Skip to content

Add Labor Day Free 51GB Phishing domains to domains.wildcard.list#1145

Merged
jasongodev merged 1 commit into
masterfrom
jasongodev-patch-3
May 1, 2026
Merged

Add Labor Day Free 51GB Phishing domains to domains.wildcard.list#1145
jasongodev merged 1 commit into
masterfrom
jasongodev-patch-3

Conversation

@jasongodev
Copy link
Copy Markdown
Contributor

Phishing Domain/URL/IP(s):

5b8tv.top
879cv.top
bt8rc.top
c1b2f.top
dihg.top
dzou.top
gr12x.top
h1ttv.top
hy2238.top
hy7322.top
iokd9.top
iwrf.top
jaui.top
jcs11.top
levu.top
ljuf.top
omiw.top
ozpu.top
slru.top
syfo.top
t87bb.top
tcxv8.top
tiyp.top
woex.top
xcv9r.top
y8699.top
yfav.top

Impersonated domain

dito.ph
facebook.com

Describe the issue

Various phishing posts are being shared and circulated online, most notably on Facebook and FB Messenger, on May 1, 2026 during the Labor Day event in the Philippines. The posts and the malicious websites claim to provide free mobile data credits in exchange of the user's mobile number. The malicious websites are designed to mimic a Philippine telecommunications company, DITO dito.ph, complete with design elements and fake Facebook comments.

Screenshot_20260502_060514

In tests the websites seem not to send any information to any server at all.

Screenshot_20260502_053657

It shows a fake progress bar and fake comment input field.

Screenshot_20260502_055250 Screenshot_20260502_053730

Interacting with the website causes many JavaScript errors.

Screenshot_20260502_054013

It also uses cookies and local storage to store benign data.

Screenshot_20260502_054634 Screenshot_20260502_054701

The share buttons and links redirect to fb-messenger://share/?link= protocol

Inspecting the source code reveals various comments in Russian.

Screenshot_20260502_063910

It also loads an external script single.php which contains ads redirection codes:

Screenshot_20260502_064045

The ads redirection routine leads to go.php which then redirects to random ads. As of this writing it redirects to cdn.lcwss.com. Notice that it tracks the IP address of the user.

Screenshot_20260502_055520

Signed-off-by: Jason Go <jasongo@jasongo.net>
@jasongodev jasongodev requested review from a team as code owners May 1, 2026 22:47
@jasongodev jasongodev merged commit 6d3e85a into master May 1, 2026
jasongodev added a commit that referenced this pull request May 2, 2026
Related to #1145

Signed-off-by: Jason Go <jasongo@jasongo.net>
jasongodev added a commit that referenced this pull request May 2, 2026
Related to #1145

Signed-off-by: Jason Go <jasongo@jasongo.net>
jasongodev added a commit that referenced this pull request May 3, 2026
Related to #1145

Signed-off-by: Jason Go <jasongo@jasongo.net>
jasongodev added a commit that referenced this pull request May 3, 2026
…1146)

* Add tj.16gift.com to domains.list

Related to #1145

Signed-off-by: Jason Go <jasongo@jasongo.net>

* Add malicious tracker to links.list

Related to #1145

Signed-off-by: Jason Go <jasongo@jasongo.net>

---------

Signed-off-by: Jason Go <jasongo@jasongo.net>
jasongodev added a commit to jasongodev/phishing that referenced this pull request May 11, 2026
Related to Phishing-Database#1145

Signed-off-by: Jason Go <jasongo@jasongo.net>
jasongodev added a commit that referenced this pull request May 11, 2026
* Add Telco Phishing Domains to domains.list

Related to #1145

Signed-off-by: Jason Go <jasongo@jasongo.net>

* Add Telco Phishing Domains to the domains.wildcard.list

Related to #1145

Signed-off-by: Jason Go <jasongo@jasongo.net>

---------

Signed-off-by: Jason Go <jasongo@jasongo.net>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant