URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Submission: On September 29 via api from GB — Scanned from DE

Summary

This website contacted 4 IPs in 2 countries across 4 domains to perform 37 HTTP transactions. The main IP is 104.26.7.105, located in United States and belongs to CLOUDFLARENET, US. The main domain is malware.news.
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on June 15th 2021. Valid for: a year.
This is the only time malware.news was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
33 104.26.7.105 13335 (CLOUDFLAR...)
2 142.250.184.238 15169 (GOOGLE)
1 104.18.6.33 13335 (CLOUDFLAR...)
37 4
Domain Requested by
33 malware.news malware.news
2 www.google-analytics.com malware.news
www.google-analytics.com
1 therecord.media malware.news
0 www-therecord.recfut.com Failed malware.news
37 4
Subject Issuer Validity Valid
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2021-06-15 -
2022-06-14
a year crt.sh
*.google-analytics.com
GTS CA 1C3
2021-09-13 -
2021-11-20
2 months crt.sh

This page contains 1 frames:

Primary Page: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Frame ID: F50E133AC25EF84070E86F148FCC33AA
Requests: 38 HTTP requests in this frame

Screenshot

Page Title

Suspected Chinese state-linked threat actors infiltrated major Afghan telecom provider - Malware News - Malware Analysis, News and Indicators

Detected technologies

Overall confidence: 100%
Detected patterns
  • /wp-(?:content|includes)/

Overall confidence: 100%
Detected patterns
  • google-analytics\.com/(?:ga|urchin|analytics)\.js

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

37
Requests

97 %
HTTPS

0 %
IPv6

4
Domains

4
Subdomains

4
IPs

2
Countries

1217 kB
Transfer

5062 kB
Size

3
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

37 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request 53111
malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/
95 KB
20 KB
Document
General
Full URL
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0aec34f9f71dec9af6653c17f49ed04714182f78dca5d30e76db883cbd903b41
Security Headers
Name Value
Content-Security-Policy base-uri 'none'; object-src 'none'; script-src https://malware.news/logs/ https://malware.news/sidekiq/ https://malware.news/mini-profiler-resources/ https://malware.news/assets/ https://malware.news/brotli_asset/ https://malware.news/extra-locales/ https://malware.news/highlight-js/ https://malware.news/javascripts/ https://malware.news/plugins/ https://malware.news/theme-javascripts/ https://malware.news/svg-sprite/ https://www.google-analytics.com/analytics.js; worker-src 'self' https://malware.news/assets/ https://malware.news/brotli_asset/ https://malware.news/javascripts/ https://malware.news/plugins/
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
malware.news
:scheme
https
:path
/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
accept-language
de-DE,de;q=0.9
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-type
text/html; charset=utf-8
vary
Accept-Encoding
x-frame-options
SAMEORIGIN
x-xss-protection
1; mode=block
x-content-type-options
nosniff
x-download-options
noopen
x-permitted-cross-domain-policies
none
referrer-policy
strict-origin-when-cross-origin
x-discourse-route
topics/show
cache-control
no-cache, no-store
content-security-policy
base-uri 'none'; object-src 'none'; script-src https://malware.news/logs/ https://malware.news/sidekiq/ https://malware.news/mini-profiler-resources/ https://malware.news/assets/ https://malware.news/brotli_asset/ https://malware.news/extra-locales/ https://malware.news/highlight-js/ https://malware.news/javascripts/ https://malware.news/plugins/ https://malware.news/theme-javascripts/ https://malware.news/svg-sprite/ https://www.google-analytics.com/analytics.js; worker-src 'self' https://malware.news/assets/ https://malware.news/brotli_asset/ https://malware.news/javascripts/ https://malware.news/plugins/
x-discourse-cached
skip
x-request-id
be4a5bf1-8fec-41b3-81a4-aa83228eb6ed
x-runtime
0.114541
x-discourse-trackview
1
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=DG5vRUWqRqeeWUbKFg%2BGUhzcLwEBUv%2FDJ7kkwMJC%2FmU9yb0OgYY7FtKR5UtImbDUUZqt0YH2ZDMtni1ycAsU1zQ9FZ7kYaJehJjLBaBQaym37O90PJDKsvobCq0XOQ%3D%3D"}],"group":"cf-nel","max_age":604800}
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
server
cloudflare
cf-ray
6962cf39eb6b411f-PRG
content-encoding
br
browser-detect-115ab5953de1b5bb122bfb26b757f5391dd8d1d2aef2b81baf7b59aee99d9f34.js
malware.news/assets/
247 B
561 B
Script
General
Full URL
https://malware.news/assets/browser-detect-115ab5953de1b5bb122bfb26b757f5391dd8d1d2aef2b81baf7b59aee99d9f34.js
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
9487cb559d6168d8f29a5684b10a9c253776e7280ea758f332902773d85367e5

Request headers

:path
/assets/browser-detect-115ab5953de1b5bb122bfb26b757f5391dd8d1d2aef2b81baf7b59aee99d9f34.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 05 May 2021 19:28:24 GMT
server
cloudflare
age
381470
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=lhKdjy52cnT0B9L1Nvy5zw%2F0N5QVeDIYiG%2FkgCS%2F8w%2FztMJGq%2FPWYXyPFY%2BkvFLoNI2EYWd%2B%2Fgb4uxc5qaOnE%2B%2BXRgsUDRuaDu%2FefYfh%2FOZlhUrHtlzil9DTTFvyQw%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript
cache-control
public, max-age=31536000, immutable
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cf-ray
6962cf3bac2a411f-PRG
expires
Sat, 24 Sep 2022 03:26:48 GMT
en-b4c652e74e1f00d0e6059b6bf4aae63aedc7ef40ec1cd31a2d5494431da11f82.js
malware.news/assets/locales/
256 KB
75 KB
Script
General
Full URL
https://malware.news/assets/locales/en-b4c652e74e1f00d0e6059b6bf4aae63aedc7ef40ec1cd31a2d5494431da11f82.js
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
b64d6f3b3fafe479610cfa9b4b86fcef473ba7d0dfc5f68c8e9de52ed4774075

Request headers

:path
/assets/locales/en-b4c652e74e1f00d0e6059b6bf4aae63aedc7ef40ec1cd31a2d5494431da11f82.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 05 May 2021 19:29:35 GMT
server
cloudflare
age
808859
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=YdZ9VLCI6WwMIB6IICfwivwhX%2BtJTj1eKetB%2B%2BN3pfSpbyiHWQEmSWOsFiMIVvAU4S28yquWx7OK5keyqd06vyB%2FS3y49pjgOuOnudU0pasBMPglTY9WgNZC%2F9SvvQ%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript
cache-control
public, max-age=31536000, immutable
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cf-ray
6962cf3bac2b411f-PRG
expires
Thu, 08 Sep 2022 20:49:04 GMT
ember_jquery-36a23101c869ab0dc53fc908de69adb785731593573d32bdeef416acc1076ef4.js
malware.news/assets/
557 KB
157 KB
Script
General
Full URL
https://malware.news/assets/ember_jquery-36a23101c869ab0dc53fc908de69adb785731593573d32bdeef416acc1076ef4.js
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
1ab3d376b5d18228e95af2f61f4ea5ee12a4200177969694c347048fb41c9b7c

