URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Submission: On May 27 via api from US

Summary

This website contacted 30 IPs in 7 countries across 20 domains to perform 91 HTTP transactions. The main IP is 185.113.25.56, located in United Kingdom and belongs to FUTURE, GB. The main domain is www.techradar.com.
TLS certificate: Issued by Let's Encrypt Authority X3 on May 3rd 2020. Valid for: 3 months.
This is the only time www.techradar.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
4 185.113.25.56 20596 (FUTURE)
13 8.241.89.124 3356 (LEVEL3)
12 185.113.25.51 20596 (FUTURE)
3 2600:9000:219... 16509 (AMAZON-02)
1 2606:4700::68... 13335 (CLOUDFLAR...)
2 8.241.121.124 3356 (LEVEL3)
1 7 2a00:1450:400... 15169 (GOOGLE)
1 13.224.96.38 16509 (AMAZON-02)
1 3 2.16.46.85 16625 (AKAMAI-AS)
1 2a00:1450:400... 15169 (GOOGLE)
1 3.213.113.98 14618 (AMAZON-AES)
1 2a00:1450:400... 15169 (GOOGLE)
18 37.187.147.8 16276 (OVH)
2 2600:9000:219... 16509 (AMAZON-02)
3 3 2a00:1450:400... 15169 (GOOGLE)
3 3 2a00:1450:400... 15169 (GOOGLE)
3 2a00:1450:400... 15169 (GOOGLE)
1 2600:9000:219... 16509 (AMAZON-02)
1 35.190.59.101 15169 (GOOGLE)
1 94.31.29.99 33438 (HIGHWINDS2)
3 52.28.190.123 16509 (AMAZON-02)
1 216.58.207.38 15169 (GOOGLE)
1 185.113.25.54 20596 (FUTURE)
1 13.224.95.90 16509 (AMAZON-02)
1 8.241.79.124 3356 (LEVEL3)
1 35.157.160.140 16509 (AMAZON-02)
2 52.239.242.148 8075 (MICROSOFT...)
3 35.233.20.168 15169 (GOOGLE)
1 151.101.114.109 54113 (FASTLY)
1 2001:4860:480... 15169 (GOOGLE)
2 185.113.25.62 20596 (FUTURE)
91 30
Domain Requested by
13 vanilla.futurecdn.net www.techradar.com
vanilla.futurecdn.net
12 www.ultimedia.com vanilla.futurecdn.net
www.techradar.com
www.ultimedia.com
7 www.google-analytics.com 1 redirects www.techradar.com
vanilla.futurecdn.net
7 widgets.hawk-assets.co.uk www.techradar.com
widgets.hawk-assets.co.uk
6 medialb.ultimedia.com
5 search-api.fie.future.net.uk www.techradar.com
4 www.techradar.com vanilla.futurecdn.net
www.techradar.com
3 offer.slgnt.eu targetemsecure.blob.core.windows.net
offer.slgnt.eu
www.techradar.com
3 orionis.techradar.com www.techradar.com
3 www.google.de www.techradar.com
3 www.google.com 3 redirects
3 stats.g.doubleclick.net 3 redirects
3 sb.scorecardresearch.com 1 redirects www.techradar.com
3 quantcast.mgr.consensu.org www.techradar.com
quantcast.mgr.consensu.org
2 api.vanilla.futurecdn.net www.techradar.com
2 targetemsecure.blob.core.windows.net www.techradar.com
targetemsecure.blob.core.windows.net
2 static.quantcast.mgr.consensu.org quantcast.mgr.consensu.org
2 cdn.mos.cms.futurecdn.net www.techradar.com
1 siteeuwest.slgnt.eu www.techradar.com
1 cdn.polyfill.io targetemsecure.blob.core.windows.net
1 www.summerhamster.com
1 mos.fie.futurecdn.net
1 audit.quantcast.mgr.consensu.org www.techradar.com
1 gizmos.future-fie.co.uk
1 ad.doubleclick.net
1 dg876rejmw3ebkm51boa0sx2-wpengine.netdna-ssl.com
1 r.skimresources.com www.techradar.com
1 vendorlist.consensu.org www.techradar.com
1 ampcid.google.de www.techradar.com
1 srv-2020-05-27-15.pixel.parsely.com www.techradar.com
1 ampcid.google.com www.techradar.com
1 cdn.parsely.com www.techradar.com
1 cdn.onesignal.com www.techradar.com
91 33
Subject Issuer Validity Valid
techradar.com
Let's Encrypt Authority X3
2020-05-03 -
2020-08-01
3 months crt.sh
*.futurecdn.net
DigiCert SHA2 High Assurance Server CA
2017-07-20 -
2020-07-01
3 years crt.sh
hawk-assets.co.uk
Let's Encrypt Authority X3
2020-05-03 -
2020-08-01
3 months crt.sh
quantcast.mgr.consensu.org
Amazon
2020-05-22 -
2021-06-22
a year crt.sh
sni.cloudflaressl.com
CloudFlare Inc ECC CA-2
2020-04-06 -
2020-10-09
6 months crt.sh
*.google-analytics.com
GTS CA 1O1
2020-05-05 -
2020-07-28
3 months crt.sh
*.parsely.com
Amazon
2019-08-30 -
2020-09-30
a year crt.sh
*.scorecardresearch.com
Sectigo RSA Organization Validation Secure Server CA
2019-12-16 -
2020-12-25
a year crt.sh
*.google.com
GTS CA 1O1
2020-05-05 -
2020-07-28
3 months crt.sh
*.pixel.parsely.com
Let's Encrypt Authority X3
2020-04-01 -
2020-06-30
3 months crt.sh
*.google.de
GTS CA 1O1
2020-05-05 -
2020-07-28
3 months crt.sh
*.ultimedia.com
Sectigo RSA Domain Validation Secure Server CA
2020-03-05 -
2022-03-05
2 years crt.sh
search-api.fie.future.net.uk
Let's Encrypt Authority X3
2020-05-03 -
2020-08-01
3 months crt.sh
www.google.de
GTS CA 1O1
2020-05-05 -
2020-07-28
3 months crt.sh
vendorlist.consensu.org
Amazon
2020-02-07 -
2021-03-07
a year crt.sh
*.skimresources.com
DigiCert SHA2 Secure Server CA
2018-09-13 -
2020-10-07
2 years crt.sh
*.netdna-ssl.com
Sectigo RSA Domain Validation Secure Server CA
2020-02-18 -
2021-03-18
a year crt.sh
orionis.techradar.com
Let's Encrypt Authority X3
2020-04-17 -
2020-07-16
3 months crt.sh
*.doubleclick.net
GTS CA 1O1
2020-05-05 -
2020-07-28
3 months crt.sh
future-fie.co.uk
Let's Encrypt Authority X3
2020-05-03 -
2020-08-01
3 months crt.sh
*.summerhamster.com
Let's Encrypt Authority X3
2020-04-21 -
2020-07-20
3 months crt.sh
*.blob.core.windows.net
Microsoft IT TLS CA 5
2020-04-22 -
2022-04-22
2 years crt.sh
*.slgnt.eu
DigiCert SHA2 Secure Server CA
2019-10-18 -
2021-09-22
2 years crt.sh
f3.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2020-04-16 -
2021-04-17
a year crt.sh
api.vanilla.futurecdn.net
Let's Encrypt Authority X3
2020-05-03 -
2020-08-01
3 months crt.sh

This page contains 4 frames:

Primary Page: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Frame ID: FC302F5A581C01C2B30262D15AC1F690
Requests: 89 HTTP requests in this frame

Frame: https://static.quantcast.mgr.consensu.org/v33/cmp-3pc-check.html
Frame ID: 7BFBC0A53FC9ECC5A0FA797FF4DDE3CE
Requests: 1 HTTP requests in this frame

Frame: https://offer.slgnt.eu/sdstatic/cookie.html
Frame ID: 8612718D1AB9BE8D77C7131703D363DF
Requests: 1 HTTP requests in this frame

Frame: https://www.ultimedia.com/deliver/generic/iframe?mdtk=02312367&zone=2&type_player=0&sendstats=0&src=f5lsup&width=452&height=300&urlfacebook=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&ad=1&autoplay=yes&fstart=1&title=The+Last+of+Us+Part+2+release+date%2C+delay%2C+trailers%2C+news%2C+and+rumors+%7C+TechRadar+Talks&endMessage=um_ultimedia_wrapper_ultimediaEndRoll&widgetPrefix=um_ultimedia_wrapper_&tagparam=&tagparamdecoded=&visible=&gdprconsentstring=
Frame ID: AE8964E1891B78861C070FF1E7956F86
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<iframe[^>]* (?:id="comscore"|scr=[^>]+comscore)|\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • script /\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i

Page Statistics

91
Requests

99 %
HTTPS

35 %
IPv6

20
Domains

33
Subdomains

30
IPs

7
Countries

1490 kB
Transfer

5204 kB
Size

8
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 26
  • https://sb.scorecardresearch.com/b?c1=2&c2=10055482&cs_ucfr=&comscorekw=prokw&ns__t=1590592992173&ns_c=UTF-8&cv=3.5&c8=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&c7=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=10055482&cs_ucfr=&comscorekw=prokw&ns__t=1590592992173&ns_c=UTF-8&cv=3.5&c8=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&c7=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&c9=
Request Chain 31
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j82&tid=UA-48894329-1&cid=1367913561.1590592993&jid=934489178&gjid=1733306212&_gid=2082783632.1590592993&_u=aGBAgEABBAQC~&z=440697237 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1367913561.1590592993&jid=934489178&_v=j82&z=440697237 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1367913561.1590592993&jid=934489178&_v=j82&z=440697237&slf_rd=1&random=197471861
Request Chain 58
  • https://www.google-analytics.com/r/collect?v=1&_v=j82&a=1653908382&t=event&ni=1&_s=1&dl=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&ul=en-us&de=UTF-8&dt=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&ec=Affiliates&ea=FEP%20TOP%20widget%20missing&el=Password&_u=6HDAAEABBAQC~&jid=239099511&gjid=96036162&cid=1367913561.1590592993&tid=UA-48894329-1&_gid=2082783632.1590592993&_r=1&cd57=null&cd40=Password&cd41=Malware%7CDiscord%7CTrojan_horse_computing%7CUser_computing%7CAnarchyGrabber3_AnarchyGrabber3&cd42=Software&cd45=Password&cd46=Computing&cd47=Malware_turns_Discord_client_into_password_stealer&cd50=5&cd51=false&cd58=Computing&cd74=&cd13=false&cd10=EN-US&cd1=news&cd2=computing&cd3=computing&cd4=tech_techradar%2F&cd5=XUeVg74qQZwxrcTVTXpDSk&cd6=%7Cdiscord%7Canarchygrabber%7Cmalware%7Ctrojan%7Cpasswords%7C2fa%7Chackers%7Canarchygrabber3%7Cdiscord%7Canarchygrabber%7Cmalware%7Ctrojan%7Cpasswords%7C2fa%7Chackers%7Canarchygrabber3%7Ccomputing%7Ctrbc%7Cexclude-from-homepage%7Ctype_news%7Cchannel_computing%7Ccontentdev%7Ctrbc%7Cexclude-from-homepage%7Ctype_news%7Cchannel_computing%7Ccontentdev%7Cserversidehawk&cd7=anthony_spadafora&cd8=25-05-2020&cd9=1&cd27=181546&cd95=news&cd106=0&cd126=en&cd127=GB%7CUS%7CAU%7CSG%7CIN%7CAE%7CNZ%7CZA&cd128=25-05-2020&cd31=9.1&cd30=4g&cd12=null&cd14=null&cd16=null&cd17=null&cd25=null&cd37=null&cd48=null&cd53=null&cd62=0&cd73=null&cd75=null&cd76=null&cd90=1062412115719567500&cd105=null&cd111=null&cd115=null&cd116=null&cd117=null&cd118=null&cd124=null&cd125=null&cm1=5472&cm27=2678&cm28=1212&z=557342020 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-48894329-1&cid=1367913561.1590592993&jid=239099511&_gid=2082783632.1590592993&gjid=96036162&_v=j82&z=557342020 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1367913561.1590592993&jid=239099511&_v=j82&z=557342020 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1367913561.1590592993&jid=239099511&_v=j82&z=557342020&slf_rd=1&random=1579921548
Request Chain 90
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j82&tid=UA-48894329-1&cid=1367913561.1590592993&jid=1570748132&gjid=2131304679&_gid=2082783632.1590592993&_u=6HDAgEABBAQC~&z=329564002 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1367913561.1590592993&jid=1570748132&_v=j82&z=329564002 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1367913561.1590592993&jid=1570748132&_v=j82&z=329564002&slf_rd=1&random=3022175933

91 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set malware-turns-discord-client-into-password-stealer
www.techradar.com/news/
175 KB
48 KB
Document
General
Full URL
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.56 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif07.web.future.net.uk
Software
/
Resource Hash
f07d7087ef3d33f2016df3f7b88a5253ec33513f0d12cd39258c1536afd10527

Request headers

Host
www.techradar.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 26 May 2020 09:28:21 GMT
Content-Type
text/html; charset=UTF-8
X-FTR-Request-ID
b4c37494-f173-40da-bb9d-10a9b56ec83e 00000000:13CC_00000000:01BB_5ECE85DE_34A441:020F
Last-Modified
Tue, 26 May 2020 09:28:21 GMT
Xkey
techradar-platform-responsive techradar-article-XUeVg74qQZwxrcTVTXpDSk techradar-articletype-news techradar-articletemplate-standard techradar-article-age-recent techradar-region-US techradar-language-en techradar-author-7mgQv8SNay7k3EBExM79hM techradar-tag-ePwDVFQDuuC4YhTucNxXYX techradar-tag-pK8oXQy9JfmnytYhEXvzf5 techradar-tag-Tyi2HRsUEfBw27aPdPzTfj techradar-tag-jP7tiF7wYMBxMXrHBxtP57 techradar-tag-qPwtyR6YYDqxCFSHZ7aQxk techradar-tag-RF2BL6kwcsaDbnN779UvG5 techradar-tag-d2FrBhFT5eEGbW3zsX6FJ8 techradar-tag-rRSjdh2qpsswfChKiWgkyT techradar-tag-UAhMNQhdFijuNAxvLUWf2Y techradar-tag-ELVnYF7rwgQ2gqidP3Ra9S techradar-tag-ocag5ygCaDAoLAbxoFE747 techradar-tag-ZSgdGBn8nBmXMiNdjn5w6S techradar-version-26.8.23 techradar-server-ftefrontprod-172-20-9-86
Content-Encoding
gzip
Vary
Accept-Encoding
Age
107689
X-Country-Code
US
X-FTR-Cache-Status
HIT
X-FTR-Expires
Thu, 28 May 2020 09:28:21 GMT
Expires
Wed, 27 May 2020 15:28:10 GMT
Cache-Control
max-age=300,public
Set-Cookie
FTR_Country_Code=CH; path=/; domain=www.techradar.com
X-Country-Code-Real
CH
Accept-Ranges
bytes
Content-Length
47139
X-FTR-Realm
pip
X-FTR-DC
IX
X-FTR-Balancer
fteproxyblue
X-FTR-Backend
www-live-sites-varnish
X-FTR-Backend-Server
ftevarnishprodyellow
OpenSans.woff2
vanilla.futurecdn.net/techradar/181546/media/fonts/
10 KB
11 KB
Font
General
Full URL
https://vanilla.futurecdn.net/techradar/181546/media/fonts/OpenSans.woff2
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.241.89.124 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
12b9d92963b594157b22adeebfbcf463b80c5d504f0fefe3bee1533e20a996c9

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Origin
https://www.techradar.com

Response headers

Date
Fri, 22 May 2020 14:35:19 GMT
Content-Encoding
gzip
Age
434872
X-FTR-Backend-Server
ftefrontprodblue.core.future.net.uk
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
10220
X-FTR-Balancer
webproxyprodred
X-FTR-Request-ID
00000000:B8EB_00000000:0050_5EC7E327_154F3C:525D
Last-Modified
Fri, 22 May 2020 13:48:30 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5ec7d82e-2844"
Access-Control-Allow-Methods
GET
Content-Type
text/plain; charset=utf-8
access-control-allow-origin
*
Cache-Control
max-age=2592000
access-control-allow-credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Sun, 21 Jun 2020 14:35:21 GMT
OpenSans-Semibold.woff2
vanilla.futurecdn.net/techradar/181546/media/fonts/
10 KB
11 KB
Font
General
Full URL
https://vanilla.futurecdn.net/techradar/181546/media/fonts/OpenSans-Semibold.woff2
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.241.89.124 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
83113ce831f3f1ec8841232d895e17f722444b1939f5230891f7ff17a7c53618

