<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: PhishDestroy</title>
    <description>The latest articles on Forem by PhishDestroy (@destroyphish).</description>
    <link>https://forem.com/destroyphish</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3470447%2F2cdd9115-68b3-40e3-8727-8e97fd4f9d0c.png</url>
      <title>Forem: PhishDestroy</title>
      <link>https://forem.com/destroyphish</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/destroyphish"/>
    <language>en</language>
    <item>
      <title>xmrwallet.com Scam: How NameSilo Became the Press Secretary for a $2M Monero Theft Operation</title>
      <dc:creator>PhishDestroy</dc:creator>
      <pubDate>Mon, 16 Mar 2026 17:20:37 +0000</pubDate>
      <link>https://forem.com/destroyphish/xmrwalletcom-scam-how-namesilo-became-the-press-secretary-for-a-2m-monero-theft-operation-189b</link>
      <guid>https://forem.com/destroyphish/xmrwalletcom-scam-how-namesilo-became-the-press-secretary-for-a-2m-monero-theft-operation-189b</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxj3e1kr4v9ga7t3u2y6g.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxj3e1kr4v9ga7t3u2y6g.webp" alt="xmrwallet.com scam exposed — NameSilo registrar shields Monero theft operation from accountability while 3 other registrars suspended domains" width="720" height="480"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;xmrwallet.com&lt;/strong&gt; has been stealing Monero private keys since 2016. Fifteen documented victims. $2M+ estimated stolen. Six security vendors on &lt;a href="https://www.virustotal.com/gui/domain/www.xmrwallet.com" rel="noopener noreferrer"&gt;VirusTotal&lt;/a&gt; flag it as malicious — including &lt;strong&gt;Fortinet&lt;/strong&gt; ("Phishing"). Three registrars suspended the operator's domains within days.&lt;/p&gt;

&lt;p&gt;The fourth registrar — &lt;strong&gt;NameSilo&lt;/strong&gt; — contacted the scammer, accepted his story, and published a public defense calling him "the victim."&lt;/p&gt;

&lt;p&gt;This is the technical breakdown of how the theft works, why NameSilo's response is provably false, and why their "abuse review" is either incompetent or complicit.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Full investigation by &lt;a href="https://phishdestroy.io" rel="noopener noreferrer"&gt;PhishDestroy Research&lt;/a&gt;&lt;/strong&gt; — &lt;a href="https://phishdestroy.github.io/DO-NOT-USE-xmrwallet-com/" rel="noopener noreferrer"&gt;Evidence page&lt;/a&gt; · &lt;a href="https://github.com/phishdestroy/DO-NOT-USE-xmrwallet-com" rel="noopener noreferrer"&gt;GitHub repo&lt;/a&gt; · &lt;a href="https://phishdestroy.medium.com/xmrwallet-com-2953f35b8a79" rel="noopener noreferrer"&gt;Medium article&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  NameSilo's Public Response — Verbatim
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;"Our Abuse team conducted an in-depth review into this case and it seems that domain was compromised a few months ago (during which a copy of the webpage was replaced with a crypto-drainer). Prior to that, we had received no abuse reports related to this domain. After an extensive investigation, our team found evidence of the compromise not involving the registrant, and they immediately took steps to reverse it. The registrant is also working to get the website delisted from VT reports."&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Seven claims. All provably false. Let's go through the technical evidence.&lt;/p&gt;




&lt;h2&gt;
  
  
  Technical Analysis: The Theft is the Application
&lt;/h2&gt;

&lt;p&gt;NameSilo claims the domain was "compromised" — that someone hacked the site and injected a crypto-drainer. This is technically impossible. The theft mechanism is the &lt;strong&gt;core architecture&lt;/strong&gt; of the application.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fks5ffaoefd3m1ljfkkqf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fks5ffaoefd3m1ljfkkqf.png" alt="xmrwallet.com steals Monero private view keys via session_key — 40+ transmissions per session captured in live network analysis" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Private Key Exfiltration via &lt;code&gt;session_key&lt;/code&gt;
&lt;/h3&gt;

&lt;p&gt;Every login POSTs credentials to &lt;code&gt;/auth.php&lt;/code&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight http"&gt;&lt;code&gt;&lt;span class="err"&gt;POST https://www.xmrwallet.com/auth.php
address = 46EkQdF7iQ4i4Ah935SipgXbDSryh5yv76UnhsPXTaUYegCMJPqDN88...
viewkey = efba13ecb8b360660a3dcaafaf7cf99149713d064b9d64997b2454d58ee67800
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The server returns a &lt;code&gt;session_key&lt;/code&gt; — not a random token, but the victim's credentials in Base64:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;session_key = [blob]:[base64(address)]:[base64(viewkey)]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Decode it yourself:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;base64&lt;/span&gt;

&lt;span class="n"&gt;encoded&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;ZWZiYTEzZWNiOGIzNjA2NjBhM2RjYWFmYWY3Y2Y5OTE0OTcxM2QwNjRiOWQ2NDk5N2IyNDU0ZDU4ZWU2NzgwMA==&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;
&lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;base64&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;b64decode&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;encoded&lt;/span&gt;&lt;span class="p"&gt;).&lt;/span&gt;&lt;span class="nf"&gt;decode&lt;/span&gt;&lt;span class="p"&gt;())&lt;/span&gt;
&lt;span class="c1"&gt;# efba13ecb8b360660a3dcaafaf7cf99149713d064b9d64997b2454d58ee67800
# ^^^ real private view key from live capture
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This &lt;code&gt;session_key&lt;/code&gt; is re-transmitted on &lt;strong&gt;every API call&lt;/strong&gt; — 40+ times per session:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Endpoint&lt;/th&gt;
&lt;th&gt;View key transmissions&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;/getheightsync.php&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;12&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;/gettransactions.php&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;10&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;/getbalance.php&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;/dashboard.html&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;/send.html&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;/receive.html&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;/getsubaddresses.php&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;/getoutputs.php&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Total&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;40+&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Full capture data: &lt;a href="https://phishdestroy.github.io/DO-NOT-USE-xmrwallet-com/" rel="noopener noreferrer"&gt;PhishDestroy evidence page&lt;/a&gt; — 109 HTTP requests documented (50 POST, 59 GET).&lt;/p&gt;

&lt;h3&gt;
  
  
  Transaction Hijacking: &lt;code&gt;raw = 0&lt;/code&gt;
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight javascript"&gt;&lt;code&gt;&lt;span class="nx"&gt;raw_tx_and_hash&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;raw&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;    &lt;span class="c1"&gt;// client TX discarded — never broadcast&lt;/span&gt;

&lt;span class="k"&gt;if &lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;type&lt;/span&gt; &lt;span class="o"&gt;==&lt;/span&gt; &lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="s1"&gt;swept&lt;/span&gt;&lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;     &lt;span class="c1"&gt;// custom theft marker — NOT in Monero protocol&lt;/span&gt;
    &lt;span class="nx"&gt;txid&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="s1"&gt;Unknown transaction id&lt;/span&gt;&lt;span class="dl"&gt;'&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The client builds a valid Monero transaction, then &lt;strong&gt;discards it&lt;/strong&gt;. The server constructs its own transaction and redirects funds to any address. The &lt;code&gt;swept&lt;/code&gt; type does not exist in the Monero protocol — it's a custom flag for server-initiated theft.&lt;/p&gt;

&lt;h3&gt;
  
  
  Hardcoded Backdoor
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight http"&gt;&lt;code&gt;&lt;span class="err"&gt;POST /support_login.html
session_id = 8de50123dab32
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Not user-initiated. Hardcoded session ID. Endpoint not present in the &lt;a href="https://github.com/XMRWallet/Website" rel="noopener noreferrer"&gt;public GitHub repository&lt;/a&gt;. Documented in &lt;a href="https://phishdestroy.github.io/DO-NOT-USE-xmrwallet-com/cache-issue35/" rel="noopener noreferrer"&gt;cached Issue #35&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F46ts4ue9pu10mzn43xv7.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F46ts4ue9pu10mzn43xv7.webp" alt="xmrwallet.com privacy wallet loads Google Tag Manager GA4 DoubleClick ad trackers — no legitimate Monero wallet uses tracking" width="720" height="515"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Google Trackers in a "Privacy" Wallet
&lt;/h3&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Service&lt;/th&gt;
&lt;th&gt;Requests/session&lt;/th&gt;
&lt;th&gt;Risk&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Google Tag Manager&lt;/td&gt;
&lt;td&gt;12&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Can inject arbitrary JS without code deploy&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Google Analytics GA4&lt;/td&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Full session tracking&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Google Analytics UA (&lt;code&gt;UA-116766241-1&lt;/code&gt;)&lt;/td&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;Page views, user agent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;DoubleClick (ad network)&lt;/td&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;Ad tracker in a financial tool&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;No legitimate Monero wallet loads GTM. Not &lt;a href="https://getmonero.org/downloads" rel="noopener noreferrer"&gt;Monero GUI&lt;/a&gt;, not &lt;a href="https://featherwallet.org" rel="noopener noreferrer"&gt;Feather Wallet&lt;/a&gt;, not &lt;a href="https://cakewallet.com" rel="noopener noreferrer"&gt;Cake Wallet&lt;/a&gt;, not &lt;a href="https://monerujo.io" rel="noopener noreferrer"&gt;Monerujo&lt;/a&gt;. Zero trackers across the industry.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A hacker didn't build 8 PHP endpoints, a Base64 key exfiltration protocol, a transaction hijacking mechanism, a hardcoded backdoor, and integrate Google Tag Manager — as part of a "compromise."&lt;/strong&gt; This is a product built over years.&lt;/p&gt;




&lt;h2&gt;
  
  
  The 5.3-Year Commit Gap Destroys the "Hack" Narrative
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;2018-05-10  First release          ← looks open-source
2018-11-06  "Bulletproof Update"   ← last real commit

            5.3 YEARS — ZERO COMMITS

2024-03-15  "2024 updates"         ← sanitized dump, PHP backend excluded
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The production site uses parameters that &lt;strong&gt;do not exist&lt;/strong&gt; in the public GitHub code: &lt;code&gt;session_key&lt;/code&gt;, &lt;code&gt;verification&lt;/code&gt;, encrypted &lt;code&gt;data&lt;/code&gt;, &lt;code&gt;/support_login.html&lt;/code&gt;. The &lt;a href="https://web.archive.org" rel="noopener noreferrer"&gt;Wayback Machine&lt;/a&gt; confirms: no &lt;code&gt;session_key&lt;/code&gt; in 2023 archives. Present in 2025.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A "compromise a few months ago" does not create a 5.3-year code divergence.&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  "No Prior Abuse Reports" — A 5-Second VirusTotal Search Proves Otherwise
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5gzlilncydkr82ueub6f.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5gzlilncydkr82ueub6f.webp" alt="VirusTotal 6 of 93 security vendors flag xmrwallet.com as malicious — Fortinet Phishing Webroot ADMINUSLabs CyRadar Lionic Seclookup" width="720" height="399"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;NameSilo claims zero reports existed before 2026. Here's what was publicly available:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Source&lt;/th&gt;
&lt;th&gt;Finding&lt;/th&gt;
&lt;th&gt;Predates 2026?&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.virustotal.com/gui/domain/www.xmrwallet.com" rel="noopener noreferrer"&gt;VirusTotal&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;6/93 vendors: Fortinet (Phishing), Webroot, ADMINUSLabs, CyRadar, Lionic, Seclookup (all Malicious)&lt;/td&gt;
&lt;td&gt;✅ Automated, continuous&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://urlquery.net/report/a56ea134-19f0-467f-88c3-3444f5c49c06" rel="noopener noreferrer"&gt;URLQuery&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Domain flagged in automated analysis&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.scamadviser.com/check-website/xmrwallet.com" rel="noopener noreferrer"&gt;ScamAdviser&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Very low trust score, registrar flagged for fraud&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.trustpilot.com/review/www.xmrwallet.com" rel="noopener noreferrer"&gt;Trustpilot&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Multiple theft reports: $200, 17.44 XMR, funds redirected&lt;/td&gt;
&lt;td&gt;✅ Years of reports&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.sitejabber.com/reviews/xmrwallet.com" rel="noopener noreferrer"&gt;Sitejabber&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;590 XMR ($177K) stolen&lt;/strong&gt;, 20 XMR stolen, rating 1.5/5&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://bitcointalk.org/index.php?topic=5540097.0" rel="noopener noreferrer"&gt;BitcoinTalk&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Warning thread: "[WARNING] XMRWallet.com Scams"&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Reddit r/Monero&lt;/td&gt;
&lt;td&gt;Operator u/WiseSolution &lt;strong&gt;banned&lt;/strong&gt;
&lt;/td&gt;
&lt;td&gt;✅ Since &lt;strong&gt;2018&lt;/strong&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Searching xmrwallet.com on VirusTotal: &lt;strong&gt;5 seconds&lt;/strong&gt;. Googling "xmrwallet.com scam": &lt;strong&gt;first page is all warnings&lt;/strong&gt;. Checking Trustpilot: &lt;strong&gt;one click&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;NameSilo's "in-depth review" didn't include any of this. Or it did — and they're lying.&lt;/p&gt;




&lt;h2&gt;
  
