# PhishDestroy threat dossier — befe-coin.pages.dev ================================================================ Fetched: 2026-04-27 00:05:56 UTC Canonical: https://phishdestroy.io/domain/befe-coin.pages.dev/ ## VERDICT ---------------------------------------------------------------- HIGH THREAT — malicious activity confirmed Composite threat score: 75/100 (PhishDestroy scoring — see methodology below) Scam classification: Crypto Drainer (wallet extracted) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 0/94 security vendors flagged this domain ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 172.66.47.50 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: Cloudflare, Inc. Nameservers: jeff.ns.cloudflare.com, monroe.ns.cloudflare.com Registered: 2026-03-29 Page title: BEFE – BEFE is a MEME token HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WE1 Expires: 2026-06-27 Status: INVALID chain Fingerprint: e85b1618e0cd717909a8710dcec622b9af8894acf255038242af6d9269bf9697 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-03-29 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-03-29 15:20:10 UTC (by PhishDestroy tracker) Last verified: 2026-04-21 16:11:41 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019d3986-f5d1-73ce-9fda-6e5997c28bc1/ Wayback Machine: https://web.archive.org/web/*/befe-coin.pages.dev crt.sh CT logs: https://crt.sh/?q=%25.befe-coin.pages.dev Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=befe-coin.pages.dev AlienVault OTX: https://otx.alienvault.com/indicator/domain/befe-coin.pages.dev URLhaus: https://urlhaus.abuse.ch/host/befe-coin.pages.dev/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-03-29 15:23:41 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies befe-coin.pages.dev as a live crypto drainer site designed to steal funds from unsuspecting cryptocurrency users. The page poses as BEFE token-related content to trick visitors into connecting their crypto wallets, allowing the threat actor to drain assets without consent. This is a classic crypto-drainer operation where fake promises of tokens or rewards lead directly to wallet compromise. This domain was flagged as a generic phishing site with zero detections on VirusTotal as of the latest scan, resolving to IP 172.66.47.50 under Cloudflare’s infrastructure. The site uses a Google Trust Services SSL certificate, which is commonly abused by threat actors to appear legitimate at a glance. Its recent creation and deployment through Cloudflare Pages indicate an intentionally short-lived operation aimed at maximizing victim reach before takedown. If you visited befe-coin.pages.dev, immediately disconnect your wallet and revoke any suspicious permissions via your wallet’s app or extension. Do not interact further with the site. Report the domain to PhishDestroy and monitor your wallet for unauthorized transactions. Always verify unknown domains using PhishDestroy before entering sensitive information or connecting wallets. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: c9857b09cbfc67d8ca2717824c4abca6 TLS cert SHA-256: e85b1618e0cd717909a8710dcec622b9af8894acf255038242af6d9269bf9697 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/befe-coin.pages.dev/ JSON API: https://api.destroy.tools/v1/check?domain=befe-coin.pages.dev Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io