# PhishDestroy threat dossier — pharosnetwsworks.com ================================================================ Fetched: 2026-05-05 18:50:18 UTC Canonical: https://phishdestroy.io/domain/pharosnetwsworks.com/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 10/91 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, CRDF, ESET, Emsisoft, Fortinet, G-Data, Gridinsoft, Netcraft, Sophos ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 172.67.147.165 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: Global Domain Group LLC Nameservers: ["bonnie.ns.cloudflare.com", "renan.ns.cloudflare.com"] Registered: 2026-05-04 Page title: X. It’s what’s happening / X HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E8 Expires: 2026-08-02 Status: INVALID chain Fingerprint: a34e31a0d324827a74de7f5115a7bac3a0fc9d0d4a55c5f121424ab683af386b ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-04 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-04 05:03:33 UTC (by PhishDestroy tracker) Last verified: 2026-05-05 20:39:10 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019df0b9-13bb-778c-baf9-c5da079051e1/ Wayback Machine: https://web.archive.org/web/*/pharosnetwsworks.com crt.sh CT logs: https://crt.sh/?q=%25.pharosnetwsworks.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=pharosnetwsworks.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/pharosnetwsworks.com URLhaus: https://urlhaus.abuse.ch/host/pharosnetwsworks.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-04 05:04:06 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies pharosnetwsworks.com as an active credential-phishing domain designed to harvest login credentials under the guise of a legitimate service. This domain mimics trusted branding to trick victims into submitting usernames, passwords, or other sensitive information into fraudulent forms. The attackers likely use stolen credentials to gain unauthorized access to corporate portals, email accounts, or financial services, which can lead to further compromise such as data exfiltration, account takeover, or lateral network movement. Users who enter credentials on this site risk immediate credential exposure and potential follow-on attacks against associated accounts. This domain was flagged by PhishDestroy after analysis revealed several red flags. VirusTotal currently shows 0 out of 95 detection engines flagging the domain, indicating it remains unlisted on most blocklists despite active deployment. The domain resolves to IP address 172.67.147.165 and is registered through Global Domain Group LLC on May 04, 2026—an unusually recent creation that is highly suspicious for brand impersonation campaigns. SSL certificates issued by Let’s Encrypt are commonly abused in phishing due to their low cost and automated issuance, further lowering the barrier for attackers. If you visited pharosnetwsworks.com or entered any credentials, immediately change the passwords for those accounts and enable multi-factor authentication where available. Monitor accounts for unusual login attempts or transactions. Report the domain to your security team or use PhishDestroy’s blocklist tools to prevent future access. Avoid reusing passwords across services—especially those submitted to unknown or newly registered domains. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: c105da23200667081f91b7c476f1bde9 TLS cert SHA-256: a34e31a0d324827a74de7f5115a7bac3a0fc9d0d4a55c5f121424ab683af386b ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/pharosnetwsworks.com/ JSON API: https://api.destroy.tools/v1/check?domain=pharosnetwsworks.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 146,030 domains (61,129 alive under monitoring, 84,640 confirmed takedowns/dead). Site: https://phishdestroy.io