# yugalsatav19.github.io — MALICIOUS > yugalsatav19.github.io hosts a high-risk social engineering scam flagged by Google Safe Browsing. 10 of 95 vendors detect it. Check the full report. ## Summary PhishDestroy identifies yugalsatav19.github.io as an active domain engaged in a high-risk social engineering scam. While the specific brand impersonated remains unclear, the domain is involved in deceptive tactics aimed at tricking users into divulging sensitive information. No distinct drainer kit has been linked to this domain, but its operation clearly fits the profile of generic phishing with social engineering elements. Exact technical indicators reveal that yugalsatav19.github.io is registered through GitHub, Inc. and secured with a Let's Encrypt SSL certificate. It resolves to IP address 185.199.108.153. VirusTotal analysis indicates that 10 out of 95 security vendors have flagged this domain as malicious. Additionally, Google Safe Browsing categorizes it under SOCIAL_ENGINEERING threats. The domain is currently listed in multiple blocklists, reinforcing its dangerous status. The domain's status remains active, posing an ongoing risk to users who may encounter it. PhishDestroy recommends immediate caution and avoidance of any interaction with this domain. Security teams should continue to monitor related indicators of compromise and update blocklists accordingly. Users are advised to verify URLs carefully and rely on established sources to prevent falling victim to such social engineering scams. ## Threat Details - Verdict: MALICIOUS - Site status: unknown (HTTP ?) ## Domain Intelligence - Registrar: GitHub, Inc. - IP: 185.199.108.153 ## Detection Status - VirusTotal: 10 vendors flagged - Google Safe Browsing: FLAGGED - Blocklists: 0 hits ## Evidence - Cloudflare Radar: https://radar.cloudflare.com/domains/yugalsatav19.github.io - PhishDestroy: https://phishdestroy.io/domain/yugalsatav19.github.io/ - LLM endpoint: https://phishdestroy.io/domain/yugalsatav19.github.io/llm.txt ## If You Visited This Site 1. Change any passwords you may have entered 2. Enable 2FA on all related accounts 3. Monitor your accounts for unauthorized activity 4. Report to: FBI IC3, Europol, local authorities --- Report by PhishDestroy | https://phishdestroy.io/domain/yugalsatav19.github.io/ Last updated: 2026-04-08