# PhishDestroy threat dossier — auros.cc ================================================================ Fetched: 2026-05-05 06:38:22 UTC Canonical: https://phishdestroy.io/domain/auros.cc/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 98/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Crypto Casino / Gambling ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 6/95 security vendors flagged this domain Flagging vendors: alphaMountain.ai, CyRadar, Forcepoint ThreatSeeker, Fortinet, Gridinsoft, Webroot URLQuery: 3 detections ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 188.114.96.3 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: CloudFlare, Inc. Registrar: NICENIC INTERNATIONAL GROUP CO., LIMITED !!! REGISTRAR INTEGRITY ALERT — NiceNIC !!! NiceNIC International: over 90% of its registered domains are associated with illegal content; documented systematic abuse-report non-response. Primary sources: https://phishdestroy.io/nicenic-real https://phishdestroy.io/nicenic-verdict Nameservers: ines.ns.cloudflare.com, piers.ns.cloudflare.com Registered: 2026-03-19 Page title: Auros: Most Popular Online Crypto Casino Based on Blockchain HTTP response: 404 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E8 Expires: 2026-06-17 Status: INVALID chain Fingerprint: 8a0878daf922a3f2f6766c20df35f9f08e476458a32cac50f05f1cba13dfdc73 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-03-19 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-05 06:27:57 UTC (by PhishDestroy tracker) First reported: 2026-05-05 03:30:55 UTC (abuse notice filed) Last verified: 2026-05-05 09:25:33 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019df62b-df05-716f-b3d0-58d8efb914d9/ URLQuery: https://urlquery.net/report/1735cea6-4860-4443-9a4a-3938efca4948 Wayback Machine: https://web.archive.org/web/*/auros.cc crt.sh CT logs: https://crt.sh/?q=%25.auros.cc Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=auros.cc AlienVault OTX: https://otx.alienvault.com/indicator/domain/auros.cc URLhaus: https://urlhaus.abuse.ch/host/auros.cc/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-05 06:28:29 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies auros.cc as an active credential phishing domain designed to mimic legitimate login portals and harvest user credentials. This domain specifically lures victims into entering sensitive information by masquerading as trusted services, with the ultimate goal of enabling account takeovers and unauthorized access to financial or personal accounts. The attackers behind auros.cc rely on social engineering tactics, exploiting urgency and trust to bypass user skepticism, making it a high-risk threat to both individual users and organizations. This domain was flagged by 6 out of 95 security vendors on VirusTotal, indicating a significant but not universal recognition of its malicious nature. It is registered through NICENIC INTERNATIONAL GROUP CO., LIMITED, a registrar often exploited for anonymity in malicious campaigns. The domain resolves to IP address 188.114.96.3 and was created on March 19, 2026—indicating a very recent and likely opportunistic deployment targeting contemporary users. The presence of an SSL certificate from Let's Encrypt further enhances the domain's deceptive credibility, as HTTPS is frequently misconstrued as a trust indicator regardless of legitimacy. These technical attributes collectively underscore the domain's elevated threat level and active operational status. Users who have visited auros.cc should immediately cease any interaction and avoid inputting any credentials or personal information. If login details were entered, change passwords immediately across all accounts using the same credentials, enable multi-factor authentication where possible, and monitor for signs of unauthorized access such as unexpected transactions or account lockouts. Report the domain to your organization’s security team or via platforms like PhishDestroy to help block further propagation. Additionally, ensure your device and browser are scanned for malware, as some phishing sites may deliver drive-by downloads or persistent tracking mechanisms. Stay vigilant: scrutinize URLs, verify domain spelling, and never trust unsolicited login prompts or redirects. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260505-C6A8EB Favicon MD5: c3d9e7ac8ad834ae3d129c8c7a595a4f TLS cert SHA-256: 8a0878daf922a3f2f6766c20df35f9f08e476458a32cac50f05f1cba13dfdc73 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/auros.cc/ JSON API: https://api.destroy.tools/v1/check?domain=auros.cc Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 145,882 domains (63,711 alive under monitoring, 81,911 confirmed takedowns/dead). Site: https://phishdestroy.io