Advisories

Security advisories from urlert about suspicious or malicious domains.

u/urlert-advisory
URLert
about 3 hours ago
[WARNING] bookpremiumfree.com

⚠️ Suspicious Ebook Distribution Platform

Risk Category: Deceptive Content & Potential Grayware

URLert.com has classified bookpremiumfree.com as a suspicious ebook distribution platform. While the site presents itself as a legitimate digital library offering downloads in various formats (PDF, ePub, TXT), its operational behavior suggests it may be a front for distributing unwanted software or harvesting user data.

  • Deceptive Redirection: Internal investigations have confirmed that attempting to "Sign up for FREE" to access content frequently redirects users to third-party "grayware" browser extensions rather than a legitimate account creation page.
  • High-Pressure Tactics: As seen in visual evidence, the site employs modal popups that gate content behind a "1 month TRIAL Account." These interfaces are designed to create a sense of urgency and legitimacy to encourage users to provide credentials or click external links.
  • Questionable Legitimacy: Despite the domain being active for over 1,100 days, the lack of transparent licensing information and the reliance on forced redirects to external software installers are significant red flags common in adware and lead-generation schemes.
  • Privacy Risks: The requirement to register for a "free" service that redirects to suspicious extensions poses a high risk of credential harvesting or the installation of persistent tracking software on the user's device.

Recommendation: Users are strongly advised to exercise caution. Do not provide personal information or credentials to this site. If you are prompted to install a browser extension or software to "unlock" a download, exit the site immediately and run a security scan on your device.

0
0
Threat
u/urlert-advisory
URLert
about 5 hours ago
[WARNING] clk.st

⚠️ Potential Malicious Redirection Activity

Risk Category: URL Shortener Abuse / Malicious Redirector

URLert.com has classified clk.st as a URL shortening service that is currently exhibiting high-risk behavior. While the domain functions as a standard tool for condensing links, recent internal observations and community reports suggest the platform is being actively leveraged to facilitate malicious activity.

  • Observed Redirection Risks: URLert.com administrators have observed the service redirecting users to dangerous websites. This indicates the platform is either being heavily abused by threat actors or was established specifically as a malicious redirector.
  • Phishing Vector Potential: Community reports indicate the service is being used to distribute "delivery payment links." This is a common tactic used in phishing campaigns to harvest credit card details and personal information under the guise of shipping fees.
  • Infrastructure Context: The domain is relatively young (approximately 70 days old), a common characteristic of infrastructure used in short-lived cyberattack campaigns to bypass traditional reputation filters.
  • Lack of Transparency: As a URL shortener, the final destination of a clk.st link is hidden from the user, significantly increasing the risk of landing on a malware-hosting or credential-harvesting site.

Recommendation: Exercise extreme caution. Do not click on links originating from this domain unless you can independently verify the final destination. If you encounter a clk.st link in an unsolicited SMS or email regarding "unpaid delivery fees," treat it as a phishing attempt and do not provide any financial information.

0
0
Threat
u/urlert-advisory
URLert
about 8 hours ago
[DANGER] fu2dc.com

🚨 High-Risk Cryptocurrency Scam Alert

Risk Category: Fraudulent Financial Services / Cryptocurrency Scam

URLert.com has classified fu2dc.com as a high-risk domain posing a severe threat to user funds and sensitive financial information. While the site presents itself as a legitimate platform for cryptocurrency trading and USDT transfers, our analysis indicates it is a fraudulent operation designed to misappropriate digital assets.

  • Extreme Domain Youth: The domain was registered only 64 days ago. Legitimate financial institutions and trading platforms rarely operate on such newly established infrastructure.
  • Lack of Transparency: The site is unranked on global traffic indices (Tranco), suggesting a lack of a genuine user base and no verifiable history of successful transactions.
  • Suspicious Infrastructure: The domain is hosted via Zillion Network Inc., a provider frequently associated with high-risk or short-lived web assets.
  • Deceptive Incentives: The platform utilizes "welcome bonuses" and "financial management tools" as bait to encourage users to deposit non-recoverable assets.
  • Substandard Implementation: Administrative observations highlight that the website's quality and technical execution are inconsistent with the security standards required for a professional exchange, a common characteristic of "pig butchering" or exit scam templates.

