication.com/simgad/ Frame 10DA
330 B
454 B
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/7464639028652035684
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f19e7ee6cdf20bd478c037707c447b7cd469051de4dadeac32a795efb463c2e2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 14 Apr 2020 23:20:40 GMT
x-content-type-options
nosniff
age
2377234
x-dns-prefetch-control
off
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
330
x-xss-protection
0
last-modified
Tue, 28 Jan 2020 23:02:00 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 14 Apr 2021 23:20:40 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 10DA
0
63 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstR_i075rN_OW-I8qooH1Cj7uoqqASw_8KPiRs_tHJIBg_WdVOAabvV-LzL55Z_AfvE0iJwHJEyvENljO_jHFpSQV_fCuq_l0RJzbKNorb9-_wAIUYyBWVkIzjOegGtOXdbQXo6_YW0eazrAqQLgxT1mqjI0wGMRx_F--a4mPV__2KsBpzwmYq3b0QwsofbUmmkuj3WhE00uqCIbDyAw0Z_hTp_RwsfIPcOnfevoInnLtJg59DO369GSH6K5zEQ2GBD23JUiGOapOcXYPO6pQ&sai=AMfl-YSJVlR1Z3WOPDc6NhDkqcVVZJP8UDueZFSd9w1a8vr7t_3GqpTejDOV99jATRRBZXebrine04rK_0keaamrZoLvg7k-UkoMntxPq-vM9A&sig=Cg0ArKJSzF5UR71HdnPZEAE&adurl=
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.18.98 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
zrh04s05-in-f98.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 12 May 2020 11:41:14 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
truncated
/ Frame 10DA
213 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
3f0707480ba9b68fc2ce2bbf98a3bacc53b22c675ffd3199d73d61920f1a8341

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
anchor
www.google.com/recaptcha/api2/ Frame 0831
0
0
Document
General
Full URL
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LehhAETAAAAAAcsm2ZGDsLCqyGhesy4Yn43WNBe&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=JPZ52lNx97aD96bjM7KaA0bo&theme=light&size=normal&cb=ta4wxkaehntu
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-J2VK+GZe3kMkypVNfBaX/w' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.google.com
:scheme
https
:path
/recaptcha/api2/anchor?ar=1&k=6LehhAETAAAAAAcsm2ZGDsLCqyGhesy4Yn43WNBe&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=JPZ52lNx97aD96bjM7KaA0bo&theme=light&size=normal&cb=ta4wxkaehntu
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article

Response headers

status
200
content-type
text/html; charset=utf-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Tue, 12 May 2020 11:41:14 GMT
content-security-policy
script-src 'report-sample' 'nonce-J2VK+GZe3kMkypVNfBaX/w' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
10177
server
GSE
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
cygnus
as-sec.casalemedia.com/ Frame 0BD9
24 B
1 KB
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?s=435871&v=8.1&r=%7B%22id%22%3A%227bb2d80b8b030c%22%2C%22imp%22%3A%5B%7B%22id%22%3A%228f78437d3b679f%22%2C%22ext%22%3A%7B%22siteID%22%3A%22435871%22%2C%22sid%22%3A%22320x180%22%7D%2C%22bidfloor%22%3A1.8%2C%22bidfloorcur%22%3A%22USD%22%2C%22video%22%3A%7B%22mimes%22%3A%5B%22video%2Fmp4%22%2C%22application%2Fjavascript%22%5D%2C%22minduration%22%3A1%2C%22maxduration%22%3A200%2C%22api%22%3A%5B1%2C2%5D%2C%22protocols%22%3A%5B1%2C2%2C3%2C4%2C5%2C6%5D%2C%22linearity%22%3A1%2C%22startdelay%22%3A0%2C%22skip%22%3A1%2C%22w%22%3A320%2C%22h%22%3A180%2C%22placement%22%3A1%7D%7D%2C%7B%22id%22%3A%22923d46bfc1a472%22%2C%22ext%22%3A%7B%22siteID%22%3A%22435870%22%2C%22sid%22%3A%22320x180%22%7D%2C%22bidfloor%22%3A1.8%2C%22bidfloorcur%22%3A%22USD%22%2C%22video%22%3A%7B%22mimes%22%3A%5B%22video%2Fmp4%22%2C%22application%2Fjavascript%22%5D%2C%22minduration%22%3A1%2C%22maxduration%22%3A200%2C%22api%22%3A%5B1%2C2%5D%2C%22protocols%22%3A%5B1%2C2%2C3%2C4%2C5%2C6%5D%2C%22linearity%22%3A1%2C%22startdelay%22%3A0%2C%22skip%22%3A1%2C%22w%22%3A320%2C%22h%22%3A180%2C%22placement%22%3A1%7D%7D%5D%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle%22%7D%2C%22ext%22%3A%7B%22source%22%3A%22prebid%22%7D%2C%22regs%22%3A%7B%22ext%22%3A%7B%22gdpr%22%3A1%7D%7D%2C%22user%22%3A%7B%22ext%22%3A%7B%22consent%22%3A%22%22%7D%7D%7D&ac=j&sd=1&nf=1&
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_4.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.164 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-164.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
71aca111ca1d25b51526b17ebd2f76efb90c5092b072b4b955d4eca4e27fc1a9

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:15 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Content-Length
44
Expires
Tue, 12 May 2020 11:41:15 GMT
auction
prebid-server.rubiconproject.com/openrtb2/ Frame 0BD9
185 B
388 B
XHR
General
Full URL
https://prebid-server.rubiconproject.com/openrtb2/auction
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_4.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.57.231.210 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-57-231-210.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
ba287d38ec78eed661d9740f37aae3861d717fab97101478fed892338ec3b4a6

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:15 GMT
content-encoding
gzip
status
200
content-type
application/json
access-control-allow-origin
https://threatpost.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
content-length
175
expires
0
translator
hbopenbid.pubmatic.com/ Frame 0BD9
0
59 B
XHR
General
Full URL
https://hbopenbid.pubmatic.com/translator?source=prebid-client
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_4.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.112 , United Kingdom, ASN62713 (AS-PUBMATIC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

status
204
date
Tue, 12 May 2020 11:41:14 GMT
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
access-control-allow-origin
https://threatpost.com
prebid
ib.adnxs.com/ut/v3/ Frame 0BD9
19 B
710 B
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_4.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
37.252.173.38 , Ascension Island, ASN29990 (ASN-APPNEX, US),
Reverse DNS
537.bm-nginx-loadbalancer.mgmt.fra1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
0c09c070833c786cb25be38bc30992b30bad578f817dbc9e34beacd8b8ea44c5
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:16 GMT
X-Proxy-Origin
194.99.105.99; 194.99.105.99; 537.bm-nginx-loadbalancer.mgmt.fra1; *.adnxs.com; 37.252.172.240:80
AN-X-Request-Uuid
3d810705-e1d7-4c15-b2b6-e7152e95248a
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
19
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
avjp
teachingaids-d.openx.net/v/1.0/ Frame 0BD9
92 B
295 B
XHR
General
Full URL
https://teachingaids-d.openx.net/v/1.0/avjp?ju=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&ch=UTF-8&res=1600x1200x24&ifr=true&tz=-120&tws=1600x1200&be=1&bc=hb_pb_3.0.1&dddid=4a9352d8-4db9-4e2e-91ea-048284e851b2&nocache=1589283674826&gdpr_consent=&gdpr=1&schain=1.0%2C1!admetricspro.com%2C1005%2C1%2C%2C%2C&skip=1&auid=540882778&vwd=320&vht=180&
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_4.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.185.0 /
Resource Hash
004e5faf0bf890f61697daeede9f21826affd1137fb2cb58eaf4719937a04a14

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:14 GMT
via
1.1 google
server
OXGW/16.185.0
status
200
p3p
CP="CUR ADM OUR NOR STA NID"
access-control-allow-origin
https://threatpost.com
cache-control
private, max-age=0, no-cache
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
content-length
92
expires
Mon, 26 Jul 1997 05:00:00 GMT
openrtb
ads.adaptv.advertising.com/rtb/ Frame 0BD9
0
215 B
XHR
General
Full URL
https://ads.adaptv.advertising.com/rtb/openrtb?ext_id=TeachingAidsLLC
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_4.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.184.66.147 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-18-184-66-147.eu-central-1.compute.amazonaws.com
Software
adaptv/1.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Access-Control-Allow-Origin
https://threatpost.com
Access-Control-Allow-Credentials
true
Server
adaptv/1.0
Connection
keep-alive
Content-Length
0
Content-Type
application/json
liveView.php
live.sekindo.com/live/ Frame 9E23
43 B
463 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=6&serverTime=1589283674&s=58057&sta=12723341&x=320&y=180&msta=12348808&vid_vastType=3&vid_viewabilityState=1&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=ABT%20%2F%20WFLimit%20%2F%201%20%2F%2010&playbackMethod=auto&isApp=0&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5eba8b596cf00&rvn=${VP_RVN_MACRO}&attemptMultiplier=10&contentFileId=0&mediaPlayListId=0&playerVer=3.0.0&cbuster=1589283674814&gdpr=1&gdprConsent=&isWePassGdpr=0&ccpa=0&ccpaConsent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.17
Resource Hash
42b976597a2d977d0e300f6d06bc903db389e5c112d33c1c8c249690a522d9f2

