# PhishDestroy threat dossier — mytax-organizere5004e2e-8747-4930-a8d8-ed2d8c12c7e2.ccc-food.com ================================================================ Fetched: 2026-04-30 17:15:07 UTC Canonical: https://phishdestroy.io/domain/mytax-organizere5004e2e-8747-4930-a8d8-ed2d8c12c7e2.ccc-food.com/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users (type: content_divergence) (score: 1/6) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 12/95 security vendors flagged this domain Flagging vendors: ADMINUSLabs, BitDefender, Cluster25, CyRadar, ESET, Fortinet, G-Data, Gridinsoft, LevelBlue, MalwareURL, SOCRadar, Sophos URLQuery: 2 detections Public blocklists: listed on 2 independent blocklists ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 192.185.156.195 (US, Ashburn) ASN: AS31898 Oracle Corporation Hosting org: Oracle Corporation Registrar: Dynadot Inc Nameservers: ns1427.websitewelcome.com, ns1428.websitewelcome.com Registered: 2025-11-03 Page title: Adobe Acrobat - Secure Access HTTP response: 406 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R12 Expires: 2026-06-04 Status: INVALID chain Fingerprint: b1b5def0622c53eb91b18f35ec44a706952d57b46415dd5fb6f4b8d408b0a0d4 Subject Alternative Names (related infrastructure — often same operator): - ccc-food.com ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2025-11-03 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-30 13:44:44 UTC (by PhishDestroy tracker) First reported: 2026-04-30 10:45:12 UTC (abuse notice filed) Last verified: 2026-04-30 19:50:09 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019dddfb-b407-761a-ae67-78fc1fd1f1b2/ URLQuery: https://urlquery.net/report/f505ee89-0d80-4344-8044-d458051bf67e Wayback Machine: https://web.archive.org/web/*/mytax-organizere5004e2e-8747-4930-a8d8-ed2d8c12c7e2.ccc-food.com crt.sh CT logs: https://crt.sh/?q=%25.mytax-organizere5004e2e-8747-4930-a8d8-ed2d8c12c7e2.ccc-food.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=mytax-organizere5004e2e-8747-4930-a8d8-ed2d8c12c7e2.ccc-food.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/mytax-organizere5004e2e-8747-4930-a8d8-ed2d8c12c7e2.ccc-food.com URLhaus: https://urlhaus.abuse.ch/host/mytax-organizere5004e2e-8747-4930-a8d8-ed2d8c12c7e2.ccc-food.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-30 13:45:41 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies active phishing infrastructure linked to a malicious domain that specifically targets users seeking tax organization tools. The domain mytax-organizere5004e2e-8747-4930-a8d8-ed2d8c12c7e2.ccc-food.com operates as a crypto drainer, designed to trick victims into connecting cryptocurrency wallets under the false pretense of tax filing assistance. This threat is currently active and poses a significant risk to individuals accessing financial or tax-related services online. This domain was flagged by 12 of 95 VirusTotal security vendors, indicating moderate but concerning detection across major threat intelligence platforms. The domain was registered through Dynadot Inc on November 03, 2025, and resolves to IP address 192.185.156.195. It has been observed on 2 security blocklists and utilizes a Let's Encrypt SSL certificate for fraudulent legitimacy. PhishDestroy notes that this domain is already blocked by OpenPhish and PhishingArmy, reinforcing its malicious classification. The combination of recent creation, low detection ratio, and active hosting on a suspicious IP underscores the elevated threat level of this campaign. Given the active status of this crypto drainer and its use of deceptive naming to impersonate legitimate tax organization services, PhishDestroy recommends immediate avoidance of this domain and any associated URLs. Users are advised to verify the authenticity of tax-related websites through trusted channels and to use security tools such as browser-based phishing filters or dedicated threat intelligence platforms. Organizations should update blocklists with this domain and IP (192.185.156.195) to prevent employee exposure. Continuous monitoring of this domain is advised due to the evolving nature of crypto drainer campaigns and the potential for expanded infrastructure. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260430-AC405A TLS cert SHA-256: b1b5def0622c53eb91b18f35ec44a706952d57b46415dd5fb6f4b8d408b0a0d4 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/mytax-organizere5004e2e-8747-4930-a8d8-ed2d8c12c7e2.ccc-food.com/ JSON API: https://api.destroy.tools/v1/check?domain=mytax-organizere5004e2e-8747-4930-a8d8-ed2d8c12c7e2.ccc-food.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io