# PhishDestroy threat dossier — vlentevent-soc.cc ================================================================ Fetched: 2026-05-12 20:58:03 UTC Canonical: https://phishdestroy.io/domain/vlentevent-soc.cc/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 71/100 (PhishDestroy scoring — see methodology below) Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users (type: content_divergence) (score: 2/6) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 10/95 security vendors flagged this domain Flagging vendors: alphaMountain.ai, CRDF, CyRadar, Forcepoint ThreatSeeker, Fortinet, G-Data, Gridinsoft, Mimecast, Seclookup, Webroot ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 86.54.25.41 ASN: ASAS210006 ASKZ Shereverov Marat Ahmedovich, KZ Registrar: Gname.com Pte. Ltd. Nameservers: ns1.silkguard.net, ns2.silkguard.net Registered: 2026-04-23 Page title: Loading HTTP response: 200 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-23 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-12 22:52:51 UTC (by PhishDestroy tracker) First reported: 2026-05-12 19:57:15 UTC (abuse notice filed) Last verified: 2026-05-12 23:17:09 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019e1dbf-1f09-71ae-9254-e909a8720a87/ Wayback Machine: https://web.archive.org/web/*/vlentevent-soc.cc crt.sh CT logs: https://crt.sh/?q=%25.vlentevent-soc.cc Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=vlentevent-soc.cc AlienVault OTX: https://otx.alienvault.com/indicator/domain/vlentevent-soc.cc URLhaus: https://urlhaus.abuse.ch/host/vlentevent-soc.cc/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-12 22:53:15 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies vlentevent-soc.cc as an active crypto-draining phishing site masquerading as a crypto-event portal. The domain is engineered to trick visitors into connecting wallets so malicious scripts can siphon tokens under the guise of an airdrop or ticket sale. Security telemetry shows the page does not actually load content; instead it immediately scans for connected crypto wallets and prompts fraudulent transactions, making it especially dangerous for DeFi and NFT users seeking early access to events. This domain was flagged by ten out of ninety-five VirusTotal security vendors within hours of creation on April 23, 2026. The registrant concealed their identity through Gname.com Pte. Ltd., a registrar frequently abused for bulletproof hosting, and weaponized a free Let’s Encrypt certificate to appear legitimate. The single IP address 86.54.25.41 now hosts multiple short-lived crypto-drainer pages that cycle daily to evade blacklists, a hallmark of bulk phishing campaigns targeting trending tokens and conferences. If you visited vlentevent-soc.cc—or entered any wallet credentials or signed any transactions—disconnect the wallet immediately, revoke any suspicious token approvals via blockchain explorers or tools like Revoke.cash, and scan devices for malware. Report the domain to PhishDestroy and your wallet provider; share transaction hashes if funds were drained so investigators can trace and freeze assets. For future safety, always verify event links against official organizers’ domains, use burner wallets for giveaways, and enable hardware wallet signing for large transactions. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260512-ABBECF Favicon MD5: 3d58264e0a67120477f81eb1578410ca ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/vlentevent-soc.cc/ JSON API: https://api.destroy.tools/v1/check?domain=vlentevent-soc.cc Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 148,653 domains (37,097 alive under monitoring, 111,277 confirmed takedowns/dead). Site: https://phishdestroy.io