# PhishDestroy threat dossier — aicloudcmp.vip ================================================================ Fetched: 2026-05-01 20:13:39 UTC Canonical: https://phishdestroy.io/domain/aicloudcmp.vip/ ## VERDICT ---------------------------------------------------------------- TAKEN DOWN (neutralised) Composite threat score: 76/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Apple ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 1/94 security vendors flagged this domain Flagging vendors: alphaMountain.ai URLQuery: 2 detections ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 39.109.40.21 (HK, Ngau Tau Kok) ASN: AS140224 Nebula Global LLC Hosting org: XUN HONG KONG LIMITED Registrar: Gname.com Pte. Ltd. Nameservers: ["b7.share-dns.net", "a7.share-dns.com"] Registered: 2026-04-18 Page title: defi ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R12 Expires: 2026-06-22 Status: INVALID chain Fingerprint: 4a0c7f9ace8741b334e38edd607e87ebe72b1f92b4476dcb3021d7db48538131 Subject Alternative Names (related infrastructure — often same operator): - trustdefi.vip ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: CLOSED — no report required. This domain was neutralised before the abuse-report cycle could be dispatched — either the hosting provider / registrar suspended it on their own, the DNS went dead, or the operator abandoned the infrastructure. PhishDestroy keeps the evidence bundle on file for audit but no formal notice was sent. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-18 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-18 17:02:47 UTC (by PhishDestroy tracker) Earliest abuse rec: 2026-04-18 14:03:38 UTC — PREDATES current WHOIS registration; retained from a previous registration cycle of the same domain name Last verified: 2026-04-26 19:40:21 UTC Neutralised: 2026-04-23 00:28:02 UTC Current status: taken down (registrar suspended or DNS dead) Note: one or more events above predate the WHOIS creation date. This typically means the same domain name was previously registered, detected, dropped, and then re-registered by a new party. PhishDestroy preserves the full historical record for operator-attribution research even when the underlying infrastructure changes hands. ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019da0e5-dea0-751a-98db-72af6b79e922/ URLQuery: https://urlquery.net/report/66143919-4d6f-4cdc-94a5-f1535525f0d2 Wayback Machine: https://web.archive.org/web/*/aicloudcmp.vip crt.sh CT logs: https://crt.sh/?q=%25.aicloudcmp.vip Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=aicloudcmp.vip AlienVault OTX: https://otx.alienvault.com/indicator/domain/aicloudcmp.vip URLhaus: https://urlhaus.abuse.ch/host/aicloudcmp.vip/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-18 17:03:28 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies aicloudcmp.vip as a counterfeit Apple Cloud login portal designed to harvest user credentials and siphon cryptocurrency. The site mimics Apple’s authentic cloud login interface, tricking visitors into entering their Apple ID and password, which are then transmitted to attacker-controlled servers. Once credentials are captured, the fraudsters may also attempt to drain linked crypto wallets, gift card balances, or financial data tied to the compromised Apple account. This domain was flagged after analysis revealed key technical indicators: the domain aicloudcmp.vip was registered on July 27, 2025, through Gname.com Pte. Ltd., and currently resolves to IP address 39.109.40.21. The site uses a Let's Encrypt SSL certificate, which may give users a false sense of security, as HTTPS does not guarantee legitimacy. Notably, as of the latest scan, VirusTotal detected 0/95 security engines flagging the domain, indicating it remains undetected by many automated tools. This low detection rate highlights the evolving nature of crypto drainer scams and the importance of manual verification. If you visited aicloudcmp.vip: immediately change your Apple ID password using Apple’s official site (apple.com) and enable two-factor authentication. Avoid reusing passwords across services, especially for email or financial accounts. Scan your devices for malware using trusted antivirus software like Malwarebytes or Bitdefender. If you entered payment or crypto wallet credentials, revoke access in your Apple ID settings and contact your bank or wallet provider immediately. Report the site to Apple’s fraud reporting page and to PhishDestroy for further analysis. Always double-check URLs and use verified bookmarks for sensitive logins to prevent future exposure to similar threats. [Updates since narrative was generated:] - VirusTotal detections: now 1/94 (narrative was written when count was lower) ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260418-C9FC9B Favicon MD5: 930c979c639d03137475ffcc09f25efd TLS cert SHA-256: 4a0c7f9ace8741b334e38edd607e87ebe72b1f92b4476dcb3021d7db48538131 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/aicloudcmp.vip/ JSON API: https://api.destroy.tools/v1/check?domain=aicloudcmp.vip Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io