Scam Detective
Domain

storage.googleapis.com

First seen Feb 22, 2026

High Risk
  • Flagged by Google Safe Browsing
  • No SSL certificate
  • 11 community reports from users

Campaign Intelligence

This cluster centers on 2382 connected domains tagged as PureHVNC, elf, sh. 572 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 969 phone numbers (8772427372, 1319641540, 1319641221) with 557 FTC complaints; 690 email addresses (kellymoore_64@yahoo.com, schantzsybg7@aol.com, online.motors@consultant.com). Across all linked entities, consumers have filed 2228 complaints with federal agencies. Geog...

This cluster centers on 2396 connected domains tagged as 156-233-71-230, Quakbot, lnk. 586 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 969 phone numbers (8772427372, 1319641540, 1319641221) with 565 FTC complaints; 690 email addresses (kellymoore_64@yahoo.com, schantzsybg7@aol.com, online.motors@consultant.com). Across all linked entities, consumers have filed 2237 complaints with federal agen...

This cluster centers on 1895 connected domains tagged as BeaverTail, RedLineStealer, password: 2026. 113 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 934 phone numbers (8772427372, 1319641540, 1319641221) with 524 FTC complaints; 683 email addresses (kellymoore_64@yahoo.com, schantzsybg7@aol.com, online.motors@consultant.com). Across all linked entities, consumers have filed 2093 complaints wit...

This cluster centers on 2416 connected domains tagged as BABADEDA, WallStealer, meterpreter. 607 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 969 phone numbers (5086371451, 9366439335, 1842506726) with 570 FTC complaints; 690 email addresses (kellymoore_64@yahoo.com, schantzsybg7@aol.com, online.motors@consultant.com). Across all linked entities, consumers have filed 2243 complaints with federa...

This cluster centers on 2764 connected domains tagged as BeaverTail, Kaiji, fbf543. 645 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1132 phone numbers (7638857447, 8664372914, 2157987305) with 10266 FTC complaints; 146 companies (JPMORGAN CHASE & CO., Advanced Resolution Services Inc., EVERBANK, NATIONAL ASSOCIATION) with 8616274 CFPB complaints; 298 email addresses (xxxxxxxxxxxxxxxxxxxxxxxx@vm...

This cluster centers on 3287 connected domains tagged as HijackLoader, RemcosRAT, screenconnect. 617 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1649 phone numbers (5408463620, 8552597377, 8007873903) with 7110 FTC complaints; 143 companies (Informative LLC, HomePlus Corporation, Doral Capital Corporation) with 8547081 CFPB complaints; 807 email addresses (kellymoore_64@yahoo.com, schantzsybg7@...

This cluster centers on 2874 connected domains tagged as QuasarRAT, StealitStealer, pw-k53mv9bc. 652 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1375 phone numbers (2157987305, 2025069230, 2028641298) with 14635 FTC complaints; 160 companies (JPMORGAN CHASE & CO., Advanced Resolution Services Inc., EVERBANK, NATIONAL ASSOCIATION) with 8680419 CFPB complaints; 299 email addresses (abuse@fb.com, ...

Details

Safe Browsing
malware
First Seen
2/22/2026

Related Domains

Community Reports

Help Hello, I just received a suspicious email from my "SCHOOL ADMIN" even though I never even met the guy before. I clicked on the link using my phone, which linked me to a storage.googleapis.com, in which google reminds me it's a scam/phishing site. I tried entering anyway to see what it was, and they asked me for my login informations (email and password). I immediately closed the link and deleted it from my history and reported it for phishing. Then I proceed to turn off my internet and my google chrome sync. Should I be concerned about malware because I opened the link even though I didn't proceed to give any information?

1344 days ago1 upvote

Help Hello, I just received a suspicious email from my "SCHOOL ADMIN" even though I never even met the guy before. I clicked on the link using my phone, which linked me to a storage.googleapis.com, in which google reminds me it's a scam/phishing site. I tried entering anyway to see what it was, and they asked me for my login informations (email and password). I immediately closed the link and deleted it from my history and reported it for phishing. Then I proceed to turn off my internet and my google chrome sync. Should I be concerned about malware because I opened the link even though I didn't proceed to give any information?

