# PhishDestroy threat dossier — bitfrost.live ================================================================ Fetched: 2026-04-27 14:25:38 UTC Canonical: https://phishdestroy.io/domain/bitfrost.live/ ## VERDICT ---------------------------------------------------------------- TAKEN DOWN (neutralised) Composite threat score: 50/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 2/94 security vendors flagged this domain ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 187.77.176.43 (GB, Manchester) ASN: AS47583 Hostinger International Limited Hosting org: Hostinger GB Registrar: NameSilo, LLC !!! REGISTRAR INTEGRITY ALERT — NameSilo !!! NameSilo is a registrar documented by PhishDestroy as (1) publicly lying about received abuse reports, (2) shielding a $20M+ Monero-theft operation (xmrwallet.com) for 10 continuous years, and (3) retaliating against PhishDestroy by getting our X/Twitter account @Phish_Destroy banned after we published the evidence. Researchers/victims must ALWAYS CC compliance@icann.org on every abuse ticket — NameSilo has a track record of later claiming reports were never received. Primary sources: https://phishdestroy.io/namesilo-killed-our-twitter https://phishdestroy.io/xmrwallet-namesilo-exposed Nameservers: ns1.dnsowl.com, ns2.dnsowl.com, ns3.dnsowl.com Registered: 2026-02-20 Expires: 2027-02-20 Page title: Bifrost Wallet - Self-custody, multi-chain crypto wallet for DeFi, NFTs and Web3 HTTP response: 429 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R13 Expires: 2026-05-28 Status: INVALID chain Fingerprint: 016dbd9f6bcf4089b9be950d6cc0cc3cef573d3cdc058eca666308e9390eefa6 Subject Alternative Names (related infrastructure — often same operator): - www.bitfrost.live ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: CLOSED — no report required. This domain was neutralised before the abuse-report cycle could be dispatched — either the hosting provider / registrar suspended it on their own, the DNS went dead, or the operator abandoned the infrastructure. PhishDestroy keeps the evidence bundle on file for audit but no formal notice was sent. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-02-20 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-15 08:24:51 UTC (by PhishDestroy tracker) First reported: 2026-04-15 05:26:55 UTC (abuse notice filed) Last verified: 2026-04-23 04:06:29 UTC Neutralised: 2026-04-23 04:06:29 UTC Current status: taken down (registrar suspended or DNS dead) ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019d8f96-29e4-703b-bdd0-bc85535cfff9/ URLQuery: https://urlquery.net/report/969475d9-d4d2-4388-84e4-3c99487f0087 Wayback Machine: https://web.archive.org/web/*/bitfrost.live crt.sh CT logs: https://crt.sh/?q=%25.bitfrost.live Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=bitfrost.live AlienVault OTX: https://otx.alienvault.com/indicator/domain/bitfrost.live URLhaus: https://urlhaus.abuse.ch/host/bitfrost.live/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-15 08:27:35 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] bitfrost.live has been confirmed as an active generic phishing site. This domain poses a high risk by masquerading as a cryptocurrency wallet to harvest user credentials and private keys. The campaign is currently undetected by security vendors, with 0 detections on VirusTotal as of the latest scan, and has not yet been added to public blocklists. Given the domain’s recent creation on February 20, 2026, and the use of a Let’s Encrypt SSL certificate, attackers are leveraging trusted infrastructure to lend credibility to their fraudulent site. The infrastructure is hosted at IP 187.77.176.43, which has no established reputation, and is registered through NameSilo, LLC, a registrar commonly abused for short-lived malicious domains. The combination of low detection rates, new registration, and plausible infrastructure suggests this is an early-stage operation likely targeting cryptocurrency users under the guise of wallet services or seed phrase recovery tools. This domain exhibits several red flags consistent with credential harvesting campaigns. It was registered on February 20, 2026, indicating a very recent deployment, which is common in fast-moving phishing operations. VirusTotal currently shows 0 detections out of 95 engines, signaling that signature-based defenses have not yet caught up to this threat. The domain resolves to IP 187.77.176.43, an address with no prior association in threat intelligence databases, further complicating detection. The use of a Let’s Encrypt SSL certificate adds a veneer of legitimacy, making it more likely for victims to enter sensitive data. The registrar, NameSilo, LLC, has been frequently observed in abuse reports tied to spam, phishing, and malware distribution, though registration alone is not inherently malicious. There are no current entries on public blocklists such as Google Safe Browsing, PhishTank, or OpenPhish, suggesting a gap in proactive threat blocking. To mitigate exposure to this threat, users should immediately block access to bitfrost.live at the network level and avoid visiting the domain. If credentials or private keys have been entered, users must revoke all associated wallet access, transfer remaining funds to a new wallet, and enable two-factor authentication on all related accounts. Organizations should add the domain and IP (187.77.176.43) to internal blocklists and monitor for outbound connections to these indicators. Security teams should also inspect DNS logs for queries to bitfrost.live and scan endpoints for signs of credential theft or wallet-related malware. Given the domain’s low detection status, updating threat intelligence feeds with this IOC and reporting it to CERTs and domain registrars can help accelerate remediation. Proactive threat hunting for similar domains with recent creation dates and low trust scores is recommended to prevent further spread of this campaign. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260415-0BB5CA Favicon MD5: adf24f199c3732149f9452baead87a41 TLS cert SHA-256: 016dbd9f6bcf4089b9be950d6cc0cc3cef573d3cdc058eca666308e9390eefa6 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/bitfrost.live/ JSON API: https://api.destroy.tools/v1/check?domain=bitfrost.live Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io