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:13 GMT
Server
nginx
Age
0
X-Powered-By
PHP/7.3.17
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000
Content-Disposition
inline; filename="pixel.gif"
Content-Type
image/gif
Expires
Thu, 31 Dec 2037 23:55:55 GMT
integrator.js
adservice.google.de/adsid/ Frame 8CB0
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=threatpost.com
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 12 May 2020 11:41:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame 8CB0
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=threatpost.com
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 12 May 2020 11:41:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
104
x-xss-protection
0
show_ads_impl_fy2019.js
pagead2.googlesyndication.com/pagead/js/r20200506/r20190131/ Frame 8CB0
217 KB
82 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20200506/r20190131/show_ads_impl_fy2019.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
4008c399421c2f1282faf06b2631a925629c9fb9bdfa56b972bb8754d829be47
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
83827
x-xss-protection
0
server
cafe
etag
14851109439880523126
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Tue, 12 May 2020 11:41:14 GMT
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20200506/r20190131/ Frame 5690
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/html/r20200506/r20190131/zrt_lookup.html
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/html/r20200506/r20190131/zrt_lookup.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUlF0cSuG3xkTI6sqhQpO4JckkqQXi7Pcft8ypryohZUMxLIV6TTZuAUfT1C
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
vary
Accept-Encoding
date
Thu, 07 May 2020 02:45:36 GMT
expires
Thu, 21 May 2020 02:45:36 GMT
content-type
text/html; charset=UTF-8
etag
4094386822458569044
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
4444
x-xss-protection
0
cache-control
public, max-age=1209600
age
464138
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
integrator.js
adservice.google.de/adsid/ Frame 78E0
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=threatpost.com
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 12 May 2020 11:41:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame 78E0
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=threatpost.com
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 12 May 2020 11:41:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
104
x-xss-protection
0
show_ads_impl_fy2019.js
pagead2.googlesyndication.com/pagead/js/r20200506/r20190131/ Frame 78E0
217 KB
82 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20200506/r20190131/show_ads_impl_fy2019.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
4008c399421c2f1282faf06b2631a925629c9fb9bdfa56b972bb8754d829be47
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
83827
x-xss-protection
0
server
cafe
etag
14851109439880523126
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Tue, 12 May 2020 11:41:14 GMT
integrator.js
adservice.google.de/adsid/ Frame D955
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=threatpost.com
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 12 May 2020 11:41:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame D955
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=threatpost.com
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 12 May 2020 11:41:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
104
x-xss-protection
0
show_ads_impl_fy2019.js
pagead2.googlesyndication.com/pagead/js/r20200506/r20190131/ Frame D955
217 KB
82 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20200506/r20190131/show_ads_impl_fy2019.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
4008c399421c2f1282faf06b2631a925629c9fb9bdfa56b972bb8754d829be47
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
83827
x-xss-protection
0
server
cafe
etag
14851109439880523126
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Tue, 12 May 2020 11:41:14 GMT
auction
prebid-server.rubiconproject.com/openrtb2/ Frame 0BD9
185 B
385 B
XHR
General
Full URL
https://prebid-server.rubiconproject.com/openrtb2/auction
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_4.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.57.231.210 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-57-231-210.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
1f40209effede1fd425703914275e3453656383f08dcf1b282e936b63b573b07

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:15 GMT
content-encoding
gzip
status
200
content-type
application/json
access-control-allow-origin
https://threatpost.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
content-length
172
expires
0
bframe
www.google.com/recaptcha/api2/ Frame 1958
0
0
Document
General
Full URL
https://www.google.com/recaptcha/api2/bframe?hl=en&v=JPZ52lNx97aD96bjM7KaA0bo&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&cb=l8ifoeigz9m8
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-gbPhMULVr2qoEPl8IpBozw' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.google.com
:scheme
https
:path
/recaptcha/api2/bframe?hl=en&v=JPZ52lNx97aD96bjM7KaA0bo&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&cb=l8ifoeigz9m8
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article

Response headers

status
200
content-type
text/html; charset=utf-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Tue, 12 May 2020 11:41:15 GMT
content-security-policy
script-src 'report-sample' 'nonce-gbPhMULVr2qoEPl8IpBozw' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
1182
server
GSE
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
ads
googleads.g.doubleclick.net/pagead/ Frame D060
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7500593236707325&output=html&h=90&slotname=5620800026&adk=2236077833&adf=3173046728&w=970&psa=0&guci=1.2.0.0.2.2.0.0&format=970x90&url=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&ea=0&flash=0&wgl=1&adsid=NT&dt=1589283674851&bpp=30&bdt=573&idt=523&shv=r20200506&cbv=r20190131&ptt=9&saldr=aa&correlator=5869267208876&frm=23&ife=4&pv=2&ga_vid=754605376.1589283674&ga_sid=1589283676&ga_hid=1483783621&ga_fc=1&iag=3&icsg=8362&nhd=1&dssz=14&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=308&ady=10&biw=1585&bih=1200&isw=970&ish=90&ifk=1299019832&scr_x=0&scr_y=0&eid=21065531%2C21066085&oid=3&pvsid=256106765155426&pem=143&rx=0&eae=2&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C970%2C90&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=8212&bc=31&ifi=1&uci=1.3rmtgleybp3c&fsb=1&dtd=709
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-7500593236707325&output=html&h=90&slotname=5620800026&adk=2236077833&adf=3173046728&w=970&psa=0&guci=1.2.0.0.2.2.0.0&format=970x90&url=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&ea=0&flash=0&wgl=1&adsid=NT&dt=1589283674851&bpp=30&bdt=573&idt=523&shv=r20200506&cbv=r20190131&ptt=9&saldr=aa&correlator=5869267208876&frm=23&ife=4&pv=2&ga_vid=754605376.1589283674&ga_sid=1589283676&ga_hid=1483783621&ga_fc=1&iag=3&icsg=8362&nhd=1&dssz=14&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=308&ady=10&biw=1585&bih=1200&isw=970&ish=90&ifk=1299019832&scr_x=0&scr_y=0&eid=21065531%2C21066085&oid=3&pvsid=256106765155426&pem=143&rx=0&eae=2&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C970%2C90&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=8212&bc=31&ifi=1&uci=1.3rmtgleybp3c&fsb=1&dtd=709
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUlF0cSuG3xkTI6sqhQpO4JckkqQXi7Pcft8ypryohZUMxLIV6TTZuAUfT1C
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Tue, 12 May 2020 11:41:15 GMT
server
cafe
content-length
20932
x-xss-protection
0
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
osd.js
www.googletagservices.com/activeview/js/current/ Frame 8CB0
73 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
9bb5347fd356ae8863aeb2695b9f2125a42b90449cd729e3527456dd1f20897b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1588975424504927"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
27855
x-xss-protection
0
expires
Tue, 12 May 2020 11:41:15 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame B645
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7500593236707325&output=html&h=250&slotname=7286959315&adk=2838937357&adf=3173046727&w=300&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&ea=0&flash=0&wgl=1&adsid=NT&dt=1589283674907&bpp=3&bdt=618&idt=670&shv=r20200506&cbv=r20190131&ptt=9&saldr=aa&correlator=5869267208876&frm=23&ife=4&pv=1&ga_vid=754605376.1589283674&ga_sid=1589283676&ga_hid=1670314711&ga_fc=1&iag=3&icsg=8362&nhd=1&dssz=14&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1075&ady=257&biw=1585&bih=1200&isw=300&ish=250&ifk=408740871&scr_x=0&scr_y=0&eid=21065531%2C21066085&oid=3&pvsid=2476001864918825&pem=143&rx=0&eae=2&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=8212&bc=31&ifi=1&uci=1.e9r1nxrgxuv7&fsb=1&dtd=675
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-7500593236707325&output=html&h=250&slotname=7286959315&adk=2838937357&adf=3173046727&w=300&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&ea=0&flash=0&wgl=1&adsid=NT&dt=1589283674907&bpp=3&bdt=618&idt=670&shv=r20200506&cbv=r20190131&ptt=9&saldr=aa&correlator=5869267208876&frm=23&ife=4&pv=1&ga_vid=754605376.1589283674&ga_sid=1589283676&ga_hid=1670314711&ga_fc=1&iag=3&icsg=8362&nhd=1&dssz=14&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1075&ady=257&biw=1585&bih=1200&isw=300&ish=250&ifk=408740871&scr_x=0&scr_y=0&eid=21065531%2C21066085&oid=3&pvsid=2476001864918825&pem=143&rx=0&eae=2&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=8212&bc=31&ifi=1&uci=1.e9r1nxrgxuv7&fsb=1&dtd=675
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUlF0cSuG3xkTI6sqhQpO4JckkqQXi7Pcft8ypryohZUMxLIV6TTZuAUfT1C
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Tue, 12 May 2020 11:41:15 GMT
server
cafe
content-length
19821
x-xss-protection
0
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
osd.js
www.googletagservices.com/activeview/js/current/ Frame 78E0
73 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
9bb5347fd356ae8863aeb2695b9f2125a42b90449cd729e3527456dd1f20897b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1588975424504927"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
27855
x-xss-protection
0
expires
Tue, 12 May 2020 11:41:15 GMT
bframe
www.google.com/recaptcha/api2/ Frame 27D4
0
0
Document
General
Full URL
https://www.google.com/recaptcha/api2/bframe?hl=en&v=JPZ52lNx97aD96bjM7KaA0bo&k=6LehhAETAAAAAAcsm2ZGDsLCqyGhesy4Yn43WNBe&cb=lwlsniybgxs5
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-D9uEKVyldXFpjQFWSVupKw' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.google.com
:scheme
https
:path
/recaptcha/api2/bframe?hl=en&v=JPZ52lNx97aD96bjM7KaA0bo&k=6LehhAETAAAAAAcsm2ZGDsLCqyGhesy4Yn43WNBe&cb=lwlsniybgxs5
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article