  
  An "Open-Source Client-Side Wallet" on Bulletproof Hosting
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1b9wt3h2hewsp4z256bw.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1b9wt3h2hewsp4z256bw.webp" alt="xmrwallet.com claims open-source client-side but runs on $550/month bulletproof hosting IQWeb Belize behind DDoS-Guard Russia" width="645" height="560"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here's what NameSilo's abuse team apparently found normal:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Component&lt;/th&gt;
&lt;th&gt;xmrwallet.com&lt;/th&gt;
&lt;th&gt;Legitimate wallets&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Hosting&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;IQWeb FZ-LLC, &lt;strong&gt;Belize&lt;/strong&gt; — bulletproof, $550/mo&lt;/td&gt;
&lt;td&gt;GitHub Pages (free) / Cloudflare&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;CDN&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;DDoS-Guard, Russia&lt;/strong&gt; — anti-takedown&lt;/td&gt;
&lt;td&gt;Cloudflare / none needed&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;DNS&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;ns1/ns2.&lt;strong&gt;ddos-guard.net&lt;/strong&gt;
&lt;/td&gt;
&lt;td&gt;Standard NS&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Monthly cost&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;$550+&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;$0&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Purpose&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;"Client-side, runs in browser"&lt;/td&gt;
&lt;td&gt;Client-side, runs in browser&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;If the code runs client-side, the server processes nothing. GitHub Pages costs $0. Why does a "free volunteer project" pay $550/month for offshore bulletproof hosting behind a Russian anti-DDoS service known for &lt;a href="https://krebsonsecurity.com/tag/ddos-guard/" rel="noopener noreferrer"&gt;hosting criminal infrastructure&lt;/a&gt;?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Because the code on GitHub is not the code on the server.&lt;/strong&gt; The GitHub repository is an alibi.&lt;/p&gt;

&lt;p&gt;We sincerely hope NameSilo's legal department is sharper than their abuse department — because legal will be the ones answering questions about this.&lt;/p&gt;




&lt;h2&gt;
  
  
  Three Registrars Acted. NameSilo Became the Scammer's Lawyer.
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjc0q2lhxq35trlfqvvrt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjc0q2lhxq35trlfqvvrt.png" alt="Three registrars suspended xmrwallet domains — PublicDomainRegistry WebNic NICENIC — while NameSilo declared the scammer innocent" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Same evidence. Same technical analysis. Same VirusTotal detections. Four registrars. Three results:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Registrar&lt;/th&gt;
&lt;th&gt;Domain&lt;/th&gt;
&lt;th&gt;Evidence&lt;/th&gt;
&lt;th&gt;Action&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;PublicDomainRegistry&lt;/td&gt;
&lt;td&gt;xmrwallet.cc&lt;/td&gt;
&lt;td&gt;Same MX, WOT token &lt;code&gt;8a5554c915e3c17278a7&lt;/code&gt;, 23 VT file hashes&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;SUSPENDED&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;WebNic&lt;/td&gt;
&lt;td&gt;xmrwallet.biz&lt;/td&gt;
&lt;td&gt;Same AS59692, same DNS, same WOT token&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;SUSPENDED&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;NICENIC International&lt;/td&gt;
&lt;td&gt;xmrwallet.net&lt;/td&gt;
&lt;td&gt;Same IP as suspended .biz (&lt;code&gt;190.115.31.40&lt;/code&gt;)&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;DNS DEAD&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;NameSilo&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;xmrwallet.com&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;All of the above + 6 VT vendors + 15 victims + full technical audit&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;"The registrant is the victim"&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Three companies — India, Malaysia, China — independently concluded: fraud. One company — NameSilo, USA — concluded: the scammer is the victim, let's help him remove the warnings.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Escape Domain Panic
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fly0mqsoe2ikpgw5968z7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fly0mqsoe2ikpgw5968z7.png" alt="xmrwallet operator registered 4 escape domains across 4 registrars before investigation — 23 years of prepaid registrations burned" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The operator registered &lt;strong&gt;4 escape domains&lt;/strong&gt; across 4 registrars — &lt;strong&gt;before&lt;/strong&gt; the investigation was published:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Feb 4   xmrwallet.cc registered  (8yr prepaid)    ← before publication
Feb 9   xmrwallet.biz registered (5yr prepaid)    ← before publication
Feb 13  Issue #35 published — TX hijacking exposed
Feb 18  Issue #36 published — 43 viewkey transmissions captured
Feb 23  .cc SUSPENDED · .biz SUSPENDED · operator DELETES Issues #35+#36
Feb 26  xmrwallet.net registered (10yr, same IP as .biz)
        xmrwallet.me registered  (10yr, same IP as .cc)
Mar 8   xmrwallet.net DNS DEAD
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;23 years of prepaid registrations burned.&lt;/strong&gt; 3/4 escape domains neutralized. Same NS (&lt;code&gt;ddos-guard.net&lt;/code&gt;), same MX (&lt;code&gt;privateemail.com&lt;/code&gt;), same WOT token — one operator, five domains.&lt;/p&gt;

&lt;p&gt;Does NameSilo believe "compromised" website owners register escape domains across 4 registrars, prepaid for decades, before the investigation is published?&lt;/p&gt;




&lt;h2&gt;
  
  
  "The Registrant Is Working to Get Delisted from VT"
&lt;/h2&gt;

&lt;p&gt;The most damning sentence in NameSilo's response.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.fortinet.com" rel="noopener noreferrer"&gt;Fortinet&lt;/a&gt; — Fortune 500, $4.4B revenue, 700,000+ protected organizations — classified xmrwallet.com as &lt;strong&gt;"Phishing."&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The operator's response: not remove the phishing code — but &lt;strong&gt;lobby VirusTotal to remove the detection&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;And NameSilo presents this as progress.&lt;/p&gt;

&lt;p&gt;A legitimate hacked site owner would welcome VT detections — it validates the threat. This operator wants warnings gone while the theft code remains in production. &lt;strong&gt;NameSilo is helping a flagged phishing domain suppress security alerts.&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  The Operator
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fer37af3wc9vb6crtd36p.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fer37af3wc9vb6crtd36p.webp" alt="xmrwallet.com operator Nathalie Roy — claims volunteer open-source — runs $550/month bulletproof hosting — banned from r/Monero 2018" width="720" height="480"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Nathalie Roy&lt;/strong&gt;, Canada. GitHub: &lt;a href="https://github.com/nathroy" rel="noopener noreferrer"&gt;nathroy&lt;/a&gt; (ID: 39167759). Reddit: u/WiseSolution — banned from r/Monero (2018). ProtonMail: &lt;a href="mailto:royn5094@protonmail.com"&gt;royn5094@protonmail.com&lt;/a&gt;. Self-identified on xmrwallet.com/support.html.&lt;/p&gt;

&lt;p&gt;Full operator profile: &lt;a href="https://phishdestroy.github.io/DO-NOT-USE-xmrwallet-com/posts/post-nathalie-roy-xmrwallet.html" rel="noopener noreferrer"&gt;PhishDestroy analysis&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Claims "funded by donations" — &lt;strong&gt;zero donation wallet exists&lt;/strong&gt;. Pays $550/mo hosting. 50+ paid SEO articles. DDoS-Guard. Android app. 100+ blog posts in 10 languages. Hired a second developer for a &lt;a href="https://phishdestroy.github.io/DO-NOT-USE-xmrwallet-com/posts/post-xmrwallet-captcha-defeated.html" rel="noopener noreferrer"&gt;captcha system that was defeated in hours&lt;/a&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Operator's Own Words — Emails to PhishDestroy
&lt;/h2&gt;

&lt;p&gt;After xmrwallet.com was reported, the operator (&lt;strong&gt;&lt;a href="mailto:royn5094@protonmail.com"&gt;royn5094@protonmail.com&lt;/a&gt;&lt;/strong&gt;) emailed &lt;a href="https://phishdestroy.io" rel="noopener noreferrer"&gt;PhishDestroy&lt;/a&gt; directly. Four emails over 7 days. Zero technical rebuttals. And one sentence that reveals everything about the relationship between the operator and NameSilo.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Feb 16 — "We don't store keys"&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;"We are an open source crypto wallet that is non-custodial, we don't store seeds or keys, everything is done in your browser locally. Please remove your report on us, thank you. N.R."&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fe9721bop8ja2pr5rsidf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fe9721bop8ja2pr5rsidf.png" alt="xmrwallet operator email Feb 16 — claims we dont store seeds or keys — proven false by session_key containing Base64 private view key" width="800" height="456"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The same day, PhishDestroy responded with a full technical breakdown: &lt;code&gt;raw_tx_and_hash.raw = 0&lt;/code&gt; (client transaction discarded), &lt;code&gt;session_key&lt;/code&gt; containing the victim's private view key in Base64, &lt;code&gt;type == 'swept'&lt;/code&gt; (custom theft marker absent from Monero protocol), production-only parameters not in the public GitHub repository. The operator never addressed a single finding.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Feb 17 — Two emails in one day. Panic.&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;"This is the data we need to offer the service to users. This is not grounds for a domain suspension."&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Yesterday: "we don't store keys." Today: "this is the data we need." Two mutually exclusive statements in 24 hours.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgq68fms7h9t4z0lkwfaa.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgq68fms7h9t4z0lkwfaa.png" alt="xmrwallet operator email Feb 17 — this is the data we need — contradicts own claim of not storing keys" width="800" height="484"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;"You are accusing without proof. The way the website was built does not verify anything was stolen, so I'm not sure what you're going to waste your time on. If this is a legal matter, feel free to subpoena the domain registrar for my information to submit a complaint in the courts."&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Now read that last sentence again: "Feel free to subpoena the domain registrar."&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This was written on Feb 17 — &lt;em&gt;before&lt;/em&gt; we contacted NameSilo, &lt;em&gt;before&lt;/em&gt; the abuse report was filed, and &lt;em&gt;before&lt;/em&gt; NameSilo published their "compromise" cover story. At this point, nobody knew how NameSilo would respond.&lt;/p&gt;

&lt;p&gt;And yet the operator is not worried. Not even slightly. A scammer running a phishing operation on bulletproof hosting behind DDoS-Guard should be &lt;em&gt;terrified&lt;/em&gt; of a registrar investigation. But this operator &lt;em&gt;actively directs us toward the registrar&lt;/em&gt;, as if confident NameSilo will take his side.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;No scammer in history has ever said "please involve my registrar" — unless they already know the outcome.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Why was the operator so confident? Does the operator have a relationship with someone at NameSilo — a friend in support, a remote contractor, a connection that guarantees protection? We don't know. But the sequence speaks for itself:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Feb 17 — operator says "subpoena the registrar" with zero concern.&lt;/li&gt;
&lt;li&gt;Feb 23 — three other registrars suspend his domains immediately.&lt;/li&gt;
&lt;li&gt;NameSilo — the one registrar the operator pointed us toward — not only refuses to act, but publishes a defense calling him "the victim" and helps him remove VirusTotal warnings.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The operator predicted NameSilo's response before it happened. That's either the luckiest guess in the history of cybercrime — or the operator knew something we didn't.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Feb 18 — PhishDestroy responds with evidence and a warning.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fal5bfrwuy7a4ox5eampi.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fal5bfrwuy7a4ox5eampi.png" alt="PhishDestroy response to xmrwallet operator — enough with the whining and false claims — documented and verified cases" width="800" height="509"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Feb 23 — Domains suspended. Operator panics.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The same day xmrwallet.cc and xmrwallet.biz were &lt;strong&gt;SUSPENDED&lt;/strong&gt;:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;"I've communicated with my lawyer and you'll hear from them directly soon for harassment, spamming and brand reputation damage. We've hired a private investigator to find your information to file the case."&lt;/p&gt;

&lt;p&gt;"You can literally look up Trezor, Ledger or any other major wallet, they all have complaints about stolen funds. Every single one of them. They also get their view keys to service users, that's how it works."&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Trezor and Ledger are hardware wallets.&lt;/strong&gt; They do not collect private view keys server-side. They don't have PHP backends. They don't transmit &lt;code&gt;session_key&lt;/code&gt; to a server 40 times per session. The operator either doesn't understand cryptocurrency wallets — or is counting on the reader not understanding them.&lt;/p&gt;

&lt;p&gt;Four emails. Zero explanations for &lt;code&gt;session_key&lt;/code&gt;, &lt;code&gt;raw = 0&lt;/code&gt;, &lt;code&gt;swept&lt;/code&gt;, or the 5.3-year GitHub divergence. From "please remove your report" to "my lawyer" in 7 days. &lt;strong&gt;The lawyer has not materialized in 4 weeks.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;But here's the detail that destroys NameSilo's entire "compromise" narrative:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In all four emails (Feb 16–23), the operator speaks in first person — &lt;em&gt;"we are an open source wallet,"&lt;/em&gt; &lt;em&gt;"this is how the website is run,"&lt;/em&gt; &lt;em&gt;"this is the data we need."&lt;/em&gt; The operator defends the code, the architecture, the data collection — as their own work.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Not once does the operator mention any hack, compromise, or unauthorized access.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;On Feb 16–17, the operator told us: "this is how the website is run." Weeks later, NameSilo told the public: "the domain was compromised." These two statements cannot both be true.&lt;/p&gt;

