Research

Back to Homepage
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Research
SecuritySnacks
Newsletters
Podcast Episodes
No items found.
Research
Newly Registered Domains Distributing SpyNote Malware

Deceptive websites hosted on newly registered domains are being used to deliver AndroidOS SpyNote malware. These sites mimic the Google Chrome install page on the Google Play Store.

Deceptive websites hosted on newly registered domains are being used to deliver AndroidOS SpyNote malware. These sites mimic the Google Chrome install page on the Google Play Store to lure victims into downloading SpyNote, a potent Android remote access trojan (RAT) used for surveillance, data exfiltration, and remote control.

Domains Mimicking App Installation on Google Play Store

Newly registered domains are hosting deceptive websites that mimic popular application installation pages on the Google Play Store to trick victims into downloading malware. Analysis revealed common patterns in domain registration and website structure, with limited variations observed in malware configurations, command and control (C2) infrastructure, and delivery websites. Notably, the threat actor utilized a mix of English and Chinese-language delivery sites and included Chinese-language comments within the delivery site code and the malware itself.

Domains Mimicking App Installation on Google Play Store

This report further details the malware delivery website configurations and the deceptive techniques employed to trick users into installing the AndroidOS malware. It also provides an overview of the malware’s installation process and C2 configurations. Finally, the GitHub appendices contain indicators of compromise (IOCs), mapping to the MITRE Mobile ATT&CK framework, and a snippet of the AndroidManifest file highlighting the permissions SpyNote seeks on compromised devices.

Domain Registration and Website Patterns

Registrar:

  • NameSilo, LLC
  • XinNet Technology Corporation

IP ISP:

  • Lightnode Limited
  • Vultr Holdings LLC

SSL Issuer:

  • R10
  • R11

NameServer:

  • dnsowl[.]com
  • xincache[.]com

Server Type:

  • nginx

Prominent IP Resolved:

  • 156.244.19[.]63

Frequent Web Endpoint Path:

  • /index/index/download.html
  • /index/index/download.html?id=MTAwMDU%3D

Frequent HTML Code Inclusions:

  • https[:]//unpkg[.]com/current-device@0.10.2/umd/current-device.min.js
  • href=”https[:]//play.google[.]com/store/apps/details?id=com.zhiliaoapp.musically
  • “uUDqyDbaLAZwfdPcR4uvjA”

Malware Delivery Website Review

The websites include an image carousel displaying screenshots of mimicked Google Play app pages. These images are loaded from “bafanglaicai888[.]top,” another suspicious domain suspected to be owned by the same actor. The carousel provides a visual aspect to enhance the illusion of a legitimate app page.

A `<c-wiz>` element acts as a container and a managed component within the web page, responsible for the functionality involving the display and handling of the “Install”  button. As a side note, the presence of “com.zhiliaoapp.musically” hints at an interaction related to the TikTok (formerly Musical.ly) Android application, which may be code remnants of prior versions.

When the display images mimicking the Google Play store apps are clicked, it executes the JavaScript function “download()” (shown below) that initiates the download of the .apk file located at the hardcoded URL.

This function works by dynamically creating a hidden iframe and setting its src attribute to a JavaScript snippet. This snippet then uses location.href = src to redirect the iframe to the provided “url” value. Since iframes can initiate downloads, this effectively triggers a download of the file at the given URL. In the case of the above code samples, it would download the 002.apk file from the URL “https[:]//www.kmyjh[.]top/002.apk.”

Analysis of the downloaded .apk files revealed them to be SpyNote dropper malware. SpyNote and its variant, SpyMax, represent a family of potent Android RATs enabling extensive surveillance, data exfiltration, and remote control. Notably, SpyNote has been associated with sophisticated APT groups such as OilRig (APT34), APT-C-37 (Pat-Bear), and OilAlpha, and has been deployed against Indian Defence Personnel. The malware’s appeal to a wide range of threat actors, including advanced groups, underscores its versatility and efficacy for both targeted espionage and broader cybercriminal activities. The availability of a builder tool on underground forums has significantly facilitated its adoption among cybercriminals.

The dropper installs a second .apk file contained within the first via a class function InstallDropSessionActivity(). The class implements the DialogInterface.OnClickListener interface, meaning it’s executed when the user clicks a button (likely the “Confirm” button in the “User Data Info” dialog from InstallDropSessionActivity).

