Rebel Status Page
Update - Our security team is currently managing a coordinated phishing campaign where external attackers are impersonating Rebel.com to harvest user credentials.

Our Actions: We have identified the third-party platforms being used to host these fraudulent pages and send these emails. We have initiated formal takedown proceedings with all involved service providers and are monitoring the situation closely.

Current Status: We are awaiting final processing of these takedown requests. In the meantime, we have updated our internal filters to help mitigate the impact.

User Advisory: Do not click links in emails that direct you to unfamiliar domains (e.g., sendzing.com). Official Rebel.com communications will always direct you to our verified domain.

If you believe your account has been compromised, please reset your password immediately and contact our support team.

Feb 14, 2026 - 09:25 EST
Monitoring - We are currently investigating a phishing campaign targeting Rebel.com customers.

The Incident:
Fraudulent emails are being sent with subjects such as "Action required: Please confirm your contact info" or "WHOIS Accuracy Program." These emails appear to be from Rebel.com but are sent from the domain @valleue.com.

Current Actions:
We have identified the malicious landing page at sendzing.com/rebel.com/.
Forensic reports have been filed with the involved service providers, including Amazon SES, GoDaddy, and Network Solutions, to disable the sending accounts and take down the fraudulent site.

User Guidance:
Please do not click any links in these emails. If you have already interacted with the link and provided information, please change your Rebel.com password immediately as a precaution.

Feb 12, 2026 - 18:37 EST

About This Site

Rebel.com's home for real-time updates on our services. This page will be updated frequently if any outages occur to give you access to the most recent information available. Have an issue not shown here? Our Customer Support team is available.

Feb 18, 2026

No incidents reported today.

Feb 17, 2026

No incidents reported.

Feb 16, 2026

No incidents reported.

Feb 15, 2026

No incidents reported.

Feb 14, 2026

Unresolved incident: Active Phishing Alert - "WHOIS Accuracy" Email Impersonation.

Feb 13, 2026

No incidents reported.

Feb 12, 2026
Feb 11, 2026

No incidents reported.

Feb 10, 2026
Resolved - The connectivity issues affecting our default nameservers (dns.rebel.com and dns.rebel.ca) have been fully resolved. All DNS services are operating normally.

We have confirmed that resolution is stable and propagation is caught up. We will continue to monitor the systems to ensure ongoing stability. Thank you for your patience while we addressed this.

Feb 10, 14:56 EST
Investigating - We are currently investigating reports of connectivity issues affecting our default nameservers (dns.rebel.com/dns2.rebel.com and dns.rebel.ca/dns2.rebel.ca). Customers using these nameservers may experience intermittent website or email downtime.

Our technical team is working to identify the root cause and restore full service as quickly as possible. We apologize for the inconvenience and will provide an update every 30 minutes until the issue is resolved.

Next Update: 3:05 PM EST

Feb 10, 14:40 EST
Feb 9, 2026

No incidents reported.

Feb 8, 2026

No incidents reported.

Feb 7, 2026

No incidents reported.

Feb 6, 2026
Postmortem - Read details
Feb 6, 11:55 EST
Resolved - The fraudulent site apps.emailerstack.com has been successfully suspended and the threat neutralized.

Next Steps for Impacted Users:

If you interacted with the phishing link, please take the following immediate actions:

- Reset Password: Change your Rebel.com password immediately.
- Enable 2FA: We strongly recommend switching to an Authenticator App for enhanced security.
- Run Scans: Perform a full security scan on your device (Windows Defender, Malwarebytes, or Play Protect).

Thank you for your patience while we worked to resolve this incident.

Feb 6, 11:46 EST
Update - We are continuing to work with upstream providers to deactivate the fraudulent site apps.emailerstack.com.
Security Recommendations for All Users:

If you have interacted with the phishing link or provided any information, please follow these steps based on your device:

• Reset your Rebel.com Password immediately.

• Security Scans:
Windows Users: Run a full scan using Microsoft Defender: https://support.microsoft.com/en-us/topic/how-to-start-a-scan-for-viruses-or-malware-in-microsoft-defender-e98663f1-8827-4abe-b9ce-fb2664201f29

Mac Users: We recommend a scan with Malwarebytes for Mac: https://www.malwarebytes.com/mac or following Apple’s Security Guide: https://support.apple.com/en-ca/guide/mac-help/mh40596/mac

Chromebook Users: Review and remove any unknown browser extensions: https://support.google.com/accounts/answer/9924802

Mobile Users: Run Google Play Protect (Android): https://support.google.com/googleplay/answer/2812853 or check for unauthorized profiles (iOS).

• Upgrade 2FA: We strongly recommend switching from SMS to an Authenticator App (TOTP) for better protection.

Feb 5, 13:56 EST
Update - Update Message: "Update [Feb 5, 2026 - 1:02 PM EST]: Our security team has positively identified the source of the phishing emails (noreply@email.mailroll.mx) and the malicious destination site (apps.emailerstack.com).

We have initiated formal takedown procedures with Google Safe Browsing and the upstream domain registry. Users may soon see a 'Deceptive Site' warning when attempting to visit the malicious link. We continue to monitor the situation and will provide further updates as the site is successfully taken offline.

Reminder: Rebel.com will never ask you to verify your account credentials via a non-Rebel URL. Please remain vigilant.

Feb 5, 13:02 EST
Monitoring - We are currently tracking a phishing campaign where emails are being sent from noreply@email.mailroll.mx masquerading as Rebel.com Support. These emails claim that your domain will be 'put on hold' and request that you verify your contact information via a link to apps.emailerstack.com.

This email is NOT from Rebel. If you receive this message:

- DO NOT click any links.

- DO NOT provide your account credentials.

- Mark as Spam and delete the message immediately.

Our security team is working to have these malicious sites taken down. If you have already entered your information, please reset your Rebel.com password immediately.

Thank you,
The Rebel Team.

Feb 5, 12:32 EST
Feb 5, 2026
Feb 4, 2026

No incidents reported.