# PhishDestroy threat dossier — fbadsbusiness.com ================================================================ Fetched: 2026-04-30 10:39:43 UTC Canonical: https://phishdestroy.io/domain/fbadsbusiness.com/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Targeted brand: Facebook ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 13/91 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, Google Safebrowsing, Gridinsoft, Seclookup URLQuery: 3 detections Public blocklists: listed on 1 independent blocklist Google Safe Browsing: FLAGGED ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 45.135.237.95 (HK, Kwun Tong) ASN: AS153656 OWGELS INTERNATIONAL CO., LIMITED Hosting org: Superhub Limited Registrar: NameSilo, LLC !!! REGISTRAR INTEGRITY ALERT — NameSilo !!! NameSilo is a registrar documented by PhishDestroy as (1) publicly lying about received abuse reports, (2) shielding a $20M+ Monero-theft operation (xmrwallet.com) for 10 continuous years, and (3) retaliating against PhishDestroy by getting our X/Twitter account @Phish_Destroy banned after we published the evidence. Researchers/victims must ALWAYS CC compliance@icann.org on every abuse ticket — NameSilo has a track record of later claiming reports were never received. Primary sources: https://phishdestroy.io/namesilo-killed-our-twitter https://phishdestroy.io/xmrwallet-namesilo-exposed Nameservers: becky.ns.cloudflare.com, conrad.ns.cloudflare.com Registered: 2026-03-23 Page title: ADS - 后台管理系统 HTTP response: 526 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R12 Expires: 2026-06-09 Status: INVALID chain Fingerprint: a0405d609d317daa8d7a7583592ed15736745dd88a9cf87b4915d945dbfe46d6 Subject Alternative Names (related infrastructure — often same operator): - adminmng.v54arfjj.sbs ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-03-23 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-29 15:48:04 UTC (by PhishDestroy tracker) First reported: 2026-04-29 12:49:14 UTC (abuse notice filed) Last verified: 2026-04-30 12:20:13 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019dd946-8373-77ce-ba9c-81a4457466f5/ URLQuery: https://urlquery.net/report/77e0a19b-67c2-4f2a-9e23-4031d212fc81 Wayback Machine: https://web.archive.org/web/*/fbadsbusiness.com crt.sh CT logs: https://crt.sh/?q=%25.fbadsbusiness.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=fbadsbusiness.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/fbadsbusiness.com URLhaus: https://urlhaus.abuse.ch/host/fbadsbusiness.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-29 15:49:44 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies an active credential theft campaign hosted at fbadsbusiness.com, targeting Facebook Business account credentials under the guise of an advertising or business management service. The domain mimics legitimate advertising platforms to trick users into entering their login details, enabling threat actors to hijack business accounts for fraudulent activities such as unauthorized ad spend, data exfiltration, or further phishing propagation. The page leverages social engineering tactics, including urgency around account verification or payment issues, to coerce victims into submitting credentials to a spoofed login portal hosted on this malicious domain. This domain is part of a broader campaign likely designed to monetize compromised business accounts through ad fraud or data theft. This domain was flagged by 5 out of 95 security vendors on VirusTotal, indicating partial but not universal detection coverage. It was registered through NameSilo, LLC on March 23, 2026, making it a recently established threat with minimal historical reputation. The domain resolves to IP address 45.135.237.95 and has been blocked by InversionDNS and listed on one security blocklist. Google Safe Browsing has classified it under SOCIAL_ENGINEERING, confirming its use in deceptive practices. Additionally, the domain utilizes a Let's Encrypt SSL certificate, which may lend it an air of legitimacy to unsuspecting users. The combination of a recently registered domain, low vendor detection, and active blocklist presence underscores the elevated risk this domain poses to users and organizations. Users who visited fbadsbusiness.com should immediately check for unauthorized access to their Facebook Business accounts and revoke any unfamiliar sessions or integrations. Change passwords immediately using a strong, unique passphrase and enable two-factor authentication (2FA) if not already enabled. Avoid clicking links in unsolicited emails or advertisements related to Facebook Business tools. Report the domain to your security team or use browser-based tools to block it. If credentials were entered, monitor the account for suspicious activity and consider enabling additional security measures such as login alerts. Organizations should ensure endpoint protection systems are updated to detect and block access to this domain and similar threats. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260429-65D6F4 TLS cert SHA-256: a0405d609d317daa8d7a7583592ed15736745dd88a9cf87b4915d945dbfe46d6 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/fbadsbusiness.com/ JSON API: https://api.destroy.tools/v1/check?domain=fbadsbusiness.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io