The second .apk file contains the majority of the SpyNote malware functionality. Finally, a base.dex file within the SpyNote’s assets folder contains the connection parameters with the DomainManager.class used for testing and establishing remote connections to the Command and Control (C2) server.

One variation in this configuration was identified in which an IP is hardcoded for the C2, also over port 8282. Notably, the hardcoded IP is the same IP resolved for both C2 domains observed in the other variations.

SpyNote Malware Ramifications

Newly registered domains were identified hosting deceptive websites that mimic popular app installation pages on the Google Play Store. These sites are designed to trick users into downloading malware. Analysis of these campaigns reveals common patterns in domain registration, website structure, and largely consistent malware configurations, command and control (C2) infrastructure, and delivery methods. These websites often include an image carousel displaying screenshots of mimicked Google Play app pages to enhance the illusion of legitimacy. While no definitive attribution is currently available, a China nexus is suspected. This deceptive infrastructure is being leveraged to distribute SpyNote AndroidOS malware.

Analysis of the SpyNote malware reveals a two-stage installation process initiated by an APK dropper, ultimately deploying the core SpyNote RAT from a second embedded APK. Command and control server details are hidden within a DEX file. SpyNote is notorious for its persistence, often requiring a factory reset for complete removal. Upon installation, it aggressively requests numerous intrusive permissions, gaining extensive control over the compromised device. This control allows for the theft of sensitive data such as SMS messages, contacts, call logs, location information, and files. SpyNote also boasts significant remote access capabilities, including camera and microphone activation, call manipulation, and arbitrary command execution. Its robust keylogging functionality, targeting application credentials and utilizing Accessibility Services for two-factor authentication codes, is particularly concerning. Furthermore, SpyNote can remotely wipe data, lock the device, or install further applications. The extensive capabilities of SpyNote underscore its effectiveness as a potent tool for espionage and cybercrime, posing a significant threat to individuals and organizations targeted by these deceptive campaigns.

IOCs on GitHub

If the community has any additional input, please let us know.

https://github.com/DomainTools/SecuritySnacks/blob/main/2025/SpyNote-GooglePlayStore

Sign Up For DomainTools Investigations’ Newsletter for the Latest Research

Want more from DomainTools Investigations? Be sure to sign up for our monthly newsletter to get the latest research from the team – available on LinkedIn or email.

Learn More
Research
Where to Find Aspiring Hackers

This research analyzes Proton66, a bulletproof hosting network enabling cybercrime operations, serving as a hub for aspiring cybercriminals. It focuses on threat actor, known as "Coquettte" and their ties to the Horrid hacking group, a loosely organized cybercriminal collective fostering amateur threat actors.

Bulletproof Hosting Networks and Proton66

While researching malicious domains hosted on Proton66, we stumbled upon an intriguing discovery—a fake cybersecurity website, cybersecureprotect[.]com, masquerading as a legitimate antivirus service. However, due to an operational security (OPSEC) failure, this domain left its entire malicious infrastructure exposed. This revelation led us down a rabbit hole into the operations of an emerging threat actor known as Coquettte—an amateur cybercriminal leveraging Proton66’s bulletproof hosting to distribute malware and engage in other illicit activities.

Proton66, a well-known Russian bulletproof hosting provider, has long been a haven for cybercriminals looking to operate with impunity. By investigating cybersecureprotect[.]com, we uncovered a larger network of malicious activity, including credential-stealing malware, keyloggers, and trojans, all distributed through Proton66’s infrastructure. Interestingly, Coquettte’s criminal ventures are not limited to malware. Investigators uncovered other projects operated by this actor that suggest a broad interest in illicit activities. One notable example is a website hosted at meth[.]to, which purports to distribute guides on the manufacture of Methamphetamine, C4/Semtex, flashbangs, napalm, and catalytic converter theft. While the site appears to contain detailed instructions, it remains unclear whether the content is genuinely intended as a resource for criminal activity or if it falls into the realm of dark humor, shock content, or trolling.

This analysis provides a detailed technical analysis of Coquettte’s malware infrastructure, including forensic insights into how their campaigns function, the threat posed by Proton66 as a cybercrime enabler, and a comprehensive list of indicators of compromise (IOCs) that security professionals can use to detect and mitigate related threats.