&lt;p&gt;The "compromise" story didn't exist until NameSilo contacted the operator and needed an explanation to close the case. The operator's own emails — written before the cover story was needed — prove the "hack" narrative was &lt;strong&gt;fabricated after the fact&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NameSilo received the same evidence — and the same operator emails. They chose the cover story over the evidence. They called this person "the victim."&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  NameSilo's Liability
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5gzlilncydkr82ueub6f.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5gzlilncydkr82ueub6f.webp" alt="NameSilo liability — ICANN RAA Section 3.18 violation — registrar publicly endorsed documented theft operation xmrwallet.com" width="720" height="399"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Before their response: negligence. After: &lt;strong&gt;complicity.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;NameSilo contacted the operator, accepted his story, publicly declared him innocent, revealed they're helping him remove VirusTotal detections, and shifted burden of proof to the reporters.&lt;/p&gt;

&lt;p&gt;Under &lt;a href="https://www.icann.org/resources/pages/approved-with-specs-2013-09-17-en" rel="noopener noreferrer"&gt;ICANN RAA Section 3.18&lt;/a&gt;, registrars must investigate and respond appropriately to abuse. Does "appropriately" include writing a public defense of the accused?&lt;/p&gt;

&lt;p&gt;Every dollar stolen after NameSilo's statement was stolen by an operator &lt;strong&gt;NameSilo publicly cleared&lt;/strong&gt;. If you vouch for the thief — you share his bill. Victims should contact NameSilo directly: &lt;code&gt;support@namesilo.com&lt;/code&gt; / &lt;code&gt;abuse@namesilo.com&lt;/code&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  Documented Victims
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdg5lumfvwb3c092ah4th.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdg5lumfvwb3c092ah4th.webp" alt="xmrwallet.com victims — 590 XMR stolen 17 XMR stolen 20 XMR stolen — $2M+ total over 8 years — Trustpilot Sitejabber BitcoinTalk reports" width="720" height="573"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Amount&lt;/th&gt;
&lt;th&gt;Source&lt;/th&gt;
&lt;th&gt;Quote&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;590 XMR (~$177K)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;a href="https://www.sitejabber.com/reviews/xmrwallet.com" rel="noopener noreferrer"&gt;Sitejabber&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;em&gt;"I do deposit 590 monero 2 day gone and they steal it!"&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;17.44 XMR&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;a href="https://www.trustpilot.com/review/www.xmrwallet.com" rel="noopener noreferrer"&gt;Trustpilot&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;em&gt;"My 17.44 XMR was all gone. I have both the TxID &amp;amp; TX Key."&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;20 XMR&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;a href="https://www.sitejabber.com/reviews/xmrwallet.com" rel="noopener noreferrer"&gt;Sitejabber&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;em&gt;"Put 20 xmr next day 0 xmr"&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;$200&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;a href="https://www.trustpilot.com/review/www.xmrwallet.com" rel="noopener noreferrer"&gt;Trustpilot&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;em&gt;"They stole $200 from me, leaving me high and dry"&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Unknown&lt;/td&gt;
&lt;td&gt;&lt;a href="https://www.trustpilot.com/review/www.xmrwallet.com" rel="noopener noreferrer"&gt;Trustpilot&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;em&gt;"Transferred to some other wallets instead of mine"&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Unknown&lt;/td&gt;
&lt;td&gt;&lt;a href="https://www.trustpilot.com/review/www.xmrwallet.com" rel="noopener noreferrer"&gt;Trustpilot&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;em&gt;"UNABLE TO ACCESS MY FUNDS"&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Conservative estimate: &lt;strong&gt;$1.5M–$15M+&lt;/strong&gt; over 8 years. The operator responds to every victim: &lt;em&gt;"You used a phishing clone."&lt;/em&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  Take Action
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Report xmrwallet.com:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://safebrowsing.google.com/safebrowsing/report_phish/" rel="noopener noreferrer"&gt;Google Safe Browsing&lt;/a&gt; — blocks in Chrome, Firefox, Safari&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://report.netcraft.com" rel="noopener noreferrer"&gt;Netcraft&lt;/a&gt; — used by ISPs globally&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://phishtank.org/add_web_phish.php" rel="noopener noreferrer"&gt;PhishTank&lt;/a&gt; — community blocklist&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://phish.report/" rel="noopener noreferrer"&gt;Phish.Report&lt;/a&gt; — auto-reports to 6+ platforms&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://apwg.org/reportphishing/" rel="noopener noreferrer"&gt;APWG&lt;/a&gt; — Anti-Phishing Working Group&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;File ICANN complaint against NameSilo:&lt;/strong&gt; &lt;a href="https://www.icann.org/resources/pages/complaint-2013-05-03-en" rel="noopener noreferrer"&gt;icann.org/complaints&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Law enforcement&lt;/strong&gt; (operator: Canada):&lt;br&gt;
&lt;a href="https://www.antifraudcentre-centreantifraude.ca" rel="noopener noreferrer"&gt;Canadian Anti-Fraud Centre&lt;/a&gt; · &lt;a href="https://www.rcmp-grc.gc.ca/en/contact-us" rel="noopener noreferrer"&gt;RCMP&lt;/a&gt; · &lt;a href="https://ic3.gov" rel="noopener noreferrer"&gt;FBI IC3&lt;/a&gt; · &lt;a href="https://www.europol.europa.eu/report-a-crime/report-cybercrime-online" rel="noopener noreferrer"&gt;Europol&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Use safe wallets:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://getmonero.org/downloads" rel="noopener noreferrer"&gt;Monero GUI&lt;/a&gt; · &lt;a href="https://featherwallet.org" rel="noopener noreferrer"&gt;Feather Wallet&lt;/a&gt; · &lt;a href="https://cakewallet.com" rel="noopener noreferrer"&gt;Cake Wallet&lt;/a&gt; · &lt;a href="https://monerujo.io" rel="noopener noreferrer"&gt;Monerujo&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  Full Evidence Archive
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Resource&lt;/th&gt;
&lt;th&gt;Link&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Full investigation&lt;/td&gt;
&lt;td&gt;&lt;a href="https://phishdestroy.github.io/DO-NOT-USE-xmrwallet-com/" rel="noopener noreferrer"&gt;phishdestroy.github.io/DO-NOT-USE-xmrwallet-com&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Deleted evidence archive&lt;/td&gt;
&lt;td&gt;&lt;a href="https://phishdestroy.github.io/DO-NOT-USE-xmrwallet-com/deleted.html" rel="noopener noreferrer"&gt;deleted.html&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Issue #35 cached&lt;/td&gt;
&lt;td&gt;&lt;a href="https://phishdestroy.github.io/DO-NOT-USE-xmrwallet-com/cache-issue35/" rel="noopener noreferrer"&gt;cache-issue35&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Issue #36 cached&lt;/td&gt;
&lt;td&gt;&lt;a href="https://phishdestroy.github.io/DO-NOT-USE-xmrwallet-com/cache-issue36/" rel="noopener noreferrer"&gt;cache-issue36&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;VirusTotal&lt;/td&gt;
&lt;td&gt;&lt;a href="https://www.virustotal.com/gui/domain/www.xmrwallet.com" rel="noopener noreferrer"&gt;virustotal.com&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;URLQuery&lt;/td&gt;
&lt;td&gt;&lt;a href="https://urlquery.net/report/a56ea134-19f0-467f-88c3-3444f5c49c06" rel="noopener noreferrer"&gt;urlquery.net&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;ScamAdviser&lt;/td&gt;
&lt;td&gt;&lt;a href="https://www.scamadviser.com/check-website/xmrwallet.com" rel="noopener noreferrer"&gt;scamadviser.com&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;BitcoinTalk warning&lt;/td&gt;
&lt;td&gt;&lt;a href="https://bitcointalk.org/index.php?topic=5540097.0" rel="noopener noreferrer"&gt;bitcointalk.org&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Scam exposure&lt;/td&gt;
&lt;td&gt;&lt;a href="https://phishdestroy.github.io/DO-NOT-USE-xmrwallet-com/posts/post-xmrwallet-scam-exposed.html" rel="noopener noreferrer"&gt;article&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Operator profile&lt;/td&gt;
&lt;td&gt;&lt;a href="https://phishdestroy.github.io/DO-NOT-USE-xmrwallet-com/posts/post-nathalie-roy-xmrwallet.html" rel="noopener noreferrer"&gt;article&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Captcha defeated&lt;/td&gt;
&lt;td&gt;&lt;a href="https://phishdestroy.github.io/DO-NOT-USE-xmrwallet-com/posts/post-xmrwallet-captcha-defeated.html" rel="noopener noreferrer"&gt;article&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Safe alternatives&lt;/td&gt;
&lt;td&gt;&lt;a href="https://phishdestroy.github.io/DO-NOT-USE-xmrwallet-com/posts/post-xmrwallet-alternatives.html" rel="noopener noreferrer"&gt;article&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Medium article&lt;/td&gt;
&lt;td&gt;&lt;a href="https://phishdestroy.medium.com/xmrwallet-com-2953f35b8a79" rel="noopener noreferrer"&gt;phishdestroy.medium.com&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;GitHub repository&lt;/td&gt;
&lt;td&gt;&lt;a href="https://github.com/phishdestroy/DO-NOT-USE-xmrwallet-com" rel="noopener noreferrer"&gt;github.com/phishdestroy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;PhishDestroy blocklist&lt;/td&gt;
&lt;td&gt;&lt;a href="https://github.com/phishdestroy/destroylist" rel="noopener noreferrer"&gt;destroylist — 70,000+ domains&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxbbjg2j9rclmr8s02yzq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxbbjg2j9rclmr8s02yzq.png" alt="xmrwallet.com operator deleted 21+ GitHub issues — all cached and archived permanently by PhishDestroy Research" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;NameSilo didn't ignore the evidence. They read it, contacted the scammer, believed him, declared him innocent, and are helping him suppress VirusTotal warnings. That's not negligence. That's a partnership.&lt;/p&gt;

&lt;p&gt;Three registrars protected users. NameSilo protected the scammer — and put it in writing. Their statement will be Exhibit A in every filing from this point forward.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;If you vouch for the thief, you share his bill.&lt;/strong&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://phishdestroy.io" rel="noopener noreferrer"&gt;PhishDestroy Research&lt;/a&gt; · &lt;a href="https://t.me/destroy_phish" rel="noopener noreferrer"&gt;Telegram&lt;/a&gt; · &lt;a href="https://x.com/Phish_Destroy" rel="noopener noreferrer"&gt;Twitter/X&lt;/a&gt; · &lt;a href="https://t.me/PhishDestroy_bot" rel="noopener noreferrer"&gt;Bot&lt;/a&gt; · &lt;a href="https://api.destroy.tools" rel="noopener noreferrer"&gt;API&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Based on public evidence, live network captures, OSINT, and NameSilo's own verbatim public statement. No unauthorized access. All findings independently reproducible. Originally published on &lt;a href="https://phishdestroy.medium.com/xmrwallet-com-2953f35b8a79" rel="noopener noreferrer"&gt;Medium&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>monero</category>
      <category>cryptocurrency</category>
      <category>security</category>
    </item>
    <item>
      <title>How One Registrar Became Cybercrime's Best Friend</title>
      <dc:creator>PhishDestroy</dc:creator>
      <pubDate>Sun, 01 Feb 2026 15:24:04 +0000</pubDate>
      <link>https://forem.com/destroyphish/how-one-registrar-became-cybercrimes-best-friend-2be9</link>
      <guid>https://forem.com/destroyphish/how-one-registrar-became-cybercrimes-best-friend-2be9</guid>
      <description>&lt;p&gt;We report malicious domains daily. Most registrars take action within hours.&lt;/p&gt;

&lt;p&gt;NiceNIC? Complete silence.&lt;/p&gt;

&lt;p&gt;So we did what any security researcher would do — we investigated.&lt;/p&gt;

&lt;h2&gt;
  
  
  🔍 What we found
&lt;/h2&gt;

&lt;p&gt;After months of research, blockchain analysis, and OSINT work:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;52,847    malicious domains
$1.2B+    crypto fraud traced
0         abuse reports answered
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Phishing kits. Malware droppers. Crypto drainers. Fake pharmacies. All protected by one registrar.&lt;/p&gt;

&lt;h2&gt;
  
  
  The corporate onion
&lt;/h2&gt;

&lt;p&gt;We peeled back the layers:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Shell companies in Hong Kong&lt;/li&gt;
&lt;li&gt;Directors that don't exist&lt;/li&gt;
&lt;li&gt;Addresses that lead nowhere&lt;/li&gt;
&lt;li&gt;Payment trails that vanish into crypto mixers&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This isn't negligence. It's a business model.&lt;/p&gt;

&lt;h2&gt;
  
  
  💀 Why developers should care
&lt;/h2&gt;

&lt;p&gt;That phishing page stealing your users' credentials? Probably hosted on a NiceNIC domain.&lt;/p&gt;

&lt;p&gt;That malware dropper targeting your npm packages? Same story.&lt;/p&gt;

&lt;p&gt;Bulletproof registrars are infrastructure for attacks on &lt;strong&gt;your&lt;/strong&gt; users.&lt;/p&gt;

&lt;h2&gt;
  
  
  📢 What needs to happen
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;ICANN: investigate and accredit responsibly&lt;/li&gt;
&lt;li&gt;Registries: stop accepting NiceNIC registrations&lt;/li&gt;
&lt;li&gt;Payment processors: follow the money&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  🔗 Full investigation
&lt;/h2&gt;

