Scam Detective
Domain

www.pwc.com

First seen Feb 22, 2026

Suspicious
  • No SSL certificate
  • 3 community reports from users

Campaign Intelligence

This cluster centers on 2382 connected domains tagged as PureHVNC, elf, sh. 572 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 969 phone numbers (8772427372, 1319641540, 1319641221) with 557 FTC complaints; 690 email addresses (kellymoore_64@yahoo.com, schantzsybg7@aol.com, online.motors@consultant.com). Across all linked entities, consumers have filed 2228 complaints with federal agencies. Geog...

This cluster centers on 2396 connected domains tagged as 156-233-71-230, Quakbot, lnk. 586 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 969 phone numbers (8772427372, 1319641540, 1319641221) with 565 FTC complaints; 690 email addresses (kellymoore_64@yahoo.com, schantzsybg7@aol.com, online.motors@consultant.com). Across all linked entities, consumers have filed 2237 complaints with federal agen...

This cluster centers on 1895 connected domains tagged as BeaverTail, RedLineStealer, password: 2026. 113 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 934 phone numbers (8772427372, 1319641540, 1319641221) with 524 FTC complaints; 683 email addresses (kellymoore_64@yahoo.com, schantzsybg7@aol.com, online.motors@consultant.com). Across all linked entities, consumers have filed 2093 complaints wit...

This cluster centers on 2416 connected domains tagged as BABADEDA, WallStealer, meterpreter. 607 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 969 phone numbers (5086371451, 9366439335, 1842506726) with 570 FTC complaints; 690 email addresses (kellymoore_64@yahoo.com, schantzsybg7@aol.com, online.motors@consultant.com). Across all linked entities, consumers have filed 2243 complaints with federa...

This cluster centers on 2764 connected domains tagged as BeaverTail, Kaiji, fbf543. 645 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1132 phone numbers (7638857447, 8664372914, 2157987305) with 10266 FTC complaints; 146 companies (JPMORGAN CHASE & CO., Advanced Resolution Services Inc., EVERBANK, NATIONAL ASSOCIATION) with 8616274 CFPB complaints; 298 email addresses (xxxxxxxxxxxxxxxxxxxxxxxx@vm...

This cluster centers on 3287 connected domains tagged as HijackLoader, RemcosRAT, screenconnect. 617 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1649 phone numbers (5408463620, 8552597377, 8007873903) with 7110 FTC complaints; 143 companies (Informative LLC, HomePlus Corporation, Doral Capital Corporation) with 8547081 CFPB complaints; 807 email addresses (kellymoore_64@yahoo.com, schantzsybg7@...

This cluster centers on 2874 connected domains tagged as QuasarRAT, StealitStealer, pw-k53mv9bc. 652 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1375 phone numbers (2157987305, 2025069230, 2028641298) with 14635 FTC complaints; 160 companies (JPMORGAN CHASE & CO., Advanced Resolution Services Inc., EVERBANK, NATIONAL ASSOCIATION) with 8680419 CFPB complaints; 299 email addresses (abuse@fb.com, ...

This cluster centers on 1486 connected domains tagged as None, keylogger. 5 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1364 phone numbers (3124141737, 3163966869, 8553892999) with 17909 FTC complaints; 170 companies (EQUIFAX, INC., TRANSUNION INTERMEDIATE HOLDINGS, INC., BANK OF AMERICA, NATIONAL ASSOCIATION) with 8747332 CFPB complaints; 187 email addresses (xxxxxxxxxxxxxxxxxxxxxxxx@vmh5.grup...

Details

First Seen
2/22/2026

Related Domains

Community Reports

How to Spot Fraudulent Customer Payments The sophistication of technology and ease of online transactions has made it rather easy for tech savvy and well informed criminals to compromise your customer’s data. Australian businesses have begun to ditch the traditional brick and mortar store transactions - where the customer physically comes to the retailer and purchases their items using real cash – for online transactions where *everything* is carried out using QR codes, cryptocurrency and credit cards. While this eliminates the need for installing expensive firewalls and countermeasures to protect *physical* goods, this only means you need to ramp up your [cybersecurity](https://www.afp.gov.au/what-we-do/crime-types/cybercrime/online-fraud-and-scams) measurements to mitigate any possible risks of theft. The proper implementation of security measurements requires you to understand how technology and people interact – and how security can *improve* that interaction without adding any discernible forms of inconvenience. # Numbers don’t lie According to a report [by PwC Global Economic Crime Survey 2016](https://www.pwc.com/gx/en/services/advisory/forensics/economic-crime-survey.html), cybercrime is at number 2 of the list of reported crimes, affecting up to 32% vulnerable organizations. Attacks over the internet are no longer in the realm of dystopian fiction – they’re as real as getting mugged on the street. In the year 2015 alone, Australians spent $1.92 trillion by using cheques and cards, some of which were customer payments made online. Of this, [$469 million was fraudulent activity](http://www.apca.com.au/docs/default-source/fraud-statistics/australian_payments_fraud_details_and_data_2016.pdf). CNP fraud has also increased by 38% to an overall $136 million. # Communication and coordination is key In order for your administrators to properly defend the system from online exploits, they would also need to understand all the possible vulnerabilities in the