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Origin
https://www.techradar.com

Response headers

Date
Fri, 22 May 2020 14:35:19 GMT
Content-Encoding
gzip
Age
434872
X-FTR-Backend-Server
ftefrontprodred.core.future.net.uk
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
10389
X-FTR-Balancer
webproxyprod01
X-FTR-Request-ID
00000000:7BE3_00000000:0050_5EC7E327_1268B7:521C
Last-Modified
Fri, 22 May 2020 13:48:30 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5ec7d82e-28a4"
access-control-allow-methods
GET
Content-Type
text/plain; charset=utf-8
access-control-allow-origin
*
Cache-Control
max-age=2592000
access-control-allow-credentials
true
Accept-Ranges
bytes
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Sun, 21 Jun 2020 14:35:19 GMT
responsive.js
widgets.hawk-assets.co.uk/js/w/
96 KB
29 KB
Script
General
Full URL
https://widgets.hawk-assets.co.uk/js/w/responsive.js
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.51 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif14.web.future.net.uk
Software
/
Resource Hash
4683c315ab19a0dbe37361b3ff1b57691231fb474dd47093844b080e1b76cac1

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 15:09:53 GMT
Content-Encoding
gzip
X-Hawk-Country
Xkey
asset-type-fie-widgets
Age
797
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-assets
X-FTR-Cache-Status
HIT
Content-Length
28935
X-FTR-Expires
Wed, 27 May 2020 15:39:53 GMT
X-FTR-Balancer
hawk-proxy-185-113-25-40
X-FTR-Request-ID
00000000:9E14_00000000:01BB_5ECE85DF_1310940:4D85
Last-Modified
Tue, 26 May 2020 16:53:02 GMT
X-Country-Code-Real
CH
ETag
"5ecd496e-17f1a"
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
X-FTR-Backend-Server
fievarnishprodwhite
Cache-Control
max-age=3600
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Expires
Wed, 27 May 2020 16:09:53 GMT
header.js
vanilla.futurecdn.net/techradar/181546/media/js/header/
687 KB
195 KB
Script
General
Full URL
https://vanilla.futurecdn.net/techradar/181546/media/js/header/header.js
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.241.89.124 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
62ad4941bee0fbc2213e23563ed1b1df5fd54dc650d924476069e8ab65b32e69

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Origin
https://www.techradar.com

Response headers

Date
Fri, 22 May 2020 14:35:20 GMT
Content-Encoding
gzip
Age
434871
X-FTR-Backend-Server
ftefrontprod-172-20-9-85
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
199304
X-FTR-Balancer
webproxyprod01
X-FTR-Request-ID
00000000:8A15_00000000:0050_5EC7E325_1268A5:521C
Last-Modified
Fri, 22 May 2020 13:48:30 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5ec7d82e-aba97"
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Sun, 21 Jun 2020 14:35:20 GMT
choice.js
quantcast.mgr.consensu.org/choice/uer8ZPXHG8WDU/www.techradar.com/
4 KB
2 KB
Script
General
Full URL
https://quantcast.mgr.consensu.org/choice/uer8ZPXHG8WDU/www.techradar.com/choice.js?timestamp=1590592991058
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2190:de00:9:46dc:4700:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
9b69d8cb86f47f6a5a9f02444453c471e8e219cc805d3d918bca89cb7620fe36

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 27 May 2020 15:22:16 GMT
content-encoding
gzip
last-modified
Tue, 19 May 2020 15:31:34 GMT
server
AmazonS3
age
55
x-amz-server-side-encryption
AES256
vary
Access-Control-Request-Headers,Access-Control-Request-Method,Origin,Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript; charset=UTF-8
status
200
x-amz-cf-pop
ZRH50-C1
x-amz-cf-id
xK8sNhG5SU_xlaMiTtf9sR5Jn8cZcSJm2-VdXW2c_dDVz4aTPy5OSw==
via
1.1 e96895e7fdc48b58a3d95d2e8e23a8b0.cloudfront.net (CloudFront)
techradar.woff
vanilla.futurecdn.net/techradar/181546/media/fonts/
8 KB
8 KB
Font
General
Full URL
https://vanilla.futurecdn.net/techradar/181546/media/fonts/techradar.woff
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.241.89.124 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
1c732fe50c12ed90ffeb0ddc68602e4f8f46d7089efdfadfe0871a56af5498a1

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Origin
https://www.techradar.com

Response headers

Date
Fri, 22 May 2020 14:35:19 GMT
Age
434872
X-FTR-Backend-Server
ftefrontprodblue.core.future.net.uk
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
7840
X-FTR-Balancer
webproxyprod01
X-FTR-Request-ID
00000000:B8B0_00000000:0050_5EC7E327_CA3FF:521B
Last-Modified
Fri, 22 May 2020 13:48:30 GMT
Server
Footprint Distributor V6.1.1162
ETag
"5ec7d82e-1ea0"
Access-Control-Allow-Methods
GET
Content-Type
application/font-woff
Access-Control-Allow-Origin
*
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Sun, 21 Jun 2020 14:35:21 GMT
OneSignalSDK.js
cdn.onesignal.com/sdks/
8 KB
3 KB
Script
General
Full URL
https://cdn.onesignal.com/sdks/OneSignalSDK.js
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6812:e234 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
b1357113f7b28eb8a5e2da0fe0bca37f40fa0d5d25d9dafa4698d0ceb9c72d78

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 27 May 2020 15:23:11 GMT
content-encoding
gzip
cf-cache-status
HIT
server
cloudflare
age
286
etag
W/"3f1c1174b1ee437acb796315c8259f0c"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=43200
cf-ray
59a0bc52588ec2f9-FRA
cf-request-id
02f854077a0000c2f90d8fd200000001
expires
Thu, 28 May 2020 03:23:11 GMT
dEpz5LV5PYpqYBngLd6omi-650-80.jpg.webp
cdn.mos.cms.futurecdn.net/
46 KB
47 KB
Image
General
Full URL
https://cdn.mos.cms.futurecdn.net/dEpz5LV5PYpqYBngLd6omi-650-80.jpg.webp
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
8.241.121.124 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
openresty/1.15.8.1 /
Resource Hash
0f9a6e8590cfcdb342f9dd2786b4b274e3d4b15264be190d05489bee561570c7

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 11 May 2020 16:21:29 GMT
X-Backend
default
Age
1378902
X-FTR-DC
TC
X-FTR-Realm
pip
X-FTR-Backend
mos_kodiak
Connection
keep-alive
X-FTR-Cache-Status
MISS
Content-Length
47498
X-FTR-Balancer
bulkproxyprod01
X-FTR-Request-ID
00000000:6755_00000000:0050_5EB97B86_28985:0B28
Server
openresty/1.15.8.1
X-Served-By
kodiak-mos-adapter-varnish-fdc57966-fkvrc
Content-Type
image/webp
X-FTR-Backend-Server
kube
Cache-Control
max-age=5184000
Accept-Ranges
bytes
Expires
Sat, 11 Jul 2020 13:13:27 GMT
missing-image.svg
vanilla.futurecdn.net/techradar/media/img/
3 KB
2 KB
Image
General
Full URL
https://vanilla.futurecdn.net/techradar/media/img/missing-image.svg
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.241.89.124 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
131423a5b0117aa6fddbde39abed88048b2ee6a147ade1fbf040b551614ab2d2

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 22 May 2020 19:38:16 GMT
Content-Encoding
gzip
Age
416695
X-FTR-Backend-Server
ftefrontprod-172-20-9-86
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
1061
X-FTR-Balancer
webproxyprod01
X-FTR-Request-ID
00000000:A4D9_00000000:0050_5EC82A28_1AAC5:7685
Last-Modified
Fri, 22 May 2020 13:48:30 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5ec7d82e-a6b"
access-control-allow-methods
GET
Content-Type
image/svg+xml
access-control-allow-origin
*
Cache-Control
max-age=2592000
access-control-allow-credentials
true
Accept-Ranges
bytes
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Sun, 21 Jun 2020 19:38:16 GMT
analytics.js
www.google-analytics.com/
45 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
2f1fd973e6c48489ae07c467e3278635b856c698d1f502e06af3ab555937deac
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 30 Apr 2020 21:54:13 GMT
server
Golfe2
age
2676
date
Wed, 27 May 2020 14:38:35 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18433
expires
Wed, 27 May 2020 16:38:35 GMT
hawklinks.js
widgets.hawk-assets.co.uk/hl/
114 KB
38 KB
Script
General
Full URL
https://widgets.hawk-assets.co.uk/hl/hawklinks.js
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.51 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif14.web.future.net.uk
Software
/
Resource Hash
4670d2c85aebbf7c824f2296f3f0fd6173f6dd74b42a0d9866b094ccb86406f7

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 15:20:33 GMT
Content-Encoding
gzip
X-Hawk-Country
Xkey
asset-type-fie-hawklinks
Age
158
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-assets
X-FTR-Cache-Status
HIT
Content-Length
37957
X-FTR-Expires
Wed, 27 May 2020 15:50:33 GMT
X-FTR-Balancer
hawk-proxy-185-113-25-40
X-FTR-Request-ID
00000000:9E16_00000000:01BB_5ECE85DF_203E71:4D82
Last-Modified
Tue, 26 May 2020 09:16:18 GMT
X-Country-Code-Real
CH
ETag
"5eccde62-1c967"
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
X-FTR-Backend-Server
fievarnishprodwhite
Cache-Control
max-age=3600
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Expires
Wed, 27 May 2020 16:20:33 GMT
p.js
cdn.parsely.com/keys/techradar.com/
48 KB
19 KB
Script
General
Full URL
https://cdn.parsely.com/keys/techradar.com/p.js
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.96.38 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-96-38.zrh50.r.cloudfront.net
Software
nginx /
Resource Hash
a78fd35e8afff22e72a55015aa54ad045f829f3380927d0c88363d324b8d55c2

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
public
date
Tue, 26 May 2020 19:12:34 GMT
content-encoding
gzip
last-modified
Thu, 02 Apr 2020 00:28:36 GMT
server
nginx
age
72630
etag
"5e8531b4-c07c"
x-cache
Hit from cloudfront
content-type
application/x-javascript
status
200
cache-control
max-age=86400, public
x-amz-cf-pop
ZRH50-C1
x-amz-cf-id
XXUyzbdjc_xToJllsHrkja5IY8JaR9stOZmYAF34CP0M4BVlc_I8GQ==
via
1.1 1437ff2cfbc1ea8c7a36e6b0ce6e935a.cloudfront.net (CloudFront)
expires
Wed, 27 May 2020 19:12:34 GMT
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.46.85 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-16-46-85.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a256529bd5b1b8846f8d2536ce7581fb6cea4479992f222d01535903dff48d79

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 15:23:11 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
884
Expires
Thu, 28 May 2020 15:23:11 GMT
main.min.js
vanilla.futurecdn.net/techradar/181546/media/js/
1 MB
212 KB
Script
General
Full URL
https://vanilla.futurecdn.net/techradar/181546/media/js/main.min.js
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.241.89.124 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
0cfeaa5d33585688e72458302176524d406def37c1e9bac99c0fbc295f3a5375

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 22 May 2020 14:35:22 GMT
Content-Encoding
gzip
Age
434869
X-FTR-Backend-Server
ftefrontprodblue.core.future.net.uk
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
216667
X-FTR-Balancer
webproxyprod01
X-FTR-Request-ID
00000000:9D4F_00000000:0050_5EC7E32A_CA41A:521B
Last-Modified
Fri, 22 May 2020 13:48:30 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5ec7d82e-104ea1"
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Sun, 21 Jun 2020 14:35:22 GMT
techradar.min.css
vanilla.futurecdn.net/techradar/181546/media/css/
376 KB
52 KB
Stylesheet
General
Full URL
https://vanilla.futurecdn.net/techradar/181546/media/css/techradar.min.css
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.241.89.124 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
1817774008c5b192c9768d9e723355213161b54b0039dfd66b9c439019c70e11

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 22 May 2020 14:35:19 GMT
Content-Encoding
gzip
Age
434872
X-FTR-Backend-Server
ftefrontprod-172-20-9-85
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
52491
X-FTR-Balancer
webproxyprod01
X-FTR-Request-ID
00000000:B8B0_00000000:0050_5EC7E327_CA400:521B
Last-Modified
Fri, 22 May 2020 13:48:30 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5ec7d82e-5e004"
Access-Control-Allow-Methods
GET
Content-Type
text/css
Access-Control-Allow-Origin
*
Cache-Control
max-age=2592000
access-control-allow-credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Sun, 21 Jun 2020 14:35:24 GMT
cmp.js
quantcast.mgr.consensu.org/
264 KB
76 KB
Script
General
Full URL
https://quantcast.mgr.consensu.org/cmp.js
Requested by
Host: quantcast.mgr.consensu.org
URL: https://quantcast.mgr.consensu.org/choice/uer8ZPXHG8WDU/www.techradar.com/choice.js?timestamp=1590592991058
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2190:de00:9:46dc:4700:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
8f670db094f8157451312a2d25ce34fd67f622e07d356f9db841224cceeeed2d

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 27 May 2020 15:14:23 GMT
content-encoding
gzip
last-modified
Thu, 21 May 2020 20:45:01 GMT
server
AmazonS3
age
1364
x-amz-server-side-encryption
AES256
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/javascript;charset=UTF-8
status
200
cache-control
public, max-age=7200
x-amz-meta-qc-ineu
True
x-amz-cf-pop
ZRH50-C1
x-amz-cf-id
wc7iEm9xD6Q5oFagOVstQ9DN5gtPUE9FaEIO2VQ1KTxAnDnFJe7iLw==
via
1.1 e96895e7fdc48b58a3d95d2e8e23a8b0.cloudfront.net (CloudFront)
publisher:getClientId
ampcid.google.com/v1/
74 B
181 B
XHR
General
Full URL
https://ampcid.google.com/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
991bfe84fec788f2b7d432b99a60c1e2aa2e799bc0137da8cf478299d0fc9a10
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 27 May 2020 15:23:11 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://www.techradar.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
94
x-xss-protection
0
d5a1d580-fb71-4cb1-a96e-944982ade306
https://www.techradar.com/
14 KB
0
Other
General
Full URL
blob:https://www.techradar.com/d5a1d580-fb71-4cb1-a96e-944982ade306
Requested by
Host: vanilla.futurecdn.net
URL: https://vanilla.futurecdn.net/techradar/181546/media/js/header/header.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c093786a9d0eeb397f794fcbfc27d84c05d00e0337eb5363fb29c5b8b72da4a6

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
14798
desktop-article-layout-responsive.js
vanilla.futurecdn.net/techradar/181546/media/js/header/
7 KB
3 KB
Script
General
Full URL
https://vanilla.futurecdn.net/techradar/181546/media/js/header/desktop-article-layout-responsive.js
Requested by
Host: vanilla.futurecdn.net
URL: https://vanilla.futurecdn.net/techradar/181546/media/js/header/header.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.241.89.124 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
f33074c3a6ae77b01bfd4c30faa873a778d0daf71c9c610d9bc6fb0c23acec3c

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 22 May 2020 14:35:30 GMT
Content-Encoding
gzip
Age
434861
X-FTR-Backend-Server
ftefrontprodred.core.future.net.uk
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
1909
X-FTR-Balancer
webproxyprodred
X-FTR-Request-ID
00000000:B8EB_00000000:0050_5EC7E331_155036:525D
Last-Modified
Fri, 22 May 2020 13:48:30 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5ec7d82e-1b11"
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Sun, 21 Jun 2020 14:35:31 GMT
n-format-format-responsive.js
vanilla.futurecdn.net/techradar/181546/media/js/header/
14 KB
5 KB
Script
General
Full URL
https://vanilla.futurecdn.net/techradar/181546/media/js/header/n-format-format-responsive.js
Requested by
Host: vanilla.futurecdn.net
URL: https://vanilla.futurecdn.net/techradar/181546/media/js/header/header.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.241.89.124 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
fa2ebc95d1f68c52baf4d5117640340197175b862c6d0f32a7cec9c4b7a6e28c

