Zee09 sent me the site, and I ran it through an analysis that we might commonly do at work on a site that was reported to the Security Operations Center (SOC) or the links in an email that were reported to us as phishing. I first reported this to Zee09, but also he said it was ok to share it with the group.
We have a VirusTotal enterprise subscription, so I ran it through that first. One security vendor out of 90 on VirusTotal found it suspicious. That's not always an indicator of something nefarious, some of the engines on VirusTotal are overly sensitive. The public scan on VT indicated the same, which is here:
https://www.virustotal.com/gui/url/6251f5ae6fe324cafdffe44a09b60ac85dfc4fd9b9741c3a28a15995ba3076ed
Ipabusedb had no bad reports, domain redirected to a Cloudflare content delivery network, which is common.
https://www.abuseipdb.com/check/104.21.2.239
Cisco Talos reputation was neutral, meaning no bad reports.
https://talosintelligence.com/reputation_center/lookup?search=sydiesmart.shop
Urlscan.io found 9 IPs used within the site code but all in the US, which is positive but not conclusive, there are bad sites in the US also. 9 detected technologies including Woo Commerce, WordPress, Google Fonts, Google Tag Manager, Underscore.js, Jquery and Jquery Migrate, none of which are inherently bad.
https://urlscan.io/result/0196684d-491b-74bb-afcb-e17909559c74/
I also further ran the resultant IPs of incuded services through AbuseIPDB, you can do that through Urlscan.io on subdomains/sub-service IPs that are unpacked. Some of the resultant Google CDNs had reports, but that's not that uncommon due to them being used by many, many sites.
I forgot to mention to Zee06, but I also checked all this against our internally built blacklist which includes scraping several security focused Cybersecurity blacklists as well as manual entries that we've observed to be bad over time and added to our list, there were no hits on any observed IPs.
Based on all this, I ran it through the browser on my work PC and it's not blocked by any of our controls which include FireEye IDS and Palo Alto Network's Next Gen Firewalls, which would include our blacklist and also FE/Palo intelligence and Perimeter team's hand-picked blacklists that the firewall scrapes for bad IPs. I also checked it on Palo Alto Networks' Test a Site and it is categorized as shopping and also Low-Risk, which would indicate that it's been in existence for at least 90 days, which would be a good indicator that the vendors hosting the site also think it's ok, as sites that are doing bad stuff tend to have their sites taken down by the hosting provider once it's become evident to the security community what's hosted there.
https://urlfiltering.paloaltonetworks.com/query/
My opinion is that the site is benign. This is only my opinion as a security practitioner, not an absolute guarantee.
However it does have the look of something created by an Instagram or TikTok influencer. That's not necessarily bad, but it makes me wonder why they're selling filters.
Anyway if you wish to proceed there are some numbers at the bottom of the page that you can send a support inquiry to, I guess. Maybe use a throw-away text messaging service online to send your inquiry, not your actual phone, so they can't bug you later with something like "come back to our site again to shop!"
Brons2...out