facebook-request.program-ads-agency[.]com
Category: Phishing
To use full-featured product, you have to purchase a license for Combo Cleaner. Limited seven days free trial available. Combo Cleaner is owned and operated by RCS LT, the parent company of PCRisk.com.
Description of facebook-request.program-ads-agency[.]com
This domain appears to present itself as a Meta or Facebook-related account/privacy page, using branding such as “Meta Privacy Centre,” “Accounts Centre,” and “Meta Agency Partner Program.” The page content suggests an invitation workflow for agencies to join a partner program, with a call to submit a participation request and references to account or contact verification.
Based on the domain structure, however, this does not appear to be an official Meta-owned web property. The hostname places the word “facebook” on a subdomain of program-ads-agency.com rather than on an official facebook.com or meta.com domain. The screenshot and metadata indicate the site is designed to resemble a legitimate Meta service, which may be intended to persuade visitors to trust the page and interact with it.
Safety Assessment for facebook-request.program-ads-agency[.]com
Multiple independent signals indicate elevated risk at the time of this scan. The domain was flagged by 24 out of 91 security engines, and several web-classification sources categorized it as phishing, malware, or fraud-related. In addition, the domain is very new, with an age of only 16 days, and it has no meaningful popularity ranking, both of which are common characteristics of short-lived deceptive campaigns.
The page also closely imitates Meta/Facebook branding while operating from an unrelated domain. That mismatch is a strong warning sign because legitimate account, privacy, or partner-program workflows for a major platform would generally be expected on the company’s official domains. Although the malware file scan did not detect malicious code in the sampled files and some blacklist databases were still clean at the time of this scan, phishing pages often rely on social engineering rather than downloadable malware.
Based on these findings, this website may pose potential risks to visitors.
Technical Description
The site was reachable over HTTPS with a valid TLS certificate issued by a mainstream certificate authority, and it was served through Cloudflare infrastructure from an IP associated with that network. A valid certificate only indicates encrypted transport to the server being contacted; it does not verify that the underlying site is trustworthy. DNSSEC appears to be enabled, which helps protect DNS integrity, but likewise does not address phishing risk.
From the retrieved resources, the page appears to use a modern JavaScript web application structure with static assets under a Next.js-style /_next/ path. No malicious files were flagged in the provided malware scan, and no suspicious iframe usage was reported. The primary technical concern is not exploit delivery but likely brand impersonation and credential-harvesting risk on a newly registered domain.
Share your experience with this website. Was it safe? Did you encounter any issues?