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 22 May 2020 14:35:29 GMT
Content-Encoding
gzip
Age
434862
X-FTR-Backend-Server
ftefrontprod-172-20-9-85
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
4741
X-FTR-Balancer
webproxyprodred
X-FTR-Request-ID
00000000:B8EB_00000000:0050_5EC7E32E_154FCD:525D
Last-Modified
Fri, 22 May 2020 13:48:30 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5ec7d82e-39ea"
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Sun, 21 Jun 2020 14:35:52 GMT
/
srv-2020-05-27-15.pixel.parsely.com/plogger/
43 B
229 B
Image
General
Full URL
https://srv-2020-05-27-15.pixel.parsely.com/plogger/?rand=1590592991674&plid=30041349&idsite=techradar.com&url=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&urlref=&screen=1600x1200%7C1600x1200%7C24&data=%7B%7D&sid=1&surl=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&sref=&sts=1590592991669&slts=0&title=Malware+turns+Discord+client+into+password+stealer+%7C+TechRadar&date=Wed+May+27+2020+17%3A23%3A11+GMT%2B0200+(Central+European+Summer+Time)&action=pageview&pvid=12385289&u=pid%3Df22400e414f1e5fddcd7b4d88b242c5d
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.213.113.98 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-3-213-113-98.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 15:23:12 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
publisher:getClientId
ampcid.google.de/v1/
3 B
110 B
XHR
General
Full URL
https://ampcid.google.de/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 27 May 2020 15:23:11 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://www.techradar.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
23
x-xss-protection
0
smart.js
www.ultimedia.com/js/common/
40 KB
8 KB
Script
General
Full URL
https://www.ultimedia.com/js/common/smart.js
Requested by
Host: vanilla.futurecdn.net
URL: https://vanilla.futurecdn.net/techradar/181546/media/js/main.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
37.187.147.8 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb3.dginfra.net
Software
nginx/1.4.6 (Ubuntu) /
Resource Hash
ab0392b691d0326eb200e753184da2899fde1f20f72aea022b466d21cad7a8a8
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 15:23:12 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Last-Modified
Tue, 19 May 2020 08:52:47 GMT
Server
nginx/1.4.6 (Ubuntu)
Strict-Transport-Security
max-age=31536000; includeSubDomains
Content-Type
application/x-javascript
Cache-Control
max-age=2678400
Transfer-Encoding
chunked
Connection
keep-alive
Expires
Sat, 27 Jun 2020 15:23:12 GMT
US.svg
www.techradar.com/media/shared/img/flags/
3 KB
1 KB
Image
General
Full URL
https://www.techradar.com/media/shared/img/flags/US.svg
Requested by
Host: vanilla.futurecdn.net
URL: https://vanilla.futurecdn.net/techradar/181546/media/js/main.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.56 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif07.web.future.net.uk
Software
/
Resource Hash
a715e6b25ddd72ca18758cc80de0f3d56c9168743069ace7490be62ff13a16df

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 07 May 2020 15:12:12 GMT
Content-Encoding
gzip
Age
1728659
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites-varnish
X-FTR-Cache-Status
HIT
Content-Length
436
X-FTR-Expires
Sat, 06 Jun 2020 15:12:12 GMT
X-FTR-Balancer
fteproxyblue
X-FTR-Request-ID
00000000:13CC_00000000:01BB_5ECE85DE_34A447:020F
Last-Modified
Thu, 07 May 2020 10:09:26 GMT
X-Country-Code-Real
CH
ETag
W/"5eb3de56-a56"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
image/svg+xml
X-FTR-Backend-Server
ftevarnishprodred
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
X-Country-Code
US
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Sat, 06 Jun 2020 15:12:12 GMT
merchant-domains.php
search-api.fie.future.net.uk/
161 KB
35 KB
Fetch
General
Full URL
https://search-api.fie.future.net.uk/merchant-domains.php?site=TRD
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.51 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif14.web.future.net.uk
Software
/
Resource Hash
39bb2c04507b71c796dddf4c16f4dcf6a32ca4e4475e1df3bdcdcdfe08251a7d

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 14:54:30 GMT
Content-Encoding
gzip
X-Hawk-Country
Age
1722
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-api
X-FTR-Cache-Status
HIT
Content-Length
35073
X-FTR-Expires
Wed, 27 May 2020 15:24:30 GMT
X-FTR-Balancer
hawk-proxy-185-113-25-40
X-FTR-Request-ID
00000000:9E4A_00000000:01BB_5ECE85E0_BF8F57:4D84
X-Country-Code-Real
CH
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/json; charset=utf-8;
X-FTR-Backend-Server
fievarnishprodwhite
Cache-Control
max-age=300,public
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,X-Hawk-Country,X-Hawk-Area
Expires
Wed, 27 May 2020 15:28:12 GMT
cmp-3pc-check.html
static.quantcast.mgr.consensu.org/v33/ Frame 7BFB
0
0
Document
General
Full URL
https://static.quantcast.mgr.consensu.org/v33/cmp-3pc-check.html
Requested by
Host: quantcast.mgr.consensu.org
URL: https://quantcast.mgr.consensu.org/cmp.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2190:1800:9:46dc:4700:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash

Request headers

:method
GET
:authority
static.quantcast.mgr.consensu.org
:scheme
https
:path
/v33/cmp-3pc-check.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer

Response headers

status
200
content-type
text/html
content-length
645
last-modified
Thu, 14 May 2020 20:38:15 GMT
x-amz-server-side-encryption
AES256
accept-ranges
bytes
server
AmazonS3
date
Wed, 27 May 2020 15:16:17 GMT
etag
"55b98270d639ef0c34781d9f03cce91f"
cache-control
immutable, max-age=1209600
x-cache
Hit from cloudfront
via
1.1 eb7b239aed47669f8a7b6ac95bc8aff1.cloudfront.net (CloudFront)
x-amz-cf-pop
ZRH50-C1
x-amz-cf-id
vnEf2gIl1fJbij8ECBbYTJmWTPMcbPMKC3ib3g29ypNhJ1RZlFESCw==
age
754
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=10055482&cs_ucfr=&comscorekw=prokw&ns__t=1590592992173&ns_c=UTF-8&cv=3.5&c8=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRad...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=10055482&cs_ucfr=&comscorekw=prokw&ns__t=1590592992173&ns_c=UTF-8&cv=3.5&c8=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRa...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=10055482&cs_ucfr=&comscorekw=prokw&ns__t=1590592992173&ns_c=UTF-8&cv=3.5&c8=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&c7=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&c9=
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.46.85 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-16-46-85.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 27 May 2020 15:23:12 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=10055482&cs_ucfr=&comscorekw=prokw&ns__t=1590592992173&ns_c=UTF-8&cv=3.5&c8=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&c7=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&c9=
Pragma
no-cache
Date
Wed, 27 May 2020 15:23:12 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
OpenSans-Bold.woff2
vanilla.futurecdn.net/techradar/181546/media/fonts/
10 KB
11 KB
Font
General
Full URL
https://vanilla.futurecdn.net/techradar/181546/media/fonts/OpenSans-Bold.woff2
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.241.89.124 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
7a223174668e40dccd38462d34304503b75e31e700bff92b7e9e8fdda3274670

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://vanilla.futurecdn.net/techradar/181546/media/css/techradar.min.css
Origin
https://www.techradar.com

Response headers

Date
Fri, 22 May 2020 14:35:22 GMT
Content-Encoding
gzip
Age
434870
X-FTR-Backend-Server
ftefrontprod-172-20-9-86
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
10278
X-FTR-Balancer
webproxyprod01
X-FTR-Request-ID
00000000:B8B0_00000000:0050_5EC7E327_CA406:521B
Last-Modified
Fri, 22 May 2020 13:48:30 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5ec7d82e-2840"
Access-Control-Allow-Methods
GET
Content-Type
text/plain; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Sun, 21 Jun 2020 14:35:25 GMT
OpenSans-Light.woff2
vanilla.futurecdn.net/techradar/181546/media/fonts/
10 KB
11 KB
Font
General
Full URL
https://vanilla.futurecdn.net/techradar/181546/media/fonts/OpenSans-Light.woff2
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.241.89.124 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
6ed0702c109875dca01cfa51b44aa5c9da3f51892f8e9ba54e523d772ca20afb

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://vanilla.futurecdn.net/techradar/181546/media/css/techradar.min.css
Origin
https://www.techradar.com

Response headers

Date
Fri, 22 May 2020 14:35:22 GMT
Content-Encoding
gzip
Age
434870
X-FTR-Backend-Server
ftefrontprod-172-20-9-86
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
10161
X-FTR-Balancer
webproxyprod01
X-FTR-Request-ID
00000000:7BE3_00000000:0050_5EC7E327_1268B8:521C
Last-Modified
Fri, 22 May 2020 13:48:30 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5ec7d82e-27e0"
Access-Control-Allow-Methods
GET
Content-Type
text/plain; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Sun, 21 Jun 2020 14:35:25 GMT
translations.php
search-api.fie.future.net.uk/
20 KB
7 KB
Fetch
General
Full URL
https://search-api.fie.future.net.uk/translations.php?language=en-CH
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.51 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif14.web.future.net.uk
Software
/
Resource Hash
55ab111fd5836b7adc128da2ac5f23ca3ad59cac96e71650c99dc00fef6c5f3c

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 15:11:49 GMT
Content-Encoding
gzip
X-Hawk-Country
Age
682
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-api
X-FTR-Cache-Status
HIT
Content-Length
6342
X-FTR-Expires
Wed, 27 May 2020 15:41:49 GMT
X-FTR-Balancer
hawk-proxy-185-113-25-40
X-FTR-Request-ID
00000000:9E4A_00000000:01BB_5ECE85E0_BF8F7C:4D84
X-Country-Code-Real
CH
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/json; charset=utf-8;
X-FTR-Backend-Server
fievarnishprodred
Cache-Control
max-age=300,public
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,X-Hawk-Country,X-Hawk-Area
Expires
Wed, 27 May 2020 15:28:12 GMT
collect
www.google-analytics.com/
35 B
95 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j82&a=1653908382&t=pageview&_s=1&dl=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&ul=en-us&de=UTF-8&dt=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=aGBAgEABBAQC~&jid=934489178&gjid=1733306212&cid=1367913561.1590592993&tid=UA-48894329-1&_gid=2082783632.1590592993&cd57=null&cd40=Password&cd41=Malware%7CDiscord%7CTrojan_horse_computing%7CUser_computing%7CAnarchyGrabber3_AnarchyGrabber3&cd42=Software&cd45=Password&cd46=Computing&cd47=Malware_turns_Discord_client_into_password_stealer&cd50=5&cd51=false&cd58=Computing&cd74=&cd13=false&cd10=EN-US&cd1=news&cd2=computing&cd3=computing&cd4=tech_techradar%2F&cd5=XUeVg74qQZwxrcTVTXpDSk&cd6=%7Cdiscord%7Canarchygrabber%7Cmalware%7Ctrojan%7Cpasswords%7C2fa%7Chackers%7Canarchygrabber3%7Cdiscord%7Canarchygrabber%7Cmalware%7Ctrojan%7Cpasswords%7C2fa%7Chackers%7Canarchygrabber3%7Ccomputing%7Ctrbc%7Cexclude-from-homepage%7Ctype_news%7Cchannel_computing%7Ccontentdev%7Ctrbc%7Cexclude-from-homepage%7Ctype_news%7Cchannel_computing%7Ccontentdev%7Cserversidehawk&cd7=anthony_spadafora&cd8=25-05-2020&cd9=1&cd27=181546&cd95=news&cd106=0&cd126=en&cd127=GB%7CUS%7CAU%7CSG%7CIN%7CAE%7CNZ%7CZA&cd128=25-05-2020&cd31=9.1&cd30=4g&z=1910202742
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 27 May 2020 04:45:52 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
38240
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j82&tid=UA-48894329-1&cid=1367913561.1590592993&jid=934489178&gjid=1733306212&_gid=2082783632.1590592993&_u=aGBAgEABBAQC~&z=440697237
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1367913561.1590592993&jid=934489178&_v=j82&z=440697237
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1367913561.1590592993&jid=934489178&_v=j82&z=440697237&slf_rd=1&random=197471861
42 B
106 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1367913561.1590592993&jid=934489178&_v=j82&z=440697237&slf_rd=1&random=197471861
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 27 May 2020 15:23:12 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 27 May 2020 15:23:12 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1367913561.1590592993&jid=934489178&_v=j82&z=440697237&slf_rd=1&random=197471861
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
cmpui-popup.js
static.quantcast.mgr.consensu.org/v33/
266 KB
75 KB
Script
General
Full URL
https://static.quantcast.mgr.consensu.org/v33/cmpui-popup.js
Requested by
Host: quantcast.mgr.consensu.org
URL: https://quantcast.mgr.consensu.org/cmp.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2190:1800:9:46dc:4700:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
5038a66361943a447d31ef8898fb0f069593b45a5176454742b5d062d19cb41c

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 27 May 2020 15:08:21 GMT
content-encoding
gzip
last-modified
Thu, 14 May 2020 20:38:14 GMT
server
AmazonS3
age
1366
x-amz-server-side-encryption
AES256
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/javascript;charset=UTF-8
status
200
cache-control
immutable, max-age=1209600
x-amz-cf-pop
ZRH50-C1
x-amz-cf-id
LhwaVWm5nsDhRF-PQliTWE35jZ0DNp4b5xC2ZJ8qDj3yYEPH4-LplA==
via
1.1 eb7b239aed47669f8a7b6ac95bc8aff1.cloudfront.net (CloudFront)
Npc8yZE4C6ywqG6B6r5iDY-320-80.jpg.webp
cdn.mos.cms.futurecdn.net/
5 KB
6 KB
Image
General
Full URL
https://cdn.mos.cms.futurecdn.net/Npc8yZE4C6ywqG6B6r5iDY-320-80.jpg.webp
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
8.241.121.124 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
openresty/1.15.8.1 /
Resource Hash
1eee845ac2c79157892b6d91d1e65e031c695bc25d02b1ef874b7129a493fcfe

