# PhishDestroy threat dossier — microsofteam.top ================================================================ Fetched: 2026-05-07 05:05:51 UTC Canonical: https://phishdestroy.io/domain/microsofteam.top/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Microsoft Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users (type: redirect_split) (score: 4/6) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 0/91 security vendors flagged this domain ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 172.67.133.68 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: NameSilo, LLC !!! REGISTRAR INTEGRITY ALERT — NameSilo !!! NameSilo is a registrar documented by PhishDestroy as (1) publicly lying about received abuse reports, (2) shielding a $20M+ Monero-theft operation (xmrwallet.com) for 10 continuous years, and (3) retaliating against PhishDestroy by getting our X/Twitter account @Phish_Destroy banned after we published the evidence. Researchers/victims must ALWAYS CC compliance@icann.org on every abuse ticket — NameSilo has a track record of later claiming reports were never received. Primary sources: https://phishdestroy.io/namesilo-killed-our-twitter https://phishdestroy.io/xmrwallet-namesilo-exposed Nameservers: mckenzie.ns.cloudflare.com, west.ns.cloudflare.com Registered: 2026-05-05 Page title: Startpage Blocked HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E7 Expires: 2026-08-04 Status: INVALID chain Fingerprint: d778413190da580b09b3e1f138c7b48bf381fd5c5cb41282206be5beeaf4e377 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-05 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-07 02:39:18 UTC (by PhishDestroy tracker) Last verified: 2026-05-07 07:50:04 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019dffa6-264f-7558-8aef-c601654ff512/ Wayback Machine: https://web.archive.org/web/*/microsofteam.top crt.sh CT logs: https://crt.sh/?q=%25.microsofteam.top Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=microsofteam.top AlienVault OTX: https://otx.alienvault.com/indicator/domain/microsofteam.top URLhaus: https://urlhaus.abuse.ch/host/microsofteam.top/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-07 02:40:01 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies microsofteam.top as a live Microsoft impersonation site designed to steal your Microsoft account login credentials. Once harvested, attackers can access emails, files, and connected services, enabling further account takeovers and financial theft. This domain was flagged with zero detections on VirusTotal despite being registered on May 5, 2026, only days ago, and hosted on 172.67.133.68 through NameSilo, LLC with a Let’s Encrypt SSL certificate in place to appear legitimate. The combination of a newly created domain, low detection rate, and direct Microsoft branding signals an active credential harvesting campaign. If you visited microsofteam.top, immediately change your Microsoft password using a known-safe device and enable two-factor authentication. Scan your connected devices for malware and review recent sign-ins at account.microsoft.com/security for any unauthorized access. Report the domain to your email provider and consider enabling advanced phishing protection tools. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: 0a362a1a0cf4cc6bc56d65db8049dd6f TLS cert SHA-256: d778413190da580b09b3e1f138c7b48bf381fd5c5cb41282206be5beeaf4e377 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/microsofteam.top/ JSON API: https://api.destroy.tools/v1/check?domain=microsofteam.top Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 145,402 domains (58,115 alive under monitoring, 87,026 confirmed takedowns/dead). Site: https://phishdestroy.io