Scam Detective
Domain

csgohouse.fun

First seen Feb 22, 2026

Suspicious
  • No SSL certificate
  • 28 community reports from users

Campaign Intelligence

This cluster centers on 2764 connected domains tagged as BeaverTail, Kaiji, fbf543. 645 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1132 phone numbers (7638857447, 8664372914, 2157987305) with 10266 FTC complaints; 146 companies (JPMORGAN CHASE & CO., Advanced Resolution Services Inc., EVERBANK, NATIONAL ASSOCIATION) with 8616274 CFPB complaints; 298 email addresses (xxxxxxxxxxxxxxxxxxxxxxxx@vm...

This cluster centers on 3287 connected domains tagged as HijackLoader, RemcosRAT, screenconnect. 617 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1649 phone numbers (5408463620, 8552597377, 8007873903) with 7110 FTC complaints; 143 companies (Informative LLC, HomePlus Corporation, Doral Capital Corporation) with 8547081 CFPB complaints; 807 email addresses (kellymoore_64@yahoo.com, schantzsybg7@...

This cluster centers on 2874 connected domains tagged as QuasarRAT, StealitStealer, pw-k53mv9bc. 652 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1375 phone numbers (2157987305, 2025069230, 2028641298) with 14635 FTC complaints; 160 companies (JPMORGAN CHASE & CO., Advanced Resolution Services Inc., EVERBANK, NATIONAL ASSOCIATION) with 8680419 CFPB complaints; 299 email addresses (abuse@fb.com, ...

This cluster centers on 1486 connected domains tagged as None, keylogger. 5 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1364 phone numbers (3124141737, 3163966869, 8553892999) with 17909 FTC complaints; 170 companies (EQUIFAX, INC., TRANSUNION INTERMEDIATE HOLDINGS, INC., BANK OF AMERICA, NATIONAL ASSOCIATION) with 8747332 CFPB complaints; 187 email addresses (xxxxxxxxxxxxxxxxxxxxxxxx@vmh5.grup...

Details

First Seen
2/22/2026

Related Domains

Community Reports

Example of an extremely realistic CS:GO phishing site I came across this site today and wanted to share it with you all. As a foreword, I want to say that I will link the site at the bottom of this post, but **do not enter ANY information on this site.** I am sharing it because it is *extremely* realistic, so please don't fall for it. This site imitates the Steam OAuth login page and steals user credentials. The "Sign in through Steam" button seems legitimate enough, but when it is clicked it opens a new overlay `div` on the page. The contents of the `div` look nearly *exactly* like the normal Steam OAuth login page. The links in the `div` show a convincing-enough error to seem a little more legitimate. The "window" is even draggable. It also seems that the site checks your credentials since it rejected my fake ones. I entered the credentials to a dummy account, and it just returned me to the main page, with no change. The site has no other function than to steal accounts. Let's walk through where it is detectable, to consider how these methods can identify other phishing sites. 1. OAuth2 should completely redirect to the authenticating site, not open a new window. Although it is possible that a legitimate site could open it in a new window instead, I would be wary of a site that does not redirect. 2. I should be able to drag the "window" around my desktop, including outside the host site. This one is pretty obvious, but impossible to replicate without actually creating a new window (which would defeat their "imitation" anyway). 3. The "Secure Connection lock" on whatever browser you use (I use Firefox) should be a button, not selectable text. Give that lock a click, and see if it opens up a new widget. Make sure the information there looks normal if it opens one. Make sure the icons match your browser's (the phishing window was missing my DNT indicator). 4. An OAuth site that contains links to its own site (like the Steam logo on the top left of Steam's pag

2663 days ago1 upvote

Example of an extremely realistic CS:GO phishing site I came across this site today and wanted to share it with you all. As a foreword, I want to say that I will link the site at the bottom of this post, but **do not enter ANY information on this site.** I am sharing it because it is *extremely* realistic, so please don't fall for it. This site imitates the Steam OAuth login page and steals user credentials. The "Sign in through Steam" button seems legitimate enough, but when it is clicked it opens a new overlay `div` on the page. The contents of the `div` look nearly *exactly* like the normal Steam OAuth login page. The links in the `div` show a convincing-enough error to seem a little more legitimate. The "window" is even draggable. It also seems that the site checks your credentials since it rejected my fake ones. I entered the credentials to a dummy account, and it just returned me to the main page, with no change. The site has no other function than to steal accounts. Let's walk through where it is detectable, to consider how these methods can identify other phishing sites. 1. OAuth2 should completely redirect to the authenticating site, not open a new window. Although it is possible that a legitimate site could open it in a new window instead, I would be wary of a site that does not redirect. 2. I should be able to drag the "window" around my desktop, including outside the host site. This one is pretty obvious, but impossible to replicate without actually creating a new window (which would defeat their "imitation" anyway). 3. The "Secure Connection lock" on whatever browser you use (I use Firefox) should be a button, not selectable text. Give that lock a click, and see if it opens up a new widget. Make sure the information there looks normal if it opens one. Make sure the icons match your browser's (the phishing window was missing my DNT indicator). 4. An OAuth site that contains links to its own site (like the Steam logo on the top left of Steam's pag