&lt;p&gt;We published everything — evidence, blockchain trails, corporate records:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="https://decodecybercrime.com/nicenic-the-leading-bulletproof-domain-registrar-enabling-global-cybercrime/" rel="noopener noreferrer"&gt;Read the complete report →&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;If you work in security, share this. The more visibility, the harder it is to ignore.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>webdev</category>
    </item>
    <item>
      <title>DNS Abuse Sanctuary: How NiceNIC (IANA 3765) Shields Global Cybercrime</title>
      <dc:creator>PhishDestroy</dc:creator>
      <pubDate>Tue, 13 Jan 2026 06:38:51 +0000</pubDate>
      <link>https://forem.com/destroyphish/dns-abuse-sanctuary-how-nicenic-iana-3765-shields-global-cybercrime-11ml</link>
      <guid>https://forem.com/destroyphish/dns-abuse-sanctuary-how-nicenic-iana-3765-shields-global-cybercrime-11ml</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;"A registrar that costs $10 will let you do whatever you want and will ignore and laugh at any legal request."&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The modern internet, often perceived by the lay public as an ethereal cloud of information, is in reality a rigidly structured hierarchy of physical infrastructure, administrative governance, and contractual trust. At the gateway of this digital ecosystem stand &lt;strong&gt;domain registrars&lt;/strong&gt; — the entities authorized by the Internet Corporation for Assigned Names and Numbers (ICANN) to lease the human-readable addresses that serve as the storefronts, communication hubs, and identity cards of the web.&lt;/p&gt;

&lt;p&gt;These gatekeepers are bound by the &lt;strong&gt;Registrar Accreditation Agreement (RAA)&lt;/strong&gt; to maintain the stability and security of the Domain Name System (DNS). However, a distinct subset of accredited entities has emerged that weaponizes this agreement, subverting their custodial duties to create safe havens for illicit activity.&lt;/p&gt;

&lt;p&gt;This comprehensive investigative report isolates and analyzes the operations of one such entity: &lt;strong&gt;NiceNIC International Group Co., Limited (IANA ID 3765)&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Headquartered in Hong Kong, NiceNIC has statistically and operationally distinguished itself not through innovation or market dominance, but through an &lt;strong&gt;anomalous and sustained concentration of abuse&lt;/strong&gt;. This dossier, synthesized from proprietary intelligence gathered by the PhishDestroy Threat Intelligence Team, alongside data from the DNS Research Federation (DNSRF), Spamhaus, and the Cybercrime Information Center, establishes that NiceNIC functions as a structural pillar of the modern cybercriminal economy.&lt;/p&gt;




&lt;h2&gt;
  
  
  🔍 Key Findings
&lt;/h2&gt;

&lt;p&gt;Our investigation reveals a distinct operational pattern that transcends mere negligence. NiceNIC exhibits the characteristics of a &lt;strong&gt;"Bulletproof Registrar,"&lt;/strong&gt; characterized by:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Pattern&lt;/th&gt;
&lt;th&gt;Description&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Marketing of Anonymity&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Explicit prioritization of cryptocurrency payments (USDT, BTC) to sever financial audibility&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Procedural Obstructionism&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;"Closed-loop" abuse reporting system designed to obfuscate responsibility and delay mitigation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Geopolitical Arbitrage&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Exploitation of jurisdictional friction between Western law enforcement and Hong Kong corporate law&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Statistical Dominance in Crime&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Phishing domain score &lt;strong&gt;326 times higher&lt;/strong&gt; than the industry standard&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The implications of these findings are severe. By providing "full-stack" protection — acting as both registrar and host for high-profile threat actors like &lt;strong&gt;Scattered Spider&lt;/strong&gt; and the perpetrators of the &lt;strong&gt;December 2025 Trust Wallet heist&lt;/strong&gt; — NiceNIC has effectively positioned itself as an open advertisement for global cybercrime.&lt;/p&gt;




&lt;h1&gt;
  
  
  Part I: The Infrastructure of Malice and the PhishDestroy Methodology
&lt;/h1&gt;

&lt;p&gt;To understand the gravity of the findings presented in this dossier, it is essential to first establish the methodological rigor applied to the data collection.&lt;/p&gt;

&lt;h2&gt;
  
  
  1.1 The PhishDestroy Protocol: Precision Intelligence
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgf83ulyzf17va2sq58gq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgf83ulyzf17va2sq58gq.png" alt="False-positive statistics"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;False-positive statistics are no more than 1–2 per 1,000 valid detections&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The intelligence underpinning this report is derived from the &lt;strong&gt;PhishDestroy Threat Intelligence Team&lt;/strong&gt;, an independent analytical platform dedicated to the detection and disruption of malicious infrastructure.&lt;/p&gt;

&lt;p&gt;📁 &lt;strong&gt;GitHub Destroylist:&lt;/strong&gt; &lt;a href="https://github.com/phishdestroy/destroylist" rel="noopener noreferrer"&gt;github.com/phishdestroy/destroylist&lt;/a&gt;&lt;br&gt;
🌐 &lt;strong&gt;Live Threat Map:&lt;/strong&gt; &lt;a href="https://phishdestroy.io/live/" rel="noopener noreferrer"&gt;phishdestroy.io/live&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Our model is fully &lt;strong&gt;active and pre-emptive&lt;/strong&gt;: we aim to eliminate phishing &lt;strong&gt;before it causes damage&lt;/strong&gt;. We operate transparently, maintain a live open database, share data with multiple security systems, and have &lt;strong&gt;no profit motive&lt;/strong&gt; — no donations, no commercial interest, no bias toward or against any registrar. Our only goal is the destruction of phishing.&lt;/p&gt;

&lt;p&gt;We run &lt;strong&gt;30+ proprietary parsers&lt;/strong&gt; that detect threats at the earliest stage through:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Malvertising monitoring&lt;/li&gt;
&lt;li&gt;SEO-abuse tracking&lt;/li&gt;
&lt;li&gt;Social-media campaign analysis&lt;/li&gt;
&lt;li&gt;Typosquatting detection&lt;/li&gt;
&lt;li&gt;Community intelligence&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Confirmed threats are immediately distributed to &lt;strong&gt;50+ major vendors&lt;/strong&gt; (Google Safe Browsing, Cloudflare, Microsoft, VirusTotal, etc.) for global remediation.&lt;/p&gt;
&lt;h3&gt;
  
  
  Key Technical Signatures Monitored
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Cryptocurrency &lt;a href="https://radar.securityalliance.org/2025-10-drainers-vol-1/" rel="noopener noreferrer"&gt;Drainers&lt;/a&gt;:&lt;/strong&gt; JavaScript snippets designed to interact with Web3 wallets (MetaMask, Trust Wallet) and execute unauthorized transaction signatures&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Phishing Templates:&lt;/strong&gt; HTML/CSS structures replicating login interfaces of major financial institutions&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Malicious JavaScript:&lt;/strong&gt; Obfuscated code blocks associated with drive-by downloads or credential harvesting&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;
  
  
  Each report contains a full evidence package:
&lt;/h3&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;📧 Complete email
📄 PDF report  
🖼️ Inline screenshot
🔗 Direct-link screenshot
📎 Attached screenshot file
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;We provide this structure to ensure maximum clarity for the abuse team and to simplify verification based on VirusTotal verdicts and other technical indicators.&lt;/p&gt;
&lt;h3&gt;
  
  
  Initial Takedown Notice (1st Notice)
&lt;/h3&gt;

&lt;p&gt;The first notification includes: the email, the forensic PDF, all screenshots (inline, link, attached).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Examples:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://phishdestroy.io/1st" rel="noopener noreferrer"&gt;First email (Initial Notice)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://phishdestroy.io/nicenic/Phishing_Report_caivax.com.pdf" rel="noopener noreferrer"&gt;PDF report (caivax.com)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;
  
  
  Escalation Report (2nd Notice)
&lt;/h3&gt;

&lt;p&gt;A repeated notification is sent &lt;strong&gt;only&lt;/strong&gt; when our parsers or repeated user signals confirm that the threat has been detected again and remains active.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Examples:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://phishdestroy.io/not1" rel="noopener noreferrer"&gt;Second email (Escalation Notice)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://phishdestroy.io/nicenic/PhishDestroy_Escalation_bigspin_cc_17.pdf" rel="noopener noreferrer"&gt;Escalation PDF (bigspin.cc) — Report #17 for a domain ignored for more than 1300 hours&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;h1&gt;
  
  
  Part II: The Data of Distrust — Statistical Evidence
&lt;/h1&gt;

&lt;p&gt;Anecdotal evidence of abuse is common across the registrar industry; even giants like GoDaddy or Namecheap host thousands of malicious domains simply due to their immense market share. However, the &lt;strong&gt;rate&lt;/strong&gt; and &lt;strong&gt;concentration&lt;/strong&gt; of abuse distinguish a negligent registrar from a rogue one.&lt;/p&gt;
&lt;h2&gt;
  
  
  2.1 The League Tables of Internet Neighborhoods
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj2i7lal53qcgg3xkpief.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj2i7lal53qcgg3xkpief.png" alt="Absolute champions in malicious infrastructure"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Absolute champions in terms of the amount of malicious infrastructure over several years&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The concept of "Internet Neighborhoods" posits that just as physical cities have safe zones and high-crime zones, the internet is divided into TLDs and registrars that are either safe or dangerous.&lt;/p&gt;

&lt;p&gt;In the &lt;strong&gt;2024–2025 reporting periods&lt;/strong&gt;, NiceNIC consistently appeared in the upper echelons of the DNSRF's "League Tables" for abuse. The report highlighted a cluster of high-abuse registrars in the Asia region, specifically identifying NiceNIC as part of an &lt;strong&gt;"unsafe neighborhood"&lt;/strong&gt; comparable to a "lawless Wild West."&lt;/p&gt;
&lt;h2&gt;
  
  
  2.2 The Phishing Landscape 2025: A Statistical Anomaly
&lt;/h2&gt;

&lt;p&gt;The most damning statistical evidence comes from &lt;strong&gt;"The Phishing Landscape 2025"&lt;/strong&gt; report by the Cybercrime Information Center.&lt;/p&gt;

&lt;p&gt;🔗 &lt;a href="https://interisle.net/insights/phishing-landscape-2025-an-annual-study-of-the-scope-and-distribution-of-phishing" rel="noopener noreferrer"&gt;interisle.net/insights/phishing-landscape-2025&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;![Phishing Landscape 2025]&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2u1954hxh5f1bmsuqt3q.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2u1954hxh5f1bmsuqt3q.png" alt=" "&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftvhfhbp035ipmmny5ltm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftvhfhbp035ipmmny5ltm.png" alt="Registrar Statistics"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Source: &lt;a href="https://www.cybercrimeinfocenter.org/phishing-activity-in-registrars-august-october-2025" rel="noopener noreferrer"&gt;cybercrimeinfocenter.org&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fehm72vtcz9klntya9kmq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fehm72vtcz9klntya9kmq.png" alt="Quarter Analysis"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F81samth50k7z8wb4cxek.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F81samth50k7z8wb4cxek.png" alt="Growth Trend"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;According to the &lt;strong&gt;Phishing Activity Quarter-Over-Quarter (Aug–Oct 2025)&lt;/strong&gt; report, NiceNIC shows a consistent upward trend in phishing domain volume, while most major registrars are tightening controls and reducing abuse.&lt;/p&gt;
&lt;h3&gt;
  
  
  Phishing Domain Score Comparison
&lt;/h3&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Registrar&lt;/th&gt;
&lt;th&gt;Phishing Domain Score&lt;/th&gt;
&lt;th&gt;Status&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;NiceNIC (IANA 3765)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;1,141.74&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;🔴 Critical Threat&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Google / GoDaddy&lt;/td&gt;
&lt;td&gt;3.2–3.5&lt;/td&gt;
&lt;td&gt;🟢 Industry Standard&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Namecheap&lt;/td&gt;
&lt;td&gt;~3.5&lt;/td&gt;
&lt;td&gt;🟢 Industry Standard&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;&lt;a href="https://www.cybercrimeinfocenter.org/phishing-activity-quarter-over-quarter-registrars-august-october-2025" class="crayons-btn crayons-btn--primary" rel="noopener noreferrer"&gt;View Full Report&lt;/a&gt;
&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Analysis:&lt;/strong&gt; NiceNIC's score is approximately &lt;strong&gt;326 times higher&lt;/strong&gt; than the industry standard. This is a statistical anomaly so vast that it cannot be explained by accident, resource constraints, or incompetence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  2.3 Spamhaus Reputation Metrics
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fezpuljuaml39cy5hnwvm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fezpuljuaml39cy5hnwvm.png" alt="Spamhaus Metrics"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;NiceNIC, led by Hugo Julian, is striving to become the best among the worst&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://spamhaus.org" rel="noopener noreferrer"&gt;Spamhaus&lt;/a&gt; is widely regarded as the most authoritative arbiter of reputation in the email and network security space.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Global Ranking:&lt;/strong&gt; NiceNIC has consistently ranked among the &lt;strong&gt;top 10 most abused registrars globally&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The "Badness" Index:&lt;/strong&gt; NiceNIC's score of &lt;strong&gt;6.03&lt;/strong&gt; places it in the company of the world's worst offenders&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;🔗 &lt;a href="https://www.spamhaus.org/resource-hub/domain-reputation/domain-reputation-update-april-september-2025/" rel="noopener noreferrer"&gt;spamhaus.org/resource-hub/domain-reputation&lt;/a&gt;&lt;/p&gt;


&lt;h1&gt;
  
  
  Part III: Mechanisms of Evasion — The "Bulletproof" Model
&lt;/h1&gt;

&lt;p&gt;How does a registrar achieve such notoriety? It requires a combination of technical permissiveness, procedural obstruction, and policy exploitation.&lt;/p&gt;
&lt;h2&gt;
  
  
  3.1 The "Closed Loop" Abuse System
&lt;/h2&gt;

&lt;p&gt;The RAA requires registrars to maintain an abuse contact and investigate reports. NiceNIC complies with the &lt;strong&gt;form&lt;/strong&gt; of this requirement while completely gutting its &lt;strong&gt;substance&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;
  
  
  The Auto-Responder Wall
&lt;/h3&gt;

&lt;p&gt;Upon submitting a detailed forensic report, the reporter receives a generic acknowledgement template:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Dear Reporter,

Thank you for submitting your report. We have received your message 
and appreciate the effort to keep the Internet safe.

