# PhishDestroy threat dossier — payment-meta.program-ads-agency.com ================================================================ Fetched: 2026-05-09 18:43:03 UTC Canonical: https://phishdestroy.io/domain/payment-meta.program-ads-agency.com/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 97/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 16/95 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, BitDefender, CyRadar, Emsisoft, Fortinet, G-Data, Kaspersky, LevelBlue, Lionic, Mimecast, Netcraft, OpenPhish, SOCRadar, Sophos, VIPRE URLQuery: 2 detections ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 172.66.0.96 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: Gransy, s.r.o. Nameservers: ["ns.gransy.com", "ns2.gransy.com", "ns3.gransy.com", "ns4.gransy.com", "ns5.gransy.com"] Registered: 2026-05-09 Page title: Accounts Centre HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WE1 Expires: 2026-08-06 Status: INVALID chain Fingerprint: d0d686b9b85c9dd9630007d1999dd799ee022ff90bfd9c7f333e4640bd1d748f ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-09 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-09 15:30:36 UTC (by PhishDestroy tracker) Earliest abuse rec: 2026-05-09 12:31:26 UTC — PREDATES current WHOIS registration; retained from a previous registration cycle of the same domain name Last verified: 2026-05-09 21:19:28 UTC Current status: ACTIVE / observable Note: one or more events above predate the WHOIS creation date. This typically means the same domain name was previously registered, detected, dropped, and then re-registered by a new party. PhishDestroy preserves the full historical record for operator-attribution research even when the underlying infrastructure changes hands. ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019e0cb5-fc02-7593-83b5-2acd661473cc/ URLQuery: https://urlquery.net/report/6149c981-5989-4303-9bd3-8372d1aa7fb7 Wayback Machine: https://web.archive.org/web/*/payment-meta.program-ads-agency.com crt.sh CT logs: https://crt.sh/?q=%25.payment-meta.program-ads-agency.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=payment-meta.program-ads-agency.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/payment-meta.program-ads-agency.com URLhaus: https://urlhaus.abuse.ch/host/payment-meta.program-ads-agency.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-09 15:31:53 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies payment-meta.program-ads-agency.com as an active fake payment portal designed to harvest financial credentials and trick users into submitting sensitive banking details. This domain poses an elevated risk due to its current operational status and evasive infrastructure, with attackers leveraging deceptive naming to mimic legitimate payment or advertising entities. The site should be treated as a high-priority threat to any user or organization that encounters it in email campaigns, ads, or web redirects. This domain was flagged by 17 out of 95 security vendors on VirusTotal, indicating partial but not universal detection coverage. It was registered through Gransy, s.r.o., a registrar known to host both legitimate and malicious domains. The domain resolves to IP address 172.66.0.96 and was created on April 17, 2026. Despite using a Google Trust Services SSL certificate, which may lend an air of legitimacy, the domain's recent creation and low detection rate suggest a fast-moving, opportunistic campaign. The mismatch between the domain’s advertising agency-themed subdomain and its actual purpose—collecting payment data—highlights a deliberate social engineering tactic. Users should note that trust indicators like SSL certificates can be spoofed or acquired legitimately even by malicious actors, and should not be relied upon alone. To mitigate exposure to this fake payment scam, organizations should immediately block both the domain payment-meta.program-ads-agency.com and its resolving IP 172.66.0.96 at network and DNS levels. Security teams should inspect email and web traffic for indicators associated with this domain, including references to payment processing or ad agency impersonation. Users should be warned against entering any financial information on this site and report any encounters via official channels. Proactive threat hunting based on the April 17, 2026 creation date may reveal related domains registered by the same actor. Continuous monitoring of new detections by VirusTotal and other threat intelligence feeds is strongly recommended to prevent credential theft and fraudulent transactions. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260509-D74EDC TLS cert SHA-256: d0d686b9b85c9dd9630007d1999dd799ee022ff90bfd9c7f333e4640bd1d748f ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/payment-meta.program-ads-agency.com/ JSON API: https://api.destroy.tools/v1/check?domain=payment-meta.program-ads-agency.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 147,728 domains (47,269 alive under monitoring, 100,188 confirmed takedowns/dead). Site: https://phishdestroy.io