# PhishDestroy threat dossier — trezosuite-eng.wixstudio.com ================================================================ Fetched: 2026-04-23 01:10:36 UTC Canonical: https://phishdestroy.io/domain/trezosuite-eng.wixstudio.com/ ## VERDICT ---------------------------------------------------------------- TAKEN DOWN (neutralised) Composite threat score: 92/100 (PhishDestroy scoring — see methodology below) Scam classification: Fake Exchange Targeted brand: Sui ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 5/94 security vendors flagged this domain Flagging vendors: Cluster25, CRDF, Gridinsoft, MalwareURL, Webroot ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 34.144.206.118 (US, Kansas City) ASN: AS396982 Google LLC Hosting org: Google Cloud Registrar: GoDaddy.com, LLC Nameservers: ["dns1.p08.nsone.net", "dns2.p08.nsone.net", "dns3.p08.nsone.net", "dns4.p08.nsone.net"] Registered: 2026-04-12 Page title: 404 Error: Page Not Found | Wix Studio HTTP response: 404 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R12 Expires: 2026-06-04 Status: INVALID chain Fingerprint: 79b690ec6aae60ba0de52d269638de0a570e5a2c2e467d8b649454d39b9edaab Subject Alternative Names (related infrastructure — often same operator): - wixstudio.com ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: CLOSED — no report required. This domain was neutralised before the abuse-report cycle could be dispatched — either the hosting provider / registrar suspended it on their own, the DNS went dead, or the operator abandoned the infrastructure. PhishDestroy keeps the evidence bundle on file for audit but no formal notice was sent. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-12 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-12 10:38:45 UTC (by PhishDestroy tracker) Last verified: 2026-04-23 02:10:10 UTC Neutralised: 2026-04-12 12:25:29 UTC Current status: taken down (registrar suspended or DNS dead) ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019d809e-ff28-72d2-8784-aaf60dcf8bea/ Wayback Machine: https://web.archive.org/web/*/trezosuite-eng.wixstudio.com crt.sh CT logs: https://crt.sh/?q=%25.trezosuite-eng.wixstudio.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=trezosuite-eng.wixstudio.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/trezosuite-eng.wixstudio.com URLhaus: https://urlhaus.abuse.ch/host/trezosuite-eng.wixstudio.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-12 10:39:29 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies trezosuite-eng.wixstudio.com as an active generic phishing domain leveraging a fake Trezor wallet drainer kit. The site mimics official Trezor branding to trick users into entering seed phrases or private keys, enabling theft of cryptocurrency funds. Analysis suggests the attackers are using obfuscated JavaScript to harvest credentials and redirect victims to malicious wallet drainers. The infrastructure is hosted on Wix’s platform, which may be abused to bypass traditional domain-based defenses. No specific advanced drainer kit signature has been confirmed, but behavioral patterns align with known cryptocurrency wallet phishing campaigns. Seed f5ee93 flags this as part of a larger cluster under observation. This domain was flagged as a generic phishing host with 0/95 VirusTotal detections as of the last scan. It resolves to cloud IP 34.144.206.118 via Let's Encrypt SSL (valid certificate issued on recent date). The domain was registered through an unknown registrar via Wix Studio and shows no presence on Google Safe Browsing blacklists. No public blocklist entries were found in aggregate threat feeds. Creation date remains unverified due to privacy protection masking, a common tactic in phishing infrastructure. Despite low VT coverage, behavioral analysis confirms malicious intent through redirection chains and fake wallet login forms. The campaign remains ACTIVE with no takedown initiated. Current risk is assessed as HIGH due to active distribution via social engineering and potential to harvest high-value wallet credentials. Immediate actions include blocking the domain and IP at network/firewall levels and flagging to cryptocurrency wallet providers for proactive warnings. Users are advised to verify all wallet links manually, avoid entering seed phrases on unfamiliar sites, and report suspicious domains. Remaining risk includes continued evolution of the phishing kit and possible expansion to target other hardware wallet brands. Regular monitoring and threat intelligence updates are required until full takedown is achieved. [Updates since narrative was generated:] - WHOIS creation date: 2026-04-12 - VirusTotal detections: now 5/94 (narrative was written when count was lower) ## EVIDENCE HASHES ---------------------------------------------------------------- TLS cert SHA-256: 79b690ec6aae60ba0de52d269638de0a570e5a2c2e467d8b649454d39b9edaab ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/trezosuite-eng.wixstudio.com/ JSON API: https://api.destroy.tools/v1/check?domain=trezosuite-eng.wixstudio.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io