Request headers

:path
/assets/ember_jquery-36a23101c869ab0dc53fc908de69adb785731593573d32bdeef416acc1076ef4.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 05 May 2021 19:28:37 GMT
server
cloudflare
age
381469
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=dFBiKsfIUYSQUU7XuoFsJukCVp%2FgpC279Z%2F06I8qxqQUZNCKHnYejH8cHANjQnzj8oodjR9rpn6e8kkieyGMpl8jcHuRGCV3Zwxz5ZJYa2E0AcS29R3b0aPZukq45w%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript
cache-control
public, max-age=31536000, immutable
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cf-ray
6962cf3bac2c411f-PRG
expires
Sat, 24 Sep 2022 04:10:58 GMT
vendor-72ed7d3a2757503f5d4b387ef519a6f371137f63e3b8f1ff29544b54c1d8450f.js
malware.news/assets/
173 KB
61 KB
Script
General
Full URL
https://malware.news/assets/vendor-72ed7d3a2757503f5d4b387ef519a6f371137f63e3b8f1ff29544b54c1d8450f.js
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
f25487aa53b51b4c355c8c8dcfe481294a929e8e6c8ab3f4c1b0d84115803fb5

Request headers

:path
/assets/vendor-72ed7d3a2757503f5d4b387ef519a6f371137f63e3b8f1ff29544b54c1d8450f.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 05 May 2021 19:28:15 GMT
server
cloudflare
age
381470
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=ovJE30QymzM%2BycN50s69Gkj51uXu9AXqEJ993QKfZxdovUSe0E9Y3l%2FBRoVdjmDdlQP10vEaNdwV97fAjuGsPZTdPChQdKm7fpo8basvpbpvB2eprFAAypLRcGOrDQ%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript
cache-control
public, max-age=31536000, immutable
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cf-ray
6962cf3bac2d411f-PRG
expires
Sat, 24 Sep 2022 04:10:58 GMT
pretty-text-bundle-0651e2a797c3ce2e7029301b15f1e2d11ab1286bea425eaf70aac53d80e226ee.js
malware.news/assets/
150 KB
44 KB
Script
General
Full URL
https://malware.news/assets/pretty-text-bundle-0651e2a797c3ce2e7029301b15f1e2d11ab1286bea425eaf70aac53d80e226ee.js
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
aa7aadbd1349c23ab2ab4bfecc563e091b07aad49739b21fa4a2ed2047fa57c1

Request headers

:path
/assets/pretty-text-bundle-0651e2a797c3ce2e7029301b15f1e2d11ab1286bea425eaf70aac53d80e226ee.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 05 May 2021 19:28:41 GMT
server
cloudflare
age
381470
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=8a98B8MzfRnsgWy83ZxcF17p3NWAvpe8d1JzTFTRnu%2FVeYk1VJ%2B7m9z33D14eAD3YkMVZlQg1EGNnuxoLs4yQrAtY%2Bp%2FqGamre2QH5vhGwMHDgQRBix5j6y3CX7zFA%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript
cache-control
public, max-age=31536000, immutable
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cf-ray
6962cf3bac2e411f-PRG
expires
Sat, 24 Sep 2022 04:10:58 GMT
application-3df47873cd9bb1ffc9f33b03e1c6ae8ca41d140f3208fb6b80353c289123e986.js
malware.news/assets/
3 MB
505 KB
Script
General
Full URL
https://malware.news/assets/application-3df47873cd9bb1ffc9f33b03e1c6ae8ca41d140f3208fb6b80353c289123e986.js
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
dbf6e5a1bdcf7981e49d952fc5e62e36715904a838584c9c7da9a49c62290baf

Request headers

:path
/assets/application-3df47873cd9bb1ffc9f33b03e1c6ae8ca41d140f3208fb6b80353c289123e986.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 05 May 2021 19:30:03 GMT
server
cloudflare
age
381470
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=WMpBQKoi2jGDQaem6eleKOUgbiw%2BUZJsiQ9iqT6FklnahOgCHyQtLsBTGAofhfhjNeB1goUzK47syKf6NGE36sz7QMPaC7xIeJkkMhys3uymoaR7XEGzn%2B32UIiPTQ%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript
cache-control
public, max-age=31536000, immutable
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cf-ray
6962cf3bac2f411f-PRG
expires
Sat, 24 Sep 2022 03:26:48 GMT
discourse-details-9be9806ef2338ede8e5c567dfd5b521aaad27d01694f01c604516118466d2120.js
malware.news/assets/plugins/
1 KB
1011 B
Script
General
Full URL
https://malware.news/assets/plugins/discourse-details-9be9806ef2338ede8e5c567dfd5b521aaad27d01694f01c604516118466d2120.js
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7eedbeb43c93c8d82301cb78609a457a55cec956398be4b7dd6d12f0fac1d516

Request headers

:path
/assets/plugins/discourse-details-9be9806ef2338ede8e5c567dfd5b521aaad27d01694f01c604516118466d2120.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 05 May 2021 19:29:39 GMT
server
cloudflare
age
381469
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=WsdcXsaIDiyGrMzCgJ6E7keDw1WvJw7FOq%2B1LR2otwkXW8HfsblJRjNo7zHUUWnERdwOgpRQThJ4ZqWiRRhA5Wuk6KiNvTXZHWs5PNqcJlwWsaGnxGdEe9l2UhFhNA%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript
cache-control
public, max-age=31536000, immutable
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cf-ray
6962cf3bac30411f-PRG
expires
Sat, 24 Sep 2022 03:26:48 GMT
discourse-local-dates-fb84b6e975839c2af6c7ffe54ef3f37631eb79d1ca4c032e3232c522b202b185.js
malware.news/assets/plugins/
32 KB
9 KB
Script
General
Full URL
https://malware.news/assets/plugins/discourse-local-dates-fb84b6e975839c2af6c7ffe54ef3f37631eb79d1ca4c032e3232c522b202b185.js
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
70f1cbf2697ee3da0fce545369f9ff2394d5a67afb1920b1433dabd5d299c436

Request headers

:path
/assets/plugins/discourse-local-dates-fb84b6e975839c2af6c7ffe54ef3f37631eb79d1ca4c032e3232c522b202b185.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 05 May 2021 19:29:40 GMT
server
cloudflare
age
381470
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=lh7IIxKN9tgPJHUAAdxJsTYSd9Udq0XFqrYdbCScxhWKRlU3gPMfTuVMreGYhwKnu2jPDw4X9Z2ippZxHVdKYAWrU3DeZPfz2DXAvwgpl3iOngaoFUOG%2F53tpQPfIQ%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript
cache-control
public, max-age=31536000, immutable
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cf-ray
6962cf3bac31411f-PRG
expires
Sat, 24 Sep 2022 03:26:48 GMT
discourse-narrative-bot-0b1e40d099d739cee23bbad45c2fb5eac1dcaaba028fdc9fa21b9e32930ec40b.js
malware.news/assets/plugins/
1 KB
1 KB
Script
General
Full URL
https://malware.news/assets/plugins/discourse-narrative-bot-0b1e40d099d739cee23bbad45c2fb5eac1dcaaba028fdc9fa21b9e32930ec40b.js
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a6915794955aa02a862c6286b6ae26b9ad45b49d9a095ecd1c9d1b7f8b498778

Request headers

:path
/assets/plugins/discourse-narrative-bot-0b1e40d099d739cee23bbad45c2fb5eac1dcaaba028fdc9fa21b9e32930ec40b.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 05 May 2021 19:29:40 GMT
server
cloudflare
age
808858
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=v5Vv8K2u2dXLvmTPy5B4I7QsteDmEm9OiUc4aEBPXhXmC23b1jpOkhEjdVEoR9YcB9eaHc5OPHOqPaMb45nnJcgUPyD7wbcnMsJLHLwpLcqE7IAj7oj99Eqqxt58WA%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript
cache-control
public, max-age=31536000, immutable
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cf-ray
6962cf3bac33411f-PRG
expires
Thu, 08 Sep 2022 20:49:06 GMT
discourse-presence-b6fbd1a4370db8cbe9a6026b149f4c857b4f4a71b0f72eefda4a295d0ed6a56a.js
malware.news/assets/plugins/
13 KB
4 KB
Script
General
Full URL
https://malware.news/assets/plugins/discourse-presence-b6fbd1a4370db8cbe9a6026b149f4c857b4f4a71b0f72eefda4a295d0ed6a56a.js
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
5ccf20c77e2159876f53e2e7903140447691cd93ea5fdf38142a34cc37c0a1fa