Response headers

status
200
content-type
text/html; charset=utf-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Tue, 12 May 2020 11:41:15 GMT
content-security-policy
script-src 'report-sample' 'nonce-D9uEKVyldXFpjQFWSVupKw' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
1181
server
GSE
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
ads
googleads.g.doubleclick.net/pagead/ Frame 214F
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7500593236707325&output=html&h=250&slotname=2376748102&adk=2477513961&adf=3173046726&w=300&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&ea=0&flash=0&wgl=1&adsid=NT&dt=1589283674968&bpp=2&bdt=672&idt=647&shv=r20200506&cbv=r20190131&ptt=9&saldr=aa&correlator=5869267208876&frm=23&ife=4&pv=1&ga_vid=754605376.1589283674&ga_sid=1589283676&ga_hid=1756047493&ga_fc=1&iag=3&icsg=8362&nhd=1&dssz=14&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1075&ady=1587&biw=1585&bih=1200&isw=300&ish=250&ifk=1972745306&scr_x=0&scr_y=0&eid=21065531%2C21066085&oid=3&pvsid=3096197003707693&pem=143&rx=0&eae=2&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&pfx=0&fu=8212&bc=31&ifi=1&uci=1.bpssvey0y9rr&btvi=1&fsb=1&dtd=657
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-7500593236707325&output=html&h=250&slotname=2376748102&adk=2477513961&adf=3173046726&w=300&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&ea=0&flash=0&wgl=1&adsid=NT&dt=1589283674968&bpp=2&bdt=672&idt=647&shv=r20200506&cbv=r20190131&ptt=9&saldr=aa&correlator=5869267208876&frm=23&ife=4&pv=1&ga_vid=754605376.1589283674&ga_sid=1589283676&ga_hid=1756047493&ga_fc=1&iag=3&icsg=8362&nhd=1&dssz=14&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1075&ady=1587&biw=1585&bih=1200&isw=300&ish=250&ifk=1972745306&scr_x=0&scr_y=0&eid=21065531%2C21066085&oid=3&pvsid=3096197003707693&pem=143&rx=0&eae=2&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&pfx=0&fu=8212&bc=31&ifi=1&uci=1.bpssvey0y9rr&btvi=1&fsb=1&dtd=657
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUlF0cSuG3xkTI6sqhQpO4JckkqQXi7Pcft8ypryohZUMxLIV6TTZuAUfT1C
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Tue, 12 May 2020 11:41:15 GMT
server
cafe
content-length
23040
x-xss-protection
0
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
osd.js
www.googletagservices.com/activeview/js/current/ Frame D955
73 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
9bb5347fd356ae8863aeb2695b9f2125a42b90449cd729e3527456dd1f20897b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1588975424504927"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
27855
x-xss-protection
0
expires
Tue, 12 May 2020 11:41:15 GMT
7464639028652035684
tpc.googlesyndication.com/simgad/ Frame 10DA
330 B
404 B
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/7464639028652035684
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012005012256000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f19e7ee6cdf20bd478c037707c447b7cd469051de4dadeac32a795efb463c2e2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 14 Apr 2020 23:20:40 GMT
x-content-type-options
nosniff
age
2377235
x-dns-prefetch-control
off
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
330
x-xss-protection
0
last-modified
Tue, 28 Jan 2020 23:02:00 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 14 Apr 2021 23:20:40 GMT
async_usersync.html
acdn.adnxs.com/ib/static/usersync/v3/ Frame 1BF5
0
0
Document
General
Full URL
https://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_4.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.113.108 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx/1.9.13 /
Resource Hash

Request headers

Host
acdn.adnxs.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article

Response headers

Connection
keep-alive
Content-Length
506
Server
nginx/1.9.13
Content-Type
text/html
Last-Modified
Fri, 20 May 2016 02:07:09 GMT
ETag
W/"573e714d-3e3"
Expires
Sun, 06 Aug 2017 09:41:59 GMT
Cache-Control
max-age=31536000
Access-Control-Allow-Origin
*
Content-Encoding
gzip
Via
1.1 varnish 1.1 varnish
Accept-Ranges
bytes
Date
Tue, 12 May 2020 11:41:15 GMT
Age
24199159
X-Served-By
cache-jfk8123-JFK, cache-hhn4069-HHN
X-Cache
HIT, HIT
X-Cache-Hits
1276778, 6617843
X-Timer
S1589283676.786361,VS0,VE0
Vary
Accept-Encoding
showad.js
ads.pubmatic.com/AdServer/js/ Frame 81A9
0
0
Document
General
Full URL
https://ads.pubmatic.com/AdServer/js/showad.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_4.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.92 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-92.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) /
Resource Hash

Request headers

Host
ads.pubmatic.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
KTPCACOOKIE=YES; KCCH=YES; pi=159196:2
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article

Response headers

Last-Modified
Tue, 14 Apr 2020 10:27:52 GMT
ETag
"13006b6-a4bb-5a33da6f1a023"
Server
Apache/2.2.15 (CentOS)
Accept-Ranges
bytes
Content-Encoding
gzip
P3P
CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC", CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Content-Length
15243
Content-Type
text/html; charset=UTF-8
Cache-Control
public, max-age=81323
Expires
Wed, 13 May 2020 10:16:38 GMT
Date
Tue, 12 May 2020 11:41:15 GMT
Connection
keep-alive
Vary
Accept-Encoding
pd
u.openx.net/w/1.0/ Frame 4051
0
0
Document
General
Full URL
https://u.openx.net/w/1.0/pd?gdpr=1&gdpr_consent=
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_4.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.185.0 /
Resource Hash

Request headers

:method
GET
:authority
u.openx.net
:scheme
https
:path
/w/1.0/pd?gdpr=1&gdpr_consent=
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
i=2883a7ec-9993-418a-abd1-b82987413820|1589283673
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article

Response headers

status
200
vary
Accept, Accept-Encoding
set-cookie
i=2883a7ec-9993-418a-abd1-b82987413820|1589283673; Version=1; Expires=Wed, 12-May-2021 11:41:15 GMT; Max-Age=31536000; Secure; Domain=.openx.net; Path=/; SameSite=None pd=v2|1589283675|mOgikimWiygu; Version=1; Expires=Wed, 27-May-2020 11:41:15 GMT; Max-Age=1296000; Secure; Domain=.openx.net; Path=/; SameSite=None
server
OXGW/16.185.0
p3p
CP="CUR ADM OUR NOR STA NID"
date
Tue, 12 May 2020 11:41:15 GMT
content-type
text/html
content-length
375
content-encoding
gzip
via
1.1 google
alt-svc
clear
showad.js
ads.pubmatic.com/AdServer/js/ Frame 35E3
0
0
Document
General
Full URL
https://ads.pubmatic.com/AdServer/js/showad.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_4.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.92 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-92.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) /
Resource Hash

Request headers

Host
ads.pubmatic.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
KTPCACOOKIE=YES; KCCH=YES; pi=159196:2
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article

Response headers

Last-Modified
Tue, 14 Apr 2020 10:27:52 GMT
ETag
"13006b6-a4bb-5a33da6f1a023"
Server
Apache/2.2.15 (CentOS)
Accept-Ranges
bytes
Content-Encoding
gzip
P3P
CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC", CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Content-Length
15243
Content-Type
text/html; charset=UTF-8
Cache-Control
public, max-age=81323
Expires
Wed, 13 May 2020 10:16:38 GMT
Date
Tue, 12 May 2020 11:41:15 GMT
Connection
keep-alive
Vary
Accept-Encoding
usync.html
eus.rubiconproject.com/ Frame 1B6A
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html?gdpr=1&gdpr_consent=
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_4.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Thu, 23 Apr 2020 20:31:59 GMT
Content-Encoding
gzip
Content-Length
9123
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=25557
Expires
Tue, 12 May 2020 18:47:12 GMT
Date
Tue, 12 May 2020 11:41:15 GMT
Connection
keep-alive
Vary
Accept-Encoding
sync
sync.adap.tv/ Frame 0BD9
Redirect Chain
  • https://sync-tm.everesttech.net/upi/pid/m7y5t93k?redir=https%3A%2F%2Fsync.adap.tv%2Fsync%3Ftype%3Dgif%26key%3Dtubemogul%26uid%3D%24%7BUSER_ID%7D
  • https://sync-tm.everesttech.net/ct/upi/pid/m7y5t93k?redir=https%3A%2F%2Fsync.adap.tv%2Fsync%3Ftype%3Dgif%26key%3Dtubemogul%26uid%3D%24%7BUSER_ID%7D&_test=XrqLWwAAAJkLbyTo
  • https://sync.adap.tv/sync?type=gif&key=tubemogul&uid=XrqLWwAAAJkLbyTo&_test=XrqLWwAAAJkLbyTo
0
0

sync
ups.analytics.yahoo.com/ups/55953/ Frame 0BD9
Redirect Chain
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=adaptv&ttd_tpi=1
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=adaptv&ttd_tpi=1
  • https://pixel.advertising.com/ups/55953/sync?uid=f3329c59-48b0-4cee-a0c4-b9b5eb0e2b69&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=f3329c59-48b0-4cee-a0c4-b9b5eb0e2b69
  • https://ups.analytics.yahoo.com/ups/55953/sync?uid=f3329c59-48b0-4cee-a0c4-b9b5eb0e2b69&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=f3329c59-48b0-4cee-a0c4-b9b5eb0e2b69&apid=1A7b8b8dc8-9445-11ea...
0
977 B
Image
General
Full URL
https://ups.analytics.yahoo.com/ups/55953/sync?uid=f3329c59-48b0-4cee-a0c4-b9b5eb0e2b69&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=f3329c59-48b0-4cee-a0c4-b9b5eb0e2b69&apid=1A7b8b8dc8-9445-11ea-a141-12a779b12fd4
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
18.156.0.31 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-18-156-0-31.eu-central-1.compute.amazonaws.com
Software
ATS/7.1.2.106 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 May 2020 11:41:16 GMT
Server
ATS/7.1.2.106
Connection
keep-alive
Age
0
Strict-Transport-Security
max-age=31536000
P3P
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV

