# PhishDestroy threat dossier — jocospt.shop ================================================================ Fetched: 2026-05-05 13:02:47 UTC Canonical: https://phishdestroy.io/domain/jocospt.shop/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Microsoft ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 18/95 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, AlphaSOC, Antiy-AVL, ArcSight Threat Intelligence, BitDefender, CyRadar, ESET, Forcepoint ThreatSeeker, Fortinet, G-Data, Kaspersky, Lionic, Seclookup, SOCRadar, Sophos, VIPRE, Webroot Public blocklists: listed on 1 independent blocklist ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 40.91.108.115 (US, Quincy) ASN: AS8075 Microsoft Corporation Hosting org: Microsoft Azure Cloud (westus2) Registrar: MarkMonitor Inc. Nameservers: ["ns911a.microsoftinternetsafety.net", "ns911b.microsoftinternetsafety.net"] Registered: 2026-05-05 Page title: This website domain has been seized by Microsoft HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Microsoft Corporation / Microsoft Azure RSA TLS Issuing CA 07 Expires: 2026-07-11 Status: INVALID chain Fingerprint: 1c63f99794a00fcd22a52d76584adbd2df93691f97d45a25de5b40e3a9bb7c28 Subject Alternative Names (related infrastructure — often same operator): - adsay.xyz - agnioysz.xyz - antvu.xyz - aryxnw.xyz - asceniz.shop - assixny.xyz - atomihc.xyz - beyxm.xyz - blolln.xyz - blotzm.xyz - bokcgjf.xyz - bowoqur.xyz - boxmc.xyz - butaqud.xyz - callbacywo.xyz ... +157 more ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-05 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-05 13:02:32 UTC (by PhishDestroy tracker) Last verified: 2026-05-05 16:00:06 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019df793-87e7-775f-b833-01cd18b852f7/ Wayback Machine: https://web.archive.org/web/*/jocospt.shop crt.sh CT logs: https://crt.sh/?q=%25.jocospt.shop Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=jocospt.shop AlienVault OTX: https://otx.alienvault.com/indicator/domain/jocospt.shop URLhaus: https://urlhaus.abuse.ch/host/jocospt.shop/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-05 13:02:59 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies jocospt.shop as an active Microsoft impersonation scam operating at an elevated risk level. This domain weaponizes Microsoft's brand legitimacy through a fraudulent 'seized domain' claim, luring victims into a phishing trap designed to harvest sensitive credentials or install malware under false pretenses. The page title 'This website domain has been seized by Microsoft' exploits trust in the brand to manipulate users into engaging with the malicious site. The threat is further amplified by the presence of a deceptive SSL certificate issued to 'Microsoft Corporation', creating a false sense of security. This domain was flagged by 18 out of 95 security vendors on VirusTotal, reflecting widespread suspicion of its malicious intent. It resolves to IP address 40.91.108.115 and is actively blocked by Maltrail and included on 1 security blocklist. The SSL certificate claims association with Microsoft Corporation, despite no legitimate connection. The domain's abusive nature is underscored by its impersonation of Microsoft, a tactic commonly employed in credential phishing campaigns. Technical indicators include the misuse of Microsoft's branding to deceive users, a common strategy in advanced social engineering attacks. Mitigation against such Microsoft impersonation scams requires a multi-layered approach. Users should immediately avoid interacting with jocospt.shop and report the domain to their security provider or browser vendor. Enterprises and individuals should verify unusual communications claiming to be from Microsoft through official channels, such as the company's support website or verified support contacts. Security teams are advised to block the domain at the network level using threat intelligence feeds and ensure endpoint protection solutions are updated to detect similar impersonation attempts. Educating users about recognizing brand impersonation tactics and verifying unexpected communications are critical steps in mitigating this elevated-risk threat. Avoid downloading files or entering credentials on pages linked from this domain, as they may lead to credential theft or malware installation. ## EVIDENCE HASHES ---------------------------------------------------------------- TLS cert SHA-256: 1c63f99794a00fcd22a52d76584adbd2df93691f97d45a25de5b40e3a9bb7c28 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/jocospt.shop/ JSON API: https://api.destroy.tools/v1/check?domain=jocospt.shop Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 146,008 domains (61,917 alive under monitoring, 83,630 confirmed takedowns/dead). Site: https://phishdestroy.io