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 24 May 2020 08:00:39 GMT
X-Backend
default
Age
285753
X-FTR-DC
TC
X-FTR-Realm
pip
X-FTR-Backend
mos_kodiak
Connection
keep-alive
X-FTR-Cache-Status
MISS
Content-Length
5170
X-FTR-Balancer
bulkproxyprod01
X-FTR-Request-ID
00000000:8B59_00000000:0050_5ECA29A4_4910F:0C63
Server
openresty/1.15.8.1
X-Served-By
kodiak-mos-adapter-varnish-fdc57966-fkvrc
Content-Type
image/webp
X-FTR-Backend-Server
kube
Cache-Control
max-age=5184000
Accept-Ranges
bytes
Expires
Thu, 23 Jul 2020 08:03:49 GMT
2
www.ultimedia.com/api/widget/getwidget/mdtk/02312367/zone/
136 B
466 B
XHR
General
Full URL
https://www.ultimedia.com/api/widget/getwidget/mdtk/02312367/zone/2?url=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&meta_breadcrumb=&meta_tag=
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
37.187.147.8 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb3.dginfra.net
Software
nginx/1.4.6 (Ubuntu) /
Resource Hash
e78f56276c04b58863c43424709892edc08c45c7eb17bdc289d3cdd2a060fb1e
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 27 May 2020 15:23:15 GMT
Server
nginx/1.4.6 (Ubuntu)
Connection
keep-alive
Content-Length
136
Strict-Transport-Security
max-age=31536000; includeSubDomains
Content-Type
application/json
visible_player.js
www.ultimedia.com/js/common/
27 KB
9 KB
Script
General
Full URL
https://www.ultimedia.com/js/common/visible_player.js?v=1590537600000
Requested by
Host: www.ultimedia.com
URL: https://www.ultimedia.com/js/common/smart.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
37.187.147.8 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb3.dginfra.net
Software
nginx/1.4.6 (Ubuntu) /
Resource Hash
13df0abc22358701ae098e908624f5fb67766bc4a81702e9bc9d8abea1469ee2
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 15:23:12 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Last-Modified
Mon, 04 May 2020 10:47:28 GMT
Server
nginx/1.4.6 (Ubuntu)
Strict-Transport-Security
max-age=31536000; includeSubDomains
Content-Type
application/x-javascript
Cache-Control
max-age=2678400
Transfer-Encoding
chunked
Connection
keep-alive
Expires
Sat, 27 Jun 2020 15:23:12 GMT
notification.js
www.ultimedia.com/js/common/
5 KB
2 KB
Script
General
Full URL
https://www.ultimedia.com/js/common/notification.js?v=1590537600000
Requested by
Host: www.ultimedia.com
URL: https://www.ultimedia.com/js/common/smart.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
37.187.147.8 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb3.dginfra.net
Software
nginx/1.4.6 (Ubuntu) /
Resource Hash
780396b361c35383795d3d1fb3e71e8c1e57e717973f3a4599ec4f11ba75f84e
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 15:23:12 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Last-Modified
Mon, 06 Nov 2017 08:56:21 GMT
Server
nginx/1.4.6 (Ubuntu)
Strict-Transport-Security
max-age=31536000; includeSubDomains
Content-Type
application/x-javascript
Cache-Control
max-age=2678400
Transfer-Encoding
chunked
Connection
keep-alive
Expires
Sat, 27 Jun 2020 15:23:12 GMT
visibilityStat.js
www.ultimedia.com/js/common/
2 KB
1 KB
Script
General
Full URL
https://www.ultimedia.com/js/common/visibilityStat.js?v=1590537600000
Requested by
Host: www.ultimedia.com
URL: https://www.ultimedia.com/js/common/smart.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
37.187.147.8 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb3.dginfra.net
Software
nginx/1.4.6 (Ubuntu) /
Resource Hash
675ab0a24f0160c73eaa7dde430b9f5ee68a54dc0c0c8d7d2bd0a811f30f6fd5
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 15:23:12 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Last-Modified
Thu, 15 Mar 2018 09:04:08 GMT
Server
nginx/1.4.6 (Ubuntu)
Strict-Transport-Security
max-age=31536000; includeSubDomains
Content-Type
application/x-javascript
Cache-Control
max-age=2678400
Transfer-Encoding
chunked
Connection
keep-alive
Expires
Sat, 27 Jun 2020 15:23:12 GMT
hawk.min.css
widgets.hawk-assets.co.uk/css/14.13.15-ac7e27af5aad941f6e65db1907ee427ad1ee105c/
17 KB
3 KB
Stylesheet
General
Full URL
https://widgets.hawk-assets.co.uk/css/14.13.15-ac7e27af5aad941f6e65db1907ee427ad1ee105c/hawk.min.css
Requested by
Host: widgets.hawk-assets.co.uk
URL: https://widgets.hawk-assets.co.uk/js/w/responsive.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.51 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif14.web.future.net.uk
Software
/
Resource Hash
e718d2a1972506572962e52c13af917e6c9bb570fff71006ca1b66da0b2a732e

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 15:09:56 GMT
Content-Encoding
gzip
X-Hawk-Country
Xkey
asset-type-fie-widgets
Age
796
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-assets
X-FTR-Cache-Status
HIT
Content-Length
2119
X-FTR-Expires
Wed, 27 May 2020 15:39:56 GMT
X-FTR-Balancer
hawk-proxy-185-113-25-40
X-FTR-Request-ID
00000000:9E16_00000000:01BB_5ECE85DF_203E74:4D82
Last-Modified
Tue, 26 May 2020 16:53:02 GMT
X-Country-Code-Real
CH
ETag
"5ecd496e-43b5"
Vary
Accept-Encoding
Content-Type
text/css
X-FTR-Backend-Server
fievarnishprodwhite
Cache-Control
max-age=3600
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Expires
Wed, 27 May 2020 16:09:56 GMT
hawk.js
widgets.hawk-assets.co.uk/js/w/3f19011cfba4f086e527/
207 KB
69 KB
Script
General
Full URL
https://widgets.hawk-assets.co.uk/js/w/3f19011cfba4f086e527/hawk.js
Requested by
Host: widgets.hawk-assets.co.uk
URL: https://widgets.hawk-assets.co.uk/js/w/responsive.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.51 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif14.web.future.net.uk
Software
/
Resource Hash
c83b50479d009ce646d69c6cb3369238f8c32b4399f9297cebc02ac69b35653a

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 15:09:55 GMT
Content-Encoding
gzip
X-Hawk-Country
Xkey
asset-type-fie-widgets
Age
796
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-assets
X-FTR-Cache-Status
HIT
Content-Length
69521
X-FTR-Expires
Wed, 27 May 2020 15:39:55 GMT
X-FTR-Balancer
hawk-proxy-185-113-25-40
X-FTR-Request-ID
00000000:9E14_00000000:01BB_5ECE85DF_131094C:4D85
Last-Modified
Tue, 26 May 2020 16:53:02 GMT
X-Country-Code-Real
CH
ETag
"5ecd496e-33d68"
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
X-FTR-Backend-Server
fievarnishprodwhite
Cache-Control
max-age=3600
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Expires
Wed, 27 May 2020 16:09:55 GMT
vendorlist.json
vendorlist.consensu.org/
97 KB
18 KB
XHR
General
Full URL
https://vendorlist.consensu.org/vendorlist.json
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2190:7800:1:af78:4c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
59b3a40d8afe6809772f568a403f5994910ddf1a1f3e39e830e490d66e31f90b

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 16:10:47 GMT
content-encoding
gzip
vary
Accept-Encoding,Origin,Access-Control-Request-Headers,Access-Control-Request-Method
age
515546
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Thu, 21 May 2020 16:01:21 GMT
server
AmazonS3
access-control-max-age
604800
access-control-allow-methods
GET
x-amz-version-id
Yh6c11QRkOU5DxynD2yPL5LFEJecOV97
via
1.1 7245e91891539560c1f484b1e46159c9.cloudfront.net (CloudFront)
cache-control
max-age=604800
x-amz-cf-pop
ZRH50-C1
content-type
application/json; charset=utf-8
x-amz-cf-id
Dh8VO50bR1BvGD34fRrqw4esZFzJFigzeOLa_ydLw_6VJIa9ojc7rg==
trd.min.css
widgets.hawk-assets.co.uk/css/
3 KB
2 KB
Stylesheet
General
Full URL
https://widgets.hawk-assets.co.uk/css/trd.min.css
Requested by
Host: widgets.hawk-assets.co.uk
URL: https://widgets.hawk-assets.co.uk/js/w/responsive.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.51 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif14.web.future.net.uk
Software
/
Resource Hash
95bd1ab7171ff0c52da6112fee1d48be3bd5ce549765ec276a817131a38011d8

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 15:09:56 GMT
Content-Encoding
gzip
X-Hawk-Country
Xkey
asset-type-fie-widgets
Age
796
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-assets
X-FTR-Cache-Status
HIT
Content-Length
1331
X-FTR-Expires
Wed, 27 May 2020 15:39:56 GMT
X-FTR-Balancer
hawk-proxy-185-113-25-40
X-FTR-Request-ID
00000000:9E16_00000000:01BB_5ECE85E0_203ECA:4D82
Last-Modified
Tue, 26 May 2020 16:53:02 GMT
X-Country-Code-Real
CH
ETag
"5ecd496e-d96"
Vary
Accept-Encoding
Content-Type
text/css
X-FTR-Backend-Server
fievarnishprodred
Cache-Control
max-age=3600
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Expires
Wed, 27 May 2020 16:09:56 GMT
/
r.skimresources.com/api/
149 B
405 B
Fetch
General
Full URL
https://r.skimresources.com/api/?persistence=1&xguid=01BT2SNRZKMTD96W8181AS0KKC&data={%22pubcode%22:%2292X363%22,%22domains%22:[%22techradar.com%22,%22facebook.com%22,%22twitter.com%22,%22youtube.com%22,%22futureplc.com%22,%22send%22,%22pinterest.com%22,%22%22,%22bleepingcomputer.com%22,%22futureus.com%22],%22page%22:%22https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer%22}&checksum=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
eb41d8e4273bd744623ba393fa024cb5199c773a4cacc19916bded599c6811e3
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 27 May 2020 15:23:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
openresty/1.11.2.5
status
200
vary
Accept-Encoding
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://www.techradar.com
access-control-allow-credentials
true
strict-transport-security
max-age=31536000
content-type
application/json
alt-svc
clear
via
1.1 google
widget.php
search-api.fie.future.net.uk/
343 B
1 KB
Fetch
General
Full URL
https://search-api.fie.future.net.uk/widget.php?site=TRD&article_type=news&article_category=retail&model_name=Password&deals_per_model=1&multi=1&related_models=1&rows=4&filter_product_types=deals
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.51 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif14.web.future.net.uk
Software
/
Resource Hash
b6e50074c874220c407e143fbf595a414a746a31dc589916c84837a29ff1561c

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 15:10:28 GMT
Content-Encoding
gzip
X-Hawk-Country
Age
765
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-api
X-FTR-Cache-Status
HIT
Content-Length
222
X-FTR-Expires
Wed, 27 May 2020 15:40:28 GMT
X-FTR-Balancer
hawk-proxy-185-113-25-40
X-FTR-Request-ID
00000000:9E4A_00000000:01BB_5ECE85E0_BF8FA1:4D84
X-Country-Code-Real
CH
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/json; charset=utf-8;
X-FTR-Backend-Server
fievarnishprodwhite
Cache-Control
max-age=300,public
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,X-Hawk-Country,X-Hawk-Area
Expires
Wed, 27 May 2020 15:28:13 GMT
seasonal.php
search-api.fie.future.net.uk/
73 B
971 B
Fetch
General
Full URL
https://search-api.fie.future.net.uk/seasonal.php?site=TRD&article_type=news&article_category=retail
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.51 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif14.web.future.net.uk
Software
/
Resource Hash
55a4c56584709b3f525fefb110bce2f5f28c62eef73be55dd5a21d8b8efe9774

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 15:05:43 GMT
Content-Encoding
gzip
X-Hawk-Country
Age
1050
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-api
X-FTR-Cache-Status
HIT
Content-Length
84
X-FTR-Expires
Wed, 27 May 2020 15:35:43 GMT
X-FTR-Balancer
hawk-proxy-185-113-25-40
X-FTR-Request-ID
00000000:9E4A_00000000:01BB_5ECE85E1_BF9094:4D84
X-Country-Code-Real
CH
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/json; charset=utf-8;
X-FTR-Backend-Server
fievarnishprodwhite
Cache-Control
max-age=300,public
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,X-Hawk-Country,X-Hawk-Area
Expires
Wed, 27 May 2020 15:28:13 GMT
atechradar-gb.js
www.techradar.com/181546/media/shared/js/
332 KB
72 KB
Script
General
Full URL
https://www.techradar.com/181546/media/shared/js/atechradar-gb.js
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.56 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif07.web.future.net.uk
Software
/
Resource Hash
f414c6c2a7af37d10afc4d4a65377216199319ad3dcf9a3378cc1cc38e0f47df

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 22 May 2020 14:35:53 GMT
Content-Encoding
gzip
Age
434840
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites-varnish
X-FTR-Cache-Status
HIT
Content-Length
72556
X-FTR-Expires
Sun, 21 Jun 2020 14:35:53 GMT
X-FTR-Balancer
fteproxyblue
X-FTR-Request-ID
00000000:13CC_00000000:01BB_5ECE85E0_34A47F:020F
Last-Modified
Fri, 22 May 2020 13:48:31 GMT
X-Country-Code-Real
CH
ETag
W/"5ec7d82f-52f4a"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
X-FTR-Backend-Server
ftevarnishprodyellow
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
X-Country-Code
US
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Sun, 21 Jun 2020 14:35:53 GMT
btechradar-gb.js
www.techradar.com/181546/media/shared/js/
6 KB
3 KB
Script
General
Full URL
https://www.techradar.com/181546/media/shared/js/btechradar-gb.js
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.56 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif07.web.future.net.uk
Software
/
Resource Hash
9d1edce9b427c9853d98a71b4bf00cee076aeab478760b4101ec5dc6b3c7d1d1

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 24 May 2020 16:52:31 GMT
Content-Encoding
gzip
Age
253842
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites-varnish
X-FTR-Cache-Status
HIT
Content-Length
1702
X-FTR-Expires
Tue, 23 Jun 2020 16:52:31 GMT
X-FTR-Balancer
fteproxyblue
X-FTR-Request-ID
00000000:13CE_00000000:01BB_5ECE85DE_D4C68B:0212
Last-Modified
Fri, 22 May 2020 13:48:31 GMT
X-Country-Code-Real
CH
ETag
W/"5ec7d82f-1671"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
X-FTR-Backend-Server
ftevarnishprodgreen
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
X-Country-Code
US
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Tue, 23 Jun 2020 16:52:31 GMT
pubvendors.json
quantcast.mgr.consensu.org/choice/uer8ZPXHG8WDU/www.techradar.com/.well-known/
6 KB
2 KB
XHR
General
Full URL
https://quantcast.mgr.consensu.org/choice/uer8ZPXHG8WDU/www.techradar.com/.well-known/pubvendors.json?timestamp=1590592991389
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2190:de00:9:46dc:4700:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
9b976763a0e92a50e457fd232430728eed5db0d9691c7d5bebee54162be2f496

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 27 May 2020 15:20:48 GMT
content-encoding
gzip
vary
Accept-Encoding,Origin
age
146
x-amz-server-side-encryption
AES256
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
https://www.techradar.com
last-modified
Fri, 27 Mar 2020 14:13:46 GMT
server
AmazonS3
access-control-max-age
3000
access-control-allow-methods
GET
content-type
application/json;charset=UTF-8
via
1.1 7245e91891539560c1f484b1e46159c9.cloudfront.net (CloudFront)
access-control-allow-credentials
true
x-amz-cf-pop
ZRH50-C1
x-amz-cf-id
bUbvcIevXC7mpHHWHtguG5Fw92Y72PCNtMs7CYjiuLbnhT90jWd3lA==
widget.php
search-api.fie.future.net.uk/
6 KB
2 KB
Fetch
General
Full URL
https://search-api.fie.future.net.uk/widget.php?site=TRD&article_type=news&article_category=retail&model_name=TechRadar%20Magazines&ignore_buy_similar=1&filter_product_types=deals&rows=1
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.51 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif14.web.future.net.uk
Software
/
Resource Hash
3454ac55e9832e1dc51eab832e51d35e8597391142c1f420c17ea5a9b14a7dc9

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 15:20:19 GMT
Content-Encoding
gzip
X-Hawk-Country
Xkey
match-id-3332043978, model-id-783095, model-id-286340, model-id-287573, model-id-287633
Age
173
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-api
X-FTR-Cache-Status
HIT
Content-Length
1434
X-FTR-Expires
Wed, 27 May 2020 15:50:19 GMT
X-FTR-Balancer
hawk-proxy-185-113-25-40
X-FTR-Request-ID
00000000:9E4A_00000000:01BB_5ECE85E1_BF90A8:4D84
X-Country-Code-Real
CH
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/json; charset=utf-8;
X-FTR-Backend-Server
fievarnishprodwhite
Cache-Control
max-age=300,public
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,X-Hawk-Country,X-Hawk-Area
Expires
Wed, 27 May 2020 15:28:13 GMT
TR_Logo.png
dg876rejmw3ebkm51boa0sx2-wpengine.netdna-ssl.com/wp-content/uploads/2017/12/
6 KB
6 KB
Image
General
Full URL
https://dg876rejmw3ebkm51boa0sx2-wpengine.netdna-ssl.com/wp-content/uploads/2017/12/TR_Logo.png
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
94.31.29.99 , United Kingdom, ASN33438 (HIGHWINDS2, US),
Reverse DNS
94.31.29.99.IPYX-077437-ZYO.above.net
Software
NetDNA-cache/2.2 /
Resource Hash
37ccf6a41d068537cb68f6c2cc3b1f9b438d5f18d2a87a2a640172a850218b60

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 27 May 2020 15:23:13 GMT
last-modified
Tue, 10 Apr 2018 12:55:44 GMT
server
NetDNA-cache/2.2
status
200
etag
"5accb450-18f4"
vary
Accept-Encoding
x-cache
HIT
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
6388
truncated
/
3 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
87562d3773ffab3d0716a70faa73c38b322fde3b8f265c3d646a3cea976ef67e

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
get_site_data
orionis.techradar.com/
18 B
251 B
XHR
General
Full URL
https://orionis.techradar.com/get_site_data?account_id=200&href=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&requestUUID=3c4fa42b-9c66-4bcf-94ac-0b4e68295883-1590592993468
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.28.190.123 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-28-190-123.eu-central-1.compute.amazonaws.com
Software
Jetty(9.4.2.v20170220) /
Resource Hash
6cddc935bfd70130ff535506925990fa432ff5dbf670134a9d5829cf8fa0374d