Redirect headers

status
302
date
Tue, 12 May 2020 11:41:16 GMT
location
https://ups.analytics.yahoo.com/ups/55953/sync?uid=f3329c59-48b0-4cee-a0c4-b9b5eb0e2b69&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=f3329c59-48b0-4cee-a0c4-b9b5eb0e2b69&apid=1A7b8b8dc8-9445-11ea-a141-12a779b12fd4
content-length
0
strict-transport-security
max-age=31536000
p3p
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
%7Bcombo_uid%7D
pr-bh.ybp.yahoo.com/sync/adaptv_ortb/ Frame 0BD9
43 B
794 B
Image
General
Full URL
https://pr-bh.ybp.yahoo.com/sync/adaptv_ortb/%7Bcombo_uid%7D
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1288:110:c305::8000 , United Kingdom, ASN34010 (YAHOO-IRD, GB),
Reverse DNS
Software
ATS /
Resource Hash
48a33ca9f42b91902d57ad8ac52e1ce32b92c8c10c732f2dbb6fe960ebfd9438
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:15 GMT
referrer-policy
strict-origin-when-cross-origin
server
ATS
age
0
expect-ct
max-age=31536000, report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only"
strict-transport-security
max-age=31536000
content-type
image/gif
status
200
x-xss-protection
1; mode=block
content-length
43
x-content-type-options
nosniff
expires
Thu, 01 Jan 1970 00:00:00 GMT
sync
ups.analytics.yahoo.com/ups/57304/ Frame 0BD9
Redirect Chain
  • https://cm.g.doubleclick.net/pixel?google_nid=adaptv_dbm&google_cm&google_sc
  • https://pixel.advertising.com/ups/57304/sync?uid=CAESELRbMW0syvKs940rK8aZc50&google_cver=1
  • https://ups.analytics.yahoo.com/ups/57304/sync?uid=CAESELRbMW0syvKs940rK8aZc50&google_cver=1&apid=1A7b8b8dc8-9445-11ea-a141-12a779b12fd4
0
977 B
Image
General
Full URL
https://ups.analytics.yahoo.com/ups/57304/sync?uid=CAESELRbMW0syvKs940rK8aZc50&google_cver=1&apid=1A7b8b8dc8-9445-11ea-a141-12a779b12fd4
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
18.156.0.31 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-18-156-0-31.eu-central-1.compute.amazonaws.com
Software
ATS/7.1.2.106 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 May 2020 11:41:16 GMT
Server
ATS/7.1.2.106
Connection
keep-alive
Age
0
Strict-Transport-Security
max-age=31536000
P3P
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV

Redirect headers

status
302
date
Tue, 12 May 2020 11:41:15 GMT
location
https://ups.analytics.yahoo.com/ups/57304/sync?uid=CAESELRbMW0syvKs940rK8aZc50&google_cver=1&apid=1A7b8b8dc8-9445-11ea-a141-12a779b12fd4
content-length
0
strict-transport-security
max-age=31536000
p3p
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
activeview
pagead2.googlesyndication.com/pcs/ Frame 8CB0
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsvZSsBYjC96vjBB4CNnno6XmfoSTQRQd1C5tUeEqlEeDY5hiJDakH5V1nDiV5ljBBHQC5RCrFDJtEL8McIBQ42SOLQ2OgW2FTt8CjDcpAQ&sig=Cg0ArKJSzG0qvKE953y4EAE&adk=1015519800&tt=-1&bs=1585%2C1200&mtos=1027,1027,1027,1027,1027&tos=1027,0,0,0,0&p=10,308,100,1278&nrl=1&mcvt=1027&rs=0&ht=0&tfs=598&tls=1550&mc=1&lte=0&bas=0&bac=0&met=ie&avms=nio&exg=1&md=2&btr=0&lm=2&rst=1589283674286&dlt&rpt=597&isd=0&msd=0&ext&xdi=0&ps=1585%2C4802&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-8-15-7-7-0-0-0&tvt=1539&is=970%2C90&iframe_loc=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&r=v&id=osdim&vs=4&uc=8&upc=0&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=0x0&itpl=19&v=20200508
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:16 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
liveView.php
live.sekindo.com/live/ Frame 9E23
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=36&serverTime=1589283673&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=ABT%20%2F%20WFLimit%20%2F%201%20%2F%2010&isApp=0&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5eba8b596cf00&contentFileId=0&mediaPlayListId=0&cbuster=1589283676265&gdpr=1&gdprConsent=&isWePassGdpr=0&ccpa=0&ccpaConsent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.17
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:15 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.17
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
activeview
pagead2.googlesyndication.com/pcs/ Frame 78E0
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsvD96Fgp9c0iHWx9pMLFJhSAhh8xyZIa7J_BsHHgB-1zpORiDyR5UjxZ5w2DzhEGMz6FMJ2PJ485GRs4YGRdJnJEqUosVWpUgATC_w8R5M&sig=Cg0ArKJSzEG6omCoMWyKEAE&adk=654286612&tt=-1&bs=1585%2C1200&mtos=1127,1127,1127,1127,1127&tos=1127,0,0,0,0&p=257,1075,507,1375&nrl=1&mcvt=1127&rs=0&ht=0&tfs=525&tls=1570&mc=1&lte=0&bas=0&bac=0&met=ie&avms=nio&exg=1&md=2&btr=0&lm=2&rst=1589283674293&dlt&rpt=618&isd=0&msd=0&ext&xdi=0&ps=1585%2C4802&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-8-7-7-7-0-0-0&tvt=1567&is=300%2C250&iframe_loc=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&r=v&id=osdim&vs=4&uc=8&upc=0&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=0x0&itpl=19&v=20200508
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:16 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
sodar
pagead2.googlesyndication.com/getconfig/ Frame 78E0
7 KB
5 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gda&tv=r20200506&st=env
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200506/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
5b610be9cbbb2e0f76658a9c8e03ea14a83e6a0bedcb0f37896b1b32268ca6cb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 12 May 2020 11:41:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
5536
x-xss-protection
0
showad.js
ads.pubmatic.com/AdServer/js/ Frame 8A6A
0
0
Document
General
Full URL
https://ads.pubmatic.com/AdServer/js/showad.js
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.92 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-92.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) /
Resource Hash

Request headers

Host
ads.pubmatic.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
KTPCACOOKIE=YES; KCCH=YES; pi=159196:2; KADUSERCOOKIE=DD6EB1A3-112D-4AD3-9E95-FCD568C5A61B
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article

Response headers

Last-Modified
Tue, 14 Apr 2020 10:27:52 GMT
ETag
"13006b6-a4bb-5a33da6f1a023"
Server
Apache/2.2.15 (CentOS)
Accept-Ranges
bytes
Content-Encoding
gzip
P3P
CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC", CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Content-Length
15243
Content-Type
text/html; charset=UTF-8
Cache-Control
public, max-age=81322
Expires
Wed, 13 May 2020 10:16:38 GMT
Date
Tue, 12 May 2020 11:41:16 GMT
Connection
keep-alive
Vary
Accept-Encoding
pd
eu-u.openx.net/w/1.0/ Frame A65A
0
0
Document
General
Full URL
https://eu-u.openx.net/w/1.0/pd?plm=6&ph=e1b1f5e1-3c2c-4287-9806-317cfbf3bd12&gdpr=1
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.185.0 /
Resource Hash

Request headers

:method
GET
:authority
eu-u.openx.net
:scheme
https
:path
/w/1.0/pd?plm=6&ph=e1b1f5e1-3c2c-4287-9806-317cfbf3bd12&gdpr=1
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
i=2883a7ec-9993-418a-abd1-b82987413820|1589283673; pd=v2|1589283675|mOgikimWiygu
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article

Response headers

status
200
vary
Accept, Accept-Encoding
set-cookie
i=2883a7ec-9993-418a-abd1-b82987413820|1589283673; Version=1; Expires=Wed, 12-May-2021 11:41:16 GMT; Max-Age=31536000; Secure; Domain=.openx.net; Path=/; SameSite=None pd=v2|1589283675.1|kimWiymOgugi.fcgqsLomgen0; Version=1; Expires=Wed, 27-May-2020 11:41:16 GMT; Max-Age=1296000; Secure; Domain=.openx.net; Path=/; SameSite=None
server
OXGW/16.185.0
p3p
CP="CUR ADM OUR NOR STA NID"
date
Tue, 12 May 2020 11:41:16 GMT
content-type
text/html
content-length
354
content-encoding
gzip
via
1.1 google
alt-svc
clear
2000891.html
serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/ Frame 6D15
Redirect Chain
  • https://sync.serverbid.com/ss/2000891.html
  • https://serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/2000891.html
0
0
Document
General
Full URL
https://serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/2000891.html
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload

Request headers

Host
serverbid-sync.nyc3.cdn.digitaloceanspaces.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article

Response headers

Date
Tue, 12 May 2020 11:41:17 GMT
Connection
Keep-Alive
Accept-Ranges
bytes
Cache-Control
max-age=47171
Content-Length
4947
Content-Type
text/html
Last-Modified
Wed, 20 Nov 2019 20:29:05 GMT
ETag
"1b0ebac83fe30af80513039edbdf566f"
x-amz-request-id
tx00000000000001b96fc75-005eb9f220-3523c7a-nyc3a
Strict-Transport-Security
max-age=15552000; includeSubDomains; preload
Vary
Access-Control-Request-Headers,Access-Control-Request-Method,Origin
X-HW
1589283677.dop202.lo4.t,1589283677.cds091.lo4.shn,1589283677.dop202.lo4.t,1589283677.cds210.lo4.c

Redirect headers

status
302
content-length
0
location
https://serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/2000891.html
cache-control
no-cache
async_usersync.html
acdn.adnxs.com/ib/static/usersync/v3/ Frame 0ECB
0
0
Document
General
Full URL
https://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.113.108 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx/1.9.13 /
Resource Hash