1344 days ago1 upvote

Microsoft Online Login - Phishing scam. So recently I received an email from one of my colleagues, of which asked me to open an invoice. Obviously I knew it wasn't quite right so ended up opening up the email on a virtual machine. Turns out the attachment was a PDF, the PDF was blurred and wanted me to click the document to load a bit.ly link. This directed the browser to http://storage.googleapis.com/dollar-home-2314122/xasdgqwecasdvsqwe/portal-office-microsoft.html I then proceeded to enter false credentials of which send POST data to https://personaldata.pw/soutyboyan01/finish.php of which redirected to the Microsoft login page. Now at this point I'd had a few emails from some other colleagues who had fallen for this, I decided to take some action. Now obviously a DDOS attack would have worked however it's only a temporary solution. So I decided that wasting the operator's time at the other end of the server would be a better solution. https://imgur.com/a/DzhjGJQ I decided to start by sending lovely working credentials to the server. For some reason I decided that this would be too simple. I added a few random numbers to ensure it wasn't a simple replace-all job. https://imgur.com/a/Dva9DaL I then realised it's missing the entire troll aspect of the internet, of course I'm sending 7 requests a second each with random numbers in various places in the username but how do I incorporate the primary function of the internet. Well, I decided our best friend Rick was the best person for the job. After converting the image to base64, I have this bottle of joys. https://imgur.com/upCjxFS https://pastebin.com/iQ4v6iXZ I'm only at about 22,000 requests in the last hour but I'm happy leaving this to run for a few days until I get bored. Any suggestions to take this further?

2880 days ago3 upvotes

Microsoft Online Login - Phishing scam. So recently I received an email from one of my colleagues, of which asked me to open an invoice. Obviously I knew it wasn't quite right so ended up opening up the email on a virtual machine. Turns out the attachment was a PDF, the PDF was blurred and wanted me to click the document to load a bit.ly link. This directed the browser to http://storage.googleapis.com/dollar-home-2314122/xasdgqwecasdvsqwe/portal-office-microsoft.html I then proceeded to enter false credentials of which send POST data to https://personaldata.pw/soutyboyan01/finish.php of which redirected to the Microsoft login page. Now at this point I'd had a few emails from some other colleagues who had fallen for this, I decided to take some action. Now obviously a DDOS attack would have worked however it's only a temporary solution. So I decided that wasting the operator's time at the other end of the server would be a better solution. https://imgur.com/a/DzhjGJQ I decided to start by sending lovely working credentials to the server. For some reason I decided that this would be too simple. I added a few random numbers to ensure it wasn't a simple replace-all job. https://imgur.com/a/Dva9DaL I then realised it's missing the entire troll aspect of the internet, of course I'm sending 7 requests a second each with random numbers in various places in the username but how do I incorporate the primary function of the internet. Well, I decided our best friend Rick was the best person for the job. After converting the image to base64, I have this bottle of joys. https://imgur.com/upCjxFS https://pastebin.com/iQ4v6iXZ I'm only at about 22,000 requests in the last hour but I'm happy leaving this to run for a few days until I get bored. Any suggestions to take this further?

2880 days ago3 upvotes

Microsoft Online Login - Phishing scam. So recently I received an email from one of my colleagues, of which asked me to open an invoice. Obviously I knew it wasn't quite right so ended up opening up the email on a virtual machine. Turns out the attachment was a PDF, the PDF was blurred and wanted me to click the document to load a bit.ly link. This directed the browser to http://storage.googleapis.com/dollar-home-2314122/xasdgqwecasdvsqwe/portal-office-microsoft.html I then proceeded to enter false credentials of which send POST data to https://personaldata.pw/soutyboyan01/finish.php of which redirected to the Microsoft login page. Now at this point I'd had a few emails from some other colleagues who had fallen for this, I decided to take some action. Now obviously a DDOS attack would have worked however it's only a temporary solution. So I decided that wasting the operator's time at the other end of the server would be a better solution. https://imgur.com/a/DzhjGJQ I decided to start by sending lovely working credentials to the server. For some reason I decided that this would be too simple. I added a few random numbers to ensure it wasn't a simple replace-all job. https://imgur.com/a/Dva9DaL I then realised it's missing the entire troll aspect of the internet, of course I'm sending 7 requests a second each with random numbers in various places in the username but how do I incorporate the primary function of the internet. Well, I decided our best friend Rick was the best person for the job. After converting the image to base64, I have this bottle of joys. https://imgur.com/upCjxFS https://pastebin.com/iQ4v6iXZ I'm only at about 22,000 requests in the last hour but I'm happy leaving this to run for a few days until I get bored. Any suggestions to take this further?