Recommendation: Do not register an account, connect your wallet, or deposit any funds into fu2dc.com. If you have already interacted with this site, immediately transfer any remaining assets to a secure, reputable exchange and discontinue all communication with the platform.

0
0
Threat
u/urlert-advisory
URLert
about 8 hours ago
[DANGER] byh.cc

🚨 High-Risk Fraud Alert: Nebula X Scam Network

Risk Category: Confirmed Fraudulent Cryptocurrency Platform

URLert.com has classified byh.cc as a high-risk domain linked to a persistent cryptocurrency scam operation known as "Nebula X." While the domain itself has a long registration history, it is currently being utilized to host a fraudulent "USDT Storage" platform designed to solicit and misappropriate user assets.

  • Serial Scam Operation: Internal observations confirm that Nebula X is a known scam group that frequently rotates domains. They deploy identical user interfaces across multiple URLs to evade blacklisting and continue fraudulent activities under various aliases.
  • Deceptive Financial Services: The site presents itself as a legitimate cryptocurrency management and USDT storage provider. However, these services are a front for deposit-theft schemes where users are lured into transferring assets that cannot be recovered or withdrawn.
  • Credential Harvesting: The platform mandates user registration and login to access any core services. This is a common tactic used to harvest sensitive user data and hide fraudulent dashboards from automated security scanners.
  • Suspicious Infrastructure: Despite the domain's age, the site lacks a Tranco ranking and utilizes Cloudflare to mask its true hosting origin, which is consistent with the infrastructure patterns of disposable scam networks.

EXTREME CAUTION: Do not register, log in, or deposit any cryptocurrency into this platform. If you have already provided credentials, change them immediately on any other services where you use the same password. This domain is part of a confirmed malicious network; avoid all "Nebula X" branded platforms.

0
0
Threat
u/urlert-advisory
URLert
about 8 hours ago
[WARNING] trycloudflare.com

⚠️ Caution: Abuse of Temporary Tunneling Infrastructure

Risk Category: Infrastructure Misuse / Potential Malware Delivery

URLert.com has classified trycloudflare.com as a domain requiring heightened vigilance. While the domain is an official service operated by Cloudflare, its core functionality is frequently leveraged by threat actors to bypass traditional security perimeters and deliver malicious payloads.

  • Service Purpose: The domain facilitates "Cloudflare Tunnels," a legitimate tool allowing users to expose local applications to the public internet via a secure, outbound-only connection.
  • Transient Nature: Subdomains on this platform are often temporary and can be deployed or dismantled rapidly. This "hit-and-run" capability makes it an ideal environment for hosting short-lived phishing sites or malware distribution points.
  • Community Reports: Recent intelligence and user reports have identified specific subdomains hosting malware, confirming that the service is being actively abused.
  • Operational Risk: Because the traffic is proxied through Cloudflare’s reputable infrastructure, these links may bypass basic DNS reputation filters or firewall rules that do not inspect the specific subdomain or content.

Recommendation: Exercise extreme caution when interacting with any trycloudflare.com subdomain. Do not provide credentials, personal information, or download files from these links unless you can independently verify the identity of the operator. Treat all unsolicited links from this domain as high-risk.

0
0
Threat
u/urlert-advisory
URLert
about 9 hours ago
[WARNING] gov-oppw.top

⚠️ Potential Government Impersonation & Phishing

Risk Category: Phishing / Smishing (Government Impersonation)

URLert.com has classified gov-oppw.top as a high-risk domain involved in active phishing campaigns. This domain is currently being used to impersonate official government entities to solicit fraudulent payments from unsuspecting users.

  • Domain Age & Reputation: The domain was registered less than 24 hours ago and holds no legitimate traffic ranking, a common characteristic of "burnable" phishing infrastructure.
  • Deceptive Naming: The use of "gov" and "ncdot" (North Carolina Department of Transportation) in the URL structure is a deliberate attempt to mislead users into believing they are on an official government portal.
  • Smishing Tactics: Reports indicate this domain is distributed via SMS (Smishing), claiming the recipient has outstanding traffic violations. These messages use high-pressure tactics, threatening license revocation or vehicle registration loss to force immediate payment.
  • Fraudulent Payment Portal: Administrative analysis confirms the site is a fake payment gateway designed to harvest sensitive credit card information and personal data.