Request headers

Host
acdn.adnxs.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article

Response headers

Connection
keep-alive
Content-Length
506
Server
nginx/1.9.13
Content-Type
text/html
Last-Modified
Fri, 20 May 2016 02:07:09 GMT
ETag
W/"573e714d-3e3"
Expires
Sun, 06 Aug 2017 09:41:59 GMT
Cache-Control
max-age=31536000
Access-Control-Allow-Origin
*
Content-Encoding
gzip
Via
1.1 varnish 1.1 varnish
Accept-Ranges
bytes
Date
Tue, 12 May 2020 11:41:16 GMT
Age
24199160
X-Served-By
cache-jfk8123-JFK, cache-hhn4069-HHN
X-Cache
HIT, HIT
X-Cache-Hits
1276778, 6617845
X-Timer
S1589283677.801883,VS0,VE0
Vary
Accept-Encoding
usync.html
eus.rubiconproject.com/ Frame 2DDD
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Thu, 23 Apr 2020 20:31:59 GMT
Content-Encoding
gzip
Content-Length
9123
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=25555
Expires
Tue, 12 May 2020 18:47:12 GMT
Date
Tue, 12 May 2020 11:41:17 GMT
Connection
keep-alive
Vary
Accept-Encoding
current
aol-match.dotomi.com/match/bounce/
0
104 B
Image
General
Full URL
https://aol-match.dotomi.com/match/bounce/current?networkId=60&version=1&nuid=1A7b8b8cec-9445-11ea-88cb-12052abf3156&gdpr=1&gdpr_consent=&rurl=https%3A%2F%2Fpixel.advertising.com%2Fups%2F55853%2Fsync%3Fuid%3D%24UID%26_origin%3D0%26gdpr%3D1%26gdpr_consent%3D
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:fa8:8806:16::1400 , Sweden, ASN41041 (VCLK-EU-, SE),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
204
pragma
no-cache
date
Tue, 12 May 2020 11:41:16 GMT
cache-control
no-cache, private, max-age=0, no-store
server
nginx
expires
0
sync
ups.analytics.yahoo.com/ups/55965/
Redirect Chain
  • https://pixel.quantserve.com/pixel/p-NcBg8UA4xqUFp.gif?idmatch=0&gdpr=1&gdpr_consent=
  • https://pixel.advertising.com/ups/55965/sync?_origin=0&gdpr=1&uid=l-W9upri6rqPtLq-muLyuJHkvLiPtei-k7GtFCpk
  • https://ups.analytics.yahoo.com/ups/55965/sync?_origin=0&gdpr=1&uid=l-W9upri6rqPtLq-muLyuJHkvLiPtei-k7GtFCpk&apid=1A7b8b8dc8-9445-11ea-a141-12a779b12fd4
0
1 KB
Image
General
Full URL
https://ups.analytics.yahoo.com/ups/55965/sync?_origin=0&gdpr=1&uid=l-W9upri6rqPtLq-muLyuJHkvLiPtei-k7GtFCpk&apid=1A7b8b8dc8-9445-11ea-a141-12a779b12fd4
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
18.156.0.31 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-18-156-0-31.eu-central-1.compute.amazonaws.com
Software
ATS/7.1.2.106 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 May 2020 11:41:17 GMT
Server
ATS/7.1.2.106
Connection
keep-alive
Age
0
Strict-Transport-Security
max-age=31536000
P3P
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV

Redirect headers

status
302
date
Tue, 12 May 2020 11:41:16 GMT
location
https://ups.analytics.yahoo.com/ups/55965/sync?_origin=0&gdpr=1&uid=l-W9upri6rqPtLq-muLyuJHkvLiPtei-k7GtFCpk&apid=1A7b8b8dc8-9445-11ea-a141-12a779b12fd4
content-length
0
strict-transport-security
max-age=31536000
p3p
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
sync
ups.analytics.yahoo.com/ups/56465/
Redirect Chain
  • https://pixel.advertising.com/ups/56465/sync?_origin=0&redir=true&gdpr=1&gdpr_consent=
  • https://ups.analytics.yahoo.com/ups/56465/sync?_origin=0&redir=true&gdpr=1&gdpr_consent=&apid=1A7b8b8dc8-9445-11ea-a141-12a779b12fd4
  • https://pr-bh.ybp.yahoo.com/sync/adtech/1A7b8b8dc8-9445-11ea-a141-12a779b12fd4?gdpr=1&gdpr_consent=
  • https://pixel.advertising.com/ups/56465/sync?uid=y-2yqWAPp1lxkiMBkzBYspadqNjTuMkh.vw767&_origin=0&nsync=0
  • https://ups.analytics.yahoo.com/ups/56465/sync?uid=y-2yqWAPp1lxkiMBkzBYspadqNjTuMkh.vw767&_origin=0&nsync=0&apid=1A7b8b8dc8-9445-11ea-a141-12a779b12fd4
0
1 KB
Image
General
Full URL
https://ups.analytics.yahoo.com/ups/56465/sync?uid=y-2yqWAPp1lxkiMBkzBYspadqNjTuMkh.vw767&_origin=0&nsync=0&apid=1A7b8b8dc8-9445-11ea-a141-12a779b12fd4
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
18.156.0.31 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-18-156-0-31.eu-central-1.compute.amazonaws.com
Software
ATS/7.1.2.106 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 May 2020 11:41:17 GMT
Server
ATS/7.1.2.106
Connection
keep-alive
Age
0
Strict-Transport-Security
max-age=31536000
P3P
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV

