# abdullahzaheer147.github.io — MALICIOUS > Check if abdullahzaheer147.github.io is a credential phishing scam targeting users with 17/95 VirusTotal detections. View full threat analysis. ## Summary PhishDestroy identifies abdullahzaheer147.github.io as an active credential phishing domain posing as a fake login page to harvest user credentials. This GitHub-hosted page leverages social engineering tactics to trick visitors into entering sensitive information, including passwords or payment details, under false pretenses. With 17 out of 95 security vendors flagging the domain and OpenPhish already blocking access, the threat is imminent and should be treated with high urgency. The domain’s association with social engineering campaigns, as confirmed by Google Safe Browsing’s SOCIAL_ENGINEERING classification, underscores its malicious intent and operational status. This domain resolves to IP address 185.199.108.153 and is hosted through GitHub, Inc., which has not suspended the repository despite multiple flaggings. Its SSL certificate, issued by Let’s Encrypt, provides a false sense of security by enabling HTTPS encryption, a common tactic to deceive users into trusting the site. The domain is currently listed on one security blocklist and continues to evade takedown efforts, suggesting persistent availability. Despite GitHub’s legitimate infrastructure, the misuse of their platform for phishing underscores the sophistication of modern credential harvesting campaigns, which exploit trusted domains to bypass traditional defenses. Users encountering this domain must avoid entering any personal or financial information, as the site is designed to capture input and transmit it to attackers. Immediately clear browser cache and cookies if accidentally interacted with, and scan devices for malware using updated antivirus tools. Report the domain to your email provider, browser, and platforms like OpenPhish or Google Safe Browsing to aid in its rapid deactivation. Always verify URLs manually before entering credentials, and use multi-factor authentication (MFA) wherever possible to mitigate the impact of credential theft. This threat highlights the importance of skepticism toward unsolicited links, even when hosted on reputable services like GitHub. ## Threat Details - Verdict: MALICIOUS - Site status: unknown (HTTP ?) ## Domain Intelligence - Registrar: GitHub, Inc. - IP: 185.199.108.153 ## Detection Status - VirusTotal: 17 vendors flagged - Google Safe Browsing: FLAGGED - Blocklists: 1 hits Lists: ["OpenPhish"] ## Evidence - Cloudflare Radar: https://radar.cloudflare.com/domains/abdullahzaheer147.github.io - PhishDestroy: https://phishdestroy.io/domain/abdullahzaheer147.github.io/ - LLM endpoint: https://phishdestroy.io/domain/abdullahzaheer147.github.io/llm.txt ## If You Visited This Site 1. Change any passwords you may have entered 2. Enable 2FA on all related accounts 3. Monitor your accounts for unauthorized activity 4. Report to: FBI IC3, Europol, local authorities --- Report by PhishDestroy | https://phishdestroy.io/domain/abdullahzaheer147.github.io/ Last updated: 2026-04-02