# PhishDestroy threat dossier — wa-fi-store.site ================================================================ Fetched: 2026-05-02 06:13:22 UTC Canonical: https://phishdestroy.io/domain/wa-fi-store.site/ ## VERDICT ---------------------------------------------------------------- TAKEN DOWN (neutralised) Composite threat score: 40/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 0/94 security vendors flagged this domain ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 31.22.7.243 (GB, Newcastle upon Tyne) ASN: AS34119 Wildcard UK Limited Hosting org: I Fastnet Ltd Registrar: PDR Ltd. d/b/a PublicDomainRegistry.com Nameservers: ns1.ifastnet14.org, ns2.ifastnet14.org Registered: 2026-03-19 Page title: عالم وافي Wafi SA ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R12 Expires: 2026-06-17 Status: INVALID chain Fingerprint: 398e0ae9d97cef7a7ccb3b948c5609ff3483dadc11a32aafa5dff0440bd62f78 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: CLOSED — no report required. This domain was neutralised before the abuse-report cycle could be dispatched — either the hosting provider / registrar suspended it on their own, the DNS went dead, or the operator abandoned the infrastructure. PhishDestroy keeps the evidence bundle on file for audit but no formal notice was sent. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-03-19 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-21 02:43:09 UTC (by PhishDestroy tracker) First reported: 2026-04-20 23:45:00 UTC (abuse notice filed) Last verified: 2026-04-22 21:34:53 UTC Neutralised: 2026-04-22 08:40:26 UTC Current status: taken down (registrar suspended or DNS dead) ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019dad45-b99a-7556-b03d-201aa011100c/ URLQuery: https://urlquery.net/report/8aef0d6d-a452-4482-8103-6a8ed80afc48 Wayback Machine: https://web.archive.org/web/*/wa-fi-store.site crt.sh CT logs: https://crt.sh/?q=%25.wa-fi-store.site Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=wa-fi-store.site AlienVault OTX: https://otx.alienvault.com/indicator/domain/wa-fi-store.site URLhaus: https://urlhaus.abuse.ch/host/wa-fi-store.site/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-21 02:44:04 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies wa-fi-store.site as an active credential theft operation masquerading as a legitimate Wi-Fi equipment retailer. The domain is currently unresolved but remains under active threat investigation after initial detection on March 19, 2026. This site employs deceptive storefront branding to trick users into submitting login credentials under the guise of account creation or order processing. wa-fi-store.site exhibits several high-risk indicators confirmed by forensic analysis. The domain was registered through PDR Ltd. d/b/a PublicDomainRegistry.com and resolves to IP 31.22.7.243. Despite zero detections on VirusTotal as of analysis completion, the site possesses a valid Let's Encrypt SSL certificate, enhancing its perceived legitimacy. The domain's creation timestamp reveals recent registration activity, suggesting opportunistic deployment targeting current events or seasonal demand spikes. This domain represents an active credential harvesting threat. Users should avoid accessing wa-fi-store.site entirely and report any suspicious interactions to their security teams or relevant authorities. Organizations are advised to implement network-level blocking for both the domain and associated IP address. Enhanced monitoring for credential stuffing attempts using harvested data is strongly recommended. Any accounts potentially exposed to this domain should undergo immediate password rotation and multi-factor authentication review to prevent downstream compromise. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260420-5953C7 Favicon MD5: 73b19b0a014abf58dc99a93cb1c42ee1 TLS cert SHA-256: 398e0ae9d97cef7a7ccb3b948c5609ff3483dadc11a32aafa5dff0440bd62f78 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/wa-fi-store.site/ JSON API: https://api.destroy.tools/v1/check?domain=wa-fi-store.site Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io