However at this stage the information provided is not sufficient for 
our team to verify the issue or to determine the nature of the 
reported activity...

[Standard boilerplate continues...]

Best regards,
NiceNIC Abuse Team
ICANN Accredited Registrar since 2012
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;This template is sent even when the initial report contains exactly the requested data&lt;/strong&gt; — URLs, screenshots, and server logs. It is a delay tactic.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Forwarding Game
&lt;/h3&gt;

&lt;p&gt;Instead of investigating the evidence, NiceNIC &lt;strong&gt;forwards the complaint to the registrant (the criminal)&lt;/strong&gt;. The criminal registrant then replies denying the abuse, or simply ignores it. If they deny it, NiceNIC often accepts this denial at face value and closes the ticket.&lt;/p&gt;

&lt;p&gt;This "closed loop" allows NiceNIC to claim they are "processing" reports, thereby satisfying ICANN auditors, while ensuring that &lt;strong&gt;no action is actually taken&lt;/strong&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  3.2 Marketing Anonymity: The Crypto-Currency Nexus
&lt;/h2&gt;

&lt;p&gt;NiceNIC explicitly markets its acceptance of &lt;strong&gt;Bitcoin (BTC), Tether (USDT), Ethereum (ETH), and Litecoin (LTC)&lt;/strong&gt; for domain registration and renewals.&lt;/p&gt;

&lt;p&gt;By prioritizing and advertising these payment methods, NiceNIC signals to the market:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;"We do not want to know who you are."&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;This severance of the financial link between the criminal and the infrastructure is a critical service feature.&lt;/p&gt;

&lt;h2&gt;
  
  
  3.3 Technical Forensics: Homograph Attacks and DGAs
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz01taexhjolqr3id9i5k.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz01taexhjolqr3id9i5k.png" alt="Criminal vectors"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;NiceNIC's ambition extends beyond phishing — they want to dominate every criminal vector&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Homograph Attacks and Faux Cyrillic:&lt;/strong&gt;&lt;br&gt;
Threat actors exploit IDNs via "homograph attacks," using Cyrillic characters that look identical to Latin letters to spoof brands. NiceNIC's automated systems are a playground for these attacks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Domain Generation Algorithms (DGAs):&lt;/strong&gt;&lt;br&gt;
Google Threat Intelligence has flagged the presence of "recently created DGA domains" within NiceNIC's portfolio — indicating botnet management.&lt;/p&gt;




&lt;h1&gt;
  
  
  Part IV: Case Studies in Cybercrime
&lt;/h1&gt;

&lt;h2&gt;
  
  
  4.1 Case Study: The Trust Wallet Heist (December 2025)
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyv7uc79w0jiukoo0dgmh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyv7uc79w0jiukoo0dgmh.png" alt="Trust Wallet Heist"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;NiceNIC openly ignores abuse reports and positions itself as a protector for scammers&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;In December 2025, the cryptocurrency ecosystem was destabilized by a sophisticated attack targeting users of &lt;strong&gt;Trust Wallet&lt;/strong&gt;.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Attack Vector
&lt;/h3&gt;

&lt;p&gt;Threat actors distributed a malicious browser extension, designed to harvest &lt;strong&gt;"seed phrases"&lt;/strong&gt; — the master keys to user wallets.&lt;/p&gt;

&lt;h3&gt;
  
  
  The NiceNIC Connection: Full-Stack Control
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fipb25o4vpucm6pnit553.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fipb25o4vpucm6pnit553.png" alt="SlowMist Analysis"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;&lt;a href="https://slowmist.medium.com/christmas-heist-analysis-of-trust-wallet-browser-extension-hack-bdb35c3cc6dd" rel="noopener noreferrer"&gt;SlowMist analysis&lt;/a&gt; - domain confirmed&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Forensic analysis confirmed that the critical data-exfiltration infrastructure was &lt;strong&gt;not only registered via NiceNIC but also hosted on NiceNIC servers&lt;/strong&gt;. This "full-stack" control meant NiceNIC had absolute technical sovereignty over the exfiltration nodes.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Operational Failure
&lt;/h3&gt;

&lt;p&gt;Intelligence indicates that the NiceNIC operator was &lt;strong&gt;active on Telegram&lt;/strong&gt; (visible status "Online") during the heist, receiving urgent alerts from PhishDestroy and other researchers.&lt;/p&gt;

&lt;p&gt;Despite the real-time notification of a massive financial crime in progress, the infrastructure remained live. The theft reached an estimated &lt;strong&gt;$8.5 million&lt;/strong&gt; in drained assets.&lt;/p&gt;

&lt;p&gt;🔗 &lt;a href="https://trustwallet.com/blog/announcements/trust-wallet-browser-extension-v268-incident-community-update" rel="noopener noreferrer"&gt;Trust Wallet Official Statement&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  4.2 Case Study: The "Soulless" Scam Machine (August 2025)
&lt;/h2&gt;

&lt;p&gt;In August 2025, investigative journalist &lt;a href="https://krebsonsecurity.com/2025/08/affiliates-flock-to-soulless-scam-gambling-machine/" rel="noopener noreferrer"&gt;Brian Krebs&lt;/a&gt; exposed a massive network of Russian scam gambling sites.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Scale
&lt;/h3&gt;

&lt;p&gt;PhishDestroy intelligence identified over &lt;strong&gt;1,200 identical sites&lt;/strong&gt; sharing the same code base, the same crypto-drainer scripts. The vast majority registered through NiceNIC.&lt;/p&gt;

&lt;p&gt;📋 &lt;a href="https://gist.githubusercontent.com/phishdestroy/ce7890352e7277c5fa112670473c2fe2/raw/ad494ba6f6dd4e02bfe0689320f5bc89e6130d55/gistfile1.txt" rel="noopener noreferrer"&gt;Full list of sites&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Symbiosis with Crime Panels
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7odmivhutgzhr4cd481w.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7odmivhutgzhr4cd481w.png" alt="Gambler Panel Recommendation"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Source: t.me/gambler_tech/39 — Fraudulent Russian group recommends NiceNIC as the "best provider"&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Owners of scam panels actively train their affiliates to use NiceNIC. Leaked Telegram screenshots reveal instructors explicitly recommending NiceNIC as a "safe haven."&lt;/p&gt;

&lt;h2&gt;
  
  
  4.3 Case Study: Scattered Spider (UNC3944)
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foy8jqrkyfjd1iixyriix.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foy8jqrkyfjd1iixyriix.png" alt="Scattered Spider"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Scattered Spider: The Supply Chain of Ransomware&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Scattered Spider&lt;/strong&gt; is one of the most aggressive threat groups currently operating, known for targeting identity providers like Okta to breach major corporations (MGM Resorts, Caesars Entertainment).&lt;/p&gt;

&lt;h3&gt;
  
  
  The Lookalike Tactic
&lt;/h3&gt;

&lt;p&gt;The group relies heavily on "lookalike" domains — domains that visually resemble corporate login portals (e.g., &lt;code&gt;okta-support-update.com&lt;/code&gt;). Intelligence from Mimecast, Google Threat Intelligence, and Silent Push has linked a significant number of these domains to NiceNIC.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Operational Requirement
&lt;/h3&gt;

&lt;p&gt;If a Blue Team reports a domain and it is taken down in 30 minutes (standard for reputable registrars), the attack fails. If it stays up for &lt;strong&gt;48 hours&lt;/strong&gt; — the typical "ignore" window of NiceNIC — the attack succeeds.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NiceNIC is effectively part of the supply chain for ransomware attacks against Fortune 500 companies.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;🔗 &lt;a href="https://www.silentpush.com/blog/scattered-spider-2025/" rel="noopener noreferrer"&gt;Silent Push Report&lt;/a&gt;&lt;br&gt;
🔗 &lt;a href="https://attack.mitre.org/groups/G1015/" rel="noopener noreferrer"&gt;MITRE ATT&amp;amp;CK Profile&lt;/a&gt;&lt;/p&gt;




&lt;h1&gt;
  
  
  Part V: The Manifesto and the PR Stunt
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbuh0yld6cjmmpozif18x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbuh0yld6cjmmpozif18x.png" alt="Twitter"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;On January 10, 2026, the implicit actions of NiceNIC were made explicit in a bizarre public incident. The official NiceNIC X (Twitter) account posted:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;"We are not against scamming the whole world… we here to make cash."&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;They posted it — or someone using their official Twitter account did — and they even managed to include a Cyrillic character (creating plausible deniability: &lt;em&gt;"This wasn't us, this was Russian attackers"&lt;/em&gt;).&lt;/p&gt;

&lt;p&gt;What this really looks like is not an apology or an explanation for the public — &lt;strong&gt;it's PR aimed at the hackers themselves&lt;/strong&gt;. A signal:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;"We're on your side, we don't block scams, we don't cooperate with ICANN, we don't care about reports. We're the registrar you can rely on."&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h1&gt;
  
  
  Part VI: Geopolitics and Regulatory Inertia
&lt;/h1&gt;

&lt;h2&gt;
  
  
  6.1 The "Notice and Cure" Loophole
&lt;/h2&gt;

&lt;p&gt;NiceNIC games the ICANN system effectively. If ICANN sends a notice regarding 50 specific domains, NiceNIC simply deletes those 50 domains on Day 14. ICANN declares the breach "cured." Meanwhile, NiceNIC has registered &lt;strong&gt;5,000 new malicious domains&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;This "Whac-A-Mole" dynamic allows the registrar to be perpetually in breach and perpetually "curing" it.&lt;/p&gt;

&lt;h2&gt;
  
  
  6.2 The Hong Kong Shield
&lt;/h2&gt;

&lt;p&gt;NiceNIC's Hong Kong jurisdiction is a critical component of its "bulletproof" status. Western law enforcement agencies face significant bureaucratic hurdles when serving subpoenas in Hong Kong.&lt;/p&gt;

&lt;p&gt;The Great Firewall of China is obsessed with internal political stability; content that criticizes the CCP is taken down in seconds. However, a phishing site targeting a French bank or a US crypto wallet is not a priority for local censors.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NiceNIC exploits this asymmetry.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;🔗 &lt;a href="https://www.hkirc.hk/en/accredited-registrars" rel="noopener noreferrer"&gt;HKIRC Accredited Registrars&lt;/a&gt;&lt;/p&gt;




&lt;h1&gt;
  
  
  Conclusion: A Rogue State in the DNS
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fotk5x81897urh5gyc1k9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fotk5x81897urh5gyc1k9.png" alt="Conclusion"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;In the modern ecosystem, no registrar should be willing to protect scam syndicates for $10 per domain&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The evidence compiled in this report leads to a singular conclusion: &lt;strong&gt;NiceNIC (IANA 3765) is a rogue registrar&lt;/strong&gt;. It does not operate within the spirit of the ICANN community; it operates as a parasite upon it.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Finding&lt;/th&gt;
&lt;th&gt;Evidence&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Statistical Outlier&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Abuse rates exceed industry norms by over 300%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Operational Complicity&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;"Closed loop" abuse process and crypto-anonymity protect criminals&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Proven Harm&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Facilitates high-end cyberwarfare (Scattered Spider) and mass-market fraud (Trust Wallet)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;Hiding behind 'free speech' to justify refusing takedowns, while calling automated replies an 'abuse desk,' isn't just dishonest — it's criminal. It's a bargain-bin excuse for aiding offenders, shielding their infrastructure, and undermining every attempt at investigation.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  📋 Recommendations for Remediation
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Immediate ICANN Audit:&lt;/strong&gt; ICANN must invoke its audit rights under the RAA to examine NiceNIC's abuse handling records and crypto-payment KYC procedures&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Invocation of RAA Section 3.11.3:&lt;/strong&gt; The security community must build a case that NiceNIC's continued accreditation poses a threat to the stability and security of the internet&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Financial Sanctions and Payment Rails:&lt;/strong&gt; Pressure should be applied to upstream registries (Verisign for .com, PIR for .org) to de-peer NiceNIC&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Until IANA 3765 is revoked, the internet's "Red Light District" will remain open for business, and the victims will continue to pile up.&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  🙏 Thanks for reading!
&lt;/h2&gt;

&lt;p&gt;Stay alert when you come across a domain registered via NiceNIC 🚨&lt;br&gt;
Don't act like NiceNIC — act responsibly 👍&lt;br&gt;
Together, we can push phishing and scam out of the internet 🌐✨&lt;/p&gt;




&lt;h2&gt;
  
