# PhishDestroy threat dossier — mytax-organizerab3db8eb-8ab6-41a9-912c-783a84bf4867.ccc-food.com ================================================================ Fetched: 2026-04-30 17:15:07 UTC Canonical: https://phishdestroy.io/domain/mytax-organizerab3db8eb-8ab6-41a9-912c-783a84bf4867.ccc-food.com/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users (type: content_divergence) (score: 1/6) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 11/95 security vendors flagged this domain Flagging vendors: ADMINUSLabs, BitDefender, Cluster25, CyRadar, ESET, Fortinet, G-Data, Gridinsoft, LevelBlue, SOCRadar, Sophos URLQuery: 2 detections Public blocklists: listed on 2 independent blocklists ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 192.185.156.195 (US, Ashburn) ASN: AS31898 Oracle Corporation Hosting org: Oracle Corporation Registrar: Dynadot Inc Nameservers: ns1427.websitewelcome.com, ns1428.websitewelcome.com Registered: 2025-11-03 Page title: Adobe Acrobat - Secure Access HTTP response: 406 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R12 Expires: 2026-06-04 Status: INVALID chain Fingerprint: b1b5def0622c53eb91b18f35ec44a706952d57b46415dd5fb6f4b8d408b0a0d4 Subject Alternative Names (related infrastructure — often same operator): - ccc-food.com ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2025-11-03 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-30 13:45:52 UTC (by PhishDestroy tracker) First reported: 2026-04-30 10:47:26 UTC (abuse notice filed) Last verified: 2026-04-30 19:50:09 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019dddfd-6699-71d8-a306-f8bf773ef8b1/ URLQuery: https://urlquery.net/report/ecef6e77-3f07-479c-805c-394bf355163f Wayback Machine: https://web.archive.org/web/*/mytax-organizerab3db8eb-8ab6-41a9-912c-783a84bf4867.ccc-food.com crt.sh CT logs: https://crt.sh/?q=%25.mytax-organizerab3db8eb-8ab6-41a9-912c-783a84bf4867.ccc-food.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=mytax-organizerab3db8eb-8ab6-41a9-912c-783a84bf4867.ccc-food.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/mytax-organizerab3db8eb-8ab6-41a9-912c-783a84bf4867.ccc-food.com URLhaus: https://urlhaus.abuse.ch/host/mytax-organizerab3db8eb-8ab6-41a9-912c-783a84bf4867.ccc-food.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-30 13:47:00 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies an active generic phishing threat hosted on mytax-organizerab3db8eb-8ab6-41a9-912c-783a84bf4867.ccc-food.com. This domain mimics legitimate tax organization services to deceive users into submitting sensitive personal and financial information. Attackers leverage social engineering tactics, such as urgency or fear, to trick victims into disclosing credentials or payment details. The domain resolves to IP 199.185.156.195 and operates with a Let’s Encrypt SSL certificate, adding a false sense of legitimacy. This domain was flagged by 11 out of 95 VirusTotal security vendors, indicating widespread recognition as a threat. It was registered via Dynadot Inc on November 3, 2025, and currently appears on 2 security blocklists, including OpenPhish and PhishingArmy. The recent creation date and active status suggest this is a newly deployed infrastructure designed to evade detection. The combination of a newly registered domain, low detection rates, and active phishing content creates an elevated risk for unsuspecting users. If you visited this domain or entered any information, immediately cease use and change passwords or payment details that may have been exposed. Run a full antivirus scan and monitor accounts for suspicious activity. Report the domain to your IT team or security provider and avoid clicking any links or downloading files from this site. Exercise caution with domains resembling tax services, especially those recently registered or lacking verifiable legitimacy. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260430-7805A5 TLS cert SHA-256: b1b5def0622c53eb91b18f35ec44a706952d57b46415dd5fb6f4b8d408b0a0d4 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/mytax-organizerab3db8eb-8ab6-41a9-912c-783a84bf4867.ccc-food.com/ JSON API: https://api.destroy.tools/v1/check?domain=mytax-organizerab3db8eb-8ab6-41a9-912c-783a84bf4867.ccc-food.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io