# PhishDestroy threat dossier — kcosta.top ================================================================ Fetched: 2026-05-11 14:14:19 UTC Canonical: https://phishdestroy.io/domain/kcosta.top/ ## VERDICT ---------------------------------------------------------------- HIGH THREAT — malicious activity confirmed Composite threat score: 79/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 1/95 security vendors flagged this domain Flagging vendors: Webroot ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 163.61.188.5 (US, Staten Island) ASN: AS153568 NEW DHAKA HARDWARE Hosting org: MIT Registrar: Global Domain Group LLC Nameservers: ["dns1.lytehosting.com.", "dns2.lytehosting.com.", "dns3.lytehosting.com.", "dns4.lytehosting.com."] Registered: 2026-05-09 Page title: Kcosta - Create Account HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R12 Expires: 2026-07-17 Status: INVALID chain Fingerprint: 67245f85413eaf3e3714418cd2d54df383702c187ab3e87088eec14d9fb7c9a7 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-09 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-09 17:06:57 UTC (by PhishDestroy tracker) First reported: 2026-05-09 14:07:41 UTC (abuse notice filed) Last verified: 2026-05-11 12:56:28 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019e0d0e-1dc3-7666-8038-570f2625b49f/ URLQuery: https://urlquery.net/report/fd2818fe-f53e-41c7-9753-94e6a6780aeb Wayback Machine: https://web.archive.org/web/*/kcosta.top crt.sh CT logs: https://crt.sh/?q=%25.kcosta.top Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=kcosta.top AlienVault OTX: https://otx.alienvault.com/indicator/domain/kcosta.top URLhaus: https://urlhaus.abuse.ch/host/kcosta.top/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-09 17:07:31 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy’s automated threat analysis has identified kcosta.top as a live credential-theft phishing domain deployed to harvest user login secrets. This campaign does not appear to leverage a publicly known drainer kit or brand impersonation; instead, the domain is likely operating as a standalone mimicry page aimed at deceiving visitors into entering credentials on a spoofed or fake login portal. Given the absence of an obvious drainer signature and the lack of a prominent brand target in available feeds, the operational goal remains credential harvesting for subsequent account takeover or sale on illicit markets. This domain resolves to IP 163.61.188.5 and was registered through Global Domain Group LLC on April 18, 2026, just days before the first detection. The registration is recent, suggesting opportunistic acquisition to evade legacy blocklists. A Let’s Encrypt SSL certificate has been provisioned, increasing realism and enabling encrypted credential exfiltration. VirusTotal analysis shows only 3 of 95 security vendors currently flagging the domain, reflecting low initial coverage and high potential for successful delivery. The domain remains unlisted in Google Safe Browsing (GSB) at time of analysis and has accrued zero detections on other major blocklists, indicating a nascent but rapidly escalating threat profile. As of this report, kcosta.top remains active and elevated in risk status. Immediate defensive actions include DNS-level blocking via firewall rules or RPZ feeds, browser policy updates to deny navigation, and endpoint monitoring for callback traffic to 163.61.188.5. While the current footprint is limited, the domain’s recency and use of a reputable SSL issuer increase the risk of broader propagation through social engineering campaigns. Users should avoid clicking links to kcosta.top and report any suspected exposure via official phishing reporting channels. PhishDestroy continues to monitor this domain and will update stakeholders as new IOCs emerge. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260509-3F1D2F Favicon MD5: d06ec822cbee31b15e17734d919cb6b3 TLS cert SHA-256: 67245f85413eaf3e3714418cd2d54df383702c187ab3e87088eec14d9fb7c9a7 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/kcosta.top/ JSON API: https://api.destroy.tools/v1/check?domain=kcosta.top Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 148,214 domains (45,139 alive under monitoring, 102,795 confirmed takedowns/dead). Site: https://phishdestroy.io