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 27 May 2020 15:23:13 GMT
x-sp-mms-node
mms-avd.node.fra.consul
server
Jetty(9.4.2.v20170220)
status
200
access-control-allow-methods
GET
content-type
text/plain
access-control-allow-origin
https://www.techradar.com
cache-control
max-age=2592000
access-control-allow-credentials
true
;ord=1590592993483
ad.doubleclick.net/ddm/ad/bwew/wvbcqqffwn/
43 B
662 B
Image
General
Full URL
https://ad.doubleclick.net/ddm/ad/bwew/wvbcqqffwn/;ord=1590592993483?
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.38 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s24-in-f6.1e100.net
Software
cafe /
Resource Hash
9c41ba408efaf3a7a36099370bc814e38b0afd42229fa9e0e6040740620c85c0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 27 May 2020 15:23:13 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
43
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
promotion.min.css
widgets.hawk-assets.co.uk/css/14.13.15-ac7e27af5aad941f6e65db1907ee427ad1ee105c/
52 KB
7 KB
Stylesheet
General
Full URL
https://widgets.hawk-assets.co.uk/css/14.13.15-ac7e27af5aad941f6e65db1907ee427ad1ee105c/promotion.min.css
Requested by
Host: widgets.hawk-assets.co.uk
URL: https://widgets.hawk-assets.co.uk/js/w/responsive.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.51 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif14.web.future.net.uk
Software
/
Resource Hash
3af0ad4b74748533fb1b6ee2db1397a1ad05bb75c448cd9b89d33722ab303a04

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 15:09:57 GMT
Content-Encoding
gzip
X-Hawk-Country
Xkey
asset-type-fie-widgets
Age
796
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-assets
X-FTR-Cache-Status
HIT
Content-Length
5988
X-FTR-Expires
Wed, 27 May 2020 15:39:57 GMT
X-FTR-Balancer
hawk-proxy-185-113-25-40
X-FTR-Request-ID
00000000:9E16_00000000:01BB_5ECE85E0_203ED3:4D82
Last-Modified
Tue, 26 May 2020 16:53:02 GMT
X-Country-Code-Real
CH
ETag
"5ecd496e-d15c"
Vary
Accept-Encoding
Content-Type
text/css
X-FTR-Backend-Server
fievarnishprodwhite
Cache-Control
max-age=3600
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Expires
Wed, 27 May 2020 16:09:57 GMT
promotion.js
widgets.hawk-assets.co.uk/js/w/3f19011cfba4f086e527/
17 KB
6 KB
Script
General
Full URL
https://widgets.hawk-assets.co.uk/js/w/3f19011cfba4f086e527/promotion.js
Requested by
Host: widgets.hawk-assets.co.uk
URL: https://widgets.hawk-assets.co.uk/js/w/responsive.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.51 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif14.web.future.net.uk
Software
/
Resource Hash
539c2d2a0030427f8e98952254f116eb57c05e0d602b430bf2d98be5da3ece70

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 15:09:57 GMT
Content-Encoding
gzip
X-Hawk-Country
Xkey
asset-type-fie-widgets
Age
795
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-assets
X-FTR-Cache-Status
HIT
Content-Length
5194
X-FTR-Expires
Wed, 27 May 2020 15:39:57 GMT
X-FTR-Balancer
hawk-proxy-185-113-25-40
X-FTR-Request-ID
00000000:9E14_00000000:01BB_5ECE85E0_1310B43:4D85
Last-Modified
Tue, 26 May 2020 16:53:02 GMT
X-Country-Code-Real
CH
ETag
"5ecd496e-456c"
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
X-FTR-Backend-Server
fievarnishprodwhite
Cache-Control
max-age=3600
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Expires
Wed, 27 May 2020 16:09:57 GMT
techradar.svg
gizmos.future-fie.co.uk/img/sites/svg/
6 KB
6 KB
Image
General
Full URL
https://gizmos.future-fie.co.uk/img/sites/svg/techradar.svg
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.54 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif09.web.future.net.uk
Software
/
Resource Hash
aca8ae0f4de33dc03431cc4b650fb91a32fa06294f38e76bea4fcef2b73f6af1

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 15:09:56 GMT
X-Hawk-Country
Xkey
asset-type-fie-widgets
Age
797
X-Hawk-Area
ROW
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-assets
X-FTR-Cache-Status
HIT
Content-Length
5637
X-FTR-Expires
Wed, 27 May 2020 15:39:56 GMT
X-FTR-Balancer
hawkproxyprodred
X-FTR-Request-ID
00000000:9064_00000000:01BB_5ECE85E1_E625CC:4AB2
Last-Modified
Tue, 26 May 2020 16:53:02 GMT
X-Country-Code-Real
CH
ETag
"5ecd496e-1605"
Content-Type
image/svg+xml
X-FTR-Backend-Server
fievarnishprodred
Cache-Control
max-age=604800
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Expires
Wed, 03 Jun 2020 15:09:56 GMT
/
audit.quantcast.mgr.consensu.org/
80 B
487 B
XHR
General
Full URL
https://audit.quantcast.mgr.consensu.org/?log=;1590592993711;TechRadar;https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer;;;;;p,off,false,uer8ZPXHG8WDU,1,en,33,203,true,true,false;displayConsentUi:mandatory,;GDPR-o91wqier6xzt1vn69ihh
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.95.90 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-95-90.zrh50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
2d0f6b590917e7d27ddeb026b280d62dde9d03bb92f47f56342fc5f68f0c24eb

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 27 May 2020 01:30:59 GMT
via
1.1 a63182cf51dce7998774e112bf9ee7c6.cloudfront.net (CloudFront)
vary
Origin
age
49935
x-cache
Hit from cloudfront
status
200
content-length
80
last-modified
Mon, 11 Jun 2018 22:07:34 GMT
server
AmazonS3
etag
"0614149d8033903db5de46d6c184bbfd"
access-control-max-age
3000
access-control-allow-methods
GET
content-type
text/html
access-control-allow-origin
*
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
x-amz-cf-id
84K-6uuSo_2ZV8i3hUiIIJ1r1TDlAtEJD4tUylkuf6bPuYZZUS4PWA==
d5glnx0z9nc8afmz-15877400901509-250-80.png
mos.fie.futurecdn.net/logos/models/
14 KB
15 KB
Image
General
Full URL
https://mos.fie.futurecdn.net/logos/models/d5glnx0z9nc8afmz-15877400901509-250-80.png
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.241.79.124 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
nginx /
Resource Hash
d81ecdfd770abb03106fc5106e92380e2ee6dc602ffdd25f3d6e2e622fdf5a10

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 25 May 2020 04:53:37 GMT
X-FTR-Cache-Resized-Status
MISS
Age
210576
X-FTR-DC
TC
X-FTR-Realm
pip
X-FTR-Backend
mos
Connection
keep-alive
Content-Length
14272
X-FTR-Balancer
bulkproxyprod01
X-FTR-Request-ID
00000000:D6EF_00000000:0050_5EA3C251_300E4:53ED
Last-Modified
Fri, 24 Apr 2020 14:54:50 GMT
Server
nginx
ETag
"a094d2e5752ad05274db672e2973c8f0"
Content-Type
image/jpeg
X-FTR-Backend-Server
mos01
Cache-Control
max-age=2592000
Accept-Ranges
bytes
X-FTR-Cache-Host
moscache01
Expires
Wed, 24 Jun 2020 04:53:42 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j82&a=1653908382&t=event&ni=1&_s=1&dl=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&ul=en-us&de=UTF-8...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-48894329-1&cid=1367913561.1590592993&jid=239099511&_gid=2082783632.1590592993&gjid=96036162&_v=j82&z=557342020
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1367913561.1590592993&jid=239099511&_v=j82&z=557342020
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1367913561.1590592993&jid=239099511&_v=j82&z=557342020&slf_rd=1&random=1579921548
42 B
106 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1367913561.1590592993&jid=239099511&_v=j82&z=557342020&slf_rd=1&random=1579921548
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 27 May 2020 15:23:13 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 27 May 2020 15:23:13 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1367913561.1590592993&jid=239099511&_v=j82&z=557342020&slf_rd=1&random=1579921548
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
get_loaders
orionis.techradar.com/mms/
2 B
237 B
XHR
General
Full URL
https://orionis.techradar.com/mms/get_loaders?href=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&account_id=200&requestUUID=3c4fa42b-9c66-4bcf-94ac-0b4e68295883-1590592993468
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.28.190.123 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-28-190-123.eu-central-1.compute.amazonaws.com
Software
Jetty(9.4.2.v20170220) /
Resource Hash
4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 27 May 2020 15:23:14 GMT
x-sp-mms-node
mms-aqv.node.fra.consul
server
Jetty(9.4.2.v20170220)
status
200
access-control-allow-methods
GET
content-type
application/json
access-control-allow-origin
https://www.techradar.com
cache-control
max-age=10800
access-control-allow-credentials
true
bcn
www.summerhamster.com/
43 B
181 B
Image
General
Full URL
https://www.summerhamster.com/bcn?fe=1590592993966&y=2.0.1196&elg=923104112&flg=200&x=zzz.whfkudgdu.frp%2Fqhzv%2Fpdozduh-wxuqv-glvfrug-folhqw-lqwr-sdvvzrug-vwhdohu&vqwo=1&deo=0&hu=0&g2=0%3A%3A0%3A%3A0%3A%3A0%3A%3A0&requestUUID=3c4fa42b-9c66-4bcf-94ac-0b4e68295883-1590592993468
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.157.160.140 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-35-157-160-140.eu-central-1.compute.amazonaws.com
Software
Jetty(9.2.10.v20150310) /
Resource Hash
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Wed, 27 May 2020 15:23:14 GMT
server
Jetty(9.2.10.v20150310)
access-control-allow-origin
*
content-length
43
access-control-allow-methods
*
content-type
image/gif
collect
www.google-analytics.com/
35 B
95 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j82&a=1653908382&t=event&ni=1&_s=2&dl=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&ul=en-us&de=UTF-8&dt=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&ec=Affiliates&ea=Promotion%20widget%20appeared&el=TechRadar%20Magazines&_u=6HDAAEABBAQC~&jid=&gjid=&cid=1367913561.1590592993&tid=UA-48894329-1&_gid=2082783632.1590592993&cd57=null&cd40=Password&cd41=Malware%7CDiscord%7CTrojan_horse_computing%7CUser_computing%7CAnarchyGrabber3_AnarchyGrabber3&cd42=Software&cd45=Password&cd46=Computing&cd47=Malware_turns_Discord_client_into_password_stealer&cd50=5&cd51=false&cd58=Computing&cd74=&cd13=false&cd10=EN-US&cd1=news&cd2=computing&cd3=computing&cd4=tech_techradar%2F&cd5=XUeVg74qQZwxrcTVTXpDSk&cd6=%7Cdiscord%7Canarchygrabber%7Cmalware%7Ctrojan%7Cpasswords%7C2fa%7Chackers%7Canarchygrabber3%7Cdiscord%7Canarchygrabber%7Cmalware%7Ctrojan%7Cpasswords%7C2fa%7Chackers%7Canarchygrabber3%7Ccomputing%7Ctrbc%7Cexclude-from-homepage%7Ctype_news%7Cchannel_computing%7Ccontentdev%7Ctrbc%7Cexclude-from-homepage%7Ctype_news%7Cchannel_computing%7Ccontentdev%7Cserversidehawk&cd7=anthony_spadafora&cd8=25-05-2020&cd9=1&cd27=181546&cd95=news&cd106=0&cd126=en&cd127=GB%7CUS%7CAU%7CSG%7CIN%7CAE%7CNZ%7CZA&cd128=25-05-2020&cd31=9.1&cd30=4g&cd12=3332043978&cd14=My%20Favourite%20Magazines&cd16=null&cd17=1&cd25=US%24%C2%A07.15&cd37=null&cd48=Technology%20Magazines&cd53=null&cd62=0&cd73=null&cd75=null&cd76=https%3A%2F%2Fmyfavouritemagazines.pxf.io%2Fc%2F221109%2F583111%2F9620%3FsubId1%3Dhawk-custom-tracking%26u%3Dhttps%253A%252F%252Fwww.myfavouritemagazines.co.uk%252Ftech-gadgets%252F&cd90=2017936937685742800&cd105=116021&cd111=null&cd115=null&cd116=null&cd117=null&cd118=null&cd124=null&cd125=1082&cm1=5677&cm27=2678&z=1473604203
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 27 May 2020 04:45:52 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
38242
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
acgRE50Q0FQO09FUEE7Rk95UndrYD0_P0tRSlA7RUB3bGpqYD0-THdCPUhPQWBOQUJBTk5BTndgT0FPT0VLSjtOQUJBTk5BTndgT0FPT0VLSjtJQU9PPUNBOz9LUUpQd2pgRlJ3bGhqaGtrc3BgP0A_d1NFSkBLU2g7T0w7aElPQ2g7RUpQQU5KPUhoP0A_a2BETk...
orionis.techradar.com/
1 KB
2 KB
Script
General
Full URL
https://orionis.techradar.com/acgRE50Q0FQO09FUEE7Rk95UndrYD0_P0tRSlA7RUB3bGpqYD0-THdCPUhPQWBOQUJBTk5BTndgT0FPT0VLSjtOQUJBTk5BTndgT0FPT0VLSjtJQU9PPUNBOz9LUUpQd2pgRlJ3bGhqaGtrc3BgP0A_d1NFSkBLU2g7T0w7aElPQ2g7RUpQQU5KPUhoP0A_a2BETkFCd0RQUExPX217X2wiX2wiU1NTaFBBP0ROPUA9Tmg_S0lfbCJKQVNPX2wiST1IUz1OQWdQUU5KT2dARU8_S05AZz9IRUFKUGdFSlBLZ0w9T09TS05AZ09QQT1IQU5gP0tKT0FKUDExJX53UUpAQUJFSkFAYE5BTVFBT1AxMSV-d20_bkI9bmw-Z3M_cHBnbj4_Qmdzbj0_Z2o-bkFwcmxzb3JybWdrb3Nqb3Nsc3NtbnByYFBfb3w9QDtRSkVQX29-d2tqb2tyc2xzX2wiUEE_RDtQQT9ETj1APU5fbCJQTkxOS19sIj9LSUxRUEVKQ2BQX298SEVSQTs9QDtRSkVQX29-d2tqb2tyc2xzX2wiUEE_RDtQQT9ETj1APU5fbCJgUF9vfFBBT1A7PUA7UUpFUF9vfndram9rcnNsc19sIlBBP0Q7UEE_RE49QD1OO1BBT1BfbCJgUF9vfE5BP0tSQU5VOz1AO1FKRVBfb353YFBfb3xOQT9LUkFOVTtQQU9QOz1AO1FKRVBfb353YFBfb3xPRVBBO0xIPVBCS05JX29-d1I9SkVISD1gUF9vfFBFPkFORVFPX29-d1BOUUFgUF9vfFBFPkFORVFPO0lLQEFfb353S0JCYFBfb3xHQVVTS05AT19vfncwLnx9X2x9QVQ_SFFAQWdCTktJZ0RLSUFMPUNBX2x9UFVMQTtKQVNPX2x9P0Q9SkpBSDs_S0lMUVBFSkNfbH0_S0pQQUpQQEFSX2x9T0FOUkFOT0VAQUQ9U0dfbH19S0lMUVBFSkNfbH1-RU8_S05AX2x9e0o9Tj9EVSNOPT4-QU5fbH0pPUhTPU5BX2x9UE5LRj1KX2x9TD1PT1NLTkBPX2x9bCJ7X2x9JD0_R0FOT19sfXtKPU4_RFUjTj0-PkFObWBQX298PU5QRT9IQTtFQF9vfnc0MUEyQ3FuTS02U1ROPzAyMDRMfi9HYFBfb3xSPUpFSEg9Oz1OUEU_SEE7RUBfb353NDFBMkNxbk0tNlNUTj8wMjA0TH4vR2BQX298TD1DQTtQVUxBX29-d0pBU09gUF9vfExOS0BRP1A7Pk49SkBfb353YFBfb3xMTktAUT9QOz89UEFDS05VX29-d2BQX298TE5LQFE_UF9vfndgUF9vfFJBTlBFPz1IX29-dz9LSUxRUEVKQ2BQX298T0tRTj9BX29-d2BQX298TE5LUkFOUEU_PUhfb353P0tJTFFQRUpDYFBfb3xGU0xIPVVBTl9vfnc_PU5LUU9BSGBQX298Qz1ISEFOVTtOQUJOQU9EO0VKUEFOUj1IX29-d2xgUF9vfFA9Q09fb353fkVPP0tOQF9sfXtKPU4_RFUjTj0-PkFOX2x9KT1IUz1OQV9sfVBOS0Y9Sl9sfUw9T09TS05AT19sfWwie19sfSQ9P0dBTk9fbH17Sj1OP0RVI049Pj5BTm1fbH1-RU8_S05AX2x9e0o9Tj9EVSNOPT4-QU5fbH0pPUhTPU5BX2x9UE5LRj1KX2x9TD1PT1NLTkBPX2x9bCJ7X2x9JD0_R0FOT19sfXtKPU4_RFUjTj0-PkFObV9sfX1LSUxRUEVKQ2BQX298P0hRPjtIS0NDQUBFSl9vfndCPUhPQQ==
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/181546/media/shared/js/atechradar-gb.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.28.190.123 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-28-190-123.eu-central-1.compute.amazonaws.com
Software
Jetty(9.4.2.v20170220) /
Resource Hash
3688aebc45256dbe9098fb0b3a97a27f44c9b9d6416ff1785b2ed982270e7ae8

