WE1 TLS Certificate
Phishing sites using this certificate issuer
About WE1
- Operator
- Google Trust Services LLC
- Chains to
- GTS Root R4
- Key type
- ECDSA
- In use since
- 2023
Automated DV TLS for sites using Google's public ACME endpoint, plus Google's own consumer and workspace domains.
ECDSA P-256 intermediate in Google's newer 2023 hierarchy. Free and automated — legitimately used at enormous scale, which is also why phishing kits default to it.
Frequently asked questions
Is WE1 a legitimate certificate authority?
Yes. WE1 is a publicly trusted intermediate CA operated by Google Trust Services LLC and chained to GTS Root R4. It is recognized by all mainstream browsers and operating system trust stores. The certificate itself is not a phishing indicator — the same intermediate signs millions of legitimate sites.
Why does WE1 show up on phishing sites?
Google Trust Services LLC issues ECDSA domain-validated certificates automatically and at no cost (or very low cost), which is the exact workflow scammers need to put HTTPS on a throwaway domain. Domain validation only proves that the requester controls the domain name, not that the site behind it is trustworthy. phishunt lists the specific domains currently flagged below — those are the suspicious ones, not WE1 itself.
How do I verify a certificate issued by WE1?
In a desktop browser, click the padlock in the address bar and open the certificate viewer. Confirm the issuer chain ends at GTS Root R4, that the subject matches the domain you expect, and that the notAfter date has not passed. A valid WE1 certificate only proves TLS was negotiated correctly — always verify the domain name itself belongs to the service you intended to visit.
What is the difference between WE1 and WE2?
WE1 and its siblings (WE2, WR1, WR2, GTS CA 1C3) share the same operator (Google Trust Services LLC) and roll up to the same root (GTS Root R4). CAs rotate multiple intermediates so that if one key ever has to be revoked, the damage is contained. As a user, you can treat all of them as the same trust anchor.
It is strongly recommended to use them for Threat Hunting or add them to a Watchlist.
| Last check (UTC) | First seen (UTC) ▾ | URL | Screenshot | Flags | Details |
|---|---|---|---|---|---|
| 2026-04-25 07:30 | 2026-04-19 12:01 | ![]() |
PhishTank | Details | |
| 2026-04-25 07:30 | 2026-04-19 12:01 | ![]() |
PhishTank | Details | |
| 2026-04-25 07:30 | 2026-04-19 12:00 | ![]() |
PhishTank | Details | |
| 2026-04-25 07:30 | 2026-04-17 13:02 | ![]() |
OpenPhish urlscan | Details | |
| 2026-04-25 07:30 | 2026-04-16 23:00 | ![]() |
PhishTank | Details | |
| 2026-04-25 07:30 | 2026-04-16 17:00 | ![]() |
PhishTank | Details | |
| 2026-04-25 07:30 | 2026-04-13 09:00 | ![]() |
PhishTank | Details | |
| 2026-04-25 07:30 | 2026-04-07 12:00 | ![]() |
PhishTank | Details | |
| 2026-04-25 07:30 | 2026-03-31 20:00 | ![]() |
TweetFeed | Details | |
| 2026-04-25 07:30 | 2026-03-30 13:01 | ![]() |
GSB OpenPhish urlscan | Details | |
| 2026-04-25 07:30 | 2026-03-30 01:00 | ![]() |
PhishTank | Details | |
| 2026-04-25 07:30 | 2026-03-26 23:00 | ![]() |
PhishTank | Details |
It is strongly recommended to use them for Threat Hunting or add them to a Watchlist.
| URL | Screenshot | Flags | Details |
|---|---|---|---|
| https://outlookk-104503.weebl… | ![]() |
PhishTank | Details |
| https://outlook-104014-105414… | ![]() |
PhishTank | Details |
| https://hotmail-mailbox-10035… | ![]() |
PhishTank | Details |
| https://netflix5555.info | ![]() |
OpenPhish urlscan | Details |
| https://www-google-vipp.com | ![]() |
PhishTank | Details |
| https://www-google-vip.com | ![]() |
PhishTank | Details |
| https://binance-zh.com | ![]() |
PhishTank | Details |
| https://www-app-google.com | ![]() |
PhishTank | Details |
| https://dropbox-home-page-clo… | ![]() |
TweetFeed | Details |
| https://security.email-micros… | ![]() |
GSB OpenPhish urlscan | Details |
| https://qqo-google.com.cn | ![]() |
PhishTank | Details |
| https://office365-service-c38… | ![]() |
PhishTank | Details |











