Independent · Public · Non-commercial · Since 2019
About PhishDestroy:
Mission, Team & Methodology
We are a volunteer threat‑intelligence group. For 5+ years we have disrupted phishing, drainers, and crypto fraud. We detect live threats first, preserve evidence, and coordinate takedowns with hosts, registrars, and AV vendors.
~6 min read· Updated March 2026· PhishDestroy Intelligence
About PhishDestroy
Our approach is simple: when we see an active threat, we move immediately. We don’t wait for victims, lawsuits, or publicity — we act so there are no victims at all. This is our story.
Our Mission and Methods
We started with Steam scammers and spammy ads; today our scope is global crypto phishing, drainer networks, and large‑scale fraud operations. We conduct end‑to‑end casework: tracing money on‑chain to real operators, mapping infrastructure, and linking campaigns to specific panels, keys, and code. Our unique insight comes from having seen scams from the inside — not as employees but with full root‑level access to their infrastructure. This gives us an unparalleled edge to preempt new variants quickly.
- Non‑commercial: We sell nothing and take no donations. No paid delistings, ever.
- Public & Verifiable: Indicators, timestamps, and outcomes are public when safe and lawful.
- No Victim Data Stores: We avoid holding sensitive personal data; tickets use IDs only.
- Evidence Preservation: We keep web archives and technical artifacts so victims and investigators can self‑serve discovery later.
- Lawful Cooperation: We coordinate with hosts/registrars and share artifacts with competent authorities when appropriate.