# PhishDestroy threat dossier — cake.giving ================================================================ Fetched: 2026-05-01 02:56:39 UTC Canonical: https://phishdestroy.io/domain/cake.giving/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: cryptocurrency Targeted brand: Crypto Casino / Gambling Phishing kit: Gambler Scam Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 7/93 security vendors flagged this domain Flagging vendors: alphaMountain.ai, Certego, CRDF, CyRadar, Gridinsoft, Seclookup, SOCRadar URLQuery: 2 detections AlienVault OTX: 1 pulses (threat-intel feed mentions) Public blocklists: listed on 1 independent blocklist Victim re-reports (public form): 1 ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 172.67.210.66 (US, San Francisco) ASN: ASAS13335 CLOUDFLARENET, US Hosting org: AS13335 Cloudflare, Inc. Registrar: Global Domain Group LLC Nameservers: drew.ns.cloudflare.com, kami.ns.cloudflare.com Registered: 2025-12-13 Expires: 2026-12-13 Page title: Cake: Most Popular Online Crypto Casino Based on Blockchain HTTP response: 666 (custom cloaking code — see Cloaking above) ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WE1 Expires: 2026-05-11 Status: INVALID chain Fingerprint: e7f089a1b13a512aca6ce949ca7f914613c217211332b58f36c1d0cc0c7f2442 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: REPORTS FILED AND IGNORED — Global Domain Group LLC did not act on these notifications. Domain still online. Reports filed: 1 independent abuse notifications First report: 2026-02-08 18:19:48 UTC Days since first notice: 81 — no registrar action, domain remains online Methodology: follow-up reports are sent ONLY when a victim re-submitted a re-report via our public form, our monitoring detected the domain resurfacing in SEO/feeds, OR our live-checker confirmed the domain is still technically active and fraudulent. Each report contains: VT verdict, URLScan snapshot, WHOIS, SSL metadata, IP/hosting chain, impersonated-brand evidence, drainer/kit classification, screenshots, and a cryptographic hash of the forensic PDF. ICANN RAA Sec. 3.18 applies. Per-report timeline: https://phishdestroy.io/domain/cake.giving/#coordinated-suppression ## TIMELINE ---------------------------------------------------------------- Domain registered: 2025-12-13 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-02-25 02:39:27 UTC (by PhishDestroy tracker) First reported: 2026-01-05 15:13:55 UTC (abuse notice filed) Last verified: 2026-04-27 12:46:24 UTC Neutralised: 2026-02-28 05:10:12 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019b8e54-a263-731d-9450-cfe8446e16eb/ URLQuery: https://urlquery.net/report/f3e24f48-0adb-4a1f-a29a-5dbb4381afb7 Wayback Machine: https://web.archive.org/web/*/cake.giving crt.sh CT logs: https://crt.sh/?q=%25.cake.giving Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=cake.giving AlienVault OTX: https://otx.alienvault.com/indicator/domain/cake.giving URLhaus: https://urlhaus.abuse.ch/host/cake.giving/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-03-03 03:29:17 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies cake.giving as a medium-risk domain involved in brand impersonation targeting crypto scams. The site presented itself as "Cake: Most Popular Online Crypto Casino Based on Blockchain." Technical analysis reveals the domain was registered on 2025-12-13 via Global Domain Group Inc, resolving to IP 172.67.210.66. It appeared on one security blocklist and was detected in an AlienVault OTX threat pulse. VirusTotal flagged it with 7 alerts from 95 vendors. Currently, cake.giving is offline and no longer accessible. PhishDestroy recommends maintaining vigilance against similar impersonation attempts and updating blocklists accordingly. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260105-F09BC0 Favicon MD5: 095b185e288ed8e4d934ac78fe6a4e2e TLS cert SHA-256: e7f089a1b13a512aca6ce949ca7f914613c217211332b58f36c1d0cc0c7f2442 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/cake.giving/ JSON API: https://api.destroy.tools/v1/check?domain=cake.giving Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io