2663 days ago1 upvote

Example of an extremely realistic CS:GO phishing site I came across this site today and wanted to share it with you all. As a foreword, I want to say that I will link the site at the bottom of this post, but **do not enter ANY information on this site.** I am sharing it because it is *extremely* realistic, so please don't fall for it. This site imitates the Steam OAuth login page and steals user credentials. The "Sign in through Steam" button seems legitimate enough, but when it is clicked it opens a new overlay `div` on the page. The contents of the `div` look nearly *exactly* like the normal Steam OAuth login page. The links in the `div` show a convincing-enough error to seem a little more legitimate. The "window" is even draggable. It also seems that the site checks your credentials since it rejected my fake ones. I entered the credentials to a dummy account, and it just returned me to the main page, with no change. The site has no other function than to steal accounts. Let's walk through where it is detectable, to consider how these methods can identify other phishing sites. 1. OAuth2 should completely redirect to the authenticating site, not open a new window. Although it is possible that a legitimate site could open it in a new window instead, I would be wary of a site that does not redirect. 2. I should be able to drag the "window" around my desktop, including outside the host site. This one is pretty obvious, but impossible to replicate without actually creating a new window (which would defeat their "imitation" anyway). 3. The "Secure Connection lock" on whatever browser you use (I use Firefox) should be a button, not selectable text. Give that lock a click, and see if it opens up a new widget. Make sure the information there looks normal if it opens one. Make sure the icons match your browser's (the phishing window was missing my DNT indicator). 4. An OAuth site that contains links to its own site (like the Steam logo on the top left of Steam's pag

2663 days ago1 upvote

Example of an extremely realistic CS:GO phishing site I came across this site today and wanted to share it with you all. As a foreword, I want to say that I will link the site at the bottom of this post, but **do not enter ANY information on this site.** I am sharing it because it is *extremely* realistic, so please don't fall for it. This site imitates the Steam OAuth login page and steals user credentials. The "Sign in through Steam" button seems legitimate enough, but when it is clicked it opens a new overlay `div` on the page. The contents of the `div` look nearly *exactly* like the normal Steam OAuth login page. The links in the `div` show a convincing-enough error to seem a little more legitimate. The "window" is even draggable. It also seems that the site checks your credentials since it rejected my fake ones. I entered the credentials to a dummy account, and it just returned me to the main page, with no change. The site has no other function than to steal accounts. Let's walk through where it is detectable, to consider how these methods can identify other phishing sites. 1. OAuth2 should completely redirect to the authenticating site, not open a new window. Although it is possible that a legitimate site could open it in a new window instead, I would be wary of a site that does not redirect. 2. I should be able to drag the "window" around my desktop, including outside the host site. This one is pretty obvious, but impossible to replicate without actually creating a new window (which would defeat their "imitation" anyway). 3. The "Secure Connection lock" on whatever browser you use (I use Firefox) should be a button, not selectable text. Give that lock a click, and see if it opens up a new widget. Make sure the information there looks normal if it opens one. Make sure the icons match your browser's (the phishing window was missing my DNT indicator). 4. An OAuth site that contains links to its own site (like the Steam logo on the top left of Steam's pag

