# PhishDestroy threat dossier — phantomosteam.github.io ================================================================ Fetched: 2026-05-02 17:49:52 UTC Canonical: https://phishdestroy.io/domain/phantomosteam.github.io/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 84/100 (PhishDestroy scoring — see methodology below) Scam classification: cryptocurrency Targeted brand: Phantom (and: steam) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 2/95 security vendors flagged this domain Flagging vendors: ChainPatrol, alphaMountain.ai Public blocklists: listed on 3 independent blocklists Victim re-reports (public form): 1 ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 185.199.110.153 (US, San Francisco) ASN: ASAS54113 FASTLY, US Hosting org: AS54113 Fastly, Inc. Nameservers: N/A Page title: phantomosteam.github.io | PhantomOSTeam HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R12 Expires: 2026-05-07 Status: INVALID chain Fingerprint: 02bdd44d1137ce2317d9aaccd36f753caa1fbec7ee91cc5fae51d81e8ff7dca7 Subject Alternative Names (related infrastructure — often same operator): - github.com - github.io - githubusercontent.com ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- First detected: 2026-02-25 02:39:27 UTC (by PhishDestroy tracker) First reported: 2025-08-14 13:09:56 UTC (abuse notice filed) Last verified: 2026-04-12 22:45:04 UTC (STALE — 19 days ago, re-verify) Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/0198a958-45de-7623-930b-f7352c86a87c/ Wayback Machine: https://web.archive.org/web/*/phantomosteam.github.io crt.sh CT logs: https://crt.sh/?q=%25.phantomosteam.github.io Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=phantomosteam.github.io AlienVault OTX: https://otx.alienvault.com/indicator/domain/phantomosteam.github.io URLhaus: https://urlhaus.abuse.ch/host/phantomosteam.github.io/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-03-03 02:17:53 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies phantomosteam.github.io as a low-risk brand impersonation domain targeting the Phantom brand. The domain title 'phantomosteam.github.io | PhantomOSTeam' suggests an attempt to mimic or associate with the legitimate Phantom entity, potentially misleading users. Although the threat level is categorized as low, the domain’s impersonation strategy poses a risk to brand reputation and user trust. The underlying infrastructure resolves to IP address 185.199.108.153, a GitHub Pages server, indicating the site is hosted on a free and commonly used platform for static content. The domain appears on three distinct security blocklists, and VirusTotal flags it in 2 of 95 security vendor detections, reinforcing the need for caution. The lack of registration details complicates attribution, but the presence on multiple blocklists signals previous or ongoing abuse patterns tied to this domain. Currently, phantomosteam.github.io remains active and accessible. Users encountering this domain should exercise vigilance by verifying URLs and avoiding sharing sensitive information. Organizations should consider implementing domain filtering where appropriate and monitor related phishing attempts. PhishDestroy recommends ongoing surveillance of this domain's activity and timely reporting of suspicious behavior to maintain effective defenses against potential brand misuse. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon SHA-256: b620507312c5e97566a3c6cfaf99144fefc18a0da7d941401dfa0f5f58fb0368 TLS cert SHA-256: 02bdd44d1137ce2317d9aaccd36f753caa1fbec7ee91cc5fae51d81e8ff7dca7 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/phantomosteam.github.io/ JSON API: https://api.destroy.tools/v1/check?domain=phantomosteam.github.io Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io