# PhishDestroy threat dossier — krakendarknetonion.shop ================================================================ Fetched: 2026-04-25 17:29:31 UTC Canonical: https://phishdestroy.io/domain/krakendarknetonion.shop/ ## VERDICT ---------------------------------------------------------------- TAKEN DOWN (neutralised) Composite threat score: 78/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Kraken ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 3/94 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, Kaspersky ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 172.67.212.183 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: Nicenic International Group Co., Limited !!! REGISTRAR INTEGRITY ALERT — NiceNIC !!! NiceNIC International: over 90% of its registered domains are associated with illegal content; documented systematic abuse-report non-response. Primary sources: https://phishdestroy.io/nicenic-real https://phishdestroy.io/nicenic-verdict Nameservers: ["burt.ns.cloudflare.com", "malavika.ns.cloudflare.com"] Registered: 2026-03-29 Page title: Рабочее зеркало магазина Кракен — Кракен зеркало рабочее. Актуальные ссылки на Kraken onion. Обход блокировки Кра ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WE1 Expires: 2026-05-24 Status: INVALID chain Fingerprint: 9446b7d8dcc9ec31d8b2ce7b2beb89790ff396f89c135b8acc781cbaf38bdba8 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: CLOSED — no report required. This domain was neutralised before the abuse-report cycle could be dispatched — either the hosting provider / registrar suspended it on their own, the DNS went dead, or the operator abandoned the infrastructure. PhishDestroy keeps the evidence bundle on file for audit but no formal notice was sent. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-03-29 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-03-29 03:11:06 UTC (by PhishDestroy tracker) Last verified: 2026-04-23 07:40:56 UTC Neutralised: 2026-04-23 02:14:08 UTC Current status: taken down (registrar suspended or DNS dead) ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019d36ec-c274-753a-95f5-84a9cc9097b4/ Wayback Machine: https://web.archive.org/web/*/krakendarknetonion.shop crt.sh CT logs: https://crt.sh/?q=%25.krakendarknetonion.shop Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=krakendarknetonion.shop AlienVault OTX: https://otx.alienvault.com/indicator/domain/krakendarknetonion.shop URLhaus: https://urlhaus.abuse.ch/host/krakendarknetonion.shop/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-03-29 03:12:06 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies krakendarknetonion.shop as an active fake login page impersonating Kraken, a legitimate cryptocurrency exchange platform. This domain specifically targets users by mimicking Kraken’s official website to steal login credentials and potentially drain cryptocurrency wallets connected to compromised accounts. The site leverages a deceptive domain structure combining 'Kraken' with 'Darknet' and 'Onion' to imply hidden or illicit services, which is a common tactic to lure victims seeking untraceable transactions. Upon visiting, users are presented with a counterfeit login interface designed to capture email and password combinations, as well as two-factor authentication codes, which are then harvested by threat actors for unauthorized account access and fund transfers. This domain was flagged with a low detection rate of 1 out of 95 security vendors on VirusTotal, indicating minimal recognition by automated scanners despite its malicious intent. The domain resolves to IP address 172.67.212.183, which is associated with Cloudflare infrastructure, a common hosting provider for both legitimate and malicious sites due to its anonymity features. The SSL certificate is issued by Google Trust Services, a legitimate certificate authority, which may lend an air of legitimacy to unsuspecting users. The domain was registered recently, with a creation date within the last few months, suggesting a short-lived operation intended to avoid long-term scrutiny. Its primary threat is credential harvesting and subsequent cryptocurrency theft, making it particularly dangerous for users who reuse passwords across multiple platforms or have linked financial accounts to their Kraken profile. Users who visited krakendarknetonion.shop should immediately cease interaction with the site and avoid entering any credentials or personal information. If login details were submitted, change the password on Kraken’s official website immediately and enable two-factor authentication if not already active. Review recent account activity for unauthorized transactions and report any suspicious activity to Kraken’s support team. Additionally, users should scan their devices for malware using reputable antivirus software, as threat actors may have deployed keyloggers or other malicious payloads during the interaction. For further verification, consult PhishDestroy’s threat intelligence database to confirm the domain’s status and receive real-time updates on emerging threats. Proactive monitoring of financial accounts linked to cryptocurrency exchanges is strongly advised to mitigate potential losses. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: 494429f25a9d209ff09272b229d3a7e0 TLS cert SHA-256: 9446b7d8dcc9ec31d8b2ce7b2beb89790ff396f89c135b8acc781cbaf38bdba8 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/krakendarknetonion.shop/ JSON API: https://api.destroy.tools/v1/check?domain=krakendarknetonion.shop Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io