# PhishDestroy threat dossier — elliallawson-drive-secure-pdf.surge.sh ================================================================ Fetched: 2026-05-13 13:48:01 UTC Canonical: https://phishdestroy.io/domain/elliallawson-drive-secure-pdf.surge.sh/ ## VERDICT ---------------------------------------------------------------- ACTIVE THREAT — multiple warning signs Composite threat score: 44/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 9/95 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, BitDefender, Fortinet, G-Data, Kaspersky, LevelBlue, OpenPhish, Sophos ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 188.166.132.94 Registrar: Surge.sh Nameservers: NS_NOT_FOUND Page title: Shared files - Google Drive HTTP response: 200 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- First detected: 2026-05-13 16:03:43 UTC (by PhishDestroy tracker) Last verified: 2026-05-13 16:36:10 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019e216e-4d33-7499-9fbb-bd3e55beae6c/ Wayback Machine: https://web.archive.org/web/*/elliallawson-drive-secure-pdf.surge.sh crt.sh CT logs: https://crt.sh/?q=%25.elliallawson-drive-secure-pdf.surge.sh Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=elliallawson-drive-secure-pdf.surge.sh AlienVault OTX: https://otx.alienvault.com/indicator/domain/elliallawson-drive-secure-pdf.surge.sh URLhaus: https://urlhaus.abuse.ch/host/elliallawson-drive-secure-pdf.surge.sh/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-13 16:05:03 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies elliallawson-drive-secure-pdf.surge.sh as an active credential theft phishing domain designed to trick users into surrendering login credentials under false pretenses. This site masquerades as a secure PDF drive, exploiting trust in familiar cloud storage terminology to harvest usernames and passwords. The threat is elevated due to its live operation and deliberate impersonation of legitimate services, posing immediate risk to victims’ personal and financial accounts. This domain was flagged by 9 out of 95 security vendors on VirusTotal, indicating significant suspicion within the cybersecurity community. It resolves to IP address 188.166.132.94 via Surge.sh, a dynamic hosting platform commonly abused in short-lived phishing campaigns. The site uses a Sectigo Limited SSL certificate, which may lend a false sense of legitimacy. While exact registration date is not publicly available due to Surge.sh’s privacy protections, the domain’s immediate detection upon activation highlights its malicious intent. To mitigate risk, users must avoid clicking links or entering credentials on this domain. Organizations should block 188.166.132.94 and the domain at network and DNS levels. Enable multi-factor authentication (MFA) on all accounts, especially cloud storage and email services, as compromised credentials often lead to further attacks. Report the domain to your security team and file a complaint with the hosting provider (Surge.sh abuse@surge.sh) and platforms like Google Safe Browsing. Always verify URLs manually via official sources before logging in. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: d27d6636a9885df090b47f7d98216be5 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/elliallawson-drive-secure-pdf.surge.sh/ JSON API: https://api.destroy.tools/v1/check?domain=elliallawson-drive-secure-pdf.surge.sh Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 148,917 domains (40,746 alive under monitoring, 107,884 confirmed takedowns/dead). Site: https://phishdestroy.io