Request headers

:path
/assets/plugins/discourse-presence-b6fbd1a4370db8cbe9a6026b149f4c857b4f4a71b0f72eefda4a295d0ed6a56a.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 05 May 2021 19:29:41 GMT
server
cloudflare
age
381469
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=8vOMX7VQ2v5WxJtXgGBRp2w3PiG%2FgDpmF%2FwafthXQYPtBet3xg5doRhMGL7B0UVv7y%2BEvjXILXuYLKzEvu2bwilvpgCLd7U9Z9TmprMtvBo9kwoNIIs%2FwKVibeLdzw%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript
cache-control
public, max-age=31536000, immutable
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cf-ray
6962cf3bac34411f-PRG
expires
Sat, 24 Sep 2022 03:26:48 GMT
docker_manager-ad177f91e75af171560e0d79a81bd5ce7b5b01c80c9055a24d75e9370c9de28b.js
malware.news/assets/plugins/
2 KB
1014 B
Script
General
Full URL
https://malware.news/assets/plugins/docker_manager-ad177f91e75af171560e0d79a81bd5ce7b5b01c80c9055a24d75e9370c9de28b.js
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
1daf903ee846f106e08e2a131f4800ffbf8837d227192192e1f00d6fb0a6027f

Request headers

:path
/assets/plugins/docker_manager-ad177f91e75af171560e0d79a81bd5ce7b5b01c80c9055a24d75e9370c9de28b.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 05 May 2021 19:29:41 GMT
server
cloudflare
age
808858
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=FUd5nIZC2TyDub4ehtJfQeAnronP%2Fa3hXtBfmAhZMoY%2BlZhc%2FHis9GgsT97M2Z0b7VoylwpsYTAh3zlkvuVklnqsRitLlGWwOtOns7tBE38%2B1yyM%2FE%2FQUyAdrrVhLg%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript
cache-control
public, max-age=31536000, immutable
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cf-ray
6962cf3bbc3a411f-PRG
expires
Thu, 08 Sep 2022 20:49:06 GMT
lazy-yt-9db193c8caacf2e3b3a24ed4c63699ad497c210f668f467d95380efd00982345.js
malware.news/assets/plugins/
4 KB
2 KB
Script
General
Full URL
https://malware.news/assets/plugins/lazy-yt-9db193c8caacf2e3b3a24ed4c63699ad497c210f668f467d95380efd00982345.js
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
40526df990780061385831eb7143db974cf389583c704c0f986284d2d8d3a0d3

Request headers

:path
/assets/plugins/lazy-yt-9db193c8caacf2e3b3a24ed4c63699ad497c210f668f467d95380efd00982345.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 05 May 2021 19:29:42 GMT
server
cloudflare
age
381469
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=hisz2DLFRg7mVBmk1fswjlm3ZXVjxl8WdeR59WuCSipvHhdUOLm8r%2BfX9gGfmizwS6MHHucQgNlnWnvnBceAJhHEnNWyB2hTPto36BRTv4G0aqKVYF%2Fyh4wcRkYuzg%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript
cache-control
public, max-age=31536000, immutable
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cf-ray
6962cf3bbc3b411f-PRG
expires
Sat, 24 Sep 2022 03:26:48 GMT
poll-4ece327052472a4245ca79c494a4bc3ad9b1f49d921e2df8b00a2299303f04bd.js
malware.news/assets/plugins/
59 KB
16 KB
Script
General
Full URL
https://malware.news/assets/plugins/poll-4ece327052472a4245ca79c494a4bc3ad9b1f49d921e2df8b00a2299303f04bd.js
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
093714378e2e61720fdd442517e5ac12580f7e7231aff8b07fa99cb1a925353d

Request headers

:path
/assets/plugins/poll-4ece327052472a4245ca79c494a4bc3ad9b1f49d921e2df8b00a2299303f04bd.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 05 May 2021 19:29:43 GMT
server
cloudflare
age
381469
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=j8BBs1evHNaC90hgfASmyRM6rwqaL8EXgVrygG7V8zHutwaUi9F8oEWgWtldbJUPCU2EqbtApt8nd%2B5Yq0VrvLP2A1BGgOp6xiEBzcCWEdR1ZRlbss2vsf17jMpUZQ%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript
cache-control
public, max-age=31536000, immutable
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cf-ray
6962cf3bbc3e411f-PRG
expires
Sat, 24 Sep 2022 03:26:48 GMT
google-universal-analytics-v3-706f1d28f0a97f67a47515c96189277240ec4940d968955042066d7873fd1fe8.js
malware.news/assets/
725 B
758 B
Script
General
Full URL
https://malware.news/assets/google-universal-analytics-v3-706f1d28f0a97f67a47515c96189277240ec4940d968955042066d7873fd1fe8.js
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
19089746082c9d1ae6b7fb6e3218eafa4411abffe26412d4d823cb304683c045

