# PhishDestroy threat dossier — cloud-base-extension-coin.pages.dev ================================================================ Fetched: 2026-04-22 12:05:42 UTC Canonical: https://phishdestroy.io/domain/cloud-base-extension-coin.pages.dev/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Coinbase ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 6/94 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, Fortinet, Kaspersky, LevelBlue, Sophos ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 188.114.97.3 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: CloudFlare, Inc. Registrar: Cloudflare, Inc. Nameservers: dan.ns.cloudflare.com, zariyah.ns.cloudflare.com Registered: 2026-03-30 Page title: Coinbase Chrome Extension – Secure Wallet Access HTTP response: 451 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WE1 Expires: 2026-06-24 Status: INVALID chain Fingerprint: a8934c36cc768e38ae885b7fb490988f5a3f0c10fcc934f251935689b4efe2e5 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-03-30 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-03-30 05:45:24 UTC (by PhishDestroy tracker) Last verified: 2026-04-21 16:08:28 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019d3c9f-7f01-75eb-b2ea-ec9eb4c3fcf4/ Wayback Machine: https://web.archive.org/web/*/cloud-base-extension-coin.pages.dev crt.sh CT logs: https://crt.sh/?q=%25.cloud-base-extension-coin.pages.dev Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=cloud-base-extension-coin.pages.dev AlienVault OTX: https://otx.alienvault.com/indicator/domain/cloud-base-extension-coin.pages.dev URLhaus: https://urlhaus.abuse.ch/host/cloud-base-extension-coin.pages.dev/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-03-30 05:47:12 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies the domain cloud-base-extension-coin.pages.dev as a generic phishing host active since seed 01ce28. This page is being tracked for potential crypto drainer activity, likely targeting cryptocurrency users by impersonating legitimate cloud-based extensions or services. No specific drainer kit fingerprint has been publicly documented, but the page structure and deployment via Pages.dev suggest a lightweight, Cloudflare-hosted lure designed to deceive visitors into connecting wallets or entering seed phrases. The site’s branding remains ambiguous, though the inclusion of 'coin' in the subdomain hints at a crypto-related lure. This domain resolves to IP address 188.114.97.3, a Cloudflare edge node commonly used to obfuscate origin infrastructure. It was registered through Cloudflare, Inc., leveraging the platform’s Pages service for rapid deployment and evasion. The domain holds a valid SSL certificate issued by Google Trust Services, which may help bypass browser security warnings. As of latest inspection, VirusTotal reports 0 out of 95 detection engines flagged the URL, indicating it remains under the radar. The domain has not been listed on Google Safe Browsing (GSB) at this time. Historical analysis shows no prior blocklist presence, suggesting a recently activated campaign. Current status is active and under investigation by threat intelligence teams. Users are advised to avoid interaction and consider blocking the domain at the network level. While current risk is elevated due to active availability and lack of AV detection, the absence from GSB and blocklists limits immediate protective coverage. Organizations should monitor for wallet connection prompts and seed phrase entry requests from similar domains. Remaining risk is moderate; however, rapid deployment via Pages.dev and Cloudflare suggests this campaign may scale quickly. Immediate mitigation includes DNS blocking, browser-level restrictions, and reporting to threat intelligence feeds to raise detection coverage. ## EVIDENCE HASHES ---------------------------------------------------------------- TLS cert SHA-256: a8934c36cc768e38ae885b7fb490988f5a3f0c10fcc934f251935689b4efe2e5 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/cloud-base-extension-coin.pages.dev/ JSON API: https://api.destroy.tools/v1/check?domain=cloud-base-extension-coin.pages.dev Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io