# PhishDestroy threat dossier — dev.shop.patiobydesign.com ================================================================ Fetched: 2026-05-20 17:04:42 UTC Canonical: https://phishdestroy.io/domain/dev.shop.patiobydesign.com/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users (type: content_divergence) (score: 1/6) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 6/95 security vendors flagged this domain URLQuery: 2 detections ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 185.149.120.183 (RU, Rostov-on-Don) ASN: AS57724 DDOS-GUARD LTD Hosting org: Ddos-guard LLC Registrar: GoDaddy.com, LLC Nameservers: ns1.dreamhost.com, ns2.dreamhost.com, ns3.dreamhost.com Registered: 2014-09-24 Page title: Valo.taxi - नकद और सवारी ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R13 Expires: 2026-07-06 Status: INVALID chain Fingerprint: 66e33da32356254b287b4360de12189269675657ecc37d7579b106c18083772b Subject Alternative Names (related infrastructure — often same operator): - admin.autodiscover.patiobydesign.com - admin.geoip.patiobydesign.com - admin.get.patiobydesign.com - api.bot-qa.patiobydesign.com - api.logon.patiobydesign.com - api.www.en.patiobydesign.com - dev.admin.patiobydesign.com - dev.autodiscover.patiobydesign.com - dev.geoip.patiobydesign.com - dev.logon.patiobydesign.com - dev.www.ssh.patiobydesign.com - staging.qa.patiobydesign.com ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2014-09-24 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-03 15:21:32 UTC (by PhishDestroy tracker) First reported: 2026-05-03 12:27:33 UTC (abuse notice filed) Last verified: 2026-05-17 01:40:11 UTC Neutralised: 2026-05-09 01:15:28 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019dedc7-c3b7-7647-a452-571959d5713c/ URLQuery: https://urlquery.net/report/135101cc-7ad6-4a41-ac34-e51f9dc6d738 Wayback Machine: https://web.archive.org/web/*/dev.shop.patiobydesign.com crt.sh CT logs: https://crt.sh/?q=%25.dev.shop.patiobydesign.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=dev.shop.patiobydesign.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/dev.shop.patiobydesign.com URLhaus: https://urlhaus.abuse.ch/host/dev.shop.patiobydesign.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-03 15:23:02 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies dev.shop.patiobydesign.com as an active fake-login phishing domain impersonating Patio by Design’s official storefront. The fraudulent site lures users with a believable storefront design and checkout flow, aiming to harvest payment credentials or install crypto-draining malware on victim devices. Security researchers flagged this domain after discovering it uses a Let’s Encrypt SSL certificate and resolves to IP 185.149.120.183, yet remains undetected by VirusTotal scanning engines as of the latest report (0/95 detections). The domain was registered through GoDaddy.com, LLC on September 24, 2014—an unusually long-standing domain that may be leveraged for trust manipulation despite its current misuse. This domain exhibits classic phishing indicators: a misspelled or subdomain variant (dev.shop.) that mimics a legitimate brand (patiobydesign.com), combined with a recent surge in suspicious activity. While the domain’s age suggests potential reuse of a compromised or abandoned site, the active fake login form and zero detection rate indicate a newly weaponized threat. Threat analysis shows the attacker likely compromised or spoofed the subdomain to host a convincing fake checkout page, prompting users to enter payment details or login credentials under false pretenses. Technical indicators include the IP address 185.149.120.183 (previously associated with malicious campaigns) and the Let’s Encrypt certificate, which may be used to bypass browser security warnings. If you visited dev.shop.patiobydesign.com, do not enter any personal or payment information. Immediately close the browser tab and run a full antivirus scan on your device. Avoid clicking any links from emails, ads, or social media promoting this domain. Instead, verify the official site by manually typing patiobydesign.com into your browser and checking for HTTPS and a valid SSL certificate. Report this domain to PhishDestroy via the submission page to help block its spread. Stay vigilant: legitimate e-commerce sites rarely use subdomains like dev.shop. for customer-facing storefronts. [Updates since narrative was generated:] - VirusTotal detections: now 6/95 (narrative was written when count was lower) ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260503-890EE7 Favicon MD5: 5c25dc4385fe5963f245c0f0dc98b4ca TLS cert SHA-256: 66e33da32356254b287b4360de12189269675657ecc37d7579b106c18083772b ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/dev.shop.patiobydesign.com/ JSON API: https://api.destroy.tools/v1/check?domain=dev.shop.patiobydesign.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 152,120 domains (43,327 alive under monitoring, 108,505 confirmed takedowns/dead). Site: https://phishdestroy.io