# PhishDestroy threat dossier — omni-tools.vip ================================================================ Fetched: 2026-05-07 03:54:03 UTC Canonical: https://phishdestroy.io/domain/omni-tools.vip/ ## VERDICT ---------------------------------------------------------------- SUSPICIOUS — under active investigation Composite threat score: 35/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 0/91 security vendors flagged this domain ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 172.67.190.193 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: Cloudflare, Inc. Nameservers: emerson.ns.cloudflare.com, mira.ns.cloudflare.com Registered: 2026-05-05 Page title: Omni | Universal Toolkit HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E7 Expires: 2026-08-03 Status: INVALID chain Fingerprint: 78e9f55811fb15130e7609a5e81b4b8f118c536bd679e1e5ea2b2a3d85cd01b8 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-05 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-07 02:38:37 UTC (by PhishDestroy tracker) Last verified: 2026-05-07 05:32:39 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019dffa6-c6d3-772b-a610-a368752e1fd7/ Wayback Machine: https://web.archive.org/web/*/omni-tools.vip crt.sh CT logs: https://crt.sh/?q=%25.omni-tools.vip Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=omni-tools.vip AlienVault OTX: https://otx.alienvault.com/indicator/domain/omni-tools.vip URLhaus: https://urlhaus.abuse.ch/host/omni-tools.vip/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-07 02:39:08 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies omni-tools.vip as a domain hosting counterfeit software tools to trick users into downloading malicious installers or entering login details. The site mimics legitimate software platforms, luring visitors with promises of free productivity tools or cracked software versions. Once accessed, victims risk credential theft, malware infections, or financial fraud through credential-harvesting forms disguised as software activation pages. This domain was specifically observed promoting fake versions of popular utilities such as PDF converters, system cleaners, or office suites, which are common vectors for malware delivery and data exfiltration. This domain was flagged based on behavioral analysis and threat intelligence correlation. It resolved to IP address 172.67.190.193, registered on May 5, 2026, through Cloudflare, Inc. The domain uses a valid SSL certificate issued by Let’s Encrypt to appear legitimate and avoid browser warnings. Despite zero detections on VirusTotal (0/95 engines), the domain’s recent creation date and association with counterfeit software distribution strongly indicate active malicious intent. Registrations through Cloudflare and the use of trusted SSL certificates are common tactics to bypass initial security checks and build false trust with potential victims. If you visited omni-tools.vip, do not enter any login credentials, payment details, or sensitive information. Disconnect from the site immediately and scan your device with updated antivirus software. If you downloaded any files, do not execute them and quarantine or delete them. Change passwords for accounts used on this site or on any device connected to the same network, as credentials may have been captured. Report the domain to your IT team or security provider. Avoid similar sites offering free software or tools from untrusted sources in the future—only download software from official vendors or verified platforms. Monitor financial accounts for unauthorized transactions and consider enabling two-factor authentication on critical services. Stay vigilant, as this domain may be part of a broader campaign involving fake toolkits and credential theft. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: 6f0fd9731195dd47ddacdca2bf7fab2b TLS cert SHA-256: 78e9f55811fb15130e7609a5e81b4b8f118c536bd679e1e5ea2b2a3d85cd01b8 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/omni-tools.vip/ JSON API: https://api.destroy.tools/v1/check?domain=omni-tools.vip Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 146,646 domains (58,333 alive under monitoring, 87,941 confirmed takedowns/dead). Site: https://phishdestroy.io