2880 days ago3 upvotes

Microsoft Online Login - Phishing scam. So recently I received an email from one of my colleagues, of which asked me to open an invoice. Obviously I knew it wasn't quite right so ended up opening up the email on a virtual machine. Turns out the attachment was a PDF, the PDF was blurred and wanted me to click the document to load a bit.ly link. This directed the browser to http://storage.googleapis.com/dollar-home-2314122/xasdgqwecasdvsqwe/portal-office-microsoft.html I then proceeded to enter false credentials of which send POST data to https://personaldata.pw/soutyboyan01/finish.php of which redirected to the Microsoft login page. Now at this point I'd had a few emails from some other colleagues who had fallen for this, I decided to take some action. Now obviously a DDOS attack would have worked however it's only a temporary solution. So I decided that wasting the operator's time at the other end of the server would be a better solution. https://imgur.com/a/DzhjGJQ I decided to start by sending lovely working credentials to the server. For some reason I decided that this would be too simple. I added a few random numbers to ensure it wasn't a simple replace-all job. https://imgur.com/a/Dva9DaL I then realised it's missing the entire troll aspect of the internet, of course I'm sending 7 requests a second each with random numbers in various places in the username but how do I incorporate the primary function of the internet. Well, I decided our best friend Rick was the best person for the job. After converting the image to base64, I have this bottle of joys. https://imgur.com/upCjxFS https://pastebin.com/iQ4v6iXZ I'm only at about 22,000 requests in the last hour but I'm happy leaving this to run for a few days until I get bored. Any suggestions to take this further?

2880 days ago3 upvotes

Microsoft Online Login - Phishing scam. So recently I received an email from one of my colleagues, of which asked me to open an invoice. Obviously I knew it wasn't quite right so ended up opening up the email on a virtual machine. Turns out the attachment was a PDF, the PDF was blurred and wanted me to click the document to load a bit.ly link. This directed the browser to http://storage.googleapis.com/dollar-home-2314122/xasdgqwecasdvsqwe/portal-office-microsoft.html I then proceeded to enter false credentials of which send POST data to https://personaldata.pw/soutyboyan01/finish.php of which redirected to the Microsoft login page. Now at this point I'd had a few emails from some other colleagues who had fallen for this, I decided to take some action. Now obviously a DDOS attack would have worked however it's only a temporary solution. So I decided that wasting the operator's time at the other end of the server would be a better solution. https://imgur.com/a/DzhjGJQ I decided to start by sending lovely working credentials to the server. For some reason I decided that this would be too simple. I added a few random numbers to ensure it wasn't a simple replace-all job. https://imgur.com/a/Dva9DaL I then realised it's missing the entire troll aspect of the internet, of course I'm sending 7 requests a second each with random numbers in various places in the username but how do I incorporate the primary function of the internet. Well, I decided our best friend Rick was the best person for the job. After converting the image to base64, I have this bottle of joys. https://imgur.com/upCjxFS https://pastebin.com/iQ4v6iXZ I'm only at about 22,000 requests in the last hour but I'm happy leaving this to run for a few days until I get bored. Any suggestions to take this further?

2880 days ago3 upvotes

Microsoft Online Login - Phishing scam. So recently I received an email from one of my colleagues, of which asked me to open an invoice. Obviously I knew it wasn't quite right so ended up opening up the email on a virtual machine. Turns out the attachment was a PDF, the PDF was blurred and wanted me to click the document to load a bit.ly link. This directed the browser to http://storage.googleapis.com/dollar-home-2314122/xasdgqwecasdvsqwe/portal-office-microsoft.html I then proceeded to enter false credentials of which send POST data to https://personaldata.pw/soutyboyan01/finish.php of which redirected to the Microsoft login page. Now at this point I'd had a few emails from some other colleagues who had fallen for this, I decided to take some action. Now obviously a DDOS attack would have worked however it's only a temporary solution. So I decided that wasting the operator's time at the other end of the server would be a better solution. https://imgur.com/a/DzhjGJQ I decided to start by sending lovely working credentials to the server. For some reason I decided that this would be too simple. I added a few random numbers to ensure it wasn't a simple replace-all job. https://imgur.com/a/Dva9DaL I then realised it's missing the entire troll aspect of the internet, of course I'm sending 7 requests a second each with random numbers in various places in the username but how do I incorporate the primary function of the internet. Well, I decided our best friend Rick was the best person for the job. After converting the image to base64, I have this bottle of joys. https://imgur.com/upCjxFS https://pastebin.com/iQ4v6iXZ I'm only at about 22,000 requests in the last hour but I'm happy leaving this to run for a few days until I get bored. Any suggestions to take this further?