  
  🔗 Further Reading / References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.trustpilot.com/review/nicenic.net" rel="noopener noreferrer"&gt;Trustpilot Reviews&lt;/a&gt; — User reviews on abuse handling and phishing domains&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://nicenic.support/" rel="noopener noreferrer"&gt;nicenic.support&lt;/a&gt; — Independent write-up on NiceNIC abuse reporting process&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://dev.to/destroyphish/the-backbone-of-global-scam-how-namesilo-webnic-and-nicenic-1if1"&gt;dev.to/destroyphish&lt;/a&gt; — OSINT analysis of registrars enabling scams&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.cybercrimeinfocenter.org/phishing-activity-in-registrars-may-july-2025" rel="noopener noreferrer"&gt;Cybercrime Info Center&lt;/a&gt; — Registrar phishing domain ranking&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://interisle.substack.com/p/phishing-trends-february-april-2025" rel="noopener noreferrer"&gt;Interisle Phishing Trends&lt;/a&gt; — Phishing activity analysis&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;This report was produced by the &lt;a href="https://phishdestroy.io" rel="noopener noreferrer"&gt;PhishDestroy&lt;/a&gt; Threat Intelligence Team. We have taken down over 500,000 phishing domains to make the internet safer for everyone.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>osint</category>
      <category>webdev</category>
      <category>security</category>
    </item>
    <item>
      <title>🕵️‍♂️ DestroyScammers: De-anonymizing Crypto Thieves with Open Source Intelligence</title>
      <dc:creator>PhishDestroy</dc:creator>
      <pubDate>Sun, 30 Nov 2025 05:25:19 +0000</pubDate>
      <link>https://forem.com/destroyphish/destroyscammers-de-anonymizing-crypto-thieves-with-open-source-intelligence-5gih</link>
      <guid>https://forem.com/destroyphish/destroyscammers-de-anonymizing-crypto-thieves-with-open-source-intelligence-5gih</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fao99ka0zihejnl2ye2nm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fao99ka0zihejnl2ye2nm.png" alt="DestroyScammers Dashboard" width="800" height="536"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;TL;DR: Crypto scammers act like jurisdiction doesn’t apply to them. It does. We built the DestroyScammers Dashboard (&lt;a href="https://phishdestroy.github.io/DestroyScammers" rel="noopener noreferrer"&gt;https://phishdestroy.github.io/DestroyScammers&lt;/a&gt;) and the open source DestroyList dataset (&lt;a href="https://github.com/phishdestroy/destroylist" rel="noopener noreferrer"&gt;https://github.com/phishdestroy/destroylist&lt;/a&gt;) to prove it. With automated data collection, passive DNS, CT logs, and basic OSINT, we turn “elite hackers” into ordinary, traceable suspects. This post explains how the stack works and why code beats fear.&lt;/p&gt;




&lt;h2&gt;
  
  
  “Incident response” that starts with &lt;code&gt;balance: 0&lt;/code&gt;
&lt;/h2&gt;

&lt;p&gt;For a lot of victims, the story starts like this:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Fake airdrop → sign “just one” transaction
&lt;/li&gt;
&lt;li&gt;“Support agent” in DMs → asks for seed phrase or wallet export
&lt;/li&gt;
&lt;li&gt;Drainer script hidden behind a trusted-looking UI
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Result is always the same:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Money gone
&lt;/li&gt;
&lt;li&gt;Trust shattered
&lt;/li&gt;
&lt;li&gt;Mental loop:
&amp;gt; “I was stupid. Nothing can be done. It’s the blockchain — there is no Ctrl+Z.”&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This post is a patch for that mindset.&lt;/p&gt;

&lt;p&gt;We’re not law enforcement. We don’t have badges or warrants. What we do have is:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;GitHub
&lt;/li&gt;
&lt;li&gt;Automation
&lt;/li&gt;
&lt;li&gt;OSINT
&lt;/li&gt;
&lt;li&gt;Time&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And surprise: a lot of the time, identifying the “mouse” behind the screen is easier than getting a special agent to pick up your ticket.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Myth of the “Elite Hacker”
&lt;/h2&gt;

&lt;p&gt;Public image:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Hoodie
&lt;/li&gt;
&lt;li&gt;Green terminals
&lt;/li&gt;
&lt;li&gt;“Offshore”
&lt;/li&gt;
&lt;li&gt;“Non-extradition”
&lt;/li&gt;
&lt;li&gt;“Connections in high places”
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Reality for a big chunk of crypto scam operations:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Recycled phishing kits with minor CSS edits
&lt;/li&gt;
&lt;li&gt;Cheap domains bought in bulk
&lt;/li&gt;
&lt;li&gt;Shared hosting / same IP ranges
&lt;/li&gt;
&lt;li&gt;Terrible OpSec (chat logs, reused usernames, real-life selfies…)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;When you start collecting and structuring evidence, they stop looking like hackers and start looking like what they are:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;People running stolen code on discount infrastructure, assuming nobody will ever audit them.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk5uxfnlp3nzw1fcy0nh7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk5uxfnlp3nzw1fcy0nh7.png" alt="DestroyScammers Stack" width="800" height="536"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  The Stack: How DestroyScammers Works
&lt;/h2&gt;

&lt;p&gt;The DestroyScammers ecosystem is boring by design. No magic, no “zero-days”, no access to internal systems. Just systematic use of data that is already public.&lt;/p&gt;

&lt;p&gt;Core repo (dataset):&lt;br&gt;&lt;br&gt;
&lt;a href="https://github.com/phishdestroy/destroylist" rel="noopener noreferrer"&gt;https://github.com/phishdestroy/destroylist&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;Dashboard (visualization):&lt;br&gt;&lt;br&gt;
&lt;a href="https://phishdestroy.github.io/DestroyScammers" rel="noopener noreferrer"&gt;https://phishdestroy.github.io/DestroyScammers&lt;/a&gt;  &lt;/p&gt;

&lt;h3&gt;
  
  
  1. Passive DNS &amp;amp; WHOIS history
&lt;/h3&gt;

&lt;p&gt;Scammers are lazy. Common patterns:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Same email reused across multiple domains
&lt;/li&gt;
&lt;li&gt;Real data in historical WHOIS before they enable privacy
&lt;/li&gt;
&lt;li&gt;Reused name/handle fragments in contact fields
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Passive DNS + WHOIS history lets us:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Map how domains move between IP ranges
&lt;/li&gt;
&lt;li&gt;Cluster related infrastructure
&lt;/li&gt;
&lt;li&gt;Catch “forgotten” metadata from early registrations
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  2. Certificate Transparency (CT) logs
&lt;/h3&gt;

&lt;p&gt;We monitor CT logs and regularly see:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;SSL certificates issued for phishing domains
&lt;/li&gt;
&lt;li&gt;Certificate subjects/patterns that match known kits
&lt;/li&gt;
&lt;li&gt;New domains for an existing scam panel before the campaign goes live
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This gives you a &lt;strong&gt;pre-attack visibility window&lt;/strong&gt;: the site is not live yet, but the certificate already exists.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Cross-referencing chain data, infra and social
&lt;/h3&gt;

&lt;p&gt;We link:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Wallet addresses (on-chain traces)
&lt;/li&gt;
&lt;li&gt;Domains / IPs / hosting providers
&lt;/li&gt;
&lt;li&gt;Social identities and handles reused across platforms
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Individually, none of these are magic. Together, they form a graph that is very hard to fully sanitize once you’ve already run a few campaigns.&lt;/p&gt;

&lt;h3&gt;
  
  
  4. Sandboxes &amp;amp; threat intel feeds
&lt;/h3&gt;

&lt;p&gt;We ingest reports from:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Public sandboxes like &lt;a href="https://urlscan.io" rel="noopener noreferrer"&gt;https://urlscan.io&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Other open threat intelligence feeds
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Even a single sandbox run can leak:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;C2 endpoints
&lt;/li&gt;
&lt;li&gt;JavaScript kit URLs
&lt;/li&gt;
&lt;li&gt;Panel paths
&lt;/li&gt;
&lt;li&gt;Reused redirectors
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We don’t need to breach their servers. We just need to structure the artifacts they already leak into the open web.&lt;/p&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F10txesqn8yxac6f9uolv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F10txesqn8yxac6f9uolv.png" alt="DestroyScammers Case Studies" width="800" height="536"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Case Study Flow: From Victim to Evidence Package
&lt;/h2&gt;

&lt;p&gt;Here’s the high-level flow of how a victim report turns into a structured case.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl89k2il54u9cx3glggxe.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl89k2il54u9cx3glggxe.png" alt=" " width="800" height="113"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now let’s look at two real-world-style scenarios that illustrate one point:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Borders do not protect you if the evidence package is solid.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  Case 1: US → UAE — “The Dubai Exploit”
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Victim: elderly US citizen
&lt;/li&gt;
&lt;li&gt;Loss: six figures
&lt;/li&gt;
&lt;li&gt;Operators: based in Russia, relaxed, “grey zone” mindset
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Their mistakes:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Bad OpSec in chats (keyboard layouts, language mix)
&lt;/li&gt;
&lt;li&gt;Instagram stories showing off international travel, including Dubai
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The victim’s son:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Used his &lt;strong&gt;legal status in the UAE&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Filed a formal complaint via UAE e-government portals
&lt;/li&gt;
&lt;li&gt;Ensured that when the scammer landed, there was a &lt;strong&gt;legal firewall&lt;/strong&gt; waiting
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Outcome:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Scammer detained in Dubai
&lt;/li&gt;
&lt;li&gt;Case processed under UAE law
&lt;/li&gt;
&lt;li&gt;Jurisdiction followed the &lt;strong&gt;person&lt;/strong&gt;, not the blockchain
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Case 2: Kazakhstan as a Proxy for Justice
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Victim: US
&lt;/li&gt;
&lt;li&gt;Operator: Russia
&lt;/li&gt;
&lt;li&gt;Classic prognosis: “Nothing to be done. Different jurisdictions.”
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Instead of accepting that, the victim:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Routed the legal process via Kazakhstan
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;What happened:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A criminal case was opened in Kazakhstan (strong mutual legal assistance treaties)
&lt;/li&gt;
&lt;li&gt;Formal request sent to Russian authorities
&lt;/li&gt;
&lt;li&gt;Search and arrest executed on the Russian side
&lt;/li&gt;
&lt;li&gt;No extradition needed — local prosecution was enough
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Takeaway:&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Crypto is borderless. So is criminal justice if you route the paperwork like an API request.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpe7c7ln0ugx4p4ccz38d.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpe7c7ln0ugx4p4ccz38d.png" alt="Grey Market Threat Model" width="800" height="536"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  The Grey Market Threat Model (“probiv”)
&lt;/h2&gt;

&lt;p&gt;In Russia and parts of the CIS, there is a huge &lt;strong&gt;grey market for insider data&lt;/strong&gt;, often called “probiv”.&lt;/p&gt;

&lt;p&gt;This is &lt;strong&gt;not&lt;/strong&gt; OSINT. This is illegal access to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;State databases
&lt;/li&gt;
&lt;li&gt;Telco systems
&lt;/li&gt;
&lt;li&gt;Bank systems
&lt;/li&gt;
&lt;li&gt;Travel records
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We do &lt;strong&gt;not&lt;/strong&gt; use or endorse this. But scammers should understand what it means for &lt;em&gt;them&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;Data often on sale:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Border crossing history
&lt;/li&gt;
&lt;li&gt;Flight passenger manifests
&lt;/li&gt;
&lt;li&gt;Civil registry (marriage, relatives)
&lt;/li&gt;
&lt;li&gt;Real-time geolocation from telcos
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Scammers hide behind Telegram usernames and think they are safe.&lt;/p&gt;

&lt;p&gt;In reality:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Their full biography sits in centralized state systems
&lt;/li&gt;
&lt;li&gt;Access to that data on the black market can cost less than a pizza
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If that’s what a random person can buy:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Imagine what a verified investigator can do with a warrant, MLAT, and a well-prepared evidence package.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Anonymity is a UX feeling, not a technical fact.&lt;/p&gt;




&lt;h2&gt;
  
  
  What the DestroyScammers Dashboard Actually Is
&lt;/h2&gt;

&lt;p&gt;We &lt;strong&gt;don’t&lt;/strong&gt; sell:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;“Recovery”
&lt;/li&gt;
&lt;li&gt;“Guaranteed fund tracing”
&lt;/li&gt;
&lt;li&gt;“Chargeback for crypto”
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Those are usually secondary scams.&lt;/p&gt;

&lt;p&gt;We &lt;strong&gt;do&lt;/strong&gt; build an open source intelligence platform focused on crypto scam infrastructure.&lt;/p&gt;

&lt;p&gt;Current capabilities:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Visualization&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Graphs of domains, wallets, panels, and social accounts
&lt;/li&gt;
&lt;li&gt;Clustering scam “crews” and campaigns
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Archiving&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Snapshots of scam sites and chats
&lt;/li&gt;
&lt;li&gt;HTTP 404 is irrelevant if we have the HTML, screenshots, and archive.org copies
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Aggregation&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Multiple victims, one scam kit → single unified view
&lt;/li&gt;
&lt;li&gt;Detecting rebrands, new domains, and “v2” panels
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Roadmap:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;[ ] Automated timeline generation for specific scam crews
&lt;/li&gt;
&lt;li&gt;[ ] Stronger Domain ↔ Wallet ↔ Social entity mapping
&lt;/li&gt;
&lt;li&gt;[ ] Public API for community evidence and intel submissions
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Links:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Dashboard: &lt;a href="https://phishdestroy.github.io/DestroyScammers" rel="noopener noreferrer"&gt;https://phishdestroy.github.io/DestroyScammers&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Dataset: &lt;a href="https://github.com/phishdestroy/destroylist" rel="noopener noreferrer"&gt;https://github.com/phishdestroy/destroylist&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Victim Action Guide: &lt;a href="https://phishdestroy.io/critical-action" rel="noopener noreferrer"&gt;https://phishdestroy.io/critical-action&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  How You Can Use This as a Dev / Researcher
&lt;/h2&gt;

