adobe-ael.saliphaberylin.workers[.]dev
Forensic brief
Read full brief
Threat Overview The domain adobe-ael[.]saliphaberylin[.]workers[.]dev has been identified as a phishing website impersonating Adobe. This site was designed to steal login credentials and personal information from Adobe users. Risk Indicators - Impersonates Adobe brand - Domain registered on dev TLD - Domain length: 36 characters - Unusually long domain name — a common phishing technique - Uses multiple subdomains to appear more legitimate - Vt Detected Recommendations Always access Adobe through the official website.
Check the URL bar carefully before entering any credentials. Report suspicious sites to PhishDestroy.
Threat response pipeline
VirusTotalPublic blocklist status
VirusTotal consensus
Aggregated detection across 95 security vendors.
Evidence & external reports
Were you affected by this site?
Were You Affected?
Recommendations & Advice for Victims
- Do not pay anything else. Recovery agents demanding upfront fees are a second-stage scam.
- Disconnect compromised wallets. Move remaining funds to a fresh seed phrase generated offline.
- Preserve evidence. Screenshot transactions, save URLs, archive emails — chain-of-custody matters for prosecution.
- Report to authorities (see section 15 below) — even small reports help build case patterns.
- Notify your bank/exchange. Some chargebacks may still be possible within 24-72h.
Report to your local authorities
Email template — registrar abuse
abuse@cloudflare workers
Registrar: Cloudflare Workers Case: PD-
Embed this report
About this report
About this report: adobe-ael.saliphaberylin.workers.dev
This domain security report is maintained by PhishDestroy's automated threat-intelligence pipeline. Our system continuously monitors this domain across 95 security vendors on VirusTotal and 1 public blocklists.
adobe-ael.saliphaberylin.workers.dev has been flagged by 18 security vendors as of today.
If you believe this listing is inaccurate, you can submit an appeal. For more information about our methodology, visit our FAQ page.