Request headers

:path
/assets/google-universal-analytics-v3-706f1d28f0a97f67a47515c96189277240ec4940d968955042066d7873fd1fe8.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 05 May 2021 19:28:54 GMT
server
cloudflare
age
808858
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=e28hb3zCUjObJ9Mr8X%2F3aGPCWypXtnyvcNvLlfr5tC1F7X2DlYvTugUnQgmHQ5HvlbWAFMC5YKaGHFeGfgGjRwqj4Ef1lRIqo5UafgpmNdqNioir0uPS7gzrN2gFtg%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript
cache-control
public, max-age=31536000, immutable
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cf-ray
6962cf3bbc3f411f-PRG
expires
Thu, 08 Sep 2022 20:49:06 GMT
color_definitions_base__1685c93a050ced147a1038a195b8e1dd02483a6a.css
malware.news/stylesheets/
2 KB
2 KB
Stylesheet
General
Full URL
https://malware.news/stylesheets/color_definitions_base__1685c93a050ced147a1038a195b8e1dd02483a6a.css?__ws=malware.news
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0b37d1d5fdce07501dbcf92e59de22bcb3b59cf179c2c4ae85c6b4e53d7a33ac
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/stylesheets/color_definitions_base__1685c93a050ced147a1038a195b8e1dd02483a6a.css?__ws=malware.news
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
text/css,*/*;q=0.1
cache-control
no-cache
sec-fetch-dest
style
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
x-permitted-cross-domain-policies
none
age
808859
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=j0njBzfra5WTXMz9W9iK%2BqSodAPF4nhvs%2F7JFx0LqG9BRdnuo19Kx09bRi%2BWBhW5rE6Ng7eD8iktZqTQMulsTBRBuRvqhnG7dxlavwyQqfOEG3zCuoUTX%2Fg50vJsWw%3D%3D"}],"group":"cf-nel","max_age":604800}
x-discourse-route
stylesheets/show
content-disposition
inline; filename="color_definitions_base__1685c93a050ced147a1038a195b8e1dd02483a6a.css"; filename*=UTF-8''color_definitions_base__1685c93a050ced147a1038a195b8e1dd02483a6a.css
x-xss-protection
1; mode=block
x-request-id
33978470-2af5-402e-880f-8b85781ff79e
referrer-policy
strict-origin-when-cross-origin
last-modified
Wed, 05 May 2021 19:30:23 GMT
server
cloudflare
x-frame-options
SAMEORIGIN
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-download-options
noopen
content-type
text/css
cache-control
public, max-age=31556952, immutable
cf-ray
6962cf3bbc3c411f-PRG
content-transfer-encoding
binary
desktop_787482ef26fe5197f888d4afa236f1d8edce38ec.css
malware.news/stylesheets/
372 KB
67 KB
Stylesheet
General
Full URL
https://malware.news/stylesheets/desktop_787482ef26fe5197f888d4afa236f1d8edce38ec.css?__ws=malware.news
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
8ac752cf3429ed4d1322aaece17556cb40319d80cef682f0ee5cbb9e1438a0fa
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/stylesheets/desktop_787482ef26fe5197f888d4afa236f1d8edce38ec.css?__ws=malware.news
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
text/css,*/*;q=0.1
cache-control
no-cache
sec-fetch-dest
style
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
x-permitted-cross-domain-policies
none
age
381273
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=nb5ALKZhq2C7RcOSq7SmBRcj6AoUo5lARyDoHIXU0HMuaN%2BXrlBOUv77YoVI%2FBdeATNutye9DTPENG63jkU3Mf0REoRbrorURWn7OBwQCM7ozKOEMv9iOVrPxFeMGA%3D%3D"}],"group":"cf-nel","max_age":604800}
x-discourse-route
stylesheets/show
content-disposition
inline; filename="desktop_787482ef26fe5197f888d4afa236f1d8edce38ec.css"; filename*=UTF-8''desktop_787482ef26fe5197f888d4afa236f1d8edce38ec.css
x-xss-protection
1; mode=block
x-request-id
6be91b3d-e918-43f5-93e4-491017d4262b
referrer-policy
strict-origin-when-cross-origin
last-modified
Wed, 05 May 2021 19:30:19 GMT
server
cloudflare
x-frame-options
SAMEORIGIN
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-download-options
noopen
content-type
text/css
cache-control
public, max-age=31556952, immutable
cf-ray
6962cf3bbc3d411f-PRG
content-transfer-encoding
binary
discourse-details_787482ef26fe5197f888d4afa236f1d8edce38ec.css
malware.news/stylesheets/
1 KB
876 B
Stylesheet
General
Full URL
https://malware.news/stylesheets/discourse-details_787482ef26fe5197f888d4afa236f1d8edce38ec.css?__ws=malware.news
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
180110a7a4ac1df81ccd0d022e0929949ba0d85dddf4beb145ea590b86bd9715
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/stylesheets/discourse-details_787482ef26fe5197f888d4afa236f1d8edce38ec.css?__ws=malware.news
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
text/css,*/*;q=0.1
cache-control
no-cache
sec-fetch-dest
style
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
x-permitted-cross-domain-policies
none
age
381469
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=DgkksCmDYVrE7wwOWcs%2FShsdnTQG0oCeF3ywBZ8yFJ%2B4a%2B2Lwm06NDtzEeD5CziJNg5YoodWkO48ob79qrfY93bU%2F%2BPaRFxFx%2FWQSB2FVoDqHcSvrVAoQmGr7%2FJaUA%3D%3D"}],"group":"cf-nel","max_age":604800}
x-discourse-route
stylesheets/show
content-disposition
inline; filename="discourse-details_787482ef26fe5197f888d4afa236f1d8edce38ec.css"; filename*=UTF-8''discourse-details_787482ef26fe5197f888d4afa236f1d8edce38ec.css
x-xss-protection
1; mode=block
x-request-id
2e8f82e9-a75c-4742-8633-d2bae26504c7
referrer-policy
strict-origin-when-cross-origin
last-modified
Wed, 05 May 2021 19:30:23 GMT
server
cloudflare
x-frame-options
SAMEORIGIN
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-download-options
noopen
content-type
text/css
cache-control
public, max-age=31556952, immutable
cf-ray
6962cf3bbc40411f-PRG
content-transfer-encoding
binary
discourse-local-dates_787482ef26fe5197f888d4afa236f1d8edce38ec.css
malware.news/stylesheets/
7 KB
2 KB
Stylesheet
General
Full URL
https://malware.news/stylesheets/discourse-local-dates_787482ef26fe5197f888d4afa236f1d8edce38ec.css?__ws=malware.news
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
6ba10e33fc40749d8e0a6e2ab2f0271c2bc89f8aca0c4432000456d2a9912ea9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/stylesheets/discourse-local-dates_787482ef26fe5197f888d4afa236f1d8edce38ec.css?__ws=malware.news
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
text/css,*/*;q=0.1
cache-control
no-cache
sec-fetch-dest
style
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
x-permitted-cross-domain-policies
none
age
808859
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=DrQ3oaolxPcW%2BJeywwBFfV1PNndnUsgx8zhf4P5IHlCfF2Uy0Yrxf4%2BB%2Ffi8pC%2B%2B1IoNG3zaeKNY8zvGb3Q%2Fi1972wRpmPXw8e84NDCG4%2FhRSYIXW9N0moUtlw4l6g%3D%3D"}],"group":"cf-nel","max_age":604800}
x-discourse-route
stylesheets/show
content-disposition
inline; filename="discourse-local-dates_787482ef26fe5197f888d4afa236f1d8edce38ec.css"; filename*=UTF-8''discourse-local-dates_787482ef26fe5197f888d4afa236f1d8edce38ec.css
x-xss-protection
1; mode=block
x-request-id
ebce8f8c-4f93-4a7c-a6f7-d272c5248396
referrer-policy
strict-origin-when-cross-origin
last-modified
Wed, 05 May 2021 19:30:23 GMT
server
cloudflare
x-frame-options
SAMEORIGIN
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-download-options
noopen
content-type
text/css
cache-control
public, max-age=31556952, immutable
cf-ray
6962cf3bbc41411f-PRG
content-transfer-encoding
binary
discourse-narrative-bot_787482ef26fe5197f888d4afa236f1d8edce38ec.css
malware.news/stylesheets/
153 B
832 B
Stylesheet
General
Full URL
https://malware.news/stylesheets/discourse-narrative-bot_787482ef26fe5197f888d4afa236f1d8edce38ec.css?__ws=malware.news
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
003c3d882b326d441cae76648a6510f6c8404353de5d54e76883a2fb61b6cdd1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/stylesheets/discourse-narrative-bot_787482ef26fe5197f888d4afa236f1d8edce38ec.css?__ws=malware.news
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
text/css,*/*;q=0.1
cache-control
no-cache
sec-fetch-dest
style
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
x-permitted-cross-domain-policies
none
age
381469
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=O98S53IxrBLP%2F3W3wr8jvzKKL4hzCxBYFbsqnKpQ9b%2B6oYpwmMoqKy3t1jZP1WQ%2FsX1D6CSLILeiOlcZrsRB%2BJzZ3kfzwGhLnjQZnpx8vDc2LeZ7lLvYjJvmlYH4zA%3D%3D"}],"group":"cf-nel","max_age":604800}
x-discourse-route
stylesheets/show
content-disposition
inline; filename="discourse-narrative-bot_787482ef26fe5197f888d4afa236f1d8edce38ec.css"; filename*=UTF-8''discourse-narrative-bot_787482ef26fe5197f888d4afa236f1d8edce38ec.css
x-xss-protection
1; mode=block
x-request-id
6094f314-831a-4c1f-b17b-d8118e27dcde
referrer-policy
strict-origin-when-cross-origin
last-modified
Wed, 05 May 2021 19:30:23 GMT
server
cloudflare
x-frame-options