&lt;p&gt;If you’re a developer, security engineer, or researcher, you can:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Use the dataset to build your own detection logic
&lt;/li&gt;
&lt;li&gt;Correlate our data with your SIEM / alerts
&lt;/li&gt;
&lt;li&gt;Run your own enrichment (e.g., custom chain analytics)
&lt;/li&gt;
&lt;li&gt;Automate reporting workflows to relevant jurisdictions
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We intentionally keep everything open:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;No secret paywalled feeds
&lt;/li&gt;
&lt;li&gt;No NDAs
&lt;/li&gt;
&lt;li&gt;No “elite club”
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Fork it, break it, improve it.&lt;/p&gt;




&lt;h2&gt;
  
  
  Conclusion: Structured Rage &amp;gt; Silent Shame
&lt;/h2&gt;

&lt;p&gt;Scammers want victims to feel:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Stupid
&lt;/li&gt;
&lt;li&gt;Alone
&lt;/li&gt;
&lt;li&gt;Helpless
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Silence is their best security feature.&lt;/p&gt;

&lt;p&gt;The counter-strategy is not “vigilante justice”. It’s &lt;strong&gt;structured rage&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Save the logs
&lt;/li&gt;
&lt;li&gt;Dump the HTML
&lt;/li&gt;
&lt;li&gt;Archive the site
&lt;/li&gt;
&lt;li&gt;Document the chain transactions
&lt;/li&gt;
&lt;li&gt;File reports where they actually matter
&lt;/li&gt;
&lt;li&gt;Use OSINT and automation to keep pressure on the infrastructure
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You don’t have to stay “just another victim”.&lt;/p&gt;

&lt;p&gt;You can be the edge case that crashes their operation, burns their kit, and makes their next campaign a lot more expensive.&lt;/p&gt;

&lt;p&gt;If this resonates:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Star the repo: &lt;a href="https://github.com/phishdestroy/destroylist" rel="noopener noreferrer"&gt;https://github.com/phishdestroy/destroylist&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Play with the dashboard: &lt;a href="https://phishdestroy.github.io/DestroyScammers" rel="noopener noreferrer"&gt;https://phishdestroy.github.io/DestroyScammers&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Fork the data, plug it into your stack, and make crypto a more hostile place for scammers.&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>opensource</category>
      <category>cybersecurity</category>
      <category>osint</category>
      <category>blockchain</category>
    </item>
    <item>
      <title>$100K+ Returned — Wallet Access Restored (Adverting Case)</title>
      <dc:creator>PhishDestroy</dc:creator>
      <pubDate>Sun, 31 Aug 2025 03:48:04 +0000</pubDate>
      <link>https://forem.com/destroyphish/100k-returned-wallet-access-restored-adverting-case-34nd</link>
      <guid>https://forem.com/destroyphish/100k-returned-wallet-access-restored-adverting-case-34nd</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;A polished “ad deal” led to a wallet compromise. Funds had already moved. We restored access and reassigned control of the attacker’s receiving wallet to the victim team. A reward was offered later; we didn’t keep it — the surplus was directed to @_SEAL_Org. We stay independent.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsyxhh6gzkjqnadkun0gs.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsyxhh6gzkjqnadkun0gs.webp" alt=" " width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  What you need to know
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;The wallet was already compromised; funds had already been moved.&lt;/li&gt;
&lt;li&gt;We restored access and ensured $100K+ didn’t remain with the attacker.&lt;/li&gt;
&lt;li&gt;The project offered a reward; we didn’t keep it. The surplus was sent to @_SEAL_Org.&lt;/li&gt;
&lt;li&gt;We do this independently. This isn’t our job — it’s our hobby.
**&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How the scam looked (simple and real)
&lt;/h2&gt;

&lt;p&gt;**&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The victim was approached with a partnership/advertising proposal for a crypto game.&lt;/li&gt;
&lt;li&gt;It looked credible: a plausible website, a fairly large X (Twitter) profile, and professional video calls.&lt;/li&gt;
&lt;li&gt;During a call, they asked to install a “workplace viewer” to access materials.&lt;/li&gt;
&lt;li&gt;That “viewer” was stealer malware.&lt;/li&gt;
&lt;li&gt;The attackers withdrew funds, swapped tokens on one chain, and moved &lt;/li&gt;
&lt;li&gt;assets to another chain into their own receiving wallet.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;What we did (facts only)&lt;/strong&gt;
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;Confirmed the compromise and halted further movement.&lt;/li&gt;
&lt;li&gt;Restored wallet access for the rightful owner.&lt;/li&gt;
&lt;li&gt;Secured and reassigned control of the attacker’s receiving wallet to the victim team.&lt;/li&gt;
&lt;li&gt;Coordinated follow-up steps to reduce residual risk&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Outcome: access back • control back • attacker locked out.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Post-incident hardening (what we actually delivered)&lt;/strong&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Stop re-compromise. We gave step-by-step guidance to safely handle the infected device so it can’t steal funds again (network isolation, session revocation, credential/key rotation, and a clean rebuild plan).&lt;/li&gt;
&lt;li&gt;Clean operational setup. We helped configure a new, clean workstation dedicated to wallet operations (fresh OS, vendor-only downloads, hardware wallet, minimal extensions, separate browser profile, 2FA).&lt;/li&gt;
&lt;li&gt;Forensics-ready. We explained how to snapshot disks and collect system/app logs so the team can hand proper evidence to investigators if they pursue legal action.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;More critical steps: full, actionable checklist → &lt;a href="https://phishdestroy.io/critical-action" rel="noopener noreferrer"&gt;https://phishdestroy.io/critical-action&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  The method: “Adverting”
&lt;/h2&gt;

&lt;p&gt;Adverting is business-style social engineering. Criminals imitate normal workflows (ad buys, partnerships, PR) to make you install a “required client/viewer.” That “client” is the payload.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsdz4p1dzzqhuy9y494ef.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsdz4p1dzzqhuy9y494ef.png" alt=" " width="700" height="467"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Adverting stealer method&lt;br&gt;
Common telltales&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;“Install our ad manager/helper to sync creatives.”&lt;/li&gt;
&lt;li&gt;“Use our custom Zoom/Telegram client for the call.”&lt;/li&gt;
&lt;li&gt;“Open our media kit/NDA via a secure viewer.”&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Rule of thumb
&lt;/h2&gt;

&lt;p&gt;If a workflow from strangers requires a special client/viewer/updater, treat it as hostile by default. Use only official vendor downloads.&lt;/p&gt;

&lt;h2&gt;
  
  
  Money, the offered reward, and why we declined
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;After recovery, the project offered a reward because the total recovery exceeded the initial loss.&lt;/li&gt;
&lt;li&gt;We didn’t keep it.&lt;/li&gt;
&lt;li&gt;We directed the entire surplus to a team we trust and collaborate with: @_SEAL_Org.&lt;/li&gt;
&lt;li&gt;We do not turn this into a funding stream. Independence stays non-negotiable.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Our principles&lt;/strong&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Independence only. No budgets, no strings. This isn’t our job; it’s our hobby.&lt;/li&gt;
&lt;li&gt;Results &amp;gt; talk. Access restored, funds back. Everything else is noise.&lt;/li&gt;
&lt;li&gt;No “special clients.” If someone pushes a custom viewer/updater, assume hostility.&lt;/li&gt;
&lt;li&gt;Share smart. We disclose what helps victims — never what helps the actor.&lt;/li&gt;
&lt;li&gt;Make scammers feel it. Lawful, efficient pressure on their infra. With measured sarcasm.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Practical advice (start today)&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;For projects &amp;amp; teams&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Never install any “workplace viewer/client/updater” from unverified third parties — even if the call looks professional.&lt;/li&gt;
&lt;li&gt;Get Zoom/Telegram only from official vendor sites.&lt;/li&gt;
&lt;li&gt;Avoid sponsored links for wallets/bridges/airdrops — navigate directly.&lt;/li&gt;
&lt;li&gt;Prefer hardware wallets; keep seeds offline; rotate keys on any suspicion.&lt;/li&gt;
&lt;li&gt;If compromised: revoke sessions, move funds, rotate keys, re-issue secrets, and ask for help quickly — hours matter.
&lt;strong&gt;For the community&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Report suspicious activity: &lt;a href="https://t.me/PhishDestroy_bot" rel="noopener noreferrer"&gt;https://t.me/PhishDestroy_bot&lt;/a&gt;&lt;br&gt;
Join us: &lt;a href="https://phishdestroy.io/" rel="noopener noreferrer"&gt;https://phishdestroy.io/&lt;/a&gt; •&lt;br&gt;
IF YOU'VE BEEN HACKED - &lt;a href="https://phishdestroy.io/critical-action" rel="noopener noreferrer"&gt;https://phishdestroy.io/critical-action&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://phishdestroy.io/critical-action" rel="noopener noreferrer"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmhbqxntfgbm5hntjgiw7.png" alt=" " width="700" height="467"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Closing&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;The money had already moved. We brought access back and made sure $100K+ didn’t stay with the attacker. A reward was offered; we declined to keep it and directed the surplus where it helps others. We’ll keep doing it this way — independent, fast, and effective.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>web3</category>
      <category>phishing</category>
      <category>socialengineering</category>
    </item>
    <item>
      <title>The Backbone of Global Scam: How NameSilo, Webnic, and NiceNic</title>
      <dc:creator>PhishDestroy</dc:creator>
      <pubDate>Sun, 31 Aug 2025 03:32:53 +0000</pubDate>
      <link>https://forem.com/destroyphish/the-backbone-of-global-scam-how-namesilo-webnic-and-nicenic-1if1</link>
      <guid>https://forem.com/destroyphish/the-backbone-of-global-scam-how-namesilo-webnic-and-nicenic-1if1</guid>
      <description>&lt;p&gt;Global scam thrives on registrar protection.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;💥 Every second you read this, someone is being scammed — with the help of ICANN-accredited registrars.&lt;br&gt;
NameSilo, Webnic, and NiceNic don’t just sell domains — they sell time, safety, and legitimacy to global criminals.&lt;br&gt;
We scanned just one Nigerian IP — almost every site was fraud, kept alive by these registrars despite abuse reports.&lt;br&gt;
Now imagine that, multiplied by thousands of IPs, across every country.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;🚨 Introduction&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;In 2025, our OSINT investigation revealed a hard truth:&lt;br&gt;
&lt;strong&gt;Some ICANN-accredited registrars are not passive bystanders in cybercrime — they are key enablers.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;NameSilo, Webnic, and NiceNic &lt;strong&gt;sell domains to scammers from any country, for any kind of fraud&lt;/strong&gt;, and then systematically ignore abuse reports.&lt;br&gt;
Phishing for crypto? Fake banking portals? Medical scams preying on cancer patients? All of it passes.&lt;/p&gt;

&lt;p&gt;We’ve documented this in detail and made our findings public:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fey0zqa99oo6b6jet910l.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fey0zqa99oo6b6jet910l.webp" alt=" " width="720" height="1080"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;📂 Global scam domain database (auto-updated):&lt;br&gt;
&lt;a href="https://github.com/phishdestroy/destroylist" rel="noopener noreferrer"&gt;https://github.com/phishdestroy/destroylist&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;🌍 Not Just One Country — A Global Problem&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;This issue has nothing to do with geography.&lt;br&gt;
Whether a scammer operates from the US, Europe, Asia, or Africa, these registrars will take their money and look away.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Example case&lt;/strong&gt;: We scanned just one IP hosted by &lt;strong&gt;Betahost247 **in Nigeria. Almost every single domain pointed to it was live scam content. The hosting provider left them running — and the domains were all registered via **NameSilo, Webnic, and NiceNic.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This isn’t the main infrastructure of global scams — it’s a snapshot showing how these registrars behave everywhere.&lt;/p&gt;

&lt;p&gt;📂 &lt;strong&gt;Nigeria case study — 1 IP scan results:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://github.com/phishdestroy/Nigerian-dignity" rel="noopener noreferrer"&gt;https://github.com/phishdestroy/Nigerian-dignity&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🔍 &lt;strong&gt;Interactive scam domain list from this IP:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://phishdestroy.github.io/Nigerian-dignity/out/index.html" rel="noopener noreferrer"&gt;https://phishdestroy.github.io/Nigerian-dignity/out/index.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;📡 &lt;strong&gt;Full ASN search results for AS36352:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://urlscan.io/asn/AS36352" rel="noopener noreferrer"&gt;https://urlscan.io/asn/AS36352&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;🧩 How Their Business Model Works&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;A scammer’s needs are simple:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Hosting that won’t take them down quickly&lt;/li&gt;
&lt;li&gt;A registrar that ignores complaints&lt;/li&gt;
&lt;li&gt;Enough time to finish the fraud cycle
&lt;strong&gt;NameSilo&lt;/strong&gt;, &lt;strong&gt;Webnic&lt;/strong&gt;, and **NiceNic **deliver #2 flawlessly.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Our findings:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;❌ No effective abuse handling — domains stay live for weeks or months&lt;/li&gt;
&lt;li&gt;❌ Even government-level abuse notices are ignored without a court order&lt;/li&gt;
&lt;li&gt;(Example: FTC complaint against NameSilo, Dec 2024)&lt;/li&gt;
&lt;li&gt;❌ Selective takedowns — one or two domains removed, rest untouched&lt;/li&gt;
&lt;li&gt;❌ No KYC — anyone can register domains instantly, for any purpose&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;📊 The Scale&lt;/strong&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;30,000+ abuse reports in 2025 involving these registrars&lt;/li&gt;
&lt;li&gt;In some samples for Webnic and NiceNic, over 90% of active domains were tied to scams&lt;/li&gt;
&lt;li&gt;The Nigeria IP scan is just one visible case — but the same pattern repeats across the globe&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  💀 The Real-World Damage
&lt;/h2&gt;

&lt;p&gt;Every ignored abuse report means:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;More people losing their savings&lt;/li&gt;
&lt;li&gt;More victims targeted via paid ads&lt;/li&gt;
&lt;li&gt;More stolen credentials and identities sold on criminal forums&lt;/li&gt;
&lt;li&gt;In medical fraud cases — lives put in danger
This is not passive negligence — this is a &lt;strong&gt;deliberate business choice&lt;/strong&gt; to keep scammer accounts alive.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;🗣 Public Reviews Tell the Same Story&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Even outside OSINT investigations, public review platforms confirm the pattern.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.trustpilot.com/review/webnic.cc" rel="noopener noreferrer"&gt;Trustpilot — Webnic.cc&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.trustpilot.com/review/nicenic.net" rel="noopener noreferrer"&gt;Trustpilot — NiceNic&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.sitejabber.com/reviews/namesilo.com" rel="noopener noreferrer"&gt;Sitejabber — NameSilo&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Hundreds of users report identical experiences:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Abuse reports are ignored or met with template replies.&lt;/li&gt;
&lt;li&gt;Registrars demand screenshots and details already included in the original report.&lt;/li&gt;
&lt;li&gt;Cases are closed without action if the complainant does not reply again — even when the registrar already has all evidence.&lt;/li&gt;
&lt;li&gt;Many negative reviews are deleted or buried, while genuine criticism is drowned in PR-generated positive posts.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is not an accident — it’s a deliberate time-delay tactic.&lt;br&gt;
Every day they delay, scammers continue to steal, run ad campaigns, and drain wallets before any takedown happens.&lt;/p&gt;

&lt;p&gt;**&lt;/p&gt;

&lt;h2&gt;
  
  
  💡 What Would Change if They Acted
&lt;/h2&gt;

&lt;p&gt;**&lt;br&gt;
If these registrars acted within hours:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Tens of thousands of victims could have been spared in 2025 alone&lt;/li&gt;
&lt;li&gt;Large fraud networks would collapse under faster takedowns&lt;/li&gt;
&lt;li&gt;Criminal ROI would plummet, making scam campaigns far less sustainable
Instead, the delays give scammers exactly the operational window they need.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;🆚 The Contrast&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Responsible registrars:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Require full identity verification (KYC)&lt;/li&gt;
&lt;li&gt;Act on abuse reports in minutes&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Shut down all domains linked to a scammer&lt;br&gt;
&lt;strong&gt;NameSilo / Webnic / NiceNic:&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Ignore or delay abuse handling for weeks&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Keep known scammer accounts active indefinitely&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Bypass their ICANN RAA 3.18 obligations to investigate and respond to abuse&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;🔍 What Needs to Happen&lt;/strong&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;ICANN Compliance must audit these registrars for repeated violations&lt;/li&gt;
&lt;li&gt;Enforce full KYC for all registrations&lt;/li&gt;
&lt;li&gt;Suspend entire scam portfolios upon confirmed abuse&lt;/li&gt;
&lt;li&gt;Introduce an industry-wide ban list for repeat abusers
**&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  📌 Sources &amp;amp; Evidence
&lt;/h2&gt;

&lt;p&gt;**&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Global scam domain database: &lt;a href="https://github.com/phishdestroy/destroylist" rel="noopener noreferrer"&gt;https://github.com/phishdestroy/destroylist&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Nigeria case study: &lt;a href="https://github.com/phishdestroy/Nigerian-dignity" rel="noopener noreferrer"&gt;https://github.com/phishdestroy/Nigerian-dignity&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Interactive domain list: &lt;a href="https://phishdestroy.github.io/Nigerian-dignity/out/index.html" rel="noopener noreferrer"&gt;https://phishdestroy.github.io/Nigerian-dignity/out/index.html&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Full ASN scan results: &lt;a href="https://urlscan.io/asn/AS36352" rel="noopener noreferrer"&gt;https://urlscan.io/asn/AS36352&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;FTC complaint: &lt;a href="https://www.ftc.gov/system/files/ftc_gov/pdf/namesilo-wl-122024.pdf" rel="noopener noreferrer"&gt;https://www.ftc.gov/system/files/ftc_gov/pdf/namesilo-wl-122024.pdf&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;💬 Conclusion&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;NameSilo, Webnic, and NiceNic are not neutral service providers. They are pillars of the scam economy, selling domains to criminals from any country and ignoring evidence of abuse — even when lives are at stake.&lt;/p&gt;

&lt;p&gt;The Nigerian IP example shows exactly how this plays out in real life — but it’s just one of many.&lt;br&gt;
Until ICANN and regulators treat registrar inaction as active facilitation of cybercrime, the global scam industry will keep running on the infrastructure they provide.&lt;/p&gt;

</description>
      <category>cybercrime</category>
      <category>osint</category>
      <category>takedown</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>PhishDestroy: A Direct War on Phishing Operations</title>
      <dc:creator>PhishDestroy</dc:creator>
      <pubDate>Sun, 31 Aug 2025 03:28:41 +0000</pubDate>
      <link>https://forem.com/destroyphish/phishdestroy-a-direct-war-on-phishing-operations-4986</link>
      <guid>https://forem.com/destroyphish/phishdestroy-a-direct-war-on-phishing-operations-4986</guid>
      <description>&lt;p&gt;We are PhishDestroy, a global volunteer community engaged in a direct war on cybercrime. Since our inception, we’ve destroyed over 500,000 phishing domains. Our mission goes beyond simple takedowns — we actively assist in investigations, dismantle criminal infrastructures, and expose malicious actors. Everything we do is focused on delivering lasting, measurable damage to the phishing ecosystem.&lt;/p&gt;

&lt;p&gt;Operational Methodology: Automation, Accuracy, and Scale&lt;br&gt;
Our model combines community reporting with automated detection systems and precision analytics.&lt;/p&gt;

&lt;p&gt;Custom-built parsers scan SEO search results and Google Ads for phishing indicators.&lt;br&gt;
Identified threats are automatically submitted to 50+ antivirus vendors, maximizing global impact.&lt;br&gt;
We maintain a false-positive rate below 0.5%, with over 100,000 validated reports — proving our systems are not just fast, but highly accurate.&lt;br&gt;
🔗 Live infrastructure:&lt;br&gt;
Public database (auto-updated):&lt;br&gt;
&lt;a href="https://github.com/phishdestroy/destroylist" rel="noopener noreferrer"&gt;https://github.com/phishdestroy/destroylist&lt;/a&gt;&lt;br&gt;
Archived reports from banned X account (140K+ threats):&lt;br&gt;
&lt;a href="https://github.com/phishdestroy/x-twitter-archive-CarlyGriggs13" rel="noopener noreferrer"&gt;https://github.com/phishdestroy/x-twitter-archive-CarlyGriggs13&lt;/a&gt;&lt;br&gt;
Real-time alerts:&lt;br&gt;
&lt;a href="https://t.me/PhishDestroyAlerts" rel="noopener noreferrer"&gt;https://t.me/PhishDestroyAlerts&lt;/a&gt;&lt;br&gt;
Mastodon updates:&lt;br&gt;
&lt;a href="https://mastodon.social/@phishdestroy" rel="noopener noreferrer"&gt;https://mastodon.social/@phishdestroy&lt;/a&gt;&lt;br&gt;
Open Intelligence: Community Reporting and Trust System&lt;br&gt;
We encourage public participation through our secure bot:&lt;br&gt;
Report phishing via 👉 &lt;a href="https://t.me/PhishDestroy_bot" rel="noopener noreferrer"&gt;https://t.me/PhishDestroy_bot&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Every report is checked automatically.&lt;br&gt;
Verified users achieving 100 accurate reports are granted “trusted” status, allowing direct submissions without moderation.&lt;br&gt;
To protect whistleblowers, we intentionally do not store any user data — ensuring full anonymity and eliminating legal/data breach risks.&lt;br&gt;
📉 Our bot also features a live “damage counter”, estimating financial losses inflicted on scammers — based on average domain value and promo costs (~$15/domain for cryptoscam setups).&lt;/p&gt;

&lt;p&gt;Ecosystem Allies and Enablers&lt;br&gt;
We work hand-in-hand with infrastructure providers committed to cybersecurity, including:&lt;/p&gt;

&lt;p&gt;GoDaddy, Hostinger, Squarespace, IONOS, and especially Namecheap — whose 24/7 abuse team has helped us rapidly eliminate 30,000+ malicious domains.&lt;br&gt;
Unfortunately, some providers like Nicenic and Cosmotown consistently ignore abuse reports, effectively acting as safe havens for cybercriminal operations. These platforms remain ongoing targets in our efforts.&lt;/p&gt;

&lt;p&gt;Criminal Retaliation: Confirmation of Impact&lt;br&gt;
Our effectiveness has triggered backlash from organized actors&lt;/p&gt;

&lt;p&gt;DDoS attacks&lt;br&gt;
Coordinated smear and takedown campaigns&lt;br&gt;
Mass-reporting of our social media infrastructure&lt;br&gt;
In one such attack, our X (Twitter) account with 140,000+ documented phishing reports was permanently suspended.&lt;br&gt;
We maintained partial backup:&lt;br&gt;
🔗 &lt;a href="https://github.com/phishdestroy/x-twitter-archive-CarlyGriggs13" rel="noopener noreferrer"&gt;https://github.com/phishdestroy/x-twitter-archive-CarlyGriggs13&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We interpret this not as disruption, but as proof of impact. Criminals are trying to erase their tracks — we are ensuring their traces stay permanent.&lt;/p&gt;

&lt;p&gt;Evidence, Not Just Takedowns&lt;br&gt;
Takedowns are only the first step. Preserving evidence is our core priority:&lt;/p&gt;

&lt;p&gt;Every detected domain is archived via public scanners to capture full site fingerprints.&lt;br&gt;
We ensure each operation leaves a digital record, immune to deletion by attackers.&lt;br&gt;
These archives support investigations, attribution, and prosecution.&lt;br&gt;
While scammers wipe traces, we make them permanent.&lt;/p&gt;

&lt;p&gt;Legal Status: Open, Volunteer-Based, and Transparent&lt;br&gt;
We are a non-profit, volunteer collective — not a company, not a legal entity, and not affiliated with any government.&lt;/p&gt;

&lt;p&gt;We publish all reports and evidence openly:&lt;br&gt;
GitHub, Telegram, Mastodon, and real-time scanning tools.&lt;br&gt;
Nothing is hidden or stored privately. Our transparency is intentional — it protects us and empowers others.&lt;br&gt;
In major investigations (actor attribution, financial tracing, infrastructure mapping), we formally transfer full evidence packages to law enforcement or CERT teams.&lt;br&gt;
All such transfers are done in full legal compliance and only when actionable intelligence is verified.&lt;br&gt;
We do not store any personal data of our contributors. This protects both us and them from retaliation or compromise.&lt;br&gt;
We’re not here to police the internet — we’re here to document and destroy malicious operations, and support those with legal authority to act.&lt;/p&gt;

&lt;p&gt;Call to Action: Collective Resistance Against Fraud&lt;br&gt;
This is not a fight for a few. It’s a collective responsibility.&lt;/p&gt;

&lt;p&gt;If you witness a phishing attempt — report it.&lt;br&gt;
If you were defrauded — don’t stay silent.&lt;/p&gt;

&lt;p&gt;Losing money to fraud funds criminal infrastructure.&lt;br&gt;
Every voice, every post, every report contributes to takedowns and prosecution.&lt;/p&gt;

&lt;p&gt;Join Us&lt;br&gt;
🔗 Website: &lt;a href="https://phishdestroy.io" rel="noopener noreferrer"&gt;https://phishdestroy.io&lt;/a&gt;&lt;br&gt;
🧾 Public DB: &lt;a href="https://github.com/phishdestroy/destroylist" rel="noopener noreferrer"&gt;https://github.com/phishdestroy/destroylist&lt;/a&gt;&lt;br&gt;
📢 Alerts: &lt;a href="https://t.me/PhishDestroyAlerts" rel="noopener noreferrer"&gt;https://t.me/PhishDestroyAlerts&lt;/a&gt;&lt;br&gt;
📡 Mastodon: &lt;a href="https://mastodon.social/@phishdestroy" rel="noopener noreferrer"&gt;https://mastodon.social/@phishdestroy&lt;/a&gt;&lt;br&gt;
📮 Report via bot: &lt;a href="https://t.me/PhishDestroy_bot" rel="noopener noreferrer"&gt;https://t.me/PhishDestroy_bot&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We don’t ask for donations. We ask for action.&lt;br&gt;
Together, we destroy phishing — one domain at a time.&lt;/p&gt;

</description>
      <category>phishing</category>
      <category>cybersecurity</category>
      <category>drainer</category>
      <category>takedown</category>
    </item>
  </channel>
</rss>
