# PhishDestroy threat dossier — asset-download.wixstudio.com ================================================================ Fetched: 2026-05-13 13:51:31 UTC Canonical: https://phishdestroy.io/domain/asset-download.wixstudio.com/ ## VERDICT ---------------------------------------------------------------- TAKEN DOWN (neutralised) Composite threat score: 72/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 4/92 security vendors flagged this domain Flagging vendors: alphaMountain.ai, Cluster25, CRDF, Gridinsoft ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 34.144.206.118 (US, Kansas City) ASN: AS396982 Google LLC Hosting org: Google Cloud Registrar: GoDaddy.com, LLC Nameservers: ["dns1.p08.nsone.net", "dns2.p08.nsone.net", "dns3.p08.nsone.net", "dns4.p08.nsone.net"] Registered: 2026-05-11 Page title: 404 Error: Page Not Found | Wix Studio HTTP response: 404 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R13 Expires: 2026-07-29 Status: INVALID chain Fingerprint: c2c2f0e645b35156ce5cf39339fbe5ae5ffb02446fe2aeb96da83b6fe9b20ad4 Subject Alternative Names (related infrastructure — often same operator): - wixstudio.com ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: CLOSED — no report required. This domain was neutralised before the abuse-report cycle could be dispatched — either the hosting provider / registrar suspended it on their own, the DNS went dead, or the operator abandoned the infrastructure. PhishDestroy keeps the evidence bundle on file for audit but no formal notice was sent. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-11 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-11 16:26:42 UTC (by PhishDestroy tracker) Last verified: 2026-05-12 19:40:04 UTC Neutralised: 2026-05-12 00:01:42 UTC Current status: taken down (registrar suspended or DNS dead) ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019e1736-0e75-70ff-bd05-b76ff59c411d/ Wayback Machine: https://web.archive.org/web/*/asset-download.wixstudio.com crt.sh CT logs: https://crt.sh/?q=%25.asset-download.wixstudio.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=asset-download.wixstudio.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/asset-download.wixstudio.com URLhaus: https://urlhaus.abuse.ch/host/asset-download.wixstudio.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-11 16:27:57 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] asset-download.wixstudio.com has been identified by PhishDestroy analysts as an active credential-harvesting portal posing as a legitimate download asset page. The infrastructure is currently live and is being used to deceive end-users into surrendering sensitive account credentials, primarily targeting business and consumer login pages. The site is not a passive lure; it is actively collecting input and transmitting captured data to attacker-controlled servers under the guise of a legitimate file-download workflow. Initial infection vectors appear to be spear-phishing emails and spoofed intranet portals that redirect victims to the fraudulent WixStudio subdomain. Given the absence of endpoint controls on the site, exfiltration occurs in real time, exposing victims to immediate account takeover and follow-on financial or identity fraud. The domain asset-download.wixstudio.com resolves to IP address 34.144.206.118 via a Let’s Encrypt SSL certificate issued for the exact domain name. VirusTotal currently shows zero detections out of 95 engines, indicating that signature-based defenses have not yet flagged the payload. Historical WHOIS data indicates the domain was recently created and is served from a Google Cloud Platform instance, pointing to a rapid deployment designed to evade early detection. The subdomain prefix asset-download is intentionally chosen to masquerade as a legitimate asset repository, while the wixstudio.com parent namespace adds a veneer of credibility borrowed from the legitimate Wix Studio platform. All available threat intelligence feeds remain silent, suggesting the campaign is still in its initial ramp-up phase. To neutralize this threat, users should block inbound connections to 34.144.206.118 at the network perimeter and immediately add asset-download.wixstudio.com to browser and DNS blocklists. Security teams should deploy browser isolation for any employee clicking links that resolve to this IP and scan endpoint logs for POST requests to the path /submit containing form data labeled username or password. Organizations should also reset credentials for any accounts that may have been entered on this rogue portal, enable multi-factor authentication across all exposed services, and issue user advisories warning against visiting any wixstudio.com subdomain that requests login credentials outside the official platform login page at wix.com/login. Continuous monitoring of newly created subdomains under wixstudio.com is recommended to preempt further credential-harvesting sites leveraging the same infrastructure. ## EVIDENCE HASHES ---------------------------------------------------------------- TLS cert SHA-256: c2c2f0e645b35156ce5cf39339fbe5ae5ffb02446fe2aeb96da83b6fe9b20ad4 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/asset-download.wixstudio.com/ JSON API: https://api.destroy.tools/v1/check?domain=asset-download.wixstudio.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 148,917 domains (40,746 alive under monitoring, 107,884 confirmed takedowns/dead). Site: https://phishdestroy.io