Proton66 as a Threat Actor Breeding Ground

Proton66 is a Russian bulletproof hosting provider (Autonomous System AS198953) notorious for enabling cybercrime by ignoring abuse complaints. In a 2024 threat intelligence report by Intrinsec, researchers identified Proton66 as a key player in the bulletproof hosting arena, facilitating illicit online activities such as malware distribution and phishing campaigns. What sets Proton66 apart is its appeal to less-experienced threat actors; its services allow even amateur hackers to host malicious content with impunity. Many phishing and credential-harvesting sites on Proton66 impersonate major brands (e.g. AT&T, Netflix, GoDaddy, banks, crypto exchanges, and government portals) to steal user data. These operations often exhibit poor OPSEC, indicating the operators are relatively inexperienced.

Example of malicious domains:

Threat Actor “Coquettte” and Their Malware Infrastructure

One emerging threat actor thriving in the Proton66 ecosystem goes by the handle “Coquettte” (note the triple “t”). Coquettte appears to be an amateur cybercriminal leveraging Proton66’s services to deploy malware under the guise of legitimate software. Investigators first uncovered Coquettte’s activities through the domain cybersecureprotect[.]com, a fake cybersecurity product site hosted on Proton66. The website pretended to offer “CyberSecure Pro” antivirus software, but due to an OPSEC failure, its web directory was left publicly accessible – revealing the malicious files within.

The directory contained a compressed zip file (CyberSecure Pro.zip) of a Windows Installer - CyberSecurePro.msi, which is actually the malware droppers rather than security software. When executed, the install reaches out to two hard coded URLs: cia[.]tf and quitarlosi[.], downloads a second-stage payload and drops additional executables from the threat actor controlled servers.

Analysis of the retrieved payload revealed that it was flagged as Rugmi (also known as Penguish or associated with the Amadey loader) – a modular malware loader commonly used by cybercriminals to deploy various secondary payloads such as infostealers, trojans, and ransomware. The specific SHA-256 hash of the Rugmi-infected installer was:
a07c9275d2628f6dee9271452a66683831d21367a63cdb61ade0fac55f3ed9ff (CyberSecure Pro[.]zip).

Execution Flow of the Malware:

  • Compressed Archive: CyberSecure Pro[.]zip (SHA-256: a07c9275d2628f6dee9271452a66683831d21367a63cdb61ade0fac55f3ed9ff)
  • Windows Installer Dropper: CyberSecure Pro.msi (SHA-256: 5558b04220e017f2a69fd88c575ec9450bde361049e42fd67501a0f89ba21834)
  • Dropped Files: Upon execution, the .msi file extracts additional payloads, including:
    • CyberSecureV.exe (SHA-256: 0983d99e87d9300d4a1b54c08d9a365160e406e4cd681bfd6ef82052d932a5b4) and stapelia.exe (SHA-256: 1487a4f637a68a5b1dadc379e770431d591421218818164add86c02853a433aa)  – Identified as Trojan.Rugmi/Penguish, a loader trojan used to deliver infostealers such as Lumma Stealer, Vidar, RecordBreaker, and Rescoms.
    • Configuration scripts and batch files to maintain persistence and execute additional payloads.

Trojan.Rugmi/Penguish’s Role in the Attack:
Rugmi/Penguish is a malware loader designed for stealthy payload delivery. It typically:

  • Fetches additional malware (infostealers, trojans) from attacker-controlled servers.
  • Evolves its delivery tactics, often used in conjunction with cracked software or fake security products.
  • Uses obfuscation techniques to bypass antivirus detection.
  • Communicates with C2 servers, like cia[.]tf, to receive commands and drop additional payloads.

Coquettte’s personal website, coquettte[.]com, provided additional insights into their online presence. The site, hosted on AWS, at one point displayed a message stating “18 years old software engineer, pursuing a degree in Comp Sci.” This suggests that Coquettte is a young individual, possibly a student, which aligns with the amateurish mistakes (like the open directory) in their cybercrime endeavors.

Further investigation revealed that the cia[.]tf domain, which was used as a malware command-and-control (C2) server, was registered with the email address root[@]coquettte[.]com. This direct link confirmed that Coquettte not only operated cybersecureprotect[.]com as a malware distribution hub, but also controlled cia[.]tf, which facilitated the downloading and execution of malware payloads. By analyzing registration records and domain relations, researchers identified additional infrastructure linked to Coquettte, indicating a broader cybercriminal operation that leveraged Proton66’s bulletproof hosting to persist despite takedown efforts.