SAMEORIGIN
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-download-options
noopen
content-type
text/css
cache-control
public, max-age=31556952, immutable
cf-ray
6962cf3bbc42411f-PRG
content-transfer-encoding
binary
discourse-presence_787482ef26fe5197f888d4afa236f1d8edce38ec.css
malware.news/stylesheets/
1 KB
1 KB
Stylesheet
General
Full URL
https://malware.news/stylesheets/discourse-presence_787482ef26fe5197f888d4afa236f1d8edce38ec.css?__ws=malware.news
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
8d814ada502cfca69414ee2168f70cc98bdf53153a31b47548c0be6d75c5c046
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/stylesheets/discourse-presence_787482ef26fe5197f888d4afa236f1d8edce38ec.css?__ws=malware.news
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
text/css,*/*;q=0.1
cache-control
no-cache
sec-fetch-dest
style
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
x-permitted-cross-domain-policies
none
age
381470
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=vn0X6fcSqX91nYcM05MZkflDPbw%2BUaqrfahR6lCMxcp0ycFVPiPY3cB%2FfEBQYiJbqBeNGJb7KmxOPMSvWj38cyh0rQbfumLspoMUL648WI29cLNVTYEOyeagzh9m4w%3D%3D"}],"group":"cf-nel","max_age":604800}
x-discourse-route
stylesheets/show
content-disposition
inline; filename="discourse-presence_787482ef26fe5197f888d4afa236f1d8edce38ec.css"; filename*=UTF-8''discourse-presence_787482ef26fe5197f888d4afa236f1d8edce38ec.css
x-xss-protection
1; mode=block
x-request-id
2fe42929-3c2f-4e3d-8307-0e45e99ce873
referrer-policy
strict-origin-when-cross-origin
last-modified
Wed, 05 May 2021 19:30:23 GMT
server
cloudflare
x-frame-options
SAMEORIGIN
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-download-options
noopen
content-type
text/css
cache-control
public, max-age=31556952, immutable
cf-ray
6962cf3bbc43411f-PRG
content-transfer-encoding
binary
lazy-yt_787482ef26fe5197f888d4afa236f1d8edce38ec.css
malware.news/stylesheets/
2 KB
1 KB
Stylesheet
General
Full URL
https://malware.news/stylesheets/lazy-yt_787482ef26fe5197f888d4afa236f1d8edce38ec.css?__ws=malware.news
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
9bc63a02041e3cbc9365d2a70224f9c22ca5e31897e72e0b3cb620259250a556
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/stylesheets/lazy-yt_787482ef26fe5197f888d4afa236f1d8edce38ec.css?__ws=malware.news
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
text/css,*/*;q=0.1
cache-control
no-cache
sec-fetch-dest
style
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
x-permitted-cross-domain-policies
none
age
808859
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=g3j5i7JzTPg4bo9Otqdy%2F0PhrlD%2B8iMP9yJr05YXyl7ZrsXl2J%2BHbRfHnP6cUrWk5wwWfEGYy6dywX4YPKwdpOb1zVCppMHUi%2BVw7w%2B4zHPTPt4advPlfWLdMDn9Pg%3D%3D"}],"group":"cf-nel","max_age":604800}
x-discourse-route
stylesheets/show
content-disposition
inline; filename="lazy-yt_787482ef26fe5197f888d4afa236f1d8edce38ec.css"; filename*=UTF-8''lazy-yt_787482ef26fe5197f888d4afa236f1d8edce38ec.css
x-xss-protection
1; mode=block
x-request-id
557fb9e0-208a-49e8-93c1-4b0a6d7b7f1f
referrer-policy
strict-origin-when-cross-origin
last-modified
Wed, 05 May 2021 19:30:23 GMT
server
cloudflare
x-frame-options
SAMEORIGIN
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-download-options
noopen
content-type
text/css
cache-control
public, max-age=31556952, immutable
cf-ray
6962cf3bbc44411f-PRG
content-transfer-encoding
binary
poll_787482ef26fe5197f888d4afa236f1d8edce38ec.css
malware.news/stylesheets/
6 KB
2 KB
Stylesheet
General
Full URL
https://malware.news/stylesheets/poll_787482ef26fe5197f888d4afa236f1d8edce38ec.css?__ws=malware.news
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
5dc2f3f0b6682457b113ec4e3641049d51488e18deaa8185831f4973cb57f97e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/stylesheets/poll_787482ef26fe5197f888d4afa236f1d8edce38ec.css?__ws=malware.news
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
text/css,*/*;q=0.1
cache-control
no-cache
sec-fetch-dest
style
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
x-permitted-cross-domain-policies
none
age
808859
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=g5gTJAWQSG%2BjwjMXimGhDEHY66bRWl48WIYRaA42CwouwIf77jagxjnUKaCWcvCk3vozEYc4xwlTeFCXZ1teYDKLWeD1%2BWG8a5JgWAU9LMa7vLFjN04Uss6P%2B0lzbA%3D%3D"}],"group":"cf-nel","max_age":604800}
x-discourse-route
stylesheets/show
content-disposition
inline; filename="poll_787482ef26fe5197f888d4afa236f1d8edce38ec.css"; filename*=UTF-8''poll_787482ef26fe5197f888d4afa236f1d8edce38ec.css
x-xss-protection
1; mode=block
x-request-id
233d46e7-d762-46d1-9a50-a0d1f682df2d
referrer-policy
strict-origin-when-cross-origin
last-modified
Wed, 05 May 2021 19:30:23 GMT
server
cloudflare
x-frame-options
SAMEORIGIN
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-download-options
noopen
content-type
text/css
cache-control
public, max-age=31556952, immutable
cf-ray
6962cf3bbc45411f-PRG
content-transfer-encoding
binary
poll_desktop_787482ef26fe5197f888d4afa236f1d8edce38ec.css
malware.news/stylesheets/
2 KB
1 KB
Stylesheet
General
Full URL
https://malware.news/stylesheets/poll_desktop_787482ef26fe5197f888d4afa236f1d8edce38ec.css?__ws=malware.news
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
430ac06a9912729cedf0e6c618b7ad7d8c1a7623b380b60312dd17b0037f36ce
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/stylesheets/poll_desktop_787482ef26fe5197f888d4afa236f1d8edce38ec.css?__ws=malware.news
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
text/css,*/*;q=0.1
cache-control
no-cache
sec-fetch-dest
style
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
x-permitted-cross-domain-policies
none
age
381273
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=jUveT6JSwTxzq87fxQXJZt3GMljzFvaf5xknjLzxmZGKGqZ9fsrH4sfQ%2Fo9rcNQVFrdQQbreonFJ%2Be3%2BaeS7g%2BcAMabzpOxmvsg1e1vX5dP3s2B5P655ZT%2BbXCEoDw%3D%3D"}],"group":"cf-nel","max_age":604800}
x-discourse-route
stylesheets/show
content-disposition
inline; filename="poll_desktop_787482ef26fe5197f888d4afa236f1d8edce38ec.css"; filename*=UTF-8''poll_desktop_787482ef26fe5197f888d4afa236f1d8edce38ec.css
x-xss-protection
1; mode=block
x-request-id
c1eabbf0-f9b1-4e83-a978-efb98730ff51
referrer-policy
strict-origin-when-cross-origin
last-modified
Wed, 05 May 2021 19:30:23 GMT
server
cloudflare
x-frame-options
SAMEORIGIN
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-download-options
noopen
content-type
text/css
cache-control
public, max-age=31556952, immutable
cf-ray
6962cf3bbc46411f-PRG
content-transfer-encoding
binary
desktop_theme_2_1eb7402e0a8095456972b2383753bd3ab76231e8.css
malware.news/stylesheets/
90 B
667 B
Stylesheet
General
Full URL
https://malware.news/stylesheets/desktop_theme_2_1eb7402e0a8095456972b2383753bd3ab76231e8.css?__ws=malware.news
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
70295e23173942999f6560f098b372fb27ad0de5bc1a1e195c6ef5af18dfc856
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/stylesheets/desktop_theme_2_1eb7402e0a8095456972b2383753bd3ab76231e8.css?__ws=malware.news
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
text/css,*/*;q=0.1
cache-control
no-cache
sec-fetch-dest
style
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
x-permitted-cross-domain-policies
none
age
381273
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=Dqik%2FrOmY9O%2BLVT1gIO7S072se7CjVceE00ol0i1bgxX126Z0QJIZG4y9GuDuJwq%2FiQhijSVvjn1oa3bYbZcsJp8DgM%2Frkai5aWvSOlnppcxWQh9E29fKX9tM9ahFQ%3D%3D"}],"group":"cf-nel","max_age":604800}
x-discourse-route
stylesheets/show
content-disposition
inline; filename="desktop_theme_2_1eb7402e0a8095456972b2383753bd3ab76231e8.css"; filename*=UTF-8''desktop_theme_2_1eb7402e0a8095456972b2383753bd3ab76231e8.css
x-xss-protection
1; mode=block
x-request-id
b9123ac1-6f40-4eb5-99b9-f33be4cf3691
referrer-policy
strict-origin-when-cross-origin
last-modified
Wed, 05 May 2021 19:30:21 GMT
server
cloudflare
x-frame-options
SAMEORIGIN
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-download-options
noopen
content-type
text/css
cache-control
public, max-age=31556952, immutable
cf-ray
6962cf3bbc47411f-PRG
content-transfer-encoding
binary
start-discourse-efa4e5abfbd1b50b5152ffbe64d5dcea9f7c33f766dcc6387e2711f0f2112148.js
malware.news/assets/
135 B
452 B
Script
General
Full URL
https://malware.news/assets/start-discourse-efa4e5abfbd1b50b5152ffbe64d5dcea9f7c33f766dcc6387e2711f0f2112148.js
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
36e56ff433d1e7c0017688ed51d42dea37fc7a90431b54d4568df80746ed349b