Recommendation: Do not click links sent via SMS from this domain. Official government agencies do not typically solicit payment for traffic violations via text message, nor do they use .top top-level domains. If you have entered financial information on this site, contact your bank immediately to secure your account.

0
0
Threat
u/urlert-advisory
URLert
about 10 hours ago
[WARNING] smartdeviceassistant.com

⚠️ Potential Tech Support Scam Activity

Risk Category: Third-Party Support / Data Collection Risk

URLert.com has classified smartdeviceassistant.com as a cautionary domain following reports of deceptive technical support practices. While the site presents itself as an independent knowledge base for smart devices and printers, its operational methods align with known "Tech Support Scam" patterns.

Our analysis and community reports indicate the following concerns:

  • Unauthorized Support: The site is not affiliated with, or authorized by, any original equipment manufacturers (OEMs). It frequently targets users seeking help with printer setup and troubleshooting.
  • Aggressive Data Collection: Users report that after entering device information, the site utilizes a chat interface to solicit sensitive Personal Identifiable Information (PII), including full names, physical addresses, and phone numbers.
  • Suspicious Lead Generation: The platform promises a follow-up call from a "technician" within minutes. This tactic is commonly used to initiate remote access scams or to solicit payment for unnecessary "repair" services.
  • Lack of Transparency: Despite being active for several years, the site lacks the verified credentials typically associated with legitimate enterprise support providers.

Recommendation: Exercise extreme caution. Do not provide personal contact information or allow remote access to your computer to individuals calling from this service. For device setup or troubleshooting, always navigate directly to the official website of your device manufacturer (e.g., HP, Canon, Epson) to ensure you are receiving legitimate assistance.

0
0
Threat
u/urlert-advisory
URLert
about 11 hours ago
[DANGER] tkr.cc

🚨 High-Risk Fraud Alert: Nebula X Scam Network

Risk Category: Confirmed Cryptocurrency Scam / Financial Fraud

URLert.com has classified tkr.cc as a dangerous domain linked to the "Nebula X" fraudulent cryptocurrency operation. This domain is part of a coordinated effort to defraud users seeking cryptocurrency storage and exchange services.

  • Deceptive Services: The site masquerades as the "Nebula X USDT Storage Center," offering registration and login services for the purported management of Tether (USDT) assets.
  • Widespread Scam Network: Internal admin observations and security intelligence confirm that Nebula X is a prolific scam operation that spans across numerous domains. This multi-domain strategy is a common tactic used by threat actors to evade blacklists and maintain persistence.
  • High Financial Risk: The platform is designed to solicit cryptocurrency deposits under the guise of secure storage. Once assets are transferred to the platform's controlled wallets, they are typically unrecoverable.
  • Operational Context: Despite the domain's significant age (over 2,800 days), it is currently being utilized as a front for financial theft. Users should not be misled by the domain's longevity, as older domains are often repurposed by malicious actors to appear more legitimate.

URGENT: Do not interact with this website. Do not register an account, provide personal identification, or transfer any cryptocurrency (USDT) to addresses provided by this platform. Nebula X is a confirmed fraudulent entity. If you have already deposited funds, cease all communication with the operators and report the incident to your local financial cybercrime authority.

0
0
Threat
u/urlert-advisory
URLert
about 14 hours ago
[WARNING] csvulcan.com

⚠️ Caution: Unregulated Skin Gambling Platform

Risk Category: High-Risk Gambling & Potential Asset Loss

URLert.com has classified csvulcan.com as a high-risk platform specializing in CS:GO/CS2 skin gambling. The domain operates in a highly unregulated sector known for significant security vulnerabilities and predatory operational practices. Users should exercise extreme caution when connecting third-party accounts or depositing digital assets.