2663 days ago1 upvote

Example of an extremely realistic CS:GO phishing site I came across this site today and wanted to share it with you all. As a foreword, I want to say that I will link the site at the bottom of this post, but **do not enter ANY information on this site.** I am sharing it because it is *extremely* realistic, so please don't fall for it. This site imitates the Steam OAuth login page and steals user credentials. The "Sign in through Steam" button seems legitimate enough, but when it is clicked it opens a new overlay `div` on the page. The contents of the `div` look nearly *exactly* like the normal Steam OAuth login page. The links in the `div` show a convincing-enough error to seem a little more legitimate. The "window" is even draggable. It also seems that the site checks your credentials since it rejected my fake ones. I entered the credentials to a dummy account, and it just returned me to the main page, with no change. The site has no other function than to steal accounts. Let's walk through where it is detectable, to consider how these methods can identify other phishing sites. 1. OAuth2 should completely redirect to the authenticating site, not open a new window. Although it is possible that a legitimate site could open it in a new window instead, I would be wary of a site that does not redirect. 2. I should be able to drag the "window" around my desktop, including outside the host site. This one is pretty obvious, but impossible to replicate without actually creating a new window (which would defeat their "imitation" anyway). 3. The "Secure Connection lock" on whatever browser you use (I use Firefox) should be a button, not selectable text. Give that lock a click, and see if it opens up a new widget. Make sure the information there looks normal if it opens one. Make sure the icons match your browser's (the phishing window was missing my DNT indicator). 4. An OAuth site that contains links to its own site (like the Steam logo on the top left of Steam's pag

2663 days ago1 upvote

Example of an extremely realistic CS:GO phishing site I came across this site today and wanted to share it with you all. As a foreword, I want to say that I will link the site at the bottom of this post, but **do not enter ANY information on this site.** I am sharing it because it is *extremely* realistic, so please don't fall for it. This site imitates the Steam OAuth login page and steals user credentials. The "Sign in through Steam" button seems legitimate enough, but when it is clicked it opens a new overlay `div` on the page. The contents of the `div` look nearly *exactly* like the normal Steam OAuth login page. The links in the `div` show a convincing-enough error to seem a little more legitimate. The "window" is even draggable. It also seems that the site checks your credentials since it rejected my fake ones. I entered the credentials to a dummy account, and it just returned me to the main page, with no change. The site has no other function than to steal accounts. Let's walk through where it is detectable, to consider how these methods can identify other phishing sites. 1. OAuth2 should completely redirect to the authenticating site, not open a new window. Although it is possible that a legitimate site could open it in a new window instead, I would be wary of a site that does not redirect. 2. I should be able to drag the "window" around my desktop, including outside the host site. This one is pretty obvious, but impossible to replicate without actually creating a new window (which would defeat their "imitation" anyway). 3. The "Secure Connection lock" on whatever browser you use (I use Firefox) should be a button, not selectable text. Give that lock a click, and see if it opens up a new widget. Make sure the information there looks normal if it opens one. Make sure the icons match your browser's (the phishing window was missing my DNT indicator). 4. An OAuth site that contains links to its own site (like the Steam logo on the top left of Steam's pag

2663 days ago1 upvote

Example of an extremely realistic CS:GO phishing site I came across this site today and wanted to share it with you all. As a foreword, I want to say that I will link the site at the bottom of this post, but **do not enter ANY information on this site.** I am sharing it because it is *extremely* realistic, so please don't fall for it. This site imitates the Steam OAuth login page and steals user credentials. The "Sign in through Steam" button seems legitimate enough, but when it is clicked it opens a new overlay `div` on the page. The contents of the `div` look nearly *exactly* like the normal Steam OAuth login page. The links in the `div` show a convincing-enough error to seem a little more legitimate. The "window" is even draggable. It also seems that the site checks your credentials since it rejected my fake ones. I entered the credentials to a dummy account, and it just returned me to the main page, with no change. The site has no other function than to steal accounts. Let's walk through where it is detectable, to consider how these methods can identify other phishing sites. 1. OAuth2 should completely redirect to the authenticating site, not open a new window. Although it is possible that a legitimate site could open it in a new window instead, I would be wary of a site that does not redirect. 2. I should be able to drag the "window" around my desktop, including outside the host site. This one is pretty obvious, but impossible to replicate without actually creating a new window (which would defeat their "imitation" anyway). 3. The "Secure Connection lock" on whatever browser you use (I use Firefox) should be a button, not selectable text. Give that lock a click, and see if it opens up a new widget. Make sure the information there looks normal if it opens one. Make sure the icons match your browser's (the phishing window was missing my DNT indicator). 4. An OAuth site that contains links to its own site (like the Steam logo on the top left of Steam's pag

