# seemabca106a-oss.github.io — MALICIOUS > New phishing site seemabca106a-oss.github.io mimics banking login to steal credentials. 5/95 vendors flag it. Check the full report. ## Summary PhishDestroy identifies an active phishing domain, seemabca106a-oss.github.io, posing as a legitimate bank login portal to harvest user credentials and install malware. This elevated-risk site is designed to trick visitors into entering sensitive information under the guise of routine account verification, potentially exposing them to financial loss or identity theft. The attackers behind this campaign rely on spoofed branding and urgent language to bypass user skepticism and increase the likelihood of interaction. Based on observed patterns, this domain is likely distributed through phishing emails or social media messages targeting banking customers, urging immediate action under false pretenses such as account suspension or security updates. Visiting this site may also result in unauthorized downloads or script-based attacks leveraging the browser environment. Users who encounter this URL should avoid any interaction and report the message to their bank or trusted cybersecurity channels immediately. This domain was flagged by 5 out of 95 security vendors on VirusTotal and remains unresolved by most detection systems due to its recent creation. Registered via GitHub, Inc., the domain resolves to IP address 185.199.108.153 and utilizes a Let's Encrypt SSL certificate to appear trustworthy. Google Safe Browsing classifies it under SOCIAL_ENGINEERING, indicating active misuse for deceptive purposes. The use of a GitHub subdomain is a common tactic among threat actors to exploit the platform’s reputation and bypass initial domain-based filtering mechanisms. While GitHub has legitimate purposes, malicious actors frequently misuse its services to host phishing pages due to ease of deployment and low operational cost. The combination of a valid SSL certificate and a trusted hosting provider increases the likelihood that unsuspecting users will interact with the content, unaware of its malicious nature. The risk level remains elevated due to the active status and low detection rate across security platforms. If you have already visited seemabca106a-oss.github.io, do not enter any personal or financial information on the page. Immediately close the browser tab or window and clear your browsing data if prompted. Scan your device using updated antivirus software to detect any potential malware or unauthorized access attempts. If you entered login credentials, change your passwords immediately, enable multi-factor authentication on your bank account, and monitor your financial statements for unauthorized transactions. Report the phishing attempt to your bank’s fraud department and file a complaint with the FBI Internet Crime Complaint Center (IC3) if applicable. Avoid clicking on any links or downloading files from similar emails or messages in the future. Enable browser-based phishing and malware protection features, and consider using a reputable DNS filter service to block known malicious domains. Stay vigilant: cybercriminals continue to evolve tactics, and timely reporting helps disrupt ongoing campaigns. ## Threat Details - Verdict: MALICIOUS - Site status: unknown (HTTP ?) ## Domain Intelligence - Registrar: GitHub, Inc. - IP: 185.199.108.153 ## Detection Status - VirusTotal: 5 vendors flagged - Google Safe Browsing: FLAGGED - Blocklists: 0 hits ## Evidence - Cloudflare Radar: https://radar.cloudflare.com/scan/1f68034f-8c1b-44e5-9c1d-c6f7d7a5c4d2 - PhishDestroy: https://phishdestroy.io/domain/seemabca106a-oss.github.io/ - LLM endpoint: https://phishdestroy.io/domain/seemabca106a-oss.github.io/llm.txt ## If You Visited This Site 1. Change any passwords you may have entered 2. Enable 2FA on all related accounts 3. Monitor your accounts for unauthorized activity 4. Report to: FBI IC3, Europol, local authorities --- Report by PhishDestroy | https://phishdestroy.io/domain/seemabca106a-oss.github.io/ Last updated: 2026-03-26