2544 days ago4 upvotes

How to Spot Fraudulent Customer Payments The sophistication of technology and ease of online transactions has made it rather easy for tech savvy and well informed criminals to compromise your customer’s data. Australian businesses have begun to ditch the traditional brick and mortar store transactions - where the customer physically comes to the retailer and purchases their items using real cash – for online transactions where *everything* is carried out using QR codes, cryptocurrency and credit cards. While this eliminates the need for installing expensive firewalls and countermeasures to protect *physical* goods, this only means you need to ramp up your [cybersecurity](https://www.afp.gov.au/what-we-do/crime-types/cybercrime/online-fraud-and-scams) measurements to mitigate any possible risks of theft. The proper implementation of security measurements requires you to understand how technology and people interact – and how security can *improve* that interaction without adding any discernible forms of inconvenience. # Numbers don’t lie According to a report [by PwC Global Economic Crime Survey 2016](https://www.pwc.com/gx/en/services/advisory/forensics/economic-crime-survey.html), cybercrime is at number 2 of the list of reported crimes, affecting up to 32% vulnerable organizations. Attacks over the internet are no longer in the realm of dystopian fiction – they’re as real as getting mugged on the street. In the year 2015 alone, Australians spent $1.92 trillion by using cheques and cards, some of which were customer payments made online. Of this, [$469 million was fraudulent activity](http://www.apca.com.au/docs/default-source/fraud-statistics/australian_payments_fraud_details_and_data_2016.pdf). CNP fraud has also increased by 38% to an overall $136 million. # Communication and coordination is key In order for your administrators to properly defend the system from online exploits, they would also need to understand all the possible vulnerabilities in the

2544 days ago4 upvotes

How to Spot Fraudulent Customer Payments The sophistication of technology and ease of online transactions has made it rather easy for tech savvy and well informed criminals to compromise your customer’s data. Australian businesses have begun to ditch the traditional brick and mortar store transactions - where the customer physically comes to the retailer and purchases their items using real cash – for online transactions where *everything* is carried out using QR codes, cryptocurrency and credit cards. While this eliminates the need for installing expensive firewalls and countermeasures to protect *physical* goods, this only means you need to ramp up your [cybersecurity](https://www.afp.gov.au/what-we-do/crime-types/cybercrime/online-fraud-and-scams) measurements to mitigate any possible risks of theft. The proper implementation of security measurements requires you to understand how technology and people interact – and how security can *improve* that interaction without adding any discernible forms of inconvenience. # Numbers don’t lie According to a report [by PwC Global Economic Crime Survey 2016](https://www.pwc.com/gx/en/services/advisory/forensics/economic-crime-survey.html), cybercrime is at number 2 of the list of reported crimes, affecting up to 32% vulnerable organizations. Attacks over the internet are no longer in the realm of dystopian fiction – they’re as real as getting mugged on the street. In the year 2015 alone, Australians spent $1.92 trillion by using cheques and cards, some of which were customer payments made online. Of this, [$469 million was fraudulent activity](http://www.apca.com.au/docs/default-source/fraud-statistics/australian_payments_fraud_details_and_data_2016.pdf). CNP fraud has also increased by 38% to an overall $136 million. # Communication and coordination is key In order for your administrators to properly defend the system from online exploits, they would also need to understand all the possible vulnerabilities in the

2544 days ago4 upvotes

Share Your Experience

What's Your Exposure?

Know your risk exposure to this message with a Thorough Analysis. It returns a detailed report covering the complaint history, your data breach exposure, related scam entities, and risk signals tied to this email message. Check the box and enter your email address now.

NordVPN Block threats and hide your IP from trackers

NordVPN encrypts your internet traffic and blocks malicious websites, ads, and trackers before they reach your device.