# kbrdirect.top — SUSPICIOUS > kbrdirect.top is a live phishing site mimicking KBR login portals to steal OAuth tokens, flagged by 0/95 VirusTotal engines. ## Summary PhishDestroy identifies kbrdirect.top as an active credential phishing domain impersonating legitimate KBR login interfaces to harvest OAuth tokens and corporate credentials. This domain was flagged under seed 764c34 and exhibits behavior consistent with sophisticated social engineering attacks targeting employees of KBR Inc. Technical telemetry indicates the domain resolves to IP 188.114.96.3 and was registered through Dynadot LLC on March 25, 2026, less than 24 hours ago. Despite low detection on VirusTotal (0/95 engines as of investigation hour), the high-risk nature of the campaign necessitates immediate recognition as a malicious impersonation vector. The use of a Let’s Encrypt SSL certificate further obfuscates malicious intent by providing a false sense of legitimacy. This domain represents a high-impact threat due to its targeted impersonation of KBR—a global engineering and technology company—and the potential for compromise of corporate Microsoft 365 or Azure AD credentials via fake OAuth consent pages. The short domain age and active hosting on 188.114.96.3 suggests a fast-deployed attack likely distributed via spoofed emails or internal messaging platforms. With no current blocklist coverage (0/95 detections on VirusTotal) and a freshly minted SSL certificate, organizations must treat this as a zero-day phishing threat. The registration through Dynadot LLC does not correlate with known KBR domains, reinforcing the likelihood of malicious intent under seed 764c34. Users or employees who have visited kbrdirect.top should immediately assess whether any credentials or tokens were entered. If credentials were submitted, revoke OAuth permissions via Microsoft My Account (account.live.com/permissions) or Azure AD Admin Center, reset passwords for corporate accounts, and scan devices for malware. Report the domain to your IT security team and block access at the network level. Avoid interacting with any links or attachments in unsolicited messages referencing KBR or internal login portals. Security teams are advised to update email filtering rules to quarantine messages referencing this domain or similar impersonations, and to monitor for unauthorized OAuth token usage. Given the rapid deployment and low detection rate, this threat under seed 764c34 poses an elevated risk to unprotected endpoints and requires immediate mitigation. ## Threat Details - Verdict: SUSPICIOUS - Site status: unknown (HTTP ?) ## Domain Intelligence - Registered: 2026-03-25 07:58:30 - Registrar: Dynadot LLC - IP: 188.114.96.3 ## Detection Status - VirusTotal: 0 vendors flagged - Google Safe Browsing: clean - Blocklists: 0 hits ## Evidence - Cloudflare Radar: https://radar.cloudflare.com/domains/kbrdirect.top - PhishDestroy: https://phishdestroy.io/domain/kbrdirect.top/ - LLM endpoint: https://phishdestroy.io/domain/kbrdirect.top/llm.txt ## If You Visited This Site 1. Change any passwords you may have entered 2. Enable 2FA on all related accounts 3. Monitor your accounts for unauthorized activity 4. Report to: FBI IC3, Europol, local authorities --- Report by PhishDestroy | https://phishdestroy.io/domain/kbrdirect.top/ Last updated: 2026-04-09