Request headers

:path
/assets/start-discourse-efa4e5abfbd1b50b5152ffbe64d5dcea9f7c33f766dcc6387e2711f0f2112148.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 05 May 2021 19:28:54 GMT
server
cloudflare
age
381469
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=Fcl99QN%2BKa8c4m%2FNNF1LgcDTk0KKqDfDqaSs2qRfE%2FMo9F6SdBIoL6KNCnOTEXFtV5JDUBasYRSePGs6bL5cqvbQ%2BV%2BSOt6BLa8CBtIq2lvOeFm2R8l3U5de1h4IyQ%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript
cache-control
public, max-age=31536000, immutable
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cf-ray
6962cf3bbc48411f-PRG
expires
Sat, 24 Sep 2022 03:26:48 GMT
browser-update-eec13eb6f8386f18f10b5dd6ebb7a3598d28421bb796e539b91a7e4a4c5d4c08.js
malware.news/assets/
2 KB
1 KB
Script
General
Full URL
https://malware.news/assets/browser-update-eec13eb6f8386f18f10b5dd6ebb7a3598d28421bb796e539b91a7e4a4c5d4c08.js
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a933fa87d48ac7c2f381036d364fa92767c5dae738491b16aa668671abc23442

Request headers

:path
/assets/browser-update-eec13eb6f8386f18f10b5dd6ebb7a3598d28421bb796e539b91a7e4a4c5d4c08.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 05 May 2021 19:28:24 GMT
server
cloudflare
age
381469
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=mdEn8s8P6XN0n9PBXN0YmIBlowMlCuKCgAiDnAJ392Ha%2BsmHPhHioJ2ePZd2KStD68G9sMJcGELvfFuW4zdr5Uu1SAhgoL2JnAH3Sz8PwII6ZvJwna52ePk5OcpjMQ%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript
cache-control
public, max-age=31536000, immutable
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cf-ray
6962cf3bbc49411f-PRG
expires
Sat, 24 Sep 2022 03:26:48 GMT
analytics.js
www.google-analytics.com/
48 KB
20 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: malware.news
URL: https://malware.news/assets/google-universal-analytics-v3-706f1d28f0a97f67a47515c96189277240ec4940d968955042066d7873fd1fe8.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
142.250.184.238 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s12-in-f14.1e100.net
Software
Golfe2 /
Resource Hash
fd222137f245c06ddb4c4d44db41f12138dad6cf8ef5d4d4a5e500f38f0c8c62
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 11 Aug 2021 00:32:57 GMT
server
Golfe2
age
2201
date
Wed, 29 Sep 2021 04:52:00 GMT
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=7200
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
19747
expires
Wed, 29 Sep 2021 06:52:00 GMT
svg-2-9b0d85c163090ed00004e0abb5db8bd226e57ab5.js
malware.news/svg-sprite/malware.news/
114 KB
37 KB
Script
General
Full URL
https://malware.news/svg-sprite/malware.news/svg-2-9b0d85c163090ed00004e0abb5db8bd226e57ab5.js
Requested by
Host: malware.news
URL: https://malware.news/assets/application-3df47873cd9bb1ffc9f33b03e1c6ae8ca41d140f3208fb6b80353c289123e986.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
dd8eb5f29381950bd2d56653f3a9aeb82ca7b0bcbadc5903d48f335d1a0f0fa7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/svg-sprite/malware.news/svg-2-9b0d85c163090ed00004e0abb5db8bd226e57ab5.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
x-permitted-cross-domain-policies
none
age
808858
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=dDml1QhGtu41sfr1bHguUPDyfL8l9gvX%2FsRd0VNu4ZQcVMyzn0EjfIRdwNosvfX%2BS6NZQCnxP6NKsVN6VrIvhB50LsHgwE6mTIkckObvvI1G58jDKM%2FMzYwQLbPvxg%3D%3D"}],"group":"cf-nel","max_age":604800}
x-discourse-route
svg_sprite/show
x-xss-protection
1; mode=block
x-request-id
70d8a993-725c-496e-bbb0-31e3649c84ac
referrer-policy
strict-origin-when-cross-origin
last-modified
Thu, 05 May 2011 19:32:04 GMT
server
cloudflare
x-frame-options
SAMEORIGIN
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding Accept
x-download-options
noopen
content-type
application/javascript; charset=utf-8
cache-control
public, max-age=31556952, immutable
cf-ray
6962cf3d1cfb411f-PRG
jquery.magnific-popup.min.js
malware.news/javascripts/magnific-popup/1.1.0/
20 KB
8 KB
Script
General
Full URL
https://malware.news/javascripts/magnific-popup/1.1.0/jquery.magnific-popup.min.js
Requested by
Host: malware.news
URL: https://malware.news/assets/application-3df47873cd9bb1ffc9f33b03e1c6ae8ca41d140f3208fb6b80353c289123e986.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3fddc6d28aba3c13d64cfd4847c333ff48c71d4a5a58bd1a0494ca6ae8ac1bb4

