# PhishDestroy threat dossier — mkrn.cc ================================================================ Fetched: 2026-04-25 17:52:27 UTC Canonical: https://phishdestroy.io/domain/mkrn.cc/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: Fake Exchange Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users (type: status_split) (score: 1/6) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 3/94 security vendors flagged this domain Flagging vendors: alphaMountain.ai, Chong Lua Dao, Forcepoint ThreatSeeker URLQuery: 6 detections ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 188.114.96.3 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: CloudFlare, Inc. Registrar: NICENIC INTERNATIONAL GROUP CO., LIMITED !!! REGISTRAR INTEGRITY ALERT — NiceNIC !!! NiceNIC International: over 90% of its registered domains are associated with illegal content; documented systematic abuse-report non-response. Primary sources: https://phishdestroy.io/nicenic-real https://phishdestroy.io/nicenic-verdict Nameservers: ["dave.ns.cloudflare.com", "grace.ns.cloudflare.com"] Registered: 2026-03-29 Page title: k.kraperehodnik.cc HTTP response: 429 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WE1 Expires: 2026-06-05 Status: INVALID chain Fingerprint: b4da0ca9efdc2801320ca098e4cf09b8b69f4a15162df09ad941576f5e8c64ee ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-03-29 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-03-29 02:40:09 UTC (by PhishDestroy tracker) Earliest abuse rec: 2026-03-28 23:42:27 UTC — PREDATES current WHOIS registration; retained from a previous registration cycle of the same domain name Last verified: 2026-04-23 04:09:24 UTC Neutralised: 2026-04-23 04:09:24 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners Note: one or more events above predate the WHOIS creation date. This typically means the same domain name was previously registered, detected, dropped, and then re-registered by a new party. PhishDestroy preserves the full historical record for operator-attribution research even when the underlying infrastructure changes hands. ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019d36d0-5265-700d-815b-bffbbc9c1e60/ URLQuery: https://urlquery.net/report/74da2bfd-490b-4c2e-a065-73762ea5c7eb Wayback Machine: https://web.archive.org/web/*/mkrn.cc crt.sh CT logs: https://crt.sh/?q=%25.mkrn.cc Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=mkrn.cc AlienVault OTX: https://otx.alienvault.com/indicator/domain/mkrn.cc URLhaus: https://urlhaus.abuse.ch/host/mkrn.cc/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-03-29 02:40:38 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies mkrn.cc as an active credential-phishing site posing an elevated risk to visitors’ login details. The domain lures users into submitting usernames and passwords to a spoofed interface, which is then harvested by attackers for account takeover and follow-on fraud. Anyone who enters data risks immediate compromise of the linked accounts and potential access to other synchronized services. This domain was flagged by the research community and registered on 26 January 2025. VirusTotal’s aggregated scan shows only 2 out of 95 participating security vendors currently detect the threat. The domain is hosted on IP address 188.114.96.3 and resolves via a Google Trust Services SSL certificate. The registrant chose NICENIC INTERNATIONAL GROUP CO., LIMITED as the registrar, a choice that complicates rapid takedown due to the provider’s operational jurisdiction. The page title “k.kraperehodnik.cc” suggests the attackers are abusing a compromised or look-alike subdomain to blend into traffic patterns and evade browser filters. To mitigate risk, users should never visit or submit data to mkrn.cc or any page that resembles it. Bookmark official login URLs directly and enable multi-factor authentication on every account. Report the domain to your browser vendor and network administrator if encountered. If you have already entered credentials, rotate passwords immediately and enable additional account-recovery options such as backup codes or hardware security keys. Monitor financial and identity records for signs of abuse and consider a password-manager reset across all critical services to sever any potential persistence introduced by credential reuse. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260328-8557E3 Favicon MD5: a9befa7ba1cefccf4f0f374a2188b49f TLS cert SHA-256: b4da0ca9efdc2801320ca098e4cf09b8b69f4a15162df09ad941576f5e8c64ee ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/mkrn.cc/ JSON API: https://api.destroy.tools/v1/check?domain=mkrn.cc Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io