Redirect headers

status
302
date
Tue, 12 May 2020 11:41:17 GMT
location
https://ups.analytics.yahoo.com/ups/56465/sync?uid=y-2yqWAPp1lxkiMBkzBYspadqNjTuMkh.vw767&_origin=0&nsync=0&apid=1A7b8b8dc8-9445-11ea-a141-12a779b12fd4
content-length
0
strict-transport-security
max-age=31536000
p3p
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
generic
match.adsrvr.org/track/cmf/
70 B
264 B
Image
General
Full URL
https://match.adsrvr.org/track/cmf/generic?ttd_pid=aoladtech&gdpr=1&gdpr_consent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.249.135.160 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-34-249-135-160.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
8d70b3e6badb6973663b398d297bb32eaedd08826a1af98d0a1cfce5324ffce0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:16 GMT
x-aspnet-version
4.0.30319
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"
status
200
cache-control
private,no-cache, must-revalidate
content-type
image/gif
content-length
70
sodar2.js
tpc.googlesyndication.com/sodar/ Frame 78E0
14 KB
5 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a47f17d6ebbf4621d8fe87ab790d8d8fb5c3086629194d9ff2d64faaa6e46ab6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1582746470043195"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
5456
x-xss-protection
0
expires
Tue, 12 May 2020 11:41:16 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 10DA
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsvAAjzFixyOoS0oPkTloznRQZWXbMkvOMEHXOqe6tmxU242c24BHFLGX4tparIMCxZ-B_tgNaTRuQXNFomfD3Fg5g4ExglQGqapUCNRGe4&sig=Cg0ArKJSzHvMex02CihhEAE&id=ampim&o=0,0&d=2,2&ss=1600,1200&bs=1600,1200&mcvt=1016&mtos=0,0,1016,1016,1016&tos=0,0,1016,0,0&tfs=508&tls=1524&g=100&h=100&tt=1528&r=v&avms=ampa&adk=3385906655
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:16 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/209/ Frame 3F6A
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/209/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
5727
date
Tue, 12 May 2020 10:48:37 GMT
expires
Wed, 12 May 2021 10:48:37 GMT
last-modified
Tue, 25 Feb 2020 17:32:01 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
3159
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
sodar
pagead2.googlesyndication.com/getconfig/ Frame 8CB0
7 KB
5 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gda&tv=r20200506&st=env
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200506/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
699ddc9102e9b97ae41182c46024d498816795398d111445f06f98e5b47bcc6a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 12 May 2020 11:41:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
5529
x-xss-protection
0
sodar2.js
tpc.googlesyndication.com/sodar/ Frame 8CB0
14 KB
5 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a47f17d6ebbf4621d8fe87ab790d8d8fb5c3086629194d9ff2d64faaa6e46ab6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:17 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1582746470043195"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
5456
x-xss-protection
0
expires
Tue, 12 May 2020 11:41:17 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/209/ Frame 6B0B
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/209/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
5727
date
Tue, 12 May 2020 10:48:37 GMT
expires
Wed, 12 May 2021 10:48:37 GMT
last-modified
Tue, 25 Feb 2020 17:32:01 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
3160
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
sodar
pagead2.googlesyndication.com/getconfig/ Frame D955
7 KB
5 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gda&tv=r20200506&st=env
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200506/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e552aae93697a51c6a7a7977bda621cb3fe97b2094a5c04e6cd6730040a3265d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 12 May 2020 11:41:17 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
5442
x-xss-protection
0
gen_204
pagead2.googlesyndication.com/pagead/ Frame 78E0
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=209&t=2&li=gda_r20200506&jk=2476001864918825&bg=!hoWlhZ1Yng_kjjD1-5wCAAAArFIAAAAlmQF8Wei5vVuQcEOBcHfOZfAqY7pterEwq7UmNLWlfueUUeR4xPK-XtdaX2qOk8v6szENqntvN7DItbBM8mDhx4re0Ew0Rp1LWaKLldUy-Upya04L8-FckxVO64EVAh_lXD_3BpEAXDbFBZ17nNnrFoY_yuQ1TONFrSmBC77mHe1_GwoMrnk3uRX7o_jN2JThWswy5p6RT9CWtyeU3JzbPmN5rFgsUtIJurOX3cRoaBSyPraiOdAaghCOCFg5a3OGnJQD86usUIaToFajxaUh0KD0YLBAhWuaud4lsCLvpG04qwlPVYipYN_gKdHCZaYbaJKYWTAjmF-lHEmjpGEoik-MaxtW1QLM8azyOgdYj-hvT6_r6f4tMUf8V9iJnL7yTOZ0SY2x4fxgSy46KJM6QU98OgYhnj1n_keya692Wh3fd1NTSSWPgfx3oc-cfYUTWdYSxtRBYr_d3SeEUAuCL0s8--RvIbL6XAn-s7M5o_EHM6BScj2MKpsdLcA7j1c
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:17 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
sodar2.js
tpc.googlesyndication.com/sodar/ Frame D955
14 KB
5 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a47f17d6ebbf4621d8fe87ab790d8d8fb5c3086629194d9ff2d64faaa6e46ab6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:17 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1582746470043195"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
5456
x-xss-protection
0
expires
Tue, 12 May 2020 11:41:17 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/209/ Frame 9285
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/209/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
5727
date
Tue, 12 May 2020 10:48:37 GMT
expires
Wed, 12 May 2021 10:48:37 GMT
last-modified
Tue, 25 Feb 2020 17:32:01 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
3160
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
gen_204
pagead2.googlesyndication.com/pagead/ Frame 8CB0
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=209&t=2&li=gda_r20200506&jk=256106765155426&bg=!5uWl5f1YfiejO3Wr6soCAAAAfVIAAAASmQF8w_XOXNW0OyEg29p_eAwSgpDOqkNoHV8Cf1AvrcARIhmuK4mC9U26g0oSsS-dw6JILDEciRWl2uemL7ZKfqfWmhc9Da4jn2ZBA9VPmGM-jeKGf5fFtte6cM6ESIO_tBA4tuF1BfZnnKxEHpZF7M-pqpiOGy83_DJI72fAyK38Si9pb9J_MxP4LHyX_R66qrD0h89swe_yfNOcCd9mfTnBfmVAQQgGrJ4omtw8s9vsvFwVOmcgHc571o7tHKSIaJb6pUOAfGErVc-CSLZT5YWbn264IAFPuGL8SQI883RoUqw4r_S_zTAcLySWbZlJO401rYGADa2sLV-jZ22Lw7xu57WqWkqggWOSUXm42o--6XdVqODl0HlRQza4BVSZn3aWtEOY2_oz2uojf9rtWpfcAsw9wrfd8zLJVMa9smuCaJ41P9EhonafhB8XwbbUnEqJPSzDiQU2QmjpPKm9zlV45wMz8aFWervR8XW04gmFd8bRO-VhkdRm26SbziI
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:17 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
gen_204
pagead2.googlesyndication.com/pagead/ Frame D955
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=209&t=2&li=gda_r20200506&jk=3096197003707693&bg=!urmluaFYAGz2uHdW1JACAAAAVVIAAAATmQF81lc6zBHIn3fNFFQTYaHbkKPRiRZly3nFgbtcwTCTgYHqBnm_X4KHzjq4nNzcZtXhZEyAeYmSo8rUmw2y80PEJa4QfuK0wuqaQo77x7bXG6EL9zQBX5fpo8xdx7sUIREIzWsI0OC8WA0xJ6pyV9clxGgB2wahhuLQL1hmtgg-lLRy5ltgxWzMRv1q9xzWYCS7SvrZ3suG7Ovk4_hoMhK6dcJBhuKs7Fr1uij7PQ5BERYZx7tDrbTHcZ8vVioy54ZLMlHnxZZAJa8GClvlHn_9sFxHg688pOU9P59_qzXam0MtV05jQk6nTIurSaBzVWM5ebTiWBHqzCXN8XD3nwirL16k30xahoGHZEMAQyTD0LkYqC7rda3YZOsQgJ2foMzKbxxJfU-HjtwDyOvoSwsMqgnfYsRMjzHGFVN3Lk7tgj2PTTW2tpp8N_ygNrJKZ3dTGBIe9INL95OdzM4ISBd3MEaymEpW96RlKGmHU_mK8n3qpE0PcwWTCoDrCWo
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:17 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
liveView.php
live.sekindo.com/live/ Frame 9E23
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=42&serverTime=1589283673&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=ABT%20%2F%20WFLimit%20%2F%201%20%2F%2010&isApp=0&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5eba8b596cf00&contentFileId=0&mediaPlayListId=0&dur=500&cbuster=1589283679201&gdpr=1&gdprConsent=&isWePassGdpr=0&ccpa=0&ccpaConsent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.17
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:18 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.17
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
sodar
pagead2.googlesyndication.com/getconfig/
7 KB
5 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gpt&tv=2020050602&st=env
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0e8482c26afa26983d3b52071e749fa1023fc0f9c17bc137e7e45e6e24ce604a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 12 May 2020 11:41:20 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
5476
x-xss-protection
0
sodar2.js
tpc.googlesyndication.com/sodar/
14 KB
5 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a47f17d6ebbf4621d8fe87ab790d8d8fb5c3086629194d9ff2d64faaa6e46ab6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 May 2020 11:41:20 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1582746470043195"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
5456
x-xss-protection
0
expires
Tue, 12 May 2020 11:41:20 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/209/ Frame 0438
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/209/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
5727
date
Tue, 12 May 2020 10:48:37 GMT
expires
Wed, 12 May 2021 10:48:37 GMT
last-modified
Tue, 25 Feb 2020 17:32:01 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
3163
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
gen_204
pagead2.googlesyndication.com/pagead/
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=209&t=2&li=gpt_2020050602&jk=1912889216903941&bg=!JiWlJT1YK6k13bzy20gCAAAAe1IAAAAlmQF2GnncONbqi5NIV11S9Gp57Tbc6TmyH727gsb0Qd0CRAr7M7c9ehGXgKx85UCLE6PSLOSaRzmPEhqZC44RePXxcOI00E_YZ62o6V-X4rHAJ-Z4Cjitm22IPaZiS3_bDmLZwlu2B1zIe5whvD-0GXNZEQQCM2Jei2Mc4bT3AXAo7ha52ENqtnW9WsPhYja_hauw02Pib6ssgXj8VssyjLaOhrrnzLZnw8w0hRbLce6pfUCarUFNdlTBAuTZbPRodqCcYZC1l36iawkdqkjUmLh5RBix8NLluyJqRAWeknJVpr4kY4N-IDkNhtSqyNcT5Lqby_lh4LPoI2CPyx9znOo0w5ku-Mbtq9xBwpQH01lxgaHMtYJbN0TdgyIhOMtO80IuQMgW40Y418Z-01g4Ajltql1DVDd6QciX-JjT3cf5YY6VVjyy9s0h8vHBgpD_tT7ubXChyt3u0boID7sXk-eCQBszFauwLPUL9kWdtRFGTmSjxybPKig
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:21 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
liveView.php
live.sekindo.com/live/ Frame 9E23
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=25&serverTime=1589283673&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=ABT%20%2F%20WFLimit%20%2F%201%20%2F%2010&isApp=0&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5eba8b596cf00&contentFileId=0&mediaPlayListId=0&dur=1000&cbuster=1589283684006&gdpr=1&gdprConsent=&isWePassGdpr=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.17
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:23 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.17
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
liveView.php
live.sekindo.com/live/ Frame 9E23
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=42&serverTime=1589283673&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=ABT%20%2F%20WFLimit%20%2F%201%20%2F%2010&isApp=0&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5eba8b596cf00&contentFileId=0&mediaPlayListId=0&dur=500&cbuster=1589283684201&gdpr=1&gdprConsent=&isWePassGdpr=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.17
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:24 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.17
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
liveView.php
live.sekindo.com/live/ Frame 9E23
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=42&serverTime=1589283673&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=ABT%20%2F%20WFLimit%20%2F%201%20%2F%2010&isApp=0&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5eba8b596cf00&contentFileId=0&mediaPlayListId=0&dur=500&cbuster=1589283689201&gdpr=1&gdprConsent=&isWePassGdpr=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.17
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:29 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.17
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
translator
hbopenbid.pubmatic.com/ Frame 0BD9
0
59 B
XHR
General
Full URL
https://hbopenbid.pubmatic.com/translator?source=prebid-client
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_4.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.112 , United Kingdom, ASN62713 (AS-PUBMATIC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

status
204
date
Tue, 12 May 2020 11:41:29 GMT
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
access-control-allow-origin
https://threatpost.com
cygnus
as-sec.casalemedia.com/ Frame 0BD9
25 B
988 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?s=435870&v=8.1&r=%7B%22id%22%3A%2229b88a5afbaf4ff%22%2C%22imp%22%3A%5B%7B%22id%22%3A%22307c30207ef9c3c%22%2C%22ext%22%3A%7B%22siteID%22%3A%22435870%22%2C%22sid%22%3A%22320x180%22%7D%2C%22bidfloor%22%3A1.8%2C%22bidfloorcur%22%3A%22USD%22%2C%22video%22%3A%7B%22mimes%22%3A%5B%22video%2Fmp4%22%2C%22application%2Fjavascript%22%5D%2C%22minduration%22%3A1%2C%22maxduration%22%3A200%2C%22api%22%3A%5B1%2C2%5D%2C%22protocols%22%3A%5B1%2C2%2C3%2C4%2C5%2C6%5D%2C%22linearity%22%3A1%2C%22startdelay%22%3A0%2C%22skip%22%3A1%2C%22w%22%3A320%2C%22h%22%3A180%2C%22placement%22%3A1%7D%7D%5D%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle%22%7D%2C%22ext%22%3A%7B%22source%22%3A%22prebid%22%7D%2C%22regs%22%3A%7B%22ext%22%3A%7B%22gdpr%22%3A1%7D%7D%2C%22user%22%3A%7B%22ext%22%3A%7B%22consent%22%3A%22%22%7D%7D%7D&ac=j&sd=1&nf=1&
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_4.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.164 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-164.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e2c89a25e6063569909495f9be7e5f69a27dac6b8cff2f37a95c52d949302e54