Request headers

:path
/javascripts/magnific-popup/1.1.0/jquery.magnific-popup.min.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 05 May 2021 19:25:04 GMT
server
cloudflare
age
37144
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=GDbZXqGw6FEVr35WwuhzO2dj0%2BdVQRrVrhmySvB9d3I0MGSH1WPe%2FCh3Ff84ZE4PHSGzGcreVyD7S3q0745AncLCviqL7wQ51djfKIolmur5TZlpx9nzJQuO54C%2Fww%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=86400, immutable
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cf-ray
6962cf3e2d60411f-PRG
expires
Tue, 28 Sep 2021 21:42:30 GMT
cdefff4af52a8d2d43094b5d57ebca1fc7613a63.js
malware.news/highlight-js/malware.news/
202 KB
40 KB
Script
General
Full URL
https://malware.news/highlight-js/malware.news/cdefff4af52a8d2d43094b5d57ebca1fc7613a63.js
Requested by
Host: malware.news
URL: https://malware.news/assets/application-3df47873cd9bb1ffc9f33b03e1c6ae8ca41d140f3208fb6b80353c289123e986.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
439310fe70c9254ca886a5848ab84ece7a2d0b9f1d7eb654e35ee1af86b1d0d9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/highlight-js/malware.news/cdefff4af52a8d2d43094b5d57ebca1fc7613a63.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
x-permitted-cross-domain-policies
none
age
808857
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=MN8TL8AmKwDsmF0W%2FzNHjzgwVcfcemgG2h55MxuuGJPVI5MWhYSRrIoPem9h2E270n%2BYzMwWPg8P7dyNkzErm31CTNye8B3gGm846RMtwesDkSmldESmCDgQEeNTqQ%3D%3D"}],"group":"cf-nel","max_age":604800}
x-discourse-route
highlight_js/show
x-xss-protection
1; mode=block
x-request-id
0b32e47e-9584-4ad5-a1bc-fb98ddf65145
referrer-policy
strict-origin-when-cross-origin
last-modified
Sat, 13 Aug 2011 11:48:50 GMT
server
cloudflare
x-frame-options
SAMEORIGIN
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding Accept
x-download-options
noopen
content-type
application/javascript; charset=utf-8
cache-control
public, max-age=31556952, immutable
cf-ray
6962cf3e2d61411f-PRG
ba8ee0a927a69022c651441ac23d01bcdbc09785.png
malware.news/uploads/default/original/3X/b/a/
9 KB
9 KB
Image
General
Full URL
https://malware.news/uploads/default/original/3X/b/a/ba8ee0a927a69022c651441ac23d01bcdbc09785.png
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
041dc75fa9294876d29e6d78e76c9f7f3202f1763480da93d6ce2414d0a095c3

Request headers

:path
/uploads/default/original/3X/b/a/ba8ee0a927a69022c651441ac23d01bcdbc09785.png
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
age
381468
content-length
8758
last-modified
Sat, 22 Dec 2018 04:38:37 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=ryzuT2xoy0%2F80HlgAvVL3PqkyaJNnLI0mqxSJYXqJPk7B3INUxpeGsJsGMVZ68%2FwukyIl720NgZPZjaQlAVESyj9S4uFNqear%2BFhKkD%2Bbd6v9ivy03AJ%2Fv1xrp%2FpQA%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=31536000
accept-ranges
bytes
cf-ray
6962cf3e6d85411f-PRG
expires
Sat, 24 Sep 2022 03:26:53 GMT
24_2.png
malware.news/user_avatar/malware.news/malbot/45/
4 KB
5 KB
Image
General
Full URL
https://malware.news/user_avatar/malware.news/malbot/45/24_2.png
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7e6dbcb4fa67139ef1bfb019ef153f21b130a1f68f7d5bbe3c15033c14342ff7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/user_avatar/malware.news/malbot/45/24_2.png
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
GET
Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:41 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
x-permitted-cross-domain-policies
none
age
381272
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=jgt9AvIv7v%2Bmm%2FI1jHh%2FJkN%2BXF24NZSMn0WX%2FMB707dJsHzRmN5BiW1rtd1rflt0iyRNInZUHa2l2xvaTnK6ADwZEESpIOl4ljc8jY1gmdKV1SX%2BMJc5ZmNBpZ0Mfg%3D%3D"}],"group":"cf-nel","max_age":604800}
x-discourse-route
user_avatars/show
content-length
4324
x-xss-protection
1; mode=block
referrer-policy
strict-origin-when-cross-origin
last-modified
Wed, 05 May 2021 19:25:09 GMT
server
cloudflare
x-frame-options
SAMEORIGIN
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-download-options
noopen
content-type
image/jpeg
cache-control
public, max-age=31556952, immutable
accept-ranges
bytes
cf-ray
6962cf3e6d86411f-PRG
content-transfer-encoding
binary
cf-bgj
h2pri
truncated
/
37 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
bb229a48bee31f5d54ca12dc9bd960c63a671f0d4be86a054c1d324a44499d96

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Content-Type
image/gif
Figure-2-1-1024x521.png
therecord.media/wp-content/uploads/2021/09/
122 KB
123 KB
Image
General
Full URL
https://therecord.media/wp-content/uploads/2021/09/Figure-2-1-1024x521.png
Requested by
Host: malware.news
URL: https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.18.6.33 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
f5da923db15583d2ff41dae9fb91699f0197fd3fb67bedd5b3dfc7856ba54545
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://malware.news/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Wed, 29 Sep 2021 05:28:42 GMT
via
1.1 varnish, 1.1 varnish
cf-cache-status
HIT
age
55488
x-pantheon-styx-hostname
styx-fe2-a-6b6d6f77d6-hws4p
x-cache
MISS, HIT
strict-transport-security
max-age=31536000; includeSubDomains
content-length
125086
x-served-by
cache-mdw17334-MDW, cache-bwi5044-BWI
last-modified
Tue, 28 Sep 2021 12:19:47 GMT
server
cloudflare
x-timer
S1632837835.526708,VS0,VE2
etag
"61530863-1e89e"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
x-styx-req-id
a1ec7393-2064-11ec-987a-76bbec8dee9e
expires
Fri, 30 Sep 2022 05:28:42 GMT
cache-control
public, max-age=31622400
accept-ranges
bytes
cf-ray
6962cf3eecdc535d-FRA
x-cache-hits
0, 1
Figure-1-1-1024x505.png
www-therecord.recfut.com/wp-content/uploads/2021/09/
0
0

collect
www.google-analytics.com/j/
2 B
205 B
XHR
General
Full URL
https://www.google-analytics.com/j/collect?v=1&_v=j93&a=1489429571&t=pageview&_s=1&dl=https%3A%2F%2Fmalware.news%2Ft%2Fsuspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider%2F53111&dp=%2Ft%2Fsuspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider%2F53111&ul=en-us&de=UTF-8&dt=Suspected%20Chinese%20state-linked%20threat%20actors%20infiltrated%20major%20Afghan%20telecom%20provider%20-%20Malware%20News%20-%20Malware%20Analysis%2C%20News%20and%20Indicators&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=IEBAAEABAAAAAC~&jid=900039089&gjid=70865619&cid=1114020156.1632893322&tid=UA-79191654-1&_gid=990731591.1632893322&_r=1&_slc=1&z=294590649
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
142.250.184.238 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s12-in-f14.1e100.net
Software
Golfe2 /
Resource Hash
a048e640908046be06e00eab37742b5d5ff80964af58cfd22f7cb2de4dfe375f
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://malware.news/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Wed, 29 Sep 2021 05:28:42 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
content-type
text/plain
access-control-allow-origin
https://malware.news
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2
expires
Fri, 01 Jan 1990 00:00:00 GMT
poll
malware.news/message-bus/fac5ba0f8a1444d7ba6bb493e9bf5be1/
266 B
0
XHR
General
Full URL
https://malware.news/message-bus/fac5ba0f8a1444d7ba6bb493e9bf5be1/poll
Requested by
Host: malware.news
URL: https://malware.news/assets/ember_jquery-36a23101c869ab0dc53fc908de69adb785731593573d32bdeef416acc1076ef4.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.26.7.105 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

sec-fetch-mode
cors
origin
https://malware.news
accept-encoding
gzip, deflate, br
x-csrf-token
undefined
accept-language
de-DE,de;q=0.9
x-silence-logger
true
sec-fetch-dest
empty
x-requested-with
XMLHttpRequest
cookie
_ga=GA1.2.1114020156.1632893322; _gid=GA1.2.990731591.1632893322; _gat=1
content-length
234
:path
/message-bus/fac5ba0f8a1444d7ba6bb493e9bf5be1/poll
pragma
no-cache
discourse-present
true
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
content-type
application/x-www-form-urlencoded; charset=UTF-8
accept
text/plain, */*; q=0.01
cache-control
no-cache
:authority
malware.news
referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
:scheme
https
sec-fetch-site
same-origin
:method
POST
Discourse-Present
true
X-CSRF-Token
undefined
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8
X-SILENCE-LOGGER
true
Accept
text/plain, */*; q=0.01
Referer
https://malware.news/t/suspected-chinese-state-linked-threat-actors-infiltrated-major-afghan-telecom-provider/53111
X-Requested-With
XMLHttpRequest

