# PhishDestroy threat dossier — uncmode.sbs ================================================================ Fetched: 2026-04-21 11:45:55 UTC Canonical: https://phishdestroy.io/domain/uncmode.sbs/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: Fake Airdrop Targeted brand: Airdrop Scam Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users (type: status_split) (score: 4/6) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 7/95 security vendors flagged this domain Flagging vendors: alphaMountain.ai, CRDF, CyRadar, Fortinet, Gridinsoft, LevelBlue, Webroot URLQuery: 2 detections Public blocklists: listed on 2 independent blocklists ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 188.114.97.3 Registrar: NICENIC INTERNATIONAL GROUP CO., LIMITED !!! REGISTRAR INTEGRITY ALERT — NiceNIC !!! NiceNIC International: over 90% of its registered domains are associated with illegal content; documented systematic abuse-report non-response. Primary sources: https://phishdestroy.io/nicenic-real https://phishdestroy.io/nicenic-verdict Nameservers: june.ns.cloudflare.com, nikon.ns.cloudflare.com Registered: 2026-04-15 Page title: unc | Airdrop HTTP response: 405 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E7 Expires: 2026-07-14 Status: INVALID chain Fingerprint: 060f5f0462284fc884c1d5f065df2ddd9d355fcd6fba0512844ed999678bb95c ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-15 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-21 11:38:10 UTC (by PhishDestroy tracker) First reported: 2026-04-21 09:16:50 UTC (abuse notice filed) Last verified: 2026-04-21 13:50:08 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019daf2f-5862-723d-8ac7-44ec2224bca4/ URLQuery: https://urlquery.net/report/25cc53ad-0ad6-41a2-b0e5-0171f6f30c97 Wayback Machine: https://web.archive.org/web/*/uncmode.sbs crt.sh CT logs: https://crt.sh/?q=%25.uncmode.sbs Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=uncmode.sbs AlienVault OTX: https://otx.alienvault.com/indicator/domain/uncmode.sbs URLhaus: https://urlhaus.abuse.ch/host/uncmode.sbs/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-21 11:38:54 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies uncmode.sbs as an active crypto wallet phishing domain designed to steal cryptocurrency from unsuspecting users. The site mimics legitimate wallet interfaces to trick visitors into entering private keys or seed phrases, which attackers then use to drain digital asset holdings. Once credentials are captured, criminals can immediately transfer funds to external wallets, leaving victims with irreversible losses. This domain is engineered to exploit trust in familiar wallet branding and urgent transaction prompts to bypass user skepticism. This domain was flagged by PhishDestroy after being detected on two major security blocklists and earning 7 detections out of 95 VirusTotal security vendors. It was registered on April 15, 2026, through NICENIC INTERNATIONAL GROUP CO., LIMITED, and uses a free Let’s Encrypt SSL certificate to appear legitimate. The domain resolves to IP 188.114.97.3 and has already been blocked by MetaMask and SEAL, two widely used crypto security tools, confirming its malicious intent. If you visited uncmode.sbs, immediately disconnect from the internet, close your browser, and run a full antivirus scan. Never enter wallet passwords, seed phrases, or private keys into any site linked from unsolicited messages or ads. Revoke any permissions granted to wallet-related apps and consider transferring remaining funds to a newly created, offline wallet. Report the domain to your antivirus provider and the platform where you encountered the link. Monitor blockchain transactions for unauthorized transfers and enable two-factor authentication on all crypto accounts to reduce future risk. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260421-119D65 Favicon MD5: 70360f20c4f2490695b178f7f422d3a0 TLS cert SHA-256: 060f5f0462284fc884c1d5f065df2ddd9d355fcd6fba0512844ed999678bb95c ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/uncmode.sbs/ JSON API: https://api.destroy.tools/v1/check?domain=uncmode.sbs Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io