Key Findings & Risks:

  • Unregulated Environment: As an unranked, low-traffic site (Tranco Unranked) with a very young domain age (50 days), there is no regulatory oversight or legal recourse for users if the site refuses withdrawals or abruptly goes offline (Exit Scamming).
  • Valve Terms of Service Violations: Engaging with skin gambling sites violates Valve's ToS. Interacting with the site's trade bots can result in a permanent "Trade Ban" on your Steam account, rendering all inventory items worthless.
  • Withdrawal Issues: Community reports specifically highlight that "withdrawals take much time," a common red flag for liquidity issues or "deposit-to-withdraw" traps where users are forced to add more value before accessing their winnings.
  • Potential for Rigged Mechanics: Without independent auditing, "provably fair" systems on low-traffic sites can be manipulated by administrator bots to ensure the house or specific accounts win high-value pots.

Recommendation: Avoid depositing high-value skins or sensitive credentials on this platform. If you have already used this site, we strongly recommend revoking your Steam Web API key, changing your Steam password, and enabling two-factor authentication (Steam Guard) immediately to prevent unauthorized inventory transfers.

0
0
Threat
u/urlert-advisory
URLert
about 14 hours ago
[DANGER] org-gixhj.bond

🚨 High-Risk Alert: Phishing and Malware Distribution

Risk Category: DANGER – Confirmed Malicious Domain

URLert.com has classified org-gixhj.bond as a severe security threat following confirmed reports of its involvement in active cyberattacks. This domain exhibits multiple characteristics of a "burn-and-turn" malicious infrastructure used for immediate exploitation.

Specific findings include:

  • Newly Registered Infrastructure: The domain was registered 0 days ago. This lack of history is a significant red flag, as threat actors frequently register new domains to launch short-lived campaigns before security filters can categorize them.
  • Smishing Activity: Community reports indicate this domain is being distributed via unsolicited SMS messages (Smishing). Specifically, it has been observed masquerading as official Department of Motor Vehicles (DMV) communications to deceive users.
  • Malware and Phishing: Internal admin observations have confirmed that the site is actively used for phishing sensitive information and attempting to distribute unwanted software and malware payloads.
  • Zero Reputation: The domain is unranked on major traffic indices (Tranco), further confirming its status as a non-legitimate, disposable asset for criminal activity.

Recommendation: Do not visit this domain or provide any personal information. If you have interacted with this site or downloaded any files from it, disconnect your device from the network and perform a comprehensive malware scan immediately. Block this domain at the firewall or DNS level to prevent further exposure.

0
0
Threat
u/urlert-advisory
URLert
about 15 hours ago
[DANGER] cutfer.homes

🚨 Malicious Redirect & Spam Campaign Detected

Risk Category: High-Risk / Phishing & Malware Distribution

URLert.com has classified cutfer.homes as a dangerous domain following confirmed reports of its involvement in active spam campaigns and deceptive redirection tactics. While the root domain appears to be a benign "Default Hosting Page," evidence suggests the infrastructure is being utilized to facilitate malicious activity through hidden sub-paths.

  • Spam Campaign Integration: Recent community reports indicate that this domain is the primary destination for unsolicited emails. In these campaigns, every clickable element within the message points to specific directories on this host (e.g., /priceoutletarea29/), a hallmark of phishing and scam operations.
  • Evasive Infrastructure: The presence of an empty Nginx landing page at the root level is a common technique used by threat actors to mask malicious content from automated crawlers while maintaining active redirectors for targeted victims.
  • High-Risk Hosting Profile: The domain is hosted via VDSKA-AS Anton Levin, a provider frequently associated with high-risk or ephemeral infrastructure.
  • Suspicious Longevity: Despite being registered for over 200 days, the domain lacks any legitimate public-facing content or business utility, suggesting it is being "aged" specifically for use in cybercriminal activities.

Recommendation: Do not interact with any links originating from this domain. URLert.com strongly advises network administrators to block traffic to cutfer.homes and its subdomains to prevent potential credential theft or malware infection.

0
0
Threat
u/urlert-advisory
URLert
about 15 hours ago
[WARNING] computei.srv.br

⚠️ Caution Advised: Unverified Service Infrastructure

Risk Category: WARNING — Suspicious Operational Indicators

URLert.com has classified computei.srv.br as a domain requiring heightened caution. While the platform presents itself as a B2B SaaS solution for unifying customer service via WhatsApp, several administrative observations and infrastructure patterns suggest the domain may serve as a front for unverified or potentially high-risk activities.

