Statistics

ZeroSSL RSA Domain Secure Site CA TLS Certificate

Phishing sites using this certificate issuer

About ZeroSSL RSA Domain Secure Site CA

Operator
ZeroSSL / Sectigo
Chains to
USERTrust RSA Certification Authority
Key type
RSA
In use since
2020

Free DV TLS from ZeroSSL, RSA variant, same signup path as the ECC one.

Frequently asked questions

Is ZeroSSL RSA Domain Secure Site CA a legitimate certificate authority?

Yes. ZeroSSL RSA Domain Secure Site CA is a publicly trusted intermediate CA operated by ZeroSSL / Sectigo and chained to USERTrust RSA Certification Authority. It is recognized by all mainstream browsers and operating system trust stores. The certificate itself is not a phishing indicator — the same intermediate signs millions of legitimate sites.

Why does ZeroSSL RSA Domain Secure Site CA show up on phishing sites?

ZeroSSL / Sectigo issues RSA domain-validated certificates automatically and at no cost (or very low cost), which is the exact workflow scammers need to put HTTPS on a throwaway domain. Domain validation only proves that the requester controls the domain name, not that the site behind it is trustworthy. phishunt lists the specific domains currently flagged below — those are the suspicious ones, not ZeroSSL RSA Domain Secure Site CA itself.

How do I verify a certificate issued by ZeroSSL RSA Domain Secure Site CA?

In a desktop browser, click the padlock in the address bar and open the certificate viewer. Confirm the issuer chain ends at USERTrust RSA Certification Authority, that the subject matches the domain you expect, and that the notAfter date has not passed. A valid ZeroSSL RSA Domain Secure Site CA certificate only proves TLS was negotiated correctly — always verify the domain name itself belongs to the service you intended to visit.

What is the difference between ZeroSSL RSA Domain Secure Site CA and ZeroSSL ECC Domain Secure Site CA?

ZeroSSL RSA Domain Secure Site CA and its siblings (ZeroSSL ECC Domain Secure Site CA) share the same operator (ZeroSSL / Sectigo) and roll up to the same root (USERTrust RSA Certification Authority). CAs rotate multiple intermediates so that if one key ever has to be revoked, the damage is contained. As a user, you can treat all of them as the same trust anchor.

Last check (UTC) First seen (UTC) URL Screenshot Flags Details
URL Screenshot Flags Details