Update - Our security team is currently managing a coordinated phishing campaign where external attackers are impersonating Rebel.com to harvest user credentials.
Our Actions: We have identified the third-party platforms being used to host these fraudulent pages and send these emails. We have initiated formal takedown proceedings with all involved service providers and are monitoring the situation closely.
Current Status: We are awaiting final processing of these takedown requests. In the meantime, we have updated our internal filters to help mitigate the impact.
User Advisory: Do not click links in emails that direct you to unfamiliar domains (e.g., sendzing.com). Official Rebel.com communications will always direct you to our verified domain.
If you believe your account has been compromised, please reset your password immediately and contact our support team.
Feb 14, 2026 - 09:25 EST
Monitoring - We are currently investigating a phishing campaign targeting Rebel.com customers.
The Incident: Fraudulent emails are being sent with subjects such as "Action required: Please confirm your contact info" or "WHOIS Accuracy Program." These emails appear to be from Rebel.com but are sent from the domain @valleue.com.
Current Actions: We have identified the malicious landing page at sendzing.com/rebel.com/. Forensic reports have been filed with the involved service providers, including Amazon SES, GoDaddy, and Network Solutions, to disable the sending accounts and take down the fraudulent site.
User Guidance: Please do not click any links in these emails. If you have already interacted with the link and provided information, please change your Rebel.com password immediately as a precaution.
Feb 12, 2026 - 18:37 EST
Rebel.com's home for real-time updates on our services. This page will be updated frequently if any outages occur to give you access to the most recent information available. Have an issue not shown here? Our Customer Support team is available.
Past Incidents
Feb 18, 2026
No incidents reported today.
Feb 17, 2026
No incidents reported.
Feb 16, 2026
No incidents reported.
Feb 15, 2026
No incidents reported.
Feb 14, 2026
Unresolved incident: Active Phishing Alert - "WHOIS Accuracy" Email Impersonation.
Resolved -
The connectivity issues affecting our default nameservers (dns.rebel.com and dns.rebel.ca) have been fully resolved. All DNS services are operating normally.
We have confirmed that resolution is stable and propagation is caught up. We will continue to monitor the systems to ensure ongoing stability. Thank you for your patience while we addressed this.
Feb 10, 14:56 EST
Investigating -
We are currently investigating reports of connectivity issues affecting our default nameservers (dns.rebel.com/dns2.rebel.com and dns.rebel.ca/dns2.rebel.ca). Customers using these nameservers may experience intermittent website or email downtime.
Our technical team is working to identify the root cause and restore full service as quickly as possible. We apologize for the inconvenience and will provide an update every 30 minutes until the issue is resolved.
Resolved -
The fraudulent site apps.emailerstack.com has been successfully suspended and the threat neutralized.
Next Steps for Impacted Users:
If you interacted with the phishing link, please take the following immediate actions:
- Reset Password: Change your Rebel.com password immediately. - Enable 2FA: We strongly recommend switching to an Authenticator App for enhanced security. - Run Scans: Perform a full security scan on your device (Windows Defender, Malwarebytes, or Play Protect).
Thank you for your patience while we worked to resolve this incident.
Feb 6, 11:46 EST
Update -
We are continuing to work with upstream providers to deactivate the fraudulent site apps.emailerstack.com. Security Recommendations for All Users:
If you have interacted with the phishing link or provided any information, please follow these steps based on your device:
• Upgrade 2FA: We strongly recommend switching from SMS to an Authenticator App (TOTP) for better protection.
Feb 5, 13:56 EST
Update -
Update Message: "Update [Feb 5, 2026 - 1:02 PM EST]: Our security team has positively identified the source of the phishing emails (noreply@email.mailroll.mx) and the malicious destination site (apps.emailerstack.com).
We have initiated formal takedown procedures with Google Safe Browsing and the upstream domain registry. Users may soon see a 'Deceptive Site' warning when attempting to visit the malicious link. We continue to monitor the situation and will provide further updates as the site is successfully taken offline.
Reminder: Rebel.com will never ask you to verify your account credentials via a non-Rebel URL. Please remain vigilant.
Feb 5, 13:02 EST
Monitoring -
We are currently tracking a phishing campaign where emails are being sent from noreply@email.mailroll.mx masquerading as Rebel.com Support. These emails claim that your domain will be 'put on hold' and request that you verify your contact information via a link to apps.emailerstack.com.
This email is NOT from Rebel. If you receive this message:
- DO NOT click any links.
- DO NOT provide your account credentials.
- Mark as Spam and delete the message immediately.
Our security team is working to have these malicious sites taken down. If you have already entered your information, please reset your Rebel.com password immediately.