diff --git a/components/safe_browsing/content/renderer/phishing_classifier/phishing_classifier.cc b/components/safe_browsing/content/renderer/phishing_classifier/phishing_classifier.cc
index a621f1209888b8a31e73df9433bd579cdfdc8b95..2ab097e055e2931c198ff51a098c77341b8bd05b 100644
--- a/components/safe_browsing/content/renderer/phishing_classifier/phishing_classifier.cc
+++ b/components/safe_browsing/content/renderer/phishing_classifier/phishing_classifier.cc
@@ -270,15 +270,6 @@ void PhishingClassifier::RunCallback(const ClientPhishingRequest& verdict,
 }
 
 void PhishingClassifier::RunFailureCallback(Result failure_event) {
-  // Note that cancelling the feature extractors is simply a no-op if they
-  // were not running. We reset the extractors at failure callback because the
-  // raw_ptr objects held by these extractors such as bitmap, features, and
-  // shingle_hashes can be dangling.
-  dom_extractor_.reset();
-  term_extractor_.reset();
-  visual_extractor_.reset();
-  weak_factory_.InvalidateWeakPtrs();
-
   ClientPhishingRequest verdict;
   // In this case we're not guaranteed to have a valid URL.  Just set it
   // to the empty string to make sure we have a valid protocol buffer.