# PhishDestroy threat dossier — tw-user.com ================================================================ Fetched: 2026-05-11 14:21:08 UTC Canonical: https://phishdestroy.io/domain/tw-user.com/ ## VERDICT ---------------------------------------------------------------- HIGH THREAT — malicious activity confirmed Composite threat score: 65/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 2/92 security vendors flagged this domain ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 172.67.203.211 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: Global Domain Group LLC Nameservers: erin.ns.cloudflare.com, moura.ns.cloudflare.com Registered: 2026-05-02 Page title: Trust - Crypto Card HTTP response: 403 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E7 Expires: 2026-07-31 Status: INVALID chain Fingerprint: 550c234d67471788e8e2a0290447cbbf3186ec2f4e7a0683a6c9cb2cda634b20 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-02 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-07 15:16:07 UTC (by PhishDestroy tracker) First reported: 2026-05-07 12:16:59 UTC (abuse notice filed) Last verified: 2026-05-10 19:40:04 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019e025d-2fa2-768c-895f-d02f7f8864cb/ URLQuery: https://urlquery.net/report/48842ba1-ef77-4ad1-9007-637338c14c8d Wayback Machine: https://web.archive.org/web/*/tw-user.com crt.sh CT logs: https://crt.sh/?q=%25.tw-user.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=tw-user.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/tw-user.com URLhaus: https://urlhaus.abuse.ch/host/tw-user.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-07 15:16:28 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies tw-user.com as an active generic phishing domain engaged in credential harvesting, likely targeting unsuspecting users through deceptive login portals. The threat involves tricking victims into submitting sensitive credentials, which are then harvested by attackers for unauthorized access or further exploitation. Security teams should treat this domain as high-risk due to its active status and lack of detections on VirusTotal, indicating potential evasion techniques or recent deployment. The absence of detections does not imply safety, as phishing domains often fly under the radar initially. This domain was flagged by PhishDestroy on seed 442874, with technical indicators including a Let's Encrypt SSL certificate, domain creation date of May 02, 2026, resolution to IP 172.67.203.211, and registration through Global Domain Group LLC. VirusTotal currently reports 0/95 detections, suggesting minimal detection coverage despite its active phishing operations. The domain’s recent creation and lack of blocklist entries highlight its potential for rapid deployment in campaigns before being widely recognized as malicious. The use of a legitimate SSL certificate further increases its deceptive appeal, as victims may overlook red flags in the URL. To mitigate risks associated with tw-user.com, users should avoid interacting with the domain entirely. Organizations should block the domain at the network level and inspect any related traffic for signs of credential submission. Security teams should monitor for any associated IP addresses or domains registered through Global Domain Group LLC, as these may indicate broader phishing infrastructure. Additionally, users should verify the legitimacy of login portals by cross-referencing URLs with official sources and enabling multi-factor authentication to reduce the impact of credential theft. Immediate reporting of this domain to PhishDestroy or relevant threat intelligence platforms can aid in faster takedowns and broader protection for the community. [Updates since narrative was generated:] - VirusTotal detections: now 2/92 (narrative was written when count was lower) ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260507-58890B Favicon MD5: 58fd2a12f571cafad976ed5feddeeacc TLS cert SHA-256: 550c234d67471788e8e2a0290447cbbf3186ec2f4e7a0683a6c9cb2cda634b20 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/tw-user.com/ JSON API: https://api.destroy.tools/v1/check?domain=tw-user.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 148,214 domains (45,060 alive under monitoring, 102,874 confirmed takedowns/dead). Site: https://phishdestroy.io