# PhishDestroy threat dossier — shining-whoever-570303.framer.app ================================================================ Fetched: 2026-05-02 16:08:51 UTC Canonical: https://phishdestroy.io/domain/shining-whoever-570303.framer.app/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 83/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 22/95 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, BitDefender, Cluster25, CRDF, CyRadar, ESET, Emsisoft, Forcepoint ThreatSeeker, Fortinet, G-Data, Gridinsoft, Kaspersky, LevelBlue, Lionic, Netcraft, OpenPhish, Phishtank, Seclookup, Sophos URLQuery: 2 detections Public blocklists: listed on 3 independent blocklists ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 31.43.161.6 (NL, Amsterdam) ASN: AS16509 Amazon.com, Inc. Hosting org: Framer B.V Registrar: REGISTRAR_NOT_FOUND Nameservers: NS_NOT_FOUND Registered: 2026-05-02 Page title: Connexion HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E8 Expires: 2026-07-06 Status: INVALID chain Fingerprint: a56001ff73b2e769ad9c3294e0330f0155d40d0a6c11de79e1b100ffba8ac44c ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-02 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-02 15:35:03 UTC (by PhishDestroy tracker) Earliest abuse rec: 2026-05-02 12:36:20 UTC — PREDATES current WHOIS registration; retained from a previous registration cycle of the same domain name Last verified: 2026-05-02 18:30:13 UTC Current status: ACTIVE / observable Note: one or more events above predate the WHOIS creation date. This typically means the same domain name was previously registered, detected, dropped, and then re-registered by a new party. PhishDestroy preserves the full historical record for operator-attribution research even when the underlying infrastructure changes hands. ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019de8ad-79cd-756e-a889-f4c39c441e61/ URLQuery: https://urlquery.net/report/276f7d85-9249-46c9-801f-52dca69309de Wayback Machine: https://web.archive.org/web/*/shining-whoever-570303.framer.app crt.sh CT logs: https://crt.sh/?q=%25.shining-whoever-570303.framer.app Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=shining-whoever-570303.framer.app AlienVault OTX: https://otx.alienvault.com/indicator/domain/shining-whoever-570303.framer.app URLhaus: https://urlhaus.abuse.ch/host/shining-whoever-570303.framer.app/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-02 15:36:12 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy is tracking an active phishing campaign utilizing the domain shining-whoever-570303.framer.app. This site impersonates a Connexion login page to harvest user credentials. The goal is to trick individuals into entering their usernames and passwords, which are then stolen by malicious actors. This can lead to account compromise, identity theft, and further unauthorized access to sensitive information. This domain presents a high risk and exhibits several indicators of malicious activity. The domain is currently listed on 3 security blocklists, including OpenPhish, PhishingArmy, and OISD. VirusTotal analysis reveals that 22 out of 95 security vendors have flagged this domain as malicious. The site uses an SSL certificate issued by Let's Encrypt, which is commonly used for both legitimate and malicious purposes, and resolves to the IP address 31.43.161.6. The page title is 'Connexion,' a common lure to deceive users. Users who have visited shining-whoever-570303.framer.app and entered their credentials should immediately change their passwords on the legitimate Connexion platform and any other accounts where the same password was used. Enable multi-factor authentication wherever possible to add an extra layer of security. Monitor accounts for any signs of unauthorized access or suspicious activity, such as password changes or unusual transactions. Report the incident to the Connexion support team and consider filing a report with law enforcement or a cybercrime reporting agency. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260502-859975 Favicon MD5: 076557678ab616c05cab4296117128bb TLS cert SHA-256: a56001ff73b2e769ad9c3294e0330f0155d40d0a6c11de79e1b100ffba8ac44c ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/shining-whoever-570303.framer.app/ JSON API: https://api.destroy.tools/v1/check?domain=shining-whoever-570303.framer.app Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io