# PhishDestroy threat dossier — zondarecoverydocument.com ================================================================ Fetched: 2026-04-26 16:35:09 UTC Canonical: https://phishdestroy.io/domain/zondarecoverydocument.com/ ## VERDICT ---------------------------------------------------------------- ACTIVE THREAT — multiple warning signs Composite threat score: 49/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 13/95 security vendors flagged this domain Flagging vendors: alphaMountain.ai, CRDF, CyRadar, Emsisoft, Fortinet, Gridinsoft, Kaspersky, LevelBlue, Lionic, Netcraft, OpenPhish, Sophos, Webroot URLQuery: 3 detections ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 104.21.62.221 Registrar: NICENIC INTERNATIONAL GROUP CO., LIMITED !!! REGISTRAR INTEGRITY ALERT — NiceNIC !!! NiceNIC International: over 90% of its registered domains are associated with illegal content; documented systematic abuse-report non-response. Primary sources: https://phishdestroy.io/nicenic-real https://phishdestroy.io/nicenic-verdict Nameservers: ollie.ns.cloudflare.com, phil.ns.cloudflare.com Registered: 2026-04-24 Page title: DocuSign - Download to View Document HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E7 Expires: 2026-07-23 Status: INVALID chain Fingerprint: e926ac229e2fd88df43458df1a8adfbc5ecbeec76dad210da9b0b51b45eab2b5 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-24 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-26 16:23:14 UTC (by PhishDestroy tracker) First reported: 2026-04-26 13:24:27 UTC (abuse notice filed) Last verified: 2026-04-26 19:20:44 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019dc9f3-94af-76aa-a0e0-a6491518e4f7/ URLQuery: https://urlquery.net/report/73e07981-7fc0-4302-9744-d8983661bdd1 Wayback Machine: https://web.archive.org/web/*/zondarecoverydocument.com crt.sh CT logs: https://crt.sh/?q=%25.zondarecoverydocument.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=zondarecoverydocument.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/zondarecoverydocument.com URLhaus: https://urlhaus.abuse.ch/host/zondarecoverydocument.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-26 16:25:18 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy has opened an active investigation into zondarecoverydocument.com, a recently created domain that is currently distributing fraudulent recovery documents to trick victims into downloading malware or surrendering sensitive data. The site resolves to 104.21.62.221 and presents itself as a legitimate document recovery service, but all indicators point to a coordinated scam aimed at harvesting credentials and installing payloads under the guise of “document recovery.” Users who receive unexpected links or files referencing recovery documents should treat them as hostile until confirmed otherwise. This domain was formally flagged on April 24, 2026, just days ago, which dramatically shortens the window during which typical threat intelligence feeds can catch it. VirusTotal currently returns 0 detections out of 95 engines, confirming that most antivirus and browser filters have not yet blacklisted it. The domain is registered through NICENIC INTERNATIONAL GROUP CO., LIMITED, a registrar known for accommodating bulletproof hosting and rapid domain churn, both common in phishing campaigns. The presence of a valid Let’s Encrypt SSL certificate further lowers victim suspicion by disguising malicious intent behind a padlock icon, making this a stealthy and effective lure. If you visited zondarecoverydocument.com or downloaded anything from it, immediately disconnect from the internet and run a full antivirus scan on the affected device using updated signatures. Do not enter any passwords or personal data on the site. Save the suspicious file in a quarantined folder and submit it to PhishDestroy’s analysis portal at phishdestroy.net/submit along with the full URL you encountered. Advise your organization’s security team and consider rotating passwords stored in browsers after confirming no malware remains active; persistence mechanisms often survive a simple browser reset. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260426-F62C73 Favicon MD5: dd442c5b128754be0147a96e78293bc9 TLS cert SHA-256: e926ac229e2fd88df43458df1a8adfbc5ecbeec76dad210da9b0b51b45eab2b5 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/zondarecoverydocument.com/ JSON API: https://api.destroy.tools/v1/check?domain=zondarecoverydocument.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io