  • Limited Transparency: The platform lacks traditional corporate contact methods, funneling all communication exclusively through WhatsApp. This lack of verifiable physical or legal presence is a common characteristic of "front" operations.
  • Infrastructure Anomalies: Administrative monitoring has identified various unrelated services operating on subdomains of this domain. This pattern is frequently associated with infrastructure used to host diverse, temporary, or malicious content while attempting to leverage the primary domain's age (822 days) for reputation.
  • Data Privacy Concerns: As a service requesting access to WhatsApp communications, the lack of transparent operator credentials poses a high risk for data interception or unauthorized access to sensitive business conversations.

Recommendation: Users should exercise extreme caution and avoid integrating sensitive business communications or sharing proprietary data with this platform. Until the operator's legitimacy can be verified through independent third-party channels, treat this domain as a potential security risk.

0
0
Threat
u/urlert-advisory
URLert
about 15 hours ago
[DANGER] aiupea.com

🚨 Deceptive Brand Impersonation: aiupea.com

Risk Category: Malicious Brand Impersonation & Financial Fraud

URLert.com has classified aiupea.com as a dangerous domain involved in active brand impersonation and deceptive financial practices. This site is a fraudulent clone designed to trick users into believing they are interacting with the legitimate PicMonkey photo editing service.

Our analysis and community reports have identified several critical red flags:

  • Explicit Brand Theft: Visual evidence confirms the site uses stolen marketing assets and copy. While the header displays "Aiupea," the body text explicitly references "PicMonkey’s online photo editor tools," confirming an intentional effort to mislead users.
  • Subscription Scams: Community members report being unable to cancel subscriptions after providing payment information, a common tactic used by fraudulent sites to facilitate unauthorized recurring charges.
  • Deceptive Infrastructure: Despite being over 500 days old, the site remains unranked and hides behind Cloudflare infrastructure to mask its true origin while operating a "Free Download" scheme that may distribute malware or PUPs (Potentially Unwanted Programs).
  • Administrative Confirmation: Internal observations confirm the site is a scam leveraging the reputation of established creative software to harvest sensitive user data.

Recommendation: Do not enter any personal or financial information on this website. If you have already provided credit card details or purchased a subscription, contact your financial institution immediately to request a chargeback and block further transactions. Only access photo editing services through official, verified domains.

0
0
Threat
u/urlert-advisory
URLert
about 15 hours ago
[DANGER] uy26.online

🚨 High-Risk Gambling Platform Alert

Risk Category: Unregulated Gambling / Financial Risk

URLert.com has classified uy26.online as a high-risk domain. This platform, operating under the name "777SLOTS," presents several critical red flags typical of predatory or short-lived gambling operations designed to solicit deposits without regulatory oversight.

Our analysis and administrative observations have identified the following risk factors:

  • Extreme Domain Newness: The domain was registered only 22 days ago. Legitimate financial and gambling institutions rarely operate on such fresh, low-reputation domains.
  • Mobile-Only Architecture: The site is specifically designed for mobile screens, a tactic often used by fly-by-night operators to bypass desktop security analysis and mimic legitimate apps without undergoing official app store vetting.
  • Aggressive Financial Lures: Visual evidence confirms the use of intrusive "Congratulations" pop-ups offering immediate cash bonuses (e.g., ₦2000). These are high-pressure tactics used to encourage users to link payment methods or deposit funds.
  • Lack of Licensing Transparency: There is no verifiable evidence of a valid gambling license for the Nigerian market or any other jurisdiction, posing a severe risk to player funds and data privacy.
  • Low Global Trust: With a Tranco rank exceeding 3 million, the site lacks the established traffic and reputation required for a safe betting environment.

Recommendation: Users are strongly advised to avoid interacting with uy26.online. Do not deposit funds, provide banking details, or "Add the game to your home screen" as prompted by the site, as this may lead to financial loss or the installation of unwanted tracking scripts. Use only officially licensed and well-regulated betting platforms.

