# PhishDestroy threat dossier — microsoft.security.82a7c75895bc4ad7bbe3a494d299ee52.norreply.com ================================================================ Fetched: 2026-04-24 18:59:12 UTC Canonical: https://phishdestroy.io/domain/microsoft.security.82a7c75895bc4ad7bbe3a494d299ee52.norreply.com/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Microsoft ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 14/95 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, BitDefender, CRDF, CyRadar, Ermes, ESET, Fortinet, G-Data, Gridinsoft, Kaspersky, LevelBlue, OpenPhish, Seclookup URLQuery: 2 detections ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 88.198.84.106 (DE, Falkenstein) ASN: AS24940 Hetzner Online GmbH Hosting org: Hetzner Online GmbH Registrar: Hetzner Online GmbH Nameservers: ns.second-ns.com, ns1.your-server.de, ns3.second-ns.de Registered: 2026-04-23 Page title: Melden Sie sich an bei Ihrem Microsoft Konto HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R12 Expires: 2026-07-22 Status: INVALID chain Fingerprint: cfabc45fd563997e296d49f84db2f5a8e2232efedfc28fce15725ba0e064d473 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-23 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-24 16:51:26 UTC (by PhishDestroy tracker) First reported: 2026-04-24 13:53:17 UTC (abuse notice filed) Last verified: 2026-04-24 21:15:28 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019dbfc1-7a5b-732f-a249-8b6e545ad8b7/ URLQuery: https://urlquery.net/report/d593a50a-1ed6-4b76-9b36-a7fb984bd60a Wayback Machine: https://web.archive.org/web/*/microsoft.security.82a7c75895bc4ad7bbe3a494d299ee52.norreply.com crt.sh CT logs: https://crt.sh/?q=%25.microsoft.security.82a7c75895bc4ad7bbe3a494d299ee52.norreply.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=microsoft.security.82a7c75895bc4ad7bbe3a494d299ee52.norreply.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/microsoft.security.82a7c75895bc4ad7bbe3a494d299ee52.norreply.com URLhaus: https://urlhaus.abuse.ch/host/microsoft.security.82a7c75895bc4ad7bbe3a494d299ee52.norreply.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-24 16:52:49 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies the active domain microsoft.security.82a7c75895bc4ad7bbe3a494d299ee52.norreply.com as a high-risk brand impersonation threat impersonating Microsoft. The domain remains active as of the latest assessment, with a page title in German mimicking a Microsoft account login portal, specifically 'Melden Sie sich an bei Ihrem Microsoft Konto,' indicating a localized credential theft campaign targeting German-speaking users. The threat is classified as brand impersonation with the potential for credential theft, given the fraudulent login interface. This domain was flagged by 14 of 95 VirusTotal security vendors, indicating a significant but not universal detection rate. It is registered through Hetzner Online GmbH, resolves to IP address 88.198.84.106, and was created on April 23, 2026. The domain utilizes a Let's Encrypt SSL certificate, which may lend it an appearance of legitimacy to unsuspecting users. Despite its recent creation, the domain has already been included in multiple blocklists, reflecting its malicious nature. Trust scores for the domain and associated infrastructure remain critically low across threat intelligence platforms. The current status of this domain is active, and it poses an ongoing risk to users who may encounter it through email campaigns, malvertising, or compromised redirects. To mitigate exposure, organizations and individuals should immediately block the domain and IP address at the network perimeter. Users are advised to verify URLs before entering credentials, avoid clicking unsolicited links, and report suspicious communications to their security teams. Security teams should update threat intelligence feeds and firewall rules to include this domain and IP. Additionally, user awareness training should emphasize the risks of brand impersonation attacks, particularly those leveraging localized language to appear legitimate. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260424-8E15A5 Favicon MD5: 12e3dac858061d088023b2bd48e2fa96 TLS cert SHA-256: cfabc45fd563997e296d49f84db2f5a8e2232efedfc28fce15725ba0e064d473 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/microsoft.security.82a7c75895bc4ad7bbe3a494d299ee52.norreply.com/ JSON API: https://api.destroy.tools/v1/check?domain=microsoft.security.82a7c75895bc4ad7bbe3a494d299ee52.norreply.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io