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:29 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Content-Length
45
Expires
Tue, 12 May 2020 11:41:29 GMT
openrtb
ads.adaptv.advertising.com/rtb/ Frame 0BD9
0
215 B
XHR
General
Full URL
https://ads.adaptv.advertising.com/rtb/openrtb?ext_id=TeachingAidsLLC
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_4.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.184.66.147 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-18-184-66-147.eu-central-1.compute.amazonaws.com
Software
adaptv/1.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Access-Control-Allow-Origin
https://threatpost.com
Access-Control-Allow-Credentials
true
Server
adaptv/1.0
Connection
keep-alive
Content-Length
0
Content-Type
application/json
avjp
teachingaids-d.openx.net/v/1.0/ Frame 0BD9
92 B
293 B
XHR
General
Full URL
https://teachingaids-d.openx.net/v/1.0/avjp?ju=https%3A%2F%2Fthreatpost.com%2Fmicrosoft-teams-impersonation-attacks%2F155404%2F%3Futm_campaign%3DPostBeyond%26utm_source%3DLinkedIn%26utm_medium%3D%2523329640%26utm_term%3DMicrosoft%2BTeams%2BImpersonation%2BAttacks%2B-%2BArticle&ch=UTF-8&res=1600x1200x24&ifr=true&tz=-120&tws=1600x1200&be=1&bc=hb_pb_3.0.1&dddid=4b1b989b-4001-4d08-9600-7c0d0a973a3c&nocache=1589283689320&gdpr_consent=&gdpr=1&schain=1.0%2C1!admetricspro.com%2C1005%2C1%2C%2C%2C&skip=1&auid=540882779&vwd=320&vht=180&
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_4.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.185.0 /
Resource Hash
004e5faf0bf890f61697daeede9f21826affd1137fb2cb58eaf4719937a04a14

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:29 GMT
via
1.1 google
server
OXGW/16.185.0
status
200
p3p
CP="CUR ADM OUR NOR STA NID"
access-control-allow-origin
https://threatpost.com
cache-control
private, max-age=0, no-cache
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
content-length
92
expires
Mon, 26 Jul 1997 05:00:00 GMT
prebid
ib.adnxs.com/ut/v3/ Frame 0BD9
19 B
710 B
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_4.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
37.252.173.38 , Ascension Island, ASN29990 (ASN-APPNEX, US),
Reverse DNS
537.bm-nginx-loadbalancer.mgmt.fra1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
0c09c070833c786cb25be38bc30992b30bad578f817dbc9e34beacd8b8ea44c5
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:31 GMT
X-Proxy-Origin
194.99.105.99; 194.99.105.99; 537.bm-nginx-loadbalancer.mgmt.fra1; *.adnxs.com; 37.252.172.167:80
AN-X-Request-Uuid
41a86328-84bc-41df-bf5c-fe0e75200516
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
19
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
auction
prebid-server.rubiconproject.com/openrtb2/ Frame 0BD9
184 B
387 B
XHR
General
Full URL
https://prebid-server.rubiconproject.com/openrtb2/auction
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_4.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.57.231.210 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-57-231-210.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
455882f3b35440573555d4ff8de5d5eb829f4c15521c0570a56371068275ad89

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:29 GMT
content-encoding
gzip
status
200
content-type
application/json
access-control-allow-origin
https://threatpost.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
content-length
174
expires
0
liveView.php
live.sekindo.com/live/ Frame 9E23
43 B
463 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=6&serverTime=1589283674&s=58057&sta=12604104&x=320&y=180&msta=12348808&vid_vastType=3&vid_viewabilityState=1&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=ABT%20%2F%20WFLimit%20%2F%201%20%2F%2010&playbackMethod=auto&isApp=0&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5eba8b596cf00&rvn=${VP_RVN_MACRO}&attemptMultiplier=10&contentFileId=0&mediaPlayListId=0&playerVer=3.0.0&cbuster=1589283689312&gdpr=1&gdprConsent=&isWePassGdpr=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.17
Resource Hash
42b976597a2d977d0e300f6d06bc903db389e5c112d33c1c8c249690a522d9f2

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:28 GMT
Server
nginx
Age
0
X-Powered-By
PHP/7.3.17
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000
Content-Disposition
inline; filename="pixel.gif"
Content-Type
image/gif
Expires
Thu, 31 Dec 2037 23:55:55 GMT
liveView.php
live.sekindo.com/live/ Frame 9E23
43 B
463 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=6&serverTime=1589283674&s=58057&sta=12381355&x=320&y=180&msta=12348808&vid_vastType=3&vid_viewabilityState=1&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=ABT%20%2F%20WFLimit%20%2F%201%20%2F%2010&playbackMethod=auto&isApp=0&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5eba8b596cf00&rvn=${VP_RVN_MACRO}&attemptMultiplier=10&contentFileId=0&mediaPlayListId=0&playerVer=3.0.0&cbuster=1589283689312&gdpr=1&gdprConsent=&isWePassGdpr=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.17
Resource Hash
42b976597a2d977d0e300f6d06bc903db389e5c112d33c1c8c249690a522d9f2

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:29 GMT
Server
nginx
Age
0
X-Powered-By
PHP/7.3.17
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000
Content-Disposition
inline; filename="pixel.gif"
Content-Type
image/gif
Expires
Thu, 31 Dec 2037 23:55:55 GMT
auction
prebid-server.rubiconproject.com/openrtb2/ Frame 0BD9
184 B
387 B
XHR
General
Full URL
https://prebid-server.rubiconproject.com/openrtb2/auction
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_4.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.57.231.210 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-57-231-210.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
da2c5d1b56e513eae13438575afc01fad43c91cc22e9e7e9e418bdec3a2a1722

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Tue, 12 May 2020 11:41:29 GMT
content-encoding
gzip
status
200
content-type
application/json
access-control-allow-origin
https://threatpost.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
content-length
174
expires
0
liveView.php
live.sekindo.com/live/ Frame 9E23
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=25&serverTime=1589283673&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=ABT%20%2F%20WFLimit%20%2F%201%20%2F%2010&isApp=0&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5eba8b596cf00&contentFileId=0&mediaPlayListId=0&dur=1000&cbuster=1589283694005&gdpr=1&gdprConsent=&isWePassGdpr=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.17
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:33 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.17
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
liveView.php
live.sekindo.com/live/ Frame 9E23
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=42&serverTime=1589283673&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=ABT%20%2F%20WFLimit%20%2F%201%20%2F%2010&isApp=0&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5eba8b596cf00&contentFileId=0&mediaPlayListId=0&dur=500&cbuster=1589283694201&gdpr=1&gdprConsent=&isWePassGdpr=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.17
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 May 2020 11:41:33 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.17
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
sync.adap.tv
URL
https://sync.adap.tv/sync?type=gif&key=tubemogul&uid=XrqLWwAAAJkLbyTo&_test=XrqLWwAAAJkLbyTo