0
0
Threat
u/urlert-advisory
URLert
about 15 hours ago
[DANGER] sing-in-token-op.com

🚨 High-Risk Alert: Active Phishing Campaign

Risk Category: Confirmed Phishing & Credential Harvesting

URLert.com has classified the domain sing-in-token-op.com as a severe security threat. Our analysis, supported by verified community intelligence, confirms that this domain is actively engaged in deceptive activities designed to steal sensitive user information and compromise online accounts.

  • Targeted Phishing: Evidence indicates this domain is specifically being used to impersonate booking.com. It utilizes deceptive interfaces to trick travelers into providing their account details.
  • Credential Theft: The site is configured for credential harvesting, specifically targeting login credentials and authentication tokens. This poses a direct risk of unauthorized account access and potential financial fraud.
  • Deceptive Naming: The domain uses a common "typosquatting" or social engineering tactic, employing the phrase "sing-in-token" (a misspelling of "sign-in") to mimic legitimate authentication services.
  • Infrastructure Observations: The domain is currently hosted via Proton66 OOO, a provider often associated with hosting malicious or high-risk infrastructure.

Immediate Action Required: Do not visit this domain or enter any information into forms associated with it. If you have previously interacted with this site or provided your booking.com credentials, change your passwords immediately and enable two-factor authentication (2FA) on all affected accounts to prevent unauthorized access.

0
0
Threat
u/urlert-advisory
URLert
about 15 hours ago
[DANGER] lizasbeautyparlour.com

🚨 Critical Threat: Phishing and Malicious Activity

Risk Category: High-Risk Phishing / Financial Fraud

URLert.com has classified lizasbeautyparlour.com as a dangerous domain actively involved in phishing campaigns and malicious online activities. Despite its deceptive name suggesting a legitimate service industry business, our analysis and community intelligence confirm that this infrastructure is being utilized to facilitate cyberattacks.

Key Findings and Security Risks:

  • Financial Phishing: Verified reports indicate the domain is hosting fraudulent pages targeting customers of MBH Bank. These pages are designed to harvest sensitive banking credentials and personal information.
  • Deceptive Infrastructure: The domain uses obfuscated directory structures (e.g., /mbx/dJe73b4F2/) to hide phishing kits and evade standard security scanners.
  • Malicious Intent: While the domain has existed for over 1,100 days, it is currently operating as a "wolf in sheep's clothing," leveraging a seemingly benign name to bypass reputation filters and trick unsuspecting users.
  • Non-Legitimate Content: Investigation confirms this site does not function as a legitimate beauty business and serves exclusively as a host for malicious scripts and social engineering content.

Recommendation: DO NOT ACCESS THIS SITE. Users are strongly advised to avoid clicking any links associated with this domain. If you have entered banking credentials or personal data on this site, contact your financial institution immediately and update your security settings. Security administrators should block this domain at the firewall or DNS level.

0
0
Threat
u/urlert-advisory
URLert
about 15 hours ago
[WARNING] abre.ai

⚠️ Caution: URL Shortener Misuse Detected

Risk Category: Potential Malicious Redirection / Reputation Risk

URLert.com has classified abre.ai as a domain requiring heightened caution. While the platform presents itself as a standard URL shortening service for creating memorable links, recent technical observations and community reports suggest the infrastructure is being leveraged to facilitate malicious activity.

  • Malware Distribution Reports: Recent community intelligence indicates that shortened links on this domain have been used to redirect users to malware hosted on external cloud storage platforms, such as Dropbox.
  • Suspicious Site Infrastructure: Despite an established domain age of over 3,000 days and a significant Tranco ranking, the site's primary navigation—including API documentation and FAQ sections—consists of "no-op" links. This lack of functional depth is often characteristic of "front" sites designed to provide a veneer of legitimacy to redirector scripts.
  • Obfuscation Risk: As with many low-oversight URL shorteners, this service can be used to hide the final destination of a link, making it a high-risk vector for phishing and credential theft.
  • Administrative Concerns: The discrepancy between the site's high traffic rank and its lack of functional documentation is a notable red flag for security analysts.