2663 days ago1 upvote

Example of an extremely realistic CS:GO phishing site I came across this site today and wanted to share it with you all. As a foreword, I want to say that I will link the site at the bottom of this post, but **do not enter ANY information on this site.** I am sharing it because it is *extremely* realistic, so please don't fall for it. This site imitates the Steam OAuth login page and steals user credentials. The "Sign in through Steam" button seems legitimate enough, but when it is clicked it opens a new overlay `div` on the page. The contents of the `div` look nearly *exactly* like the normal Steam OAuth login page. The links in the `div` show a convincing-enough error to seem a little more legitimate. The "window" is even draggable. It also seems that the site checks your credentials since it rejected my fake ones. I entered the credentials to a dummy account, and it just returned me to the main page, with no change. The site has no other function than to steal accounts. Let's walk through where it is detectable, to consider how these methods can identify other phishing sites. 1. OAuth2 should completely redirect to the authenticating site, not open a new window. Although it is possible that a legitimate site could open it in a new window instead, I would be wary of a site that does not redirect. 2. I should be able to drag the "window" around my desktop, including outside the host site. This one is pretty obvious, but impossible to replicate without actually creating a new window (which would defeat their "imitation" anyway). 3. The "Secure Connection lock" on whatever browser you use (I use Firefox) should be a button, not selectable text. Give that lock a click, and see if it opens up a new widget. Make sure the information there looks normal if it opens one. Make sure the icons match your browser's (the phishing window was missing my DNT indicator). 4. An OAuth site that contains links to its own site (like the Steam logo on the top left of Steam's pag

2663 days ago1 upvote

Example of an extremely realistic CS:GO phishing site I came across this site today and wanted to share it with you all. As a foreword, I want to say that I will link the site at the bottom of this post, but **do not enter ANY information on this site.** I am sharing it because it is *extremely* realistic, so please don't fall for it. This site imitates the Steam OAuth login page and steals user credentials. The "Sign in through Steam" button seems legitimate enough, but when it is clicked it opens a new overlay `div` on the page. The contents of the `div` look nearly *exactly* like the normal Steam OAuth login page. The links in the `div` show a convincing-enough error to seem a little more legitimate. The "window" is even draggable. It also seems that the site checks your credentials since it rejected my fake ones. I entered the credentials to a dummy account, and it just returned me to the main page, with no change. The site has no other function than to steal accounts. Let's walk through where it is detectable, to consider how these methods can identify other phishing sites. 1. OAuth2 should completely redirect to the authenticating site, not open a new window. Although it is possible that a legitimate site could open it in a new window instead, I would be wary of a site that does not redirect. 2. I should be able to drag the "window" around my desktop, including outside the host site. This one is pretty obvious, but impossible to replicate without actually creating a new window (which would defeat their "imitation" anyway). 3. The "Secure Connection lock" on whatever browser you use (I use Firefox) should be a button, not selectable text. Give that lock a click, and see if it opens up a new widget. Make sure the information there looks normal if it opens one. Make sure the icons match your browser's (the phishing window was missing my DNT indicator). 4. An OAuth site that contains links to its own site (like the Steam logo on the top left of Steam's pag

2663 days ago1 upvote

Example of an extremely realistic CS:GO phishing site I came across this site today and wanted to share it with you all. As a foreword, I want to say that I will link the site at the bottom of this post, but **do not enter ANY information on this site.** I am sharing it because it is *extremely* realistic, so please don't fall for it. This site imitates the Steam OAuth login page and steals user credentials. The "Sign in through Steam" button seems legitimate enough, but when it is clicked it opens a new overlay `div` on the page. The contents of the `div` look nearly *exactly* like the normal Steam OAuth login page. The links in the `div` show a convincing-enough error to seem a little more legitimate. The "window" is even draggable. It also seems that the site checks your credentials since it rejected my fake ones. I entered the credentials to a dummy account, and it just returned me to the main page, with no change. The site has no other function than to steal accounts. Let's walk through where it is detectable, to consider how these methods can identify other phishing sites. 1. OAuth2 should completely redirect to the authenticating site, not open a new window. Although it is possible that a legitimate site could open it in a new window instead, I would be wary of a site that does not redirect. 2. I should be able to drag the "window" around my desktop, including outside the host site. This one is pretty obvious, but impossible to replicate without actually creating a new window (which would defeat their "imitation" anyway). 3. The "Secure Connection lock" on whatever browser you use (I use Firefox) should be a button, not selectable text. Give that lock a click, and see if it opens up a new widget. Make sure the information there looks normal if it opens one. Make sure the icons match your browser's (the phishing window was missing my DNT indicator). 4. An OAuth site that contains links to its own site (like the Steam logo on the top left of Steam's pag

2663 days ago1 upvote

Share Your Experience

What's Your Exposure?

Know your risk exposure to this message with a Thorough Analysis. It returns a detailed report covering the complaint history, your data breach exposure, related scam entities, and risk signals tied to this email message. Check the box and enter your email address now.

NordPass Stop reusing passwords across accounts

After a breach, attackers try stolen passwords on every site you use. NordPass generates and stores a unique password for each account.