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 27 May 2020 15:23:14 GMT
x-sp-mms-node
mms-akk.node.fra.consul
server
Jetty(9.4.2.v20170220)
access-control-allow-methods
GET
content-type
application/javascript
status
200
cache-control
no-store, no-cache, private
access-control-allow-credentials
true
x-sp-mms-env
1
expires
Sat, 15 Nov 2008 16:00:00 GMT
138526d18ff94de4b84a3a11ec020ede_1.js
targetemsecure.blob.core.windows.net/138526d1-8ff9-4de4-b84a-3a11ec020ede/
8 KB
3 KB
Script
General
Full URL
https://targetemsecure.blob.core.windows.net/138526d1-8ff9-4de4-b84a-3a11ec020ede/138526d18ff94de4b84a3a11ec020ede_1.js
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.239.242.148 Amsterdam, Netherlands, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
58f392f51040257c3f76b6c4f345bb05dda648e7d9fe6dcd49cccf0e2cbae126

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-lease-status
unlocked
x-ms-blob-type
BlockBlob
Date
Wed, 27 May 2020 15:23:14 GMT
Content-Encoding
gzip
Last-Modified
Wed, 27 May 2020 03:03:12 GMT
Server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
Content-MD5
ke1fCEjQA9k/ZXe5Ssk9oQ==
ETag
0x8D801EA7E5C28C6
Content-Type
application/javascript
x-ms-request-id
44bb0edf-a01e-006b-233a-347a46000000
Cache-Control
public
x-ms-version
2009-09-19
Content-Length
2365
collect
www.google-analytics.com/
35 B
90 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j82&a=1653908382&t=event&ni=1&_s=3&dl=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&ul=en-us&de=UTF-8&dt=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&ec=Affiliates&ea=Promotion%20widget%20viewed&el=TechRadar%20Magazines&_u=6HDAAEABBAQC~&jid=&gjid=&cid=1367913561.1590592993&tid=UA-48894329-1&_gid=2082783632.1590592993&cd57=null&cd40=Password&cd41=Malware%7CDiscord%7CTrojan_horse_computing%7CUser_computing%7CAnarchyGrabber3_AnarchyGrabber3&cd42=Software&cd45=Password&cd46=Computing&cd47=Malware_turns_Discord_client_into_password_stealer&cd50=5&cd51=false&cd58=Computing&cd74=&cd13=false&cd10=EN-US&cd1=news&cd2=computing&cd3=computing&cd4=tech_techradar%2F&cd5=XUeVg74qQZwxrcTVTXpDSk&cd6=%7Cdiscord%7Canarchygrabber%7Cmalware%7Ctrojan%7Cpasswords%7C2fa%7Chackers%7Canarchygrabber3%7Cdiscord%7Canarchygrabber%7Cmalware%7Ctrojan%7Cpasswords%7C2fa%7Chackers%7Canarchygrabber3%7Ccomputing%7Ctrbc%7Cexclude-from-homepage%7Ctype_news%7Cchannel_computing%7Ccontentdev%7Ctrbc%7Cexclude-from-homepage%7Ctype_news%7Cchannel_computing%7Ccontentdev%7Cserversidehawk&cd7=anthony_spadafora&cd8=25-05-2020&cd9=1&cd27=181546&cd95=news&cd106=0&cd126=en&cd127=GB%7CUS%7CAU%7CSG%7CIN%7CAE%7CNZ%7CZA&cd128=25-05-2020&cd31=9.1&cd30=4g&cd12=3332043978&cd14=My%20Favourite%20Magazines&cd16=null&cd17=1&cd25=US%24%C2%A07.15&cd37=null&cd48=Technology%20Magazines&cd53=null&cd62=0&cd73=null&cd75=null&cd76=https%3A%2F%2Fmyfavouritemagazines.pxf.io%2Fc%2F221109%2F583111%2F9620%3FsubId1%3Dhawk-custom-tracking%26u%3Dhttps%253A%252F%252Fwww.myfavouritemagazines.co.uk%252Ftech-gadgets%252F&cd90=2017936937685742800&cd105=116021&cd111=null&cd115=null&cd116=null&cd117=null&cd118=null&cd124=null&cd125=1082&cm1=5810&cm27=2678&cm24=83&z=244775080
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 27 May 2020 04:45:52 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
38242
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
138526d18ff94de4b84a3a11ec020ede_2_1568799455.js
targetemsecure.blob.core.windows.net/138526d1-8ff9-4de4-b84a-3a11ec020ede/
132 KB
40 KB
Script
General
Full URL
https://targetemsecure.blob.core.windows.net/138526d1-8ff9-4de4-b84a-3a11ec020ede/138526d18ff94de4b84a3a11ec020ede_2_1568799455.js
Requested by
Host: targetemsecure.blob.core.windows.net
URL: https://targetemsecure.blob.core.windows.net/138526d1-8ff9-4de4-b84a-3a11ec020ede/138526d18ff94de4b84a3a11ec020ede_1.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.239.242.148 Amsterdam, Netherlands, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
7d0b85f9a56a5b88448ecc6cac0c98f248f25de12b3bdd5b996095938a6f24cc

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-lease-status
unlocked
x-ms-blob-type
BlockBlob
Date
Wed, 27 May 2020 15:23:14 GMT
Content-Encoding
gzip
Last-Modified
Mon, 25 May 2020 23:16:43 GMT
Server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
Content-MD5
mamiDZ/ncU2HlDgvgesoWQ==
ETag
0x8D80101B044FE96
Content-Type
application/javascript
x-ms-request-id
44bb0f01-a01e-006b-3d3a-347a46000000
Cache-Control
public, max-age=86400
x-ms-version
2009-09-19
Content-Length
40189
22938917f50d40.js
offer.slgnt.eu/f89f8f28a0cd488699140c42cdb67b8a/
29 KB
10 KB
Script
General
Full URL
https://offer.slgnt.eu/f89f8f28a0cd488699140c42cdb67b8a/22938917f50d40.js?v=0c6e8d50c5b7c641ede3baedb286285c
Requested by
Host: targetemsecure.blob.core.windows.net
URL: https://targetemsecure.blob.core.windows.net/138526d1-8ff9-4de4-b84a-3a11ec020ede/138526d18ff94de4b84a3a11ec020ede_1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
35.233.20.168 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
168.20.233.35.bc.googleusercontent.com
Software
/
Resource Hash
95f1d8e0e75700d6fa5bbfd1cacd484bcd585309fe1cbe8ea3959802b4106797
Security Headers
Name Value
Strict-Transport-Security max-age=15724800; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 27 May 2020 15:23:14 GMT
content-encoding
gzip
last-modified
Tue, 25 Feb 2020 16:23:17 GMT
etag
W/"5e5549f5-72a9"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=2592000, public
strict-transport-security
max-age=15724800; includeSubDomains
x-forwarded-proto
https
expires
Fri, 26 Jun 2020 15:23:14 GMT
polyfill.min.js
cdn.polyfill.io/v3/
72 B
535 B
Script
General
Full URL
https://cdn.polyfill.io/v3/polyfill.min.js?features=es6&gated=true
Requested by
Host: targetemsecure.blob.core.windows.net
URL: https://targetemsecure.blob.core.windows.net/138526d1-8ff9-4de4-b84a-3a11ec020ede/138526d18ff94de4b84a3a11ec020ede_2_1568799455.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.109 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
aaecd144d2b8763b2fa5c91f09778294363cef363c10504205f4203922644d11
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; includeSubdomains; preload
content-encoding
br
x-content-type-options
nosniff
content-type
text/javascript; charset=utf-8
age
476692
detected-user-agent
Chrome/74.0.3729
status
200
request_came_from_shield
HHN
server-timing
HIT, fastly;desc="Edge time";dur=0, HIT-CLUSTER, fastly;desc="Edge time";dur=2
content-length
74
referrer-policy
origin-when-cross-origin
last-modified
Thu, 21 May 2020 18:17:07 GMT
date
Wed, 27 May 2020 15:23:14 GMT
vary
User-Agent, Accept-Encoding
access-control-allow-methods
GET,HEAD,OPTIONS
normalized-user-agent
chrome/74.0.0
access-control-allow-origin
*
cache-control
public, s-maxage=31536000, max-age=604800, stale-while-revalidate=604800, stale-if-error=604800
accept-ranges
bytes
timing-allow-origin
*
track
siteeuwest.slgnt.eu/
1 KB
1 KB
Fetch
General
Full URL
https://siteeuwest.slgnt.eu/track
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4860:4802:36::15 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Frontend /
Resource Hash
37b28dc456294a27fe5273c161f3fce6efee338ba79af5e05dade26f05946846

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
content-type
application/json

Response headers

date
Wed, 27 May 2020 15:23:14 GMT
content-encoding
gzip
server
Google Frontend
status
200
vary
Accept-Encoding
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://www.techradar.com
x-cloud-trace-context
0b99c0996ce54f636908cf7d66fbbef5
cache-control
private
access-control-allow-credentials
true
content-type
application/json;charset=utf-8
content-length
938
expires
Thu, 01 Jan 1970 00:00:00 GMT
cookie.html
offer.slgnt.eu/sdstatic/ Frame 8612
0
0
Document
General
Full URL
https://offer.slgnt.eu/sdstatic/cookie.html
Requested by
Host: offer.slgnt.eu
URL: https://offer.slgnt.eu/f89f8f28a0cd488699140c42cdb67b8a/22938917f50d40.js?v=0c6e8d50c5b7c641ede3baedb286285c
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
35.233.20.168 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
168.20.233.35.bc.googleusercontent.com
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15724800; includeSubDomains

Request headers

:method
GET
:authority
offer.slgnt.eu
:scheme
https
:path
/sdstatic/cookie.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer

Response headers

status
200
date
Wed, 27 May 2020 15:23:14 GMT
content-type
text/html
last-modified
Thu, 13 Feb 2020 10:59:50 GMT
vary
Accept-Encoding
etag
W/"5e452c26-10f"
expires
Fri, 26 Jun 2020 15:23:14 GMT
cache-control
max-age=2592000 public
content-encoding
gzip
strict-transport-security
max-age=15724800; includeSubDomains
x-forwarded-proto
https
aHR0cHM6Ly93d3cudGVjaHJhZGFyLmNvbS9uZXdzL21hbHdhcmUtdHVybnMtZGlzY29yZC1jbGllbnQtaW50by1wYXNzd29yZC1zdGVhbGVy
offer.slgnt.eu/api/db4a8f7d7191408280a85206a47e4bd6/iv/
27 B
556 B
XHR
General
Full URL
https://offer.slgnt.eu/api/db4a8f7d7191408280a85206a47e4bd6/iv/aHR0cHM6Ly93d3cudGVjaHJhZGFyLmNvbS9uZXdzL21hbHdhcmUtdHVybnMtZGlzY29yZC1jbGllbnQtaW50by1wYXNzd29yZC1zdGVhbGVy?sid=f47e0e46-6afa-4d3a-b415-5d2b61055e1a
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
35.233.20.168 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
168.20.233.35.bc.googleusercontent.com
Software
/ Express
Resource Hash
03cfe943563047d9804114f133087f320377cbe1ecc4c3c026c1146371a5a3a4
Security Headers
Name Value
Strict-Transport-Security max-age=15724800; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded;charset=UTF-8

Response headers

date
Wed, 27 May 2020 15:23:14 GMT
content-type
text/html; charset=utf-8
status
200
x-powered-by
Express
strict-transport-security
max-age=15724800; includeSubDomains
p3p
policyref="http://www.tastehit.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa OUR BUS IND UNI COM NAV INT CNT PRE"
access-control-allow-origin
https://www.techradar.com
access-control-allow-credentials
true
x-forwarded-proto
https
content-length
27
app.js
vanilla.futurecdn.net/techradar/181546/media/shared/js/
331 KB
92 KB
Script
General
Full URL
https://vanilla.futurecdn.net/techradar/181546/media/shared/js/app.js
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.241.89.124 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
03c21eb8f02574b7c0320431eb08f242fe3d8fb282d982ef077c1e823a662e1f

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 22 May 2020 14:35:26 GMT
Content-Encoding
gzip
Age
434869
X-FTR-Backend-Server
ftefrontprod-172-20-9-86
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
93094
X-FTR-Balancer
webproxyprodred
X-FTR-Request-ID
00000000:B8EB_00000000:0050_5EC7E32C_154FA7:525D
Last-Modified
Fri, 22 May 2020 13:48:31 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5ec7d82f-52dc7"
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Sun, 21 Jun 2020 14:35:26 GMT
related
api.vanilla.futurecdn.net/article/v3/
2 KB
2 KB
Fetch
General
Full URL
https://api.vanilla.futurecdn.net/article/v3/related?articleTerritory=US&count=3&site=techradar
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.62 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif01.web.future.net.uk
Software
/
Resource Hash
1d75563e540e4742fc68634f4610a2c7575b32e66826747ca8d85dce55f92960

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 15:23:15 GMT
Content-Encoding
gzip
Xkey
techradar-article, techradar-article-latest, techradar-article-api-79dfd79db6-lfpw5
Age
670
Transfer-Encoding
chunked
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
van-prod
X-Backend
default
X-FTR-Cache-Status
HIT
X-FTR-Balancer
apiproxyprod01
X-FTR-Request-ID
00000000:BAC2_00000000:01BB_5ECE85E3_E9E96A:1DA0
X-Served-By
cache-api-789467d495-nwbs6
Vary
Accept-Encoding, Origin
Content-Type
application/json; charset=utf-8
X-FTR-Backend-Server
http.van-prod
Cache-Control
public,max-age=900
Access-Control-Allow-Origin
https://www.techradar.com
Expires
Wed, 27 May 2020 15:27:05 UTC
related
api.vanilla.futurecdn.net/article/v3/
12 KB
4 KB
Fetch
General
Full URL
https://api.vanilla.futurecdn.net/article/v3/related?articleTerritory=US&articleVerticalHandle=computing&count=15&site=techradar
Requested by
Host: www.techradar.com
URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.62 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif01.web.future.net.uk
Software
/
Resource Hash
d6beb026721ee5a529420b6b852727fc7eca703d8b7665afb459d1f74d1d1913

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 15:23:15 GMT
Content-Encoding
gzip
Xkey
techradar-article, techradar-article-latest, techradar-article-api-79dfd79db6-9srfc
Age
628
Transfer-Encoding
chunked
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
van-prod
X-Backend
default
X-FTR-Cache-Status
HIT
X-FTR-Balancer
apiproxyprod01
X-FTR-Request-ID
00000000:BAC2_00000000:01BB_5ECE85E3_E9E996:1DA0
X-Served-By
cache-api-789467d495-nwbs6
Vary
Accept-Encoding, Origin
Content-Type
application/json; charset=utf-8
X-FTR-Backend-Server
http.van-prod
Cache-Control
public,max-age=900
Access-Control-Allow-Origin
https://www.techradar.com
Expires
Wed, 27 May 2020 15:27:46 UTC
missing-image.svg
vanilla.futurecdn.net/techradar/media/img/
3 KB
2 KB
Image
General
Full URL
https://vanilla.futurecdn.net/techradar/media/img/missing-image.svg
Requested by
Host: vanilla.futurecdn.net
URL: https://vanilla.futurecdn.net/techradar/181546/media/shared/js/app.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
8.241.89.124 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
131423a5b0117aa6fddbde39abed88048b2ee6a147ade1fbf040b551614ab2d2