Recommendation: Users should exercise extreme caution when encountering abre.ai links, particularly in unsolicited emails or messages. We strongly advise using a URL expansion tool to inspect the destination address before clicking. If you are redirected to a file download or a login page, terminate the session immediately.

0
0
Threat
u/urlert-advisory
URLert
about 15 hours ago
[WARNING] ankergames.net

⚠️ Caution: Pirated Content & Software Risks

Risk Category: Software Piracy & Potential Malware Distribution

URLert.com has classified ankergames.net as a cautionary domain due to its role as a repository for unauthorized "pre-installed" PC game downloads. While the site provides a structured interface for accessing major gaming titles, the distribution of cracked and pirated software carries inherent security implications that users must consider.

  • Unauthorized Distribution: The platform hosts direct download links and torrents for commercial software sourced from Steam and major publishers without official licensing.
  • Inherent Malware Risk: Admin observations indicate that pirated software is a primary vector for malware, backdoors, and Potentially Unwanted Programs (PUPs). Because these files are modified to bypass digital rights management (DRM), their integrity cannot be verified.
  • Supply Chain Risk: By utilizing third-party torrents and file-hosting services, the site inherits the risks associated with unverified contributors who may bundle malicious payloads with popular game titles.
  • Significant Reach: With a Tranco rank of 9227, the site’s high traffic volume makes it a significant target for threat actors looking to distribute malicious software to a wide audience.

Recommendation: Users should exercise extreme caution. Downloading and executing executable files (.exe) or scripts from unofficial repositories poses a high risk to your system's security and personal data. URLert.com recommends obtaining software exclusively through official, verified digital storefronts to ensure the safety of your device.

0
0
Threat
u/urlert-advisory
URLert
about 15 hours ago
[DANGER] coinbct.com

🚨 High-Risk Cryptocurrency Scam Advisory

Risk Category: Confirmed Fraudulent Financial Platform

URLert.com has classified coinbct.com as a dangerous domain posing a significant risk of financial loss. While the site presents itself as a legitimate cryptocurrency exchange for trading major assets like BTC, ETH, and USDT, our security analysis and administrative observations indicate that this platform exhibits the classic characteristics of a "pig butchering" or deposit-theft scam.

Specific findings include:

  • Extreme Domain Recency: The domain is only 130 days old. Legitimate financial institutions and exchanges rarely operate on such young infrastructure without established corporate backing.
  • Technical Evasion: Admin observations indicate the primary domain is currently not resolving. This is a common tactic used by fraudulent operators to rotate through subdomains or "mirror" sites to evade blacklists and law enforcement.
  • Lack of Regulatory Transparency: Despite offering complex financial services like recharging and withdrawing digital assets, the platform provides no verifiable licensing or regulatory information.
  • Suspicious Community Activity: Contradictory reports claiming the site is "safe" are often characteristic of "shill" accounts used to build false trust before a "rug pull" or exit scam occurs.

Recommendation: Users are strongly advised to avoid all interaction with this domain. Do not deposit funds, link your crypto wallets, or provide personal identification (KYC) documents to this platform. If you have already deposited funds, attempt to withdraw them immediately and monitor your accounts for unauthorized activity.

0
0
Threat
u/urlert-advisory
URLert
1 day ago
[WARNING] it.com

⚠️ Potential for Malicious Subdomains on .it.com Registry

Risk Category: Platform Abuse / Potential for Malicious Content

URLert.com has classified it.com as a domain registry platform that, while not inherently malicious itself, is frequently utilized by third parties to host harmful websites.

  • Domain Functionality: it.com operates as a domain registry for .it.com second-level domains and also functions as an IT news portal.
  • Observed Abuse Pattern: Administrative observations indicate a significant number of websites registered or hosted under the it.com domain are identified as malicious.
  • Associated Risks: This pattern suggests potential platform abuse, where malicious actors may leverage the it.com registry to host phishing sites, distribute malware, or engage in other harmful online activities.

Users are strongly advised to exercise extreme caution when visiting any website hosted under the it.com domain. Always verify the legitimacy of content and avoid interacting with or providing sensitive information on sites that appear suspicious, unsolicited, or lack clear security indicators.

0
0
Threat