Response headers

date
Wed, 29 Sep 2021 05:28:42 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
DYNAMIC
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
access-control-allow-methods
GET, POST
pragma
no-cache
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=vFWRf8vKY8fwOn7s2Evzp3SF1cSZouiWp0%2FfL8Al67iJOTzu9CWrR%2BSF4bXlutxBcJkoSAopl2Ft%2BgM58O0IdPbcat2p%2Bf7qY7%2Bxp3m5Hl%2F40k9J5CE3aA%2Bt3TtwxQ%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
text/plain; charset=utf-8
access-control-allow-origin
https://malware.news
cache-control
must-revalidate, private, max-age=0
cf-ray
6962cf405e64411f-PRG
access-control-allow-headers
X-SILENCE-LOGGER, X-Shared-Session-Key, Dont-Chunk, Discourse-Present
expires
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
www-therecord.recfut.com
URL
https://www-therecord.recfut.com/wp-content/uploads/2021/09/Figure-1-1-1024x505.png

Verdicts & Comments Add Verdict or Comment

44 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect boolean| originAgentCluster object| I18n object| MessageFormat function| moment function| define function| requirejs object| ENV object| EmberENV function| $ function| jQuery object| mainContext object| Ember object| Em function| require function| requireModule object| Markdown object| bootbox object| clone object| Logster object| Handlebars object| MessageBus object| Popper function| _ function| Mousetrap object| RSVP object| BufferedProxy string| __INDIVIDUAL_ONE_VERSION_ev-store_ENFORCE_SINGLETON undefined| __INDIVIDUAL_ONE_VERSION_ev-store object| virtualDom function| filterCSS function| filterXSS function| __t object| __DISCOURSE_RAW_TEMPLATES object| Discourse object| __widget_helpers string| GoogleAnalyticsObject function| ga undefined| $bu object| google_tag_data object| gaplugins object| gaGlobal object| gaData object| hljs

3 Cookies

Domain/Path Name / Value
.malware.news/ Name: _ga
Value: GA1.2.1114020156.1632893322
.malware.news/ Name: _gid
Value: GA1.2.990731591.1632893322
.malware.news/ Name: _gat
Value: 1

1 Console Messages

Source Level URL
Text
network error URL: https://www-therecord.recfut.com/wp-content/uploads/2021/09/Figure-1-1-1024x505.png
Message:
Failed to load resource: net::ERR_NAME_NOT_RESOLVED

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy base-uri 'none'; object-src 'none'; script-src https://malware.news/logs/ https://malware.news/sidekiq/ https://malware.news/mini-profiler-resources/ https://malware.news/assets/ https://malware.news/brotli_asset/ https://malware.news/extra-locales/ https://malware.news/highlight-js/ https://malware.news/javascripts/ https://malware.news/plugins/ https://malware.news/theme-javascripts/ https://malware.news/svg-sprite/ https://www.google-analytics.com/analytics.js; worker-src 'self' https://malware.news/assets/ https://malware.news/brotli_asset/ https://malware.news/javascripts/ https://malware.news/plugins/
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

malware.news
therecord.media
www-therecord.recfut.com
www.google-analytics.com
www-therecord.recfut.com
104.18.6.33
104.26.7.105
142.250.184.238
003c3d882b326d441cae76648a6510f6c8404353de5d54e76883a2fb61b6cdd1
041dc75fa9294876d29e6d78e76c9f7f3202f1763480da93d6ce2414d0a095c3
093714378e2e61720fdd442517e5ac12580f7e7231aff8b07fa99cb1a925353d
0aec34f9f71dec9af6653c17f49ed04714182f78dca5d30e76db883cbd903b41
0b37d1d5fdce07501dbcf92e59de22bcb3b59cf179c2c4ae85c6b4e53d7a33ac
180110a7a4ac1df81ccd0d022e0929949ba0d85dddf4beb145ea590b86bd9715
19089746082c9d1ae6b7fb6e3218eafa4411abffe26412d4d823cb304683c045
1ab3d376b5d18228e95af2f61f4ea5ee12a4200177969694c347048fb41c9b7c
1daf903ee846f106e08e2a131f4800ffbf8837d227192192e1f00d6fb0a6027f
36e56ff433d1e7c0017688ed51d42dea37fc7a90431b54d4568df80746ed349b
3fddc6d28aba3c13d64cfd4847c333ff48c71d4a5a58bd1a0494ca6ae8ac1bb4
40526df990780061385831eb7143db974cf389583c704c0f986284d2d8d3a0d3
430ac06a9912729cedf0e6c618b7ad7d8c1a7623b380b60312dd17b0037f36ce
439310fe70c9254ca886a5848ab84ece7a2d0b9f1d7eb654e35ee1af86b1d0d9
5ccf20c77e2159876f53e2e7903140447691cd93ea5fdf38142a34cc37c0a1fa
5dc2f3f0b6682457b113ec4e3641049d51488e18deaa8185831f4973cb57f97e
6ba10e33fc40749d8e0a6e2ab2f0271c2bc89f8aca0c4432000456d2a9912ea9
70295e23173942999f6560f098b372fb27ad0de5bc1a1e195c6ef5af18dfc856
70f1cbf2697ee3da0fce545369f9ff2394d5a67afb1920b1433dabd5d299c436
7e6dbcb4fa67139ef1bfb019ef153f21b130a1f68f7d5bbe3c15033c14342ff7
7eedbeb43c93c8d82301cb78609a457a55cec956398be4b7dd6d12f0fac1d516
8ac752cf3429ed4d1322aaece17556cb40319d80cef682f0ee5cbb9e1438a0fa
8d814ada502cfca69414ee2168f70cc98bdf53153a31b47548c0be6d75c5c046
9487cb559d6168d8f29a5684b10a9c253776e7280ea758f332902773d85367e5
9bc63a02041e3cbc9365d2a70224f9c22ca5e31897e72e0b3cb620259250a556
a048e640908046be06e00eab37742b5d5ff80964af58cfd22f7cb2de4dfe375f
a6915794955aa02a862c6286b6ae26b9ad45b49d9a095ecd1c9d1b7f8b498778
a933fa87d48ac7c2f381036d364fa92767c5dae738491b16aa668671abc23442
aa7aadbd1349c23ab2ab4bfecc563e091b07aad49739b21fa4a2ed2047fa57c1
b64d6f3b3fafe479610cfa9b4b86fcef473ba7d0dfc5f68c8e9de52ed4774075
bb229a48bee31f5d54ca12dc9bd960c63a671f0d4be86a054c1d324a44499d96
dbf6e5a1bdcf7981e49d952fc5e62e36715904a838584c9c7da9a49c62290baf
dd8eb5f29381950bd2d56653f3a9aeb82ca7b0bcbadc5903d48f335d1a0f0fa7
f25487aa53b51b4c355c8c8dcfe481294a929e8e6c8ab3f4c1b0d84115803fb5
f5da923db15583d2ff41dae9fb91699f0197fd3fb67bedd5b3dfc7856ba54545
fd222137f245c06ddb4c4d44db41f12138dad6cf8ef5d4d4a5e500f38f0c8c62