# PhishDestroy threat dossier — bdagnetwork.network ================================================================ Fetched: 2026-04-23 12:13:52 UTC Canonical: https://phishdestroy.io/domain/bdagnetwork.network/ ## VERDICT ---------------------------------------------------------------- TAKEN DOWN (neutralised) Composite threat score: 92/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 8/94 security vendors flagged this domain Flagging vendors: Fortinet, G-Data, Gridinsoft Public blocklists: listed on 1 independent blocklist ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 188.114.97.3 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: CloudFlare, Inc. Registrar: NICENIC INTERNATIONAL GROUP CO., LIMITED !!! REGISTRAR INTEGRITY ALERT — NiceNIC !!! NiceNIC International: over 90% of its registered domains are associated with illegal content; documented systematic abuse-report non-response. Primary sources: https://phishdestroy.io/nicenic-real https://phishdestroy.io/nicenic-verdict Nameservers: ["grant.ns.cloudflare.com", "suzanne.ns.cloudflare.com"] Registered: 2026-04-21 Page title: BlockDAG Staking ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E8 Expires: 2026-07-13 Status: INVALID chain Fingerprint: 589a6c96df4f55025384cbbe9644e6055b38c94c133f9a3aafbc287e3e15f6c6 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: REPORTS FILED. Domain eventually taken down after 1 abuse notice(s). Reports filed: 1 independent abuse notifications First report: 2026-04-22 16:05:49 UTC Days since first notice: 1 (eventually taken down) Methodology: follow-up reports are sent ONLY when a victim re-submitted a re-report via our public form, our monitoring detected the domain resurfacing in SEO/feeds, OR our live-checker confirmed the domain is still technically active and fraudulent. Each report contains: VT verdict, URLScan snapshot, WHOIS, SSL metadata, IP/hosting chain, impersonated-brand evidence, drainer/kit classification, screenshots, and a cryptographic hash of the forensic PDF. ICANN RAA Sec. 3.18 applies. Per-report timeline: https://phishdestroy.io/domain/bdagnetwork.network/#coordinated-suppression ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-21 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-21 11:40:10 UTC (by PhishDestroy tracker) First reported: 2026-04-22 13:05:49 UTC (abuse notice filed) Last verified: 2026-04-23 13:40:09 UTC Neutralised: 2026-04-23 00:28:02 UTC Current status: taken down (registrar suspended or DNS dead) ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019daf31-8586-747c-998b-5fa3106f1e37/ Wayback Machine: https://web.archive.org/web/*/bdagnetwork.network crt.sh CT logs: https://crt.sh/?q=%25.bdagnetwork.network Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=bdagnetwork.network AlienVault OTX: https://otx.alienvault.com/indicator/domain/bdagnetwork.network URLhaus: https://urlhaus.abuse.ch/host/bdagnetwork.network/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-21 11:41:19 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy has initiated an active investigation into bdagnetwork.network following reports of credential theft phishing activity targeting unsuspecting users. This domain poses a high risk to individuals and organizations by masquerading as a legitimate service to harvest login credentials. Technical analysis reveals this domain resolves to IP address 188.114.97.3 and utilizes a valid Let's Encrypt SSL certificate, increasing its deceptive appearance. The threat actor's infrastructure shows zero detection rates on VirusTotal as of our assessment, underscoring the need for heightened vigilance among potential targets. This domain was flagged due to its active status and suspicious behavior consistent with credential harvesting operations. VirusTotal scans show 0 detections out of 95 security engines, suggesting this domain has evaded broad detection mechanisms. While detailed registrar and creation date data remains under review, the absence of detections highlights the sophistication of the threat actor's infrastructure. The domain’s association with a recently assigned IP and valid SSL certificate further compounds the risk, as these attributes are commonly exploited to deceive users into trusting the site. If you have visited bdagnetwork.network, immediately check for unauthorized logins or credential changes on any accounts accessed from that device. Do not enter any credentials or personal information on this domain. Report the incident to your IT security team or relevant platform support. Use robust, unique passwords and enable multi-factor authentication to mitigate potential exposure. Monitor accounts closely for signs of compromise, such as unfamiliar transactions or login attempts. Share this advisory with colleagues to prevent further exposure to this credential theft campaign. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-1776863141-bdagnetwork.net Favicon MD5: 8e28ff38add49738224e871c9e02e025 TLS cert SHA-256: 589a6c96df4f55025384cbbe9644e6055b38c94c133f9a3aafbc287e3e15f6c6 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/bdagnetwork.network/ JSON API: https://api.destroy.tools/v1/check?domain=bdagnetwork.network Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io