# PhishDestroy threat dossier — preqin.cyou ================================================================ Fetched: 2026-05-02 03:16:27 UTC Canonical: https://phishdestroy.io/domain/preqin.cyou/ ## VERDICT ---------------------------------------------------------------- TAKEN DOWN (neutralised) Composite threat score: 40/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 0/94 security vendors flagged this domain ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 172.67.223.128 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: Gname.com Pte. Ltd. Nameservers: archer.ns.cloudflare.com, emerie.ns.cloudflare.com Registered: 2026-01-23 Page title: PREQIN ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WE1 Expires: 2026-07-11 Status: INVALID chain Fingerprint: 37b944db5d2c1295c3140e3096352737a849b03af3729b5111fb8d5d9b54f9f2 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: CLOSED — no report required. This domain was neutralised before the abuse-report cycle could be dispatched — either the hosting provider / registrar suspended it on their own, the DNS went dead, or the operator abandoned the infrastructure. PhishDestroy keeps the evidence bundle on file for audit but no formal notice was sent. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-01-23 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-21 21:04:50 UTC (by PhishDestroy tracker) Last verified: 2026-04-23 01:28:09 UTC Neutralised: 2026-04-23 00:28:09 UTC Current status: taken down (registrar suspended or DNS dead) ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019db132-f1c7-70d8-a2ed-2100d5f23691/ Wayback Machine: https://web.archive.org/web/*/preqin.cyou crt.sh CT logs: https://crt.sh/?q=%25.preqin.cyou Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=preqin.cyou AlienVault OTX: https://otx.alienvault.com/indicator/domain/preqin.cyou URLhaus: https://urlhaus.abuse.ch/host/preqin.cyou/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-21 21:07:40 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies preqin.cyou as an active credential-stealing phishing domain that impersonates the legitimate investment research platform Preqin. This malicious site is designed to trick users into entering their login credentials or personal information by presenting a convincing replica of Preqin's interface. Once harvested, stolen credentials can be used to access real accounts, leading to financial fraud, data breaches, or identity theft. Users who interact with this domain risk exposing sensitive professional or financial data to cybercriminals. This domain was flagged by PhishDestroy with a risk status of 'under_investigation' and currently shows 0 detections out of 95 on VirusTotal, indicating it has not yet been widely blacklisted. The domain was registered on January 23, 2026, through Gname.com Pte. Ltd., a registrar known for accommodating high-risk domains. It resolves to the IP address 172.67.223.128 and utilizes a Google Trust Services SSL certificate to appear legitimate. Despite its recent creation, the domain's lack of detections highlights the importance of proactive monitoring, as threat actors often exploit newly registered domains before they are widely recognized as malicious. If you have visited preqin.cyou or entered any credentials, immediately change your passwords on the legitimate Preqin platform and enable multi-factor authentication if available. Run a full antivirus scan on your device to detect any malware that may have been installed. Consider reporting the domain to your IT department or cybersecurity team and avoid interacting with it further. For a detailed analysis and additional safety measures, consult the full report on this threat. Stay vigilant, as credential-stealing phishing sites like preqin.cyou evolve rapidly to evade detection. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: 58abaa5b083ecc60dc68f8d9f3aa7bc1 TLS cert SHA-256: 37b944db5d2c1295c3140e3096352737a849b03af3729b5111fb8d5d9b54f9f2 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/preqin.cyou/ JSON API: https://api.destroy.tools/v1/check?domain=preqin.cyou Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io