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 22 May 2020 19:38:16 GMT
Content-Encoding
gzip
Age
416699
X-FTR-Backend-Server
ftefrontprod-172-20-9-86
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites
Connection
keep-alive
Content-Length
1061
X-FTR-Balancer
webproxyprod01
X-FTR-Request-ID
00000000:A4D9_00000000:0050_5EC82A28_1AAC5:7685
Last-Modified
Fri, 22 May 2020 13:48:30 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5ec7d82e-a6b"
access-control-allow-methods
GET
Content-Type
image/svg+xml
access-control-allow-origin
*
Cache-Control
max-age=2592000
access-control-allow-credentials
true
Accept-Ranges
bytes
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Sun, 21 Jun 2020 19:38:16 GMT
analytics.js
www.google-analytics.com/
45 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: vanilla.futurecdn.net
URL: https://vanilla.futurecdn.net/techradar/181546/media/shared/js/app.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
2f1fd973e6c48489ae07c467e3278635b856c698d1f502e06af3ab555937deac
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 30 Apr 2020 21:54:13 GMT
server
Golfe2
age
2680
date
Wed, 27 May 2020 14:38:35 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18433
expires
Wed, 27 May 2020 16:38:35 GMT
smart
www.ultimedia.com/api/widget/
76 KB
10 KB
Script
General
Full URL
https://www.ultimedia.com/api/widget/smart?j=new&t=1590592992687&exclude=&meta_description=The%20AnarchyGrabber%20trojan%20has%20been%20updated%20to%20steal%20passwords%2C%20disable%202FA%20and%20spread%20malware%20to%20a%20victim%27s%20Discord%20friends.&meta_ogtitle=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_ogdescription=New%20variant%20of%20the%20AnarchyGrabber%20trojan%20can%20steal%20plain%20text%20passwords&meta_twittertitle=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_twitterdescription=New%20variant%20of%20the%20AnarchyGrabber%20trojan%20can%20steal%20plain%20text%20passwords&meta_title=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&meta_h1=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_h2=AnarchyGrabber3&meta_datepublished=2020-05-25T19%3A24%3A31Z&url=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&mdtk=02312367&zone=2&layout=&otherplayer=0&target=ultimedia_wrapper
Requested by
Host: www.ultimedia.com
URL: https://www.ultimedia.com/js/common/smart.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
37.187.147.8 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb3.dginfra.net
Software
nginx/1.4.6 (Ubuntu) /
Resource Hash
e8b78bda4e19ef69451df2988bc3f26a98249c2183e32d2eb9a92e7be217c14c
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 15:23:15 GMT
Content-Encoding
gzip
Server
nginx/1.4.6 (Ubuntu)
Vary
Accept-Encoding
Content-Type
application/javascript; charset="utf-8"
Connection
keep-alive
Strict-Transport-Security
max-age=31536000; includeSubDomains
Content-Length
10356
responsivev3.js
www.ultimedia.com/widgets/js/
108 KB
43 KB
Script
General
Full URL
https://www.ultimedia.com/widgets/js/responsivev3.js?v=2.0.2.7537
Requested by
Host: www.ultimedia.com
URL: https://www.ultimedia.com/api/widget/smart?j=new&t=1590592992687&exclude=&meta_description=The%20AnarchyGrabber%20trojan%20has%20been%20updated%20to%20steal%20passwords%2C%20disable%202FA%20and%20spread%20malware%20to%20a%20victim%27s%20Discord%20friends.&meta_ogtitle=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_ogdescription=New%20variant%20of%20the%20AnarchyGrabber%20trojan%20can%20steal%20plain%20text%20passwords&meta_twittertitle=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_twitterdescription=New%20variant%20of%20the%20AnarchyGrabber%20trojan%20can%20steal%20plain%20text%20passwords&meta_title=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&meta_h1=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_h2=AnarchyGrabber3&meta_datepublished=2020-05-25T19%3A24%3A31Z&url=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&mdtk=02312367&zone=2&layout=&otherplayer=0&target=ultimedia_wrapper
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
37.187.147.8 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb3.dginfra.net
Software
nginx/1.4.6 (Ubuntu) /
Resource Hash
99e39599d9a8292c712094b6114233d19961923037fc0e2d9441c773f654b98a
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 15:23:16 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Last-Modified
Tue, 13 Jun 2017 13:04:13 GMT
Server
nginx/1.4.6 (Ubuntu)
Strict-Transport-Security
max-age=31536000; includeSubDomains
Content-Type
application/x-javascript
Cache-Control
max-age=2678400
Transfer-Encoding
chunked
Connection
keep-alive
Expires
Sat, 27 Jun 2020 15:23:16 GMT
responsivev3.js
www.ultimedia.com/widgets/js/
108 KB
43 KB
Script
General
Full URL
https://www.ultimedia.com/widgets/js/responsivev3.js?v=2.0.2.7537
Requested by
Host: www.ultimedia.com
URL: https://www.ultimedia.com/api/widget/smart?j=new&t=1590592992687&exclude=&meta_description=The%20AnarchyGrabber%20trojan%20has%20been%20updated%20to%20steal%20passwords%2C%20disable%202FA%20and%20spread%20malware%20to%20a%20victim%27s%20Discord%20friends.&meta_ogtitle=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_ogdescription=New%20variant%20of%20the%20AnarchyGrabber%20trojan%20can%20steal%20plain%20text%20passwords&meta_twittertitle=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_twitterdescription=New%20variant%20of%20the%20AnarchyGrabber%20trojan%20can%20steal%20plain%20text%20passwords&meta_title=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&meta_h1=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_h2=AnarchyGrabber3&meta_datepublished=2020-05-25T19%3A24%3A31Z&url=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&mdtk=02312367&zone=2&layout=&otherplayer=0&target=ultimedia_wrapper
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
37.187.147.8 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb3.dginfra.net
Software
nginx/1.4.6 (Ubuntu) /
Resource Hash
99e39599d9a8292c712094b6114233d19961923037fc0e2d9441c773f654b98a
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 15:23:16 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Last-Modified
Tue, 13 Jun 2017 13:04:13 GMT
Server
nginx/1.4.6 (Ubuntu)
Strict-Transport-Security
max-age=31536000; includeSubDomains
Content-Type
application/x-javascript
Cache-Control
max-age=2678400
Transfer-Encoding
chunked
Connection
keep-alive
Expires
Sat, 27 Jun 2020 15:23:16 GMT
Cookie set iframe
www.ultimedia.com/deliver/generic/ Frame AE89
0
0
Document
General
Full URL
https://www.ultimedia.com/deliver/generic/iframe?mdtk=02312367&zone=2&type_player=0&sendstats=0&src=f5lsup&width=452&height=300&urlfacebook=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&ad=1&autoplay=yes&fstart=1&title=The+Last+of+Us+Part+2+release+date%2C+delay%2C+trailers%2C+news%2C+and+rumors+%7C+TechRadar+Talks&endMessage=um_ultimedia_wrapper_ultimediaEndRoll&widgetPrefix=um_ultimedia_wrapper_&tagparam=&tagparamdecoded=&visible=&gdprconsentstring=
Requested by
Host: www.ultimedia.com
URL: https://www.ultimedia.com/api/widget/smart?j=new&t=1590592992687&exclude=&meta_description=The%20AnarchyGrabber%20trojan%20has%20been%20updated%20to%20steal%20passwords%2C%20disable%202FA%20and%20spread%20malware%20to%20a%20victim%27s%20Discord%20friends.&meta_ogtitle=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_ogdescription=New%20variant%20of%20the%20AnarchyGrabber%20trojan%20can%20steal%20plain%20text%20passwords&meta_twittertitle=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_twitterdescription=New%20variant%20of%20the%20AnarchyGrabber%20trojan%20can%20steal%20plain%20text%20passwords&meta_title=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&meta_h1=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_h2=AnarchyGrabber3&meta_datepublished=2020-05-25T19%3A24%3A31Z&url=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&mdtk=02312367&zone=2&layout=&otherplayer=0&target=ultimedia_wrapper
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
37.187.147.8 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb3.dginfra.net
Software
nginx/1.4.6 (Ubuntu) /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Host
www.ultimedia.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
STICKY=9ba3e9877e03015ce2d6396d1751d33f
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer

Response headers

Server
nginx/1.4.6 (Ubuntu)
Date
Wed, 27 May 2020 15:23:16 GMT
Content-Type
text/html; charset=UTF-8
Content-Length
9530
Connection
keep-alive
Cache-Control
private, must-revalidate
Access-Control-Allow-Origin
*
Access-Control-Allow-Credentials
true
pragma
no-cache
expires
-1
Vary
Accept-Encoding
Content-Encoding
gzip
Set-Cookie
STICKY=e2c31ed046b5c7d24e3a86d7e1aa2b88; path=/; HttpOnly
Strict-Transport-Security
max-age=31536000; includeSubDomains
sprit_10.png
www.ultimedia.com/img/widget/
3 KB
3 KB
Image
General
Full URL
https://www.ultimedia.com/img/widget/sprit_10.png
Requested by
Host: www.ultimedia.com
URL: https://www.ultimedia.com/widgets/js/responsivev3.js?v=2.0.2.7537
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
37.187.147.8 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb3.dginfra.net
Software
nginx/1.4.6 (Ubuntu) /
Resource Hash
232e2107e9ebb4adaae34e5aa7f8eba38b819ed4a735bac8f26d41106635c97c
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 15:23:16 GMT
Last-Modified
Tue, 13 Jun 2017 13:03:46 GMT
Server
nginx/1.4.6 (Ubuntu)
ETag
"593fe2b2-b9d"
Strict-Transport-Security
max-age=31536000; includeSubDomains
Content-Type
image/png
Cache-Control
max-age=2678400
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2973
Expires
Sat, 27 Jun 2020 15:23:16 GMT
sprit_6.png
www.ultimedia.com/img/widget/
3 KB
4 KB
Image
General
Full URL
https://www.ultimedia.com/img/widget/sprit_6.png
Requested by
Host: www.ultimedia.com
URL: https://www.ultimedia.com/widgets/js/responsivev3.js?v=2.0.2.7537
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
37.187.147.8 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb3.dginfra.net
Software
nginx/1.4.6 (Ubuntu) /
Resource Hash
43fc744dc9f9bdd26ba499a6e1840b548740e7ce2b63e7c986d997d2bcae496e
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 15:23:16 GMT
Last-Modified
Tue, 13 Jun 2017 13:03:46 GMT
Server
nginx/1.4.6 (Ubuntu)
ETag
"593fe2b2-d0e"
Strict-Transport-Security
max-age=31536000; includeSubDomains
Content-Type
image/png
Cache-Control
max-age=2678400
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
3342
Expires
Sat, 27 Jun 2020 15:23:16 GMT
/
www.ultimedia.com/deliver/statistiques/widgetdisplay/
0
265 B
Script
General
Full URL
https://www.ultimedia.com/deliver/statistiques/widgetdisplay/?mdtk=02312367&zone=2&url=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&autoplay=1&widget_type=smartlasthome&result=1&params=%7B%22index%22%3A%22technology%22%2C%22search%22%3A%22Malware+turns+Discord+client+into+password+stealer+%7C+TechRadar+The+AnarchyGrabber+trojan+has+been+updated+to+steal+passwords%2C+disable+2FA+and+spread+malware+to+a+victim%27s+Discord+friends.+Malware+turns+Discord+client+into+password+stealer+New+variant+of+the+AnarchyGrabber+trojan+can+steal+plain+text+passwords%22%2C%22limit%22%3A1590434671%2C%22nb_videos%22%3A6%2C%22videos_results%22%3A%22%22%2C%22first_video_id%22%3A5290025%2C%22first_video_id_content%22%3A25%2C%22click_to_play%22%3A0%7D
Requested by
Host: www.ultimedia.com
URL: https://www.ultimedia.com/api/widget/smart?j=new&t=1590592992687&exclude=&meta_description=The%20AnarchyGrabber%20trojan%20has%20been%20updated%20to%20steal%20passwords%2C%20disable%202FA%20and%20spread%20malware%20to%20a%20victim%27s%20Discord%20friends.&meta_ogtitle=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_ogdescription=New%20variant%20of%20the%20AnarchyGrabber%20trojan%20can%20steal%20plain%20text%20passwords&meta_twittertitle=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_twitterdescription=New%20variant%20of%20the%20AnarchyGrabber%20trojan%20can%20steal%20plain%20text%20passwords&meta_title=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&meta_h1=Malware%20turns%20Discord%20client%20into%20password%20stealer&meta_h2=AnarchyGrabber3&meta_datepublished=2020-05-25T19%3A24%3A31Z&url=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&mdtk=02312367&zone=2&layout=&otherplayer=0&target=ultimedia_wrapper
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
37.187.147.8 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb3.dginfra.net
Software
nginx/1.4.6 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 27 May 2020 15:23:16 GMT
Server
nginx/1.4.6 (Ubuntu)
Connection
keep-alive
Content-Length
0
Strict-Transport-Security
max-age=31536000; includeSubDomains
Content-Type
text/html; charset=UTF-8
f5lsup-X.jpg
medialb.ultimedia.com/multi/3uv0q/
7 KB
8 KB
Image
General
Full URL
https://medialb.ultimedia.com/multi/3uv0q/f5lsup-X.jpg
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
37.187.147.8 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb3.dginfra.net
Software
nginx/1.4.6 (Ubuntu) /
Resource Hash
1ec47208c2cd5206e8088ec570033767c332e06b5709a102ba0ca51b0736c6d0

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Wed, 27 May 2020 15:23:16 GMT
Last-Modified
Sun, 03 May 2020 11:25:14 GMT
Server
nginx/1.4.6 (Ubuntu)
ETag
"5eaeaa1a-1d90"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
7568
expires
7d
f50kqu-X.jpg
medialb.ultimedia.com/multi/3urpr/
8 KB
8 KB
Image
General
Full URL
https://medialb.ultimedia.com/multi/3urpr/f50kqu-X.jpg
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
37.187.147.8 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb3.dginfra.net
Software
nginx/1.4.6 (Ubuntu) /
Resource Hash
9ddd34cdb944de464c7b7e1c0435565f0c4b1e971364559f34bfcd65d890230f

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Wed, 27 May 2020 15:23:16 GMT
Last-Modified
Sun, 26 Apr 2020 11:25:05 GMT
Server
nginx/1.4.6 (Ubuntu)
ETag
"5ea56f91-2052"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
8274
expires
7d
fsvzfl-X.jpg
medialb.ultimedia.com/multi/3urzq/
7 KB
8 KB
Image
General
Full URL
https://medialb.ultimedia.com/multi/3urzq/fsvzfl-X.jpg
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
37.187.147.8 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb3.dginfra.net
Software
nginx/1.4.6 (Ubuntu) /
Resource Hash
36ee7fcf950ad27f5c65f5b166d883c9ec89408a207f631f5d362d675fef6dd2

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Wed, 27 May 2020 15:23:16 GMT
Last-Modified
Sun, 19 Apr 2020 11:26:05 GMT
Server
nginx/1.4.6 (Ubuntu)
ETag
"5e9c354d-1d10"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
7440
expires
7d
f3ppf8-X.jpg
medialb.ultimedia.com/multi/3urvq/
8 KB
8 KB
Image
General
Full URL
https://medialb.ultimedia.com/multi/3urvq/f3ppf8-X.jpg
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
37.187.147.8 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb3.dginfra.net
Software
nginx/1.4.6 (Ubuntu) /
Resource Hash
7e3b437cdc8a473716450d54e742b1be06d9d38b6c1a3c94c9e9433981071759

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Wed, 27 May 2020 15:23:16 GMT
Last-Modified
Wed, 08 Apr 2020 14:39:51 GMT
Server
nginx/1.4.6 (Ubuntu)
ETag
"5e8de237-1fed"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
8173
expires
7d
f35v0r-X.jpg
medialb.ultimedia.com/multi/3uruv/
9 KB
9 KB
Image
General
Full URL
https://medialb.ultimedia.com/multi/3uruv/f35v0r-X.jpg
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
37.187.147.8 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb3.dginfra.net
Software
nginx/1.4.6 (Ubuntu) /
Resource Hash
36b321f3a8ea592db06677b7488fdf67a00bb896dd53273259061020fd40b0b5

