# PhishDestroy threat dossier — nhnarticle-cafe.com ================================================================ Fetched: 2026-04-21 20:12:15 UTC Canonical: https://phishdestroy.io/domain/nhnarticle-cafe.com/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users (type: status_split) (score: 1/6) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 19/94 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, Chong Lua Dao, Cluster25, CRDF, CyRadar, ESET, Forcepoint ThreatSeeker, Fortinet, G-Data, Gridinsoft, Kaspersky, Lionic, MalwareURL, OpenPhish, SOCRadar, Sophos, VIPRE, Webroot URLQuery: 2 detections Public blocklists: listed on 2 independent blocklists ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 34.111.179.208 (US, Kansas City) ASN: AS396982 Google LLC Hosting org: Google Cloud Registrar: Name.com, Inc. Nameservers: ["ns1cny.name.com", "ns2ckr.name.com", "ns3jkl.name.com", "ns4hny.name.com"] Registered: 2026-04-16 Page title: 네이버 : 로그인 HTTP response: 404 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E7 Expires: 2026-07-09 Status: INVALID chain Fingerprint: e66823860fae8046fef8f6710af803274e1be6db67fd6071bc1cd3dc9c26c5ec ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-16 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-16 17:48:42 UTC (by PhishDestroy tracker) Earliest abuse rec: 2026-04-16 14:50:26 UTC — PREDATES current WHOIS registration; retained from a previous registration cycle of the same domain name Last verified: 2026-04-21 16:10:35 UTC Neutralised: 2026-04-17 20:07:39 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners Note: one or more events above predate the WHOIS creation date. This typically means the same domain name was previously registered, detected, dropped, and then re-registered by a new party. PhishDestroy preserves the full historical record for operator-attribution research even when the underlying infrastructure changes hands. ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019d96c2-2b6c-7766-9528-d7214f473c6e/ URLQuery: https://urlquery.net/report/b76c2b85-aea8-4739-9d0e-dfc1b0176bf2 Wayback Machine: https://web.archive.org/web/*/nhnarticle-cafe.com crt.sh CT logs: https://crt.sh/?q=%25.nhnarticle-cafe.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=nhnarticle-cafe.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/nhnarticle-cafe.com URLhaus: https://urlhaus.abuse.ch/host/nhnarticle-cafe.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-16 17:49:52 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] nhnarticle-cafe.com poses a significant threat by conducting credential harvesting attacks designed to steal sensitive user login information. This specific form of phishing manipulates victims into submitting usernames and passwords through deceptive web forms, potentially compromising personal and financial accounts. The domain is actively used in these scams, representing an elevated risk to users encountering it. Technical intelligence on nhnarticle-cafe.com reveals it was registered recently on April 10, 2026, using the registrar Name.com, Inc. The domain resolves to the IP address 34.111.179.208 and utilizes a Let's Encrypt SSL certificate, which may lend it an appearance of legitimacy. Out of 95 security vendors scanned on VirusTotal, 16 have flagged this domain as malicious. Additionally, nhnarticle-cafe.com is listed on 2 separate security blocklists maintained by PhishingArmy and Hagezi, underscoring its recognized threat status in the cybersecurity community. Users who have visited nhnarticle-cafe.com should immediately verify whether they entered any login credentials on the site. If so, it is critical to change those passwords on all affected accounts and enable two-factor authentication where possible. Running a comprehensive malware scan on their devices and monitoring financial statements for unauthorized transactions is also advised. Avoid interacting further with this domain, and consult security resources for ongoing updates. Early detection and prompt action are vital to mitigate the risks posed by this credential harvesting scam. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260416-ACEE40 Favicon MD5: 3da1c922da03a8eb567de092751aa32a TLS cert SHA-256: e66823860fae8046fef8f6710af803274e1be6db67fd6071bc1cd3dc9c26c5ec ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/nhnarticle-cafe.com/ JSON API: https://api.destroy.tools/v1/check?domain=nhnarticle-cafe.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io