# PhishDestroy threat dossier — trezosuite.com.co ================================================================ Fetched: 2026-05-05 16:36:32 UTC Canonical: https://phishdestroy.io/domain/trezosuite.com.co/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 87/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Trezor ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 0/91 security vendors flagged this domain ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 104.21.36.21 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: Dynadot Inc Nameservers: algin.ns.cloudflare.com, melina.ns.cloudflare.com Registered: 2026-05-01 Page title: Wabi Field Stationery HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WE1 Expires: 2026-07-30 Status: INVALID chain Fingerprint: 5faa166964bdb6bff9690d5fc51df789d3a579d55a5de45d78584bf7ba8d04b0 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-01 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-03 18:17:45 UTC (by PhishDestroy tracker) First reported: 2026-05-03 15:17:56 UTC (abuse notice filed) Last verified: 2026-05-05 13:06:55 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019dee68-b9de-7704-b445-9299ed272e74/ URLQuery: https://urlquery.net/report/b8ff8e23-4504-414f-89cb-df1083c8944d Wayback Machine: https://web.archive.org/web/*/trezosuite.com.co crt.sh CT logs: https://crt.sh/?q=%25.trezosuite.com.co Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=trezosuite.com.co AlienVault OTX: https://otx.alienvault.com/indicator/domain/trezosuite.com.co URLhaus: https://urlhaus.abuse.ch/host/trezosuite.com.co/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-03 18:18:04 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies active crypto drainer campaign operating from trezosuite.com.co, a fraudulent domain impersonating the legitimate TREZOR Suite cryptocurrency wallet interface. The domain resolves to IP address 104.21.36.21 and was registered through Dynadot Inc on May 01, 2026. VirusTotal currently shows zero detections across 95 engines with no blocklist entries, while the site maintains a valid SSL certificate issued by Google Trust Services. This combination of low detection rates and fresh domain age suggests a newly deployed operation with potential for rapid expansion and increased victim engagement. Technical indicators reveal a high-risk configuration with minimal defensive coverage. The domain's registration date places it just days old as of this assessment, providing attackers time to weaponize it before permanent takedown becomes likely. Zero VirusTotal detections contrast sharply with the domain's active hosting status and SSL certification, demonstrating effective evasion of automated scanning systems. The registrar Dynadot Inc typically processes registrations with minimal verification, which compounds the risk profile for this malicious infrastructure. Current threat intelligence shows no association with known blocklists or threat feeds, allowing unrestricted access to potential victims seeking cryptocurrency wallet services. Immediate mitigation requires verification through PhishDestroy before any interaction with trezosuite.com.co or similar wallet impersonation domains. Users should compare domain names against official TREZOR Suite channels and use hardware wallet verification for transaction confirmation. Disable browser extensions that may execute unauthorized transactions and enable transaction simulation features where available. Report any suspicious activity to PhishDestroy for immediate domain assessment and potential takedown coordination. Consider implementing DNS-level blocking of 104.21.36.21 to prevent access from organizational networks. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260503-21EA4F TLS cert SHA-256: 5faa166964bdb6bff9690d5fc51df789d3a579d55a5de45d78584bf7ba8d04b0 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/trezosuite.com.co/ JSON API: https://api.destroy.tools/v1/check?domain=trezosuite.com.co Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 146,028 domains (62,102 alive under monitoring, 83,651 confirmed takedowns/dead). Site: https://phishdestroy.io