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Wed, 27 May 2020 15:23:16 GMT
Last-Modified
Thu, 02 Apr 2020 15:29:48 GMT
Server
nginx/1.4.6 (Ubuntu)
ETag
"5e8604ec-2276"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
8822
expires
7d
fxfxvs-X.jpg
medialb.ultimedia.com/multi/3ur5f/
7 KB
7 KB
Image
General
Full URL
https://medialb.ultimedia.com/multi/3ur5f/fxfxvs-X.jpg
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
37.187.147.8 , France, ASN16276 (OVH, FR),
Reverse DNS
ovh-lb3.dginfra.net
Software
nginx/1.4.6 (Ubuntu) /
Resource Hash
24591f061929ec37335562066d2b085578ad99cbd8d60507d90b4e4e61cc542d

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Wed, 27 May 2020 15:23:16 GMT
Last-Modified
Mon, 30 Mar 2020 19:24:23 GMT
Server
nginx/1.4.6 (Ubuntu)
ETag
"5e824767-1a5e"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
6750
expires
7d
collect
www.google-analytics.com/
35 B
95 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j82&a=1653908382&t=event&ni=1&_s=2&dl=https%3A%2F%2Fwww.techradar.com%2Fnews%2Fmalware-turns-discord-client-into-password-stealer&ul=en-us&de=UTF-8&dt=Malware%20turns%20Discord%20client%20into%20password%20stealer%20%7C%20TechRadar&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&ec=Performance%20Metrics&ea=TTI&el=8257&ev=8257&_u=6HDAgEABBAQC~&jid=1570748132&gjid=2131304679&cid=1367913561.1590592993&tid=UA-48894329-1&_gid=2082783632.1590592993&cd57=null&cd40=Password&cd41=Malware%7CDiscord%7CTrojan_horse_computing%7CUser_computing%7CAnarchyGrabber3_AnarchyGrabber3&cd42=Software&cd45=Password&cd46=Computing&cd47=Malware_turns_Discord_client_into_password_stealer&cd50=5&cd51=false&cd58=Computing&cd74=&cd13=false&cd10=US&cd5=XUeVg74qQZwxrcTVTXpDSk&cm1=11393&cm29=518&z=2109570618
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 27 May 2020 04:45:52 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
38250
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j82&tid=UA-48894329-1&cid=1367913561.1590592993&jid=1570748132&gjid=2131304679&_gid=2082783632.1590592993&_u=6HDAgEABBAQC~&z=329564002
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1367913561.1590592993&jid=1570748132&_v=j82&z=329564002
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1367913561.1590592993&jid=1570748132&_v=j82&z=329564002&slf_rd=1&random=3022175933
42 B
106 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1367913561.1590592993&jid=1570748132&_v=j82&z=329564002&slf_rd=1&random=3022175933
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 27 May 2020 15:23:22 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 27 May 2020 15:23:22 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48894329-1&cid=1367913561.1590592993&jid=1570748132&_v=j82&z=329564002&slf_rd=1&random=3022175933
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Verdicts & Comments Add Verdict or Comment

290 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| startFramesMeasurement undefined| xhr object| vanilla object| VAN object| __tti string| hostname object| hostGroups object| urlSearchParams string| FORCED_DOMAIN_QUERY_PARAM function| cmpStubFunction function| checkIfCmpIsReady number| cmpInterval boolean| askForConsent boolean| waitForConsent function| __cmp object| ccpaAppliesPromise function| resolveFEP object| processFEP object| reliableDOMContentLoaded object| reliablePageLoad object| reliableConsentGiven object| wadoinawdoijzxioznelknsdf string| hawk_css_endpoint object| adParameters object| head object| font boolean| gaCookieSet function| handleHeaderError object| bordeaux object| FEP_object function| getConnectionDimensions function| missingImage string| ga_code object| analytics_ga_data string| version string| GoogleAnalyticsObject function| ga object| optimizely object| FEP boolean| trailingSlash object| onesignalConfig boolean| isIE function| amIIE object| taboola_lists function| taboola_is_device object| _taboola function| loadHawklinks object| siteTargeting string| pageTags object| vanL10N object| _comscore object| dfp_config object| vanillaComponents object| require object| ffte object| xkeys object| templateVariables string| ftr_request_id object| OneSignal object| google_tag_data object| gaplugins object| bordeauxJsonp object| _adsShimCommunication object| fastdom object| purchs2s object| purchs2sutils object| tmntag boolean| gdprUser string| PURCHS2S_VERSION function| uuidv4 string| defuuid object| baseObj function| tmntag_ready function| tmntag_render function| tmntag_triggerEvent function| purchs2s_checkCommands boolean| bluekaiEnabled boolean| iasOptimiseEnabled function| setImmediate function| clearImmediate function| init_background_skin object| feat function| slotifyDebug function| _ boolean| headerExecuted string| indexExchangeDeviceType object| bordeauxAds object| bdx boolean| disablePurchS2SDFPRefresh boolean| indexExchangeEnabled boolean| amazonA9Enabled boolean| rampS2SEnabled object| chronos function| debugAds object| internalDebugAds object| PARSELY object| hawkWebpackJsonP object| regeneratorRuntime object| hawk function| respimage object| respimgCFG object| webpackJsonp object| core object| __core-js_shared__ object| __translator function| legacyRenderSponsoredPost boolean| leadGenMVP function| stickyFooterInit string| ULTIMEDIA_mdtk string| ULTIMEDIA_zone string| ULTIMEDIA_target boolean| ULTIMEDIA_async function| updateShareCountWithFacebookShareCount function| updateShareCountWithTwitterTweetCount function| updateShareCountWithPinterestPinCount boolean| suggestionBoxPresent object| internalEvent$ object| BOOMR object| lazyLoadInstance object| hawklinks function| __uspapi function| udm_ object| ns_p object| COMSCORE function| renderSponsoredPost function| zkckcosdoiaioawqnmzsdqw object| asdinwawisuihzejsahzl function| hiriyyyteetaqgthyu object| pppasoeommmsmzrvbr object| dfp object| Cyclejs function| advertsDebugFilter object| advertsDebug object| advertsDebugStream object| gaGlobal object| gaData object| ULTIMEDIA_param number| ULTIMEDIA_param_length function| _um_smart_deploy string| _ultimedia_host number| um_date object| _ultimedia_script object| _ultimedia_script_notif object| _ultimedia_script_visi number| _ultimedia_widget_id string| ULTIMEDIA_ACTION object| ULTIMEDIA_metas object| metas object| title object| h1 object| h2 object| times object| ULTIMEDIA_exclude object| match string| ULTIMEDIA_LOADING_SRC string| ULTIMEDIA_layout function| _appendUltimediaWidget function| _ultimedia_set_widget_params function| _ultimedia_checkIfScrollable function| _ultimedia_auto_append function| _ultimedia_load_synchronous_widget function| _ultimedia_loadWidget function| _ultimedia_isWidgetAtTop function| _ultimedia_attachEventListeners string| ULTIMEDIA_search string| ULTIMEDIA_mode string| ULTIMEDIA_date string| ULTIMEDIA_index string| ULTIMEDIA_host string| ULTIMEDIA_nb string| ULTIMEDIA_urlfacebook string| ULTIMEDIA_ad string| ULTIMEDIA_callback string| ULTIMEDIA_widget_title string| ULTIMEDIA_widget_footer string| ULTIMEDIA_widget_header string| ULTIMEDIA_overlay_title string| ULTIMEDIA_show_tooltips string| ULTIMEDIA_autoplay string| ULTIMEDIA_playlist string| ULTIMEDIA_width string| ULTIMEDIA_height string| ULTIMEDIA_jw_version string| ULTIMEDIA_default_videolist string| ULTIMEDIA_default_zone string| ULTIMEDIA_default_widget_title string| ULTIMEDIA_css_title_font_color string| ULTIMEDIA_css_title_font string| ULTIMEDIA_css_title_text_align string| ULTIMEDIA_css_title_background_color string| ULTIMEDIA_css_panel_position string| ULTIMEDIA_css_panel_font_size string| ULTIMEDIA_css_panel_font_color string| ULTIMEDIA_css_panel_text_align string| ULTIMEDIA_css_thumb_background_color string| ULTIMEDIA_css_thumb_border_color string| ULTIMEDIA_css_thumb_infos_font_color string| ULTIMEDIA_css_thumb_infos_font string| ULTIMEDIA_css_thumb_background_color_hover string| ULTIMEDIA_css_thumb_border_color_hover string| ULTIMEDIA_css_thumb_infos_font_color_hover string| ULTIMEDIA_css_thumb_infos_font_hover string| ULTIMEDIA_css_list_overflow_x string| ULTIMEDIA_css_list_overflow_y string| ULTIMEDIA_css_list_background_color string| ULTIMEDIA_css_photosgallery_selected_border string| ULTIMEDIA_css_photosgallery_nav_background_color string| ULTIMEDIA_css_photosgallery_button_nav_font_color string| ULTIMEDIA_css_photosgallery_button_nav_background_color string| ULTIMEDIA_css_photosgallery_button_nav_font_color_hover string| ULTIMEDIA_css_photosgallery_button_nav_background_color_hover string| ULTIMEDIA_css_title_widget_uppercase string| ULTIMEDIA_css_panel_text_uppercase string| ULTIMEDIA_css_thumb_text_uppercase string| ULTIMEDIA_css_footer_font_color string| ULTIMEDIA_css_footer_text_align string| ULTIMEDIA_css_background_color string| ULTIMEDIA_css_background_image string| ULTIMEDIA_css_background_repeat string| ULTIMEDIA_css_background_position string| ULTIMEDIA_source_logo_brand string| ULTIMEDIA_url_logo_brand string| ULTIMEDIA_css_header_font string| ULTIMEDIA_css_header_font_color string| ULTIMEDIA_css_header_border string| ULTIMEDIA_resize string| ULTIMEDIA_validated_videos_only function| __cmpui object| ultimediaVisiblePlayer object| ultimediaNotification object| visibilityStats object| _sp_ function| spBootstrap object| wa object| wa_s object| _thq object| true object| BT object| TasteHit number| 2f1acc6c3a606b082e5eef5e54414ffb string| _ultimedia_widget_position_place object| um_js_script object| um_js_prior undefined| $ undefined| jQuery function| jQueryUM function| um_ultimedia_wrapper_SendHoverMessage function| um_ultimedia_wrapper_SendScrollMessage function| um_ultimedia_wrapper_GetPageRect function| um_ultimedia_wrapper_GetElementRect function| um_ultimedia_wrapper_RectsIntersect function| um_ultimedia_wrapper_RectsIntersectBis boolean| um_ultimedia_wrapper_ScrollToCheck boolean| um_ultimedia_wrapper_ScrollToRecheck function| um_ultimedia_wrapper_ScrollToPlay function| um_ultimedia_wrapper_ScrollToPlayForced boolean| um_ultimedia_wrapper_OverToCheck function| um_ultimedia_wrapper_OverToPlay function| um_ultimedia_wrapper_HasClass function| um_ultimedia_wrapper_AddClass function| um_ultimedia_wrapper_RemoveClass function| um_ultimedia_wrapper_ShowADPMessage function| um_ultimedia_wrapper_SwitchVideo string| um_ultimedia_wrapper_path number| um_ultimedia_wrapper_width number| um_ultimedia_wrapper_height string| um_ultimedia_wrapper_mdtk number| um_ultimedia_wrapper_zone number| um_ultimedia_wrapper_display_adp_message boolean| um_ultimedia_wrapper_playlistActive object| um_ultimedia_wrapper_titles object| um_ultimedia_wrapper_labels string| um_ultimedia_wrapper_urlfacebook string| um_ultimedia_wrapper_ad object| um_ultimedia_wrapper_params_iframe_id object| um_ultimedia_wrapper_params_iframe_type boolean| um_ultimedia_wrapper_no_change_title string| um_ultimedia_wrapper_widget_title boolean| um_ultimedia_wrapper_from_playlist number| um_ultimedia_wrapper_playlist_index number| um_ultimedia_wrapper_ori_start object| umStylestarget object| umStyleElement object| jQuery19107542688468979069 function| um_ultimedia_wrapper_ultimediaEndRoll boolean| um_ultimedia_wrapper_hoveredOnce boolean| um_ultimedia_wrapper_muteForced boolean| um_ultimedia_wrapper_muteState

8 Cookies

Domain/Path Name / Value
www.techradar.com/ Name: _cmpQcif3pcsupported
Value: 1
.techradar.com/ Name: _gid
Value: GA1.2.2082783632.1590592993
.techradar.com/ Name: _parsely_session
Value: {%22sid%22:1%2C%22surl%22:%22https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer%22%2C%22sref%22:%22%22%2C%22sts%22:1590592991669%2C%22slts%22:0}
.techradar.com/ Name: _ga
Value: GA1.2.1367913561.1590592993
.techradar.com/ Name: AMP_TOKEN
Value: %24NOT_FOUND
.techradar.com/ Name: _gat
Value: 1
.techradar.com/ Name: _parsely_visitor
Value: {%22id%22:%22pid=f22400e414f1e5fddcd7b4d88b242c5d%22%2C%22session_count%22:1%2C%22last_session_ts%22:1590592991669}
.www.techradar.com/ Name: FTR_Country_Code
Value: CH

8 Console Messages

Source Level URL
Text
console-api log URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer(Line 157)
Message:
techradar loaded successfully.
console-api log URL: https://cdn.onesignal.com/sdks/OneSignalSDK.js(Line 1)
Message:
OneSignal: Using fallback ES5 Stub for backwards compatibility.
console-api log URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer(Line 89)
Message:
DOMContentLoaded at 546
console-api log URL: https://vanilla.futurecdn.net/techradar/181546/media/js/main.min.js(Line 28)
Message:
Lead Gen MVP: false
console-api log URL: https://vanilla.futurecdn.net/techradar/181546/media/js/main.min.js(Line 28)
Message:
No archive filter present
console-api warning URL: https://quantcast.mgr.consensu.org/cmp.js(Line 1)
Message:
init has already been called and should only be run one time.
console-api warning URL: https://static.quantcast.mgr.consensu.org/v33/cmpui-popup.js(Line 1)
Message:
Unable to get NonIab Vendor list.
console-api log URL: https://www.techradar.com/news/malware-turns-discord-client-into-password-stealer(Line 89)
Message:
PageLoad at 2140

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

ad.doubleclick.net
ampcid.google.com
ampcid.google.de
api.vanilla.futurecdn.net
audit.quantcast.mgr.consensu.org
cdn.mos.cms.futurecdn.net
cdn.onesignal.com
cdn.parsely.com
cdn.polyfill.io
dg876rejmw3ebkm51boa0sx2-wpengine.netdna-ssl.com
gizmos.future-fie.co.uk
medialb.ultimedia.com
mos.fie.futurecdn.net
offer.slgnt.eu
orionis.techradar.com
quantcast.mgr.consensu.org
r.skimresources.com
sb.scorecardresearch.com
search-api.fie.future.net.uk
siteeuwest.slgnt.eu
srv-2020-05-27-15.pixel.parsely.com
static.quantcast.mgr.consensu.org
stats.g.doubleclick.net
targetemsecure.blob.core.windows.net
vanilla.futurecdn.net
vendorlist.consensu.org
widgets.hawk-assets.co.uk
www.google-analytics.com
www.google.com
www.google.de
www.summerhamster.com
www.techradar.com
www.ultimedia.com
13.224.95.90
13.224.96.38
151.101.114.109
185.113.25.51
185.113.25.54
185.113.25.56
185.113.25.62
2.16.46.85
2001:4860:4802:36::15
216.58.207.38
2600:9000:2190:1800:9:46dc:4700:93a1
2600:9000:2190:7800:1:af78:4c0:93a1
2600:9000:2190:de00:9:46dc:4700:93a1
2606:4700::6812:e234
2a00:1450:4001:801::200e
2a00:1450:4001:806::2004
2a00:1450:4001:809::200e
2a00:1450:4001:81c::200e
2a00:1450:4001:81f::2003
2a00:1450:400c:c03::9d
3.213.113.98
35.157.160.140
35.190.59.101
35.233.20.168
37.187.147.8
52.239.242.148
52.28.190.123
8.241.121.124
8.241.79.124
8.241.89.124
94.31.29.99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