Report Overview

  1. Visited public
    2025-04-13 20:32:05
    Tags
    Submit Tags
  2. URL

    www.volexity.com/blog/2021/05/27/suspected-apt29-operation-launches-election-fraud-themed-phishing-campaigns/

  3. Finishing URL

    www.volexity.com/blog/2021/05/27/suspected-apt29-operation-launches-election-fraud-themed-phishing-campaigns/

  4. IP / ASN
    172.67.71.52

    #13335 CLOUDFLARENET

    Title
    Suspected APT29 Operation Launches Election Fraud Themed Phishing Campaigns | Volexity
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
4

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
www.volexity.comunknown2013-07-292014-09-252025-03-19
fonts.gstatic.comunknown2008-02-112014-04-022025-04-09
fonts.googleapis.com88772005-01-252012-05-232025-04-09
www.googletagmanager.com752011-11-112012-10-042025-04-09
static.cloudflareinsights.com12942019-08-302019-09-242025-04-09

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumwww.volexity.com/blog/2021/05/27/suspected-apt29-operation-launches-election-fraud-themed-phishing-campaigns/A loader for the CobaltStrike malware family, which ultimately takes the first and second bytes of an embedded file, and flips them prior to executing the resulting payload.
mediumwww.volexity.com/blog/2021/05/27/suspected-apt29-operation-launches-election-fraud-themed-phishing-campaigns/The FRESHFIRE malware family. The malware acts as a downloader, pulling down an encrypted snippet of code from a remote source, executing it, and deleting it from the remote server.

OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


JavaScript (7)

HTTP Transactions (29)

URLIPResponseSize
GET www.volexity.com/wp-includes/css/dist/block-library/style.min.css?ver=6.7
104.26.7.38200 OK115 kB
GET www.volexity.com/wp-content/plugins/cookie-notice/js/front.min.js?ver=2.4.18
104.26.7.38200 OK8.7 kB
GET www.volexity.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1
104.26.7.38200 OK14 kB
GET fonts.gstatic.com/s/opensans/v40/memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
142.250.74.3200 OK48 kB
GET www.volexity.com/wp-content/themes/volexity/fonts/fa-brands-400.woff2
104.26.7.38200 OK108 kB
POST www.volexity.com/cdn-cgi/rum?
104.26.7.38204 No Content0 B
GET www.volexity.com/blog/2021/05/27/suspected-apt29-operation-launches-election-fraud-themed-phishing-campaigns/
104.26.7.38200 OK76 kB
GET fonts.googleapis.com/css?family=Source+Sans+Pro:300,400,400i,500,700,700i|Roboto+Condensed:400,500|Roboto:400,300,500|Roboto+Slab:300,500,400|Open+Sans:400,600,700
142.250.178.42200 OK58 kB
GET www.volexity.com/wp-content/themes/volexity/favicon-16x16.png
104.26.7.38200 OK830 B
GET www.volexity.com/wp-content/themes/volexity/apple-touch-icon.png
104.26.7.38200 OK21 kB
GET fonts.gstatic.com/s/roboto/v47/KFO7CnqEu92Fr1ME7kSn66aGLdTylUAMa3yUBA.woff2
142.250.74.3200 OK40 kB
GET fonts.gstatic.com/s/opensans/v40/memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
142.250.74.3200 OK48 kB
GET www.googletagmanager.com/gtag/js?id=G-WRSX85NK29
142.250.74.168200 OK317 kB
GET www.volexity.com/wp-content/uploads/2021/05/image002.png
104.26.7.38200 OK568 kB
GET www.volexity.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js
104.26.7.38200 OK1.2 kB
GET www.volexity.com/wp-content/uploads/2021/05/election-fraud-blog-post-header-image-1-1536x768.png
104.26.7.38200 OK174 kB
GET www.volexity.com/wp-content/themes/volexity/dist/scripts/scripts.min.js?ver=6.7
104.26.7.38200 OK174 kB
GET www.volexity.com/wp-content/themes/volexity/fonts/icons.woff2?4053275
104.26.7.38200 OK5.1 kB
GET fonts.gstatic.com/s/opensans/v40/memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
142.250.74.3200 OK48 kB
GET www.volexity.com/wp-content/themes/volexity/dist/images/search.png
104.26.7.38200 OK309 B
GET www.volexity.com/wp-content/plugins/cookie-notice/css/front.min.css?ver=2.4.18
104.26.7.38200 OK5.1 kB
GET www.volexity.com/wp-content/themes/volexity/dist/styles/styles.min.css?ver=6.7
104.26.7.38200 OK108 kB
GET www.volexity.com/wp-content/uploads/2021/05/phish_email-1024x817.png
104.26.7.38200 OK358 kB
GET www.volexity.com/wp-includes/js/comment-reply.min.js?ver=6.7
104.26.7.38200 OK3.0 kB
GET static.cloudflareinsights.com/beacon.min.js/vcd15cbe7772f49c399c6a5babf22c1241717689176015
104.16.80.73200 OK20 kB
GET www.volexity.com/wp-content/themes/volexity/dist/images/logo.png
104.26.7.38200 OK4.9 kB
GET www.volexity.com/wp-content/themes/volexity/dist/images/header-bg/Banner_5_R-02.svg
104.26.7.38200 OK1.2 kB
GET www.volexity.com/wp-includes/js/jquery/jquery.min.js?ver=3.7.1
104.26.7.38200 OK88 kB
GET www.volexity.com/wp-content/themes/volexity/dist/images/header-bg/Banner_5_L-01.svg
104.26.7.38200 OK696 B