Verdicts & Comments Add Verdict or Comment

263 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate string| gAMP_urlhost string| gAMP_urlpath string| gAMP_urlquery string| gAMP_contentid string| gAMP_category string| gAMP_contenttags object| OBtmpa function| OBtmpb object| xop function| 2pkv9xhkcg0 boolean| vjk7ey1xlog object| 69h0d6c17uo number| kPrebidTimeout number| kRefreshPollTime number| gRefreshCount number| gOXRefreshCount boolean| gRefreshDebug boolean| gPrebidDebug number| k60SecondRefreshInterval number| k90SecondRefreshInterval number| k120SecondRefreshInterval number| k180SecondRefreshInterval number| kDoNotRefresh number| kDefaultRefreshInterval object| gSChainNodes undefined| gGDPR_forceLocale boolean| gGDPR_silentNoConsent boolean| gGDPR_forceNoConsent string| gGDPR_logoURL undefined| kAmazonPublisherID object| ad728x90ATF object| ad300x250ATF object| ad300x250ATF2 object| ad728x90ATFTAB object| ad300x250ATFTAB object| ad300x250ATF2TAB object| ad320x50ATF object| ad300x250ATFM object| ad300x250ATF2M object| ad2x2skin number| gBrowserWidth object| desktopAdUnits object| tabletAdUnits object| mobileAdUnits object| gAllSlotData number| gAllSlotCount object| OX_dfp_ads number| minWidth boolean| disableBids object| googletag object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleTokenSync number| google_srt function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter undefined| google_measure_js_timing object| __core-js_shared__ object| core undefined| __cmp function| pbjsChunk object| pbjs object| _pbjsGlobals object| gRefreshSlots object| gRefreshIDs object| gRefreshTimes object| gRefreshIntervals object| gThisRefreshIDs object| gThisRefreshSlots boolean| gInitialLoad object| gPBJSTimeoutTimer object| gAmazonSlots object| gAmazonBids boolean| gAmazonBidsBack boolean| gOpenXBidsBack boolean| gPrebidBidsBack function| amp_getBidsForAllChannels function| amp_dumpTable function| amp_getBestBids function| amp_dumpBids function| amp_dumpWins function| customOxTargeting function| openXRefreshCallback function| sendAdserverRequest function| checkIfAllBidsBack function| amazonBidsBack function| pbjsBidsBack function| bidsTimeout function| sendBidRequests function| amp_refreshAllSlots function| amp_refreshSlots function| refreshAdSlots function| injectReportAdStyles function| addLoadEvent function| insertAfter function| configureAdSlot function| getCookie undefined| $ function| jQuery object| gdprDynamicStrings object| kss object| gdprStrings function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill object| dataLayer object| ___grecaptcha_cfg object| grecaptcha boolean| __google_recaptcha_client object| viewPortSize object| debugIp object| debugId function| constructsekindoParent281 object| gf_global object| google_tag_manager object| a7YHya function| a7YHyb function| xblocker object| recaptcha string| GoogleAnalyticsObject function| ga object| _qevents function| twq object| v49PQa function| v49PQb function| xblacklist object| google_tag_data object| gaplugins object| gaGlobal object| gaData object| twttr number| __google_ad_urls_id number| google_unique_id function| quantserve function| __qc object| ezt object| _qoptions boolean| sekindoFlowingPlayerOn object| ampInaboxIframes object| ampInaboxPendingMessages object| __google_ad_urls boolean| google_osd_loaded boolean| google_onload_fired function| gformBindFormatPricingFields function| Currency function| gformCleanNumber function| gformGetDecimalSeparator function| gformIsNumber function| gformIsNumeric function| gformDeleteUploadedFile object| _gformPriceFields undefined| _anyProductSelected function| gformIsHidden function| gformCalculateTotalPrice function| gformGetShippingPrice function| gformGetFieldId function| gformCalculateProductPrice function| gformGetProductQuantity function| gformIsProductSelected function| gformGetBasePrice function| gformFormatMoney function| gformFormatPricingField function| gformToNumber function| gformGetPriceDifference function| gformGetOptionLabel function| gformGetProductIds function| gformGetPrice function| gformRoundPrice function| gformRegisterPriceField function| gformInitPriceFields function| gformShowPasswordStrength function| gformPasswordStrength function| gformToggleShowPassword function| gformToggleCheckboxes function| gformAddListItem function| gformDeleteListItem function| gformAdjustClasses function| gformToggleIcons function| gformAddRepeaterItem function| gformDeleteRepeaterItem function| gformResetRepeaterAttributes function| gformToggleRepeaterButtons function| gformMatchCard function| gformFindCardType function| gformToggleCreditCard function| gformInitChosenFields function| gformInitCurrencyFormatFields function| GFMergeTag function| GFCalc function| gformFormatNumber function| getMatchGroups function| gf_get_field_number_format object| gform undefined| __gf_keyup_timeout function| renderRecaptcha function| gformValidateFileSize function| gformInitSpinner function| gformAddSpinner function| gf_raw_input_change function| gf_get_input_id_by_html_id function| gf_get_form_id_by_html_id function| gf_get_ids_by_html_id function| gf_input_change function| gformExtractFieldId function| gformExtractInputIndex function| rgars function| rgar object| gfMultiFileUploader undefined| __gf_timeout_handle function| gf_apply_rules function| gf_check_field_rule function| gf_get_field_logic function| gf_apply_field_rule function| gf_get_field_action function| gf_is_match function| gf_is_match_checkable function| gf_is_match_default function| gf_format_number function| gf_try_convert_float function| gf_matches_operation function| gf_get_value function| gf_do_field_action function| gf_do_next_button_action function| gf_do_action function| gf_reset_to_default function| gf_is_hidden_pricing_input object| Placeholders object| ak_js object| commentForm undefined| replyRowContainer undefined| children object| wp object| jQuery1124017464169722500977 object| gf_form_conditional_logic string| gf_number_format function| do_callback object| closure_lm_697610 function| jQuery1124017464169722500977_1589283673261 function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| closure_lm_748418 object| __AMP_LOG object| __AMP_ERRORS boolean| ampInaboxInitialized object| __AMP_MODE function| __AMP_REPORT_ERROR object| ampInaboxPositionObserver object| ampInaboxFrameOverlayManager object| AMP object| google_reactive_ads_global_state object| google_ad_modifications number| google_global_correlator object| google_prev_clients object| google_jobrunner object| GoogleGcLKhOms object| google_image_requests

0 Cookies

25 Console Messages

Source Level URL
Text
console-api log URL: https://qd.admetricspro.com/js/threatpost/ros-layout.js(Line 315)
Message:
gBrowserWidth =1600
console-api log URL: https://qd.admetricspro.com/js/threatpost/ros-layout.js(Line 340)
Message:
OpenX Slot defined for /21707124336/ThreatPost-970x250-ATF div-gpt-ad-6794670-2
console-api log URL: https://qd.admetricspro.com/js/threatpost/ros-layout.js(Line 340)
Message:
OpenX Slot defined for /21707124336/ThreatPost-300x250-ATF div-gpt-ad-6794670-3
console-api log URL: https://qd.admetricspro.com/js/threatpost/ros-layout.js(Line 340)
Message:
OpenX Slot defined for /21707124336/ThreatPost-300x600-ATF div-gpt-ad-6794670-5
console-api log URL: https://qd.admetricspro.com/js/threatpost/ros-layout.js(Line 340)
Message:
OpenX Slot defined for /21707124336/ThreatPost-2x2-Skin div-gpt-ad-6794670-1
console-api log URL: https://qd.admetricspro.com/js/threatpost/cmp.js(Line 3)
Message:
CMP: Locale=en-us gdpr= false
console-api log URL: https://qd.admetricspro.com/js/threatpost/cmp.js(Line 3)
Message:
GDPR is not applicable, skipping initialization of CMP
console-api log (Line 3)
Message:
Not calling apstag.init() typeof(kAmazonPublisherID)=undefined
console-api log (Line 3)
Message:
ENGINE: gSChainNodes found, prebid configured with 1 supply chain object(s)
console-api log (Line 3)
Message:
Initial Ad Load
console-api log (Line 3)
Message:
sendBidRequests() gPBJSTimeoutTimer=null pbjs.adserverRequestSent=undefined
console-api log (Line 3)
Message:
pbjs bids returned
console-api log (Line 3)
Message:
gPBJSTimeoutTimer cleared
console-api log (Line 3)
Message:
sendAdserverRequest(): pbjsBidsBack
console-api log (Line 3)
Message:
sendAdserverRequest()
console-api log (Line 3)
Message:
Not calling apstag.setDisplayBids() gAmazonBidsBack=false
console-api log (Line 3)
Message:
pbjs.getAdserverTargeting: >> Prebid
console-api log (Line 3)
Message:
[object Object]
console-api log (Line 3)
Message:
pbjs.getBidResponses:
console-api log (Line 3)
Message:
[object Object]
console-api log (Line 3)
Message:
gThisRefreshSlots=
console-api log (Line 3)
Message:
[object Object],[object Object],[object Object],[object Object]
console-api log (Line 3)
Message:
sendAdserverRequest(): ---> Calling googletag.pubads().refresh()
console-api log (Line 3)
Message:
console.groupEnd
console-api info URL: https://cdn.ampproject.org/rtv/012005012256000/amp4ads-v0.js(Line 418)
Message:
Powered by AMP ⚡ HTML – Version 2005012256000 https://threatpost.com/microsoft-teams-impersonation-attacks/155404/?utm_campaign=PostBeyond&utm_source=LinkedIn&utm_medium=%23329640&utm_term=Microsoft+Teams+Impersonation+Attacks+-+Article

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

acdn.adnxs.com
ads.adaptv.advertising.com
ads.pubmatic.com
adserver-us.adtech.advertising.com
adservice.google.com
adservice.google.de
analytics.twitter.com
aol-match.dotomi.com
ap.lijit.com
as-sec.casalemedia.com
assets.threatpost.com
c.amazon-adsystem.com
cdn.ampproject.org
cm.g.doubleclick.net
csync.loopme.me
e.serverbid.com
eu-u.openx.net
eus.rubiconproject.com
fastlane.rubiconproject.com
fonts.googleapis.com
fonts.gstatic.com
googleads.g.doubleclick.net
graph.facebook.com
hbopenbid.pubmatic.com
ib.adnxs.com
kasperskycontenthub.com
live.sekindo.com
match.adsrvr.org
media.threatpost.com
pagead2.googlesyndication.com
pixel.advertising.com
pixel.quantserve.com
pr-bh.ybp.yahoo.com
prebid-server.rubiconproject.com
qd.admetricspro.com
rules.quantcount.com
secure.quantserve.com
securepubads.g.doubleclick.net
serverbid-sync.nyc3.cdn.digitaloceanspaces.com
static.ads-twitter.com
stats.g.doubleclick.net
sync.adap.tv
sync.serverbid.com
t.co
tagan.adlightning.com
teachingaids-d.openx.net
threatpost.com
tpc.googlesyndication.com
u.openx.net
ups.analytics.yahoo.com
video.sekindo.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
www.gstatic.com
www.linkedin.com
www.reddit.com
x.bidswitch.net
sync.adap.tv
104.111.230.142
104.244.42.131
104.244.42.197
138.201.86.121
143.204.90.242
151.101.113.108
151.101.12.157
165.227.252.242
167.172.1.14
172.217.16.130
172.217.18.98
18.156.0.31
18.184.66.147
185.167.96.211
185.220.205.220
185.64.189.112
199.232.53.140
205.185.216.10
23.210.249.164
23.210.249.92
2600:9000:20eb:2200:0:5c46:4f40:93a1
2600:9000:20eb:2c00:6:44e3:f8c0:93a1
2600:9000:2156:2400:2:9275:3d40:93a1
2606:2800:233:97b6:26be:138a:cba8:bb01
2606:4700:3035::6812:2130
2a00:1288:110:c305::8000
2a00:1450:4001:801::2008
2a00:1450:4001:808::2003
2a00:1450:4001:809::2002
2a00:1450:4001:80b::200a
2a00:1450:4001:814::2003
2a00:1450:4001:816::2001
2a00:1450:4001:81b::2001
2a00:1450:4001:81d::200e
2a00:1450:4001:820::2002
2a00:1450:4001:820::2004
2a00:1450:4001:821::2003
2a00:1450:400c:c0a::9b
2a02:fa8:8806:16::1400
2a03:2880:f01c:800e:face:b00c:0:2
2a05:f500:10:101::b93f:9101
34.249.135.160
34.95.120.147
35.173.160.135
37.252.173.38
52.222.190.120
52.57.231.210
52.58.23.168
54.93.140.209
69.173.144.143
72.251.249.9
91.228.74.152
91.228.74.169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