# att.tugkns.cc — MALICIOUS > att.tugkns.cc is a high-risk phishing domain taken offline after multiple detections. Stay vigilant and avoid interacting with suspicious links. ## Summary PhishDestroy identifies att.tugkns.cc as a high-risk generic phishing domain designed to deceive users into divulging sensitive information. The threat level is classified as high due to its malicious intent and confirmed indicators of compromise. This domain was registered through Gname.com Pte. Ltd. on February 21, 2026. VirusTotal flagged att.tugkns.cc by 11 out of 95 security vendors, indicating widespread detection of its malicious activity. Additionally, it appears on at least one security blocklist, further confirming its involvement in phishing campaigns. The domain’s infrastructure and reputation strongly suggest it was used to impersonate trusted entities. Currently, att.tugkns.cc has been taken offline, which mitigates immediate risk. Users are advised to remain cautious of any residual phishing attempts or cloned domains. Organizations should continue to monitor blocklists and update email filters to prevent exposure to similar threats. Avoid clicking on suspicious links and report any phishing attempts promptly. ## Threat Details - Verdict: MALICIOUS - Site status: alive (HTTP 530) ## Domain Intelligence - Registered: 2026-02-21 07:01:08 - Registrar: Gname.com Pte. Ltd. - Country: SG - Nameservers: ["A.SHARE-DNS.COM", "B.SHARE-DNS.NET"] ## Detection Status - VirusTotal: 11 vendors flagged Vendors: ["Cluster25", "CRDF", "CyRadar", "Emsisoft", "Forcepoint ThreatSeeker", "Fortinet", "G-Data", "Gridinsoft", "Netcraft", "SOCRadar", "Sophos"] - Google Safe Browsing: clean - Blocklists: 1 hits Lists: ["PhishDestroy"] ## Evidence - PhishDestroy: https://phishdestroy.io/domain/att.tugkns.cc/ - LLM endpoint: https://phishdestroy.io/domain/att.tugkns.cc/llm.txt ## If You Visited This Site 1. Change any passwords you may have entered 2. Enable 2FA on all related accounts 3. Monitor your accounts for unauthorized activity 4. Report to: FBI IC3, Europol, local authorities --- Report by PhishDestroy | https://phishdestroy.io/domain/att.tugkns.cc/ Last updated: 2026-03-16