2880 days ago3 upvotes

Microsoft Online Login - Phishing scam. So recently I received an email from one of my colleagues, of which asked me to open an invoice. Obviously I knew it wasn't quite right so ended up opening up the email on a virtual machine. Turns out the attachment was a PDF, the PDF was blurred and wanted me to click the document to load a bit.ly link. This directed the browser to http://storage.googleapis.com/dollar-home-2314122/xasdgqwecasdvsqwe/portal-office-microsoft.html I then proceeded to enter false credentials of which send POST data to https://personaldata.pw/soutyboyan01/finish.php of which redirected to the Microsoft login page. Now at this point I'd had a few emails from some other colleagues who had fallen for this, I decided to take some action. Now obviously a DDOS attack would have worked however it's only a temporary solution. So I decided that wasting the operator's time at the other end of the server would be a better solution. https://imgur.com/a/DzhjGJQ I decided to start by sending lovely working credentials to the server. For some reason I decided that this would be too simple. I added a few random numbers to ensure it wasn't a simple replace-all job. https://imgur.com/a/Dva9DaL I then realised it's missing the entire troll aspect of the internet, of course I'm sending 7 requests a second each with random numbers in various places in the username but how do I incorporate the primary function of the internet. Well, I decided our best friend Rick was the best person for the job. After converting the image to base64, I have this bottle of joys. https://imgur.com/upCjxFS https://pastebin.com/iQ4v6iXZ I'm only at about 22,000 requests in the last hour but I'm happy leaving this to run for a few days until I get bored. Any suggestions to take this further?

2880 days ago3 upvotes

Microsoft Online Login - Phishing scam. So recently I received an email from one of my colleagues, of which asked me to open an invoice. Obviously I knew it wasn't quite right so ended up opening up the email on a virtual machine. Turns out the attachment was a PDF, the PDF was blurred and wanted me to click the document to load a bit.ly link. This directed the browser to http://storage.googleapis.com/dollar-home-2314122/xasdgqwecasdvsqwe/portal-office-microsoft.html I then proceeded to enter false credentials of which send POST data to https://personaldata.pw/soutyboyan01/finish.php of which redirected to the Microsoft login page. Now at this point I'd had a few emails from some other colleagues who had fallen for this, I decided to take some action. Now obviously a DDOS attack would have worked however it's only a temporary solution. So I decided that wasting the operator's time at the other end of the server would be a better solution. https://imgur.com/a/DzhjGJQ I decided to start by sending lovely working credentials to the server. For some reason I decided that this would be too simple. I added a few random numbers to ensure it wasn't a simple replace-all job. https://imgur.com/a/Dva9DaL I then realised it's missing the entire troll aspect of the internet, of course I'm sending 7 requests a second each with random numbers in various places in the username but how do I incorporate the primary function of the internet. Well, I decided our best friend Rick was the best person for the job. After converting the image to base64, I have this bottle of joys. https://imgur.com/upCjxFS https://pastebin.com/iQ4v6iXZ I'm only at about 22,000 requests in the last hour but I'm happy leaving this to run for a few days until I get bored. Any suggestions to take this further?

2880 days ago3 upvotes

Share Your Experience

What's Your Exposure?

Know your risk exposure to this message with a Thorough Analysis. It returns a detailed report covering the complaint history, your data breach exposure, related scam entities, and risk signals tied to this email message. Check the box and enter your email address now.

Proton VPN Block malicious sites and encrypt your connection

Proton VPN routes your traffic through encrypted servers and blocks known malware domains. Free plan available.