Coquettte’s Personal website
Projects and contact information listed within the Coquettte website

Additional Malicious Activities by Coquettte

Interestingly, Coquettte’s criminal ventures are not limited to malware. Investigators uncovered other projects operated by this actor that suggests a broad interest in illicit activities. One notable example is a website hosted at meth[.]to – which, as the name implies, contains how-to guides for illegal substances and weapons.

The site allegedly provides (unverified) recipes and instructions for manufacturing methamphetamine, making explosives like C4/Semtex, constructing improvised devices (e.g. flashbangs, napalm), and even guides on catalytic converter theft. In essence, it functions as an illicit knowledge base or black-market tutorial site. The presence of such content indicates Coquettte (or their associates) are dabbling in the darker corners of cybercrime beyond just malware – potentially trying to run or contribute to an underground marketplace or forum for criminal activities.

Affiliated or Associated Hacking Groups: Horrid[.]xyz and Other Connections

Further analysis of Coquettte’s infrastructure suggests potential ties to a broader hacking group or collective operating under the name “Horrid.” A domain linked to Coquettte, horrid[.]xyz, was registered by the same group and appears to be part of their extended ecosystem. Several other domains associated with their infrastructure include:

  • terrorist[.]ovh
  • meth[.]to
  • meth[.]su

Both meth[.]to and meth[.]su hosted identical content, purporting to distribute guides on illicit activities, while terrorist[.]ovh was similarly structured. The pattern of overlapping infrastructure suggests that the individuals behind these sites may refer to themselves as “Horrid,” with Coquettte being an alias of one of the members rather than a lone actor.

Additionally, a Google Analytics tracker (G-RPK032CCFZ) embedded in some of their sites was linked across at least four domains, further confirming shared ownership:

  • horrid[.]xyz
  • terrorist[.]ovh
  • meth[.]to
  • meth[.]su

These interconnections reinforce the likelihood that “Horrid” operates as a small, loosely structured hacking collective rather than a single individual. The group's affiliation with multiple domains tied to cybercrime and illicit content suggests that it functions as an incubator for inspiring or amateur cybercriminals, providing resources and infrastructure to those looking to establish themselves in underground hacking circles.

Additional Online Presence and Linked Accounts

Beyond their own hosted infrastructure, Coquettte and their associates have left digital footprints across multiple platforms. Several of these accounts were referenced directly on coquettte[.]com in a file titled Contact_me.txt, listing the following links:

  • GitHub: github[.]com/coquettte – Personal GitHub repository, potentially containing malware-related code or past projects.
  • YouTube: youtube[.]com/@uid4 – (also has the alias “chickenwing_11”) Possible media or tutorial content associated with the group, which may serve to share tactics with aspiring cybercriminals.
  • Last.fm Profile: last[.]fm/user/chickenwing_11 – While less directly relevant, this could be a personal account linked to the actor.

Additionally, some of their own infrastructure was self-referenced in Coquettte’s personal website (coquettte[.]com) in a file titled other_projects.txt, which listed:

  • Meth[.]to: (https://meth[.]to/) – A site purporting to distribute guides on illicit activities.
  • Cia[.]tf: (https://cia[.]tf/) – A malware hosting and C2 domain frequently observed in cybercriminal activities.
  • Xn--xuu[.]ws: (https://xn--xuu[.]ws/) – A site that emulates a Linux terminal, which uses code from a community project mercurywork[.]shop, further linking their infrastructure to additional cyber-related projects.

The presence of direct self-references across multiple sites reinforces the interconnected nature of these domains, confirming a shared infrastructure between Horrid, Coquettte, and cia.tf. More importantly, these platforms appear to act as a launchpad for aspiring cybercriminals, giving them access to malware, hosting solutions, and potentially a network of like-minded individuals willing to collaborate on cyber threats.

Proton66 Cyber Threats: Vigilance Needed Against Emerging Malware and Amateur Actors

Proton66-based threats require vigilance on multiple fronts. While the individual threat actor “Coquettte” may be relatively amateur, the malware they deploy (stealers, keyloggers, etc.) can do serious damage if successful. The combination of a bulletproof hosting haven and accessible malware toolkits lowers the bar for entry into cybercrime, meaning even minor actors can pose a risk to organizations. By staying aware of the Proton66 network’s activities and aggressively monitoring for the IOCs and techniques detailed above, security teams can bolster their defenses against this breeding ground of emerging threats.

IOCs on GitHub

If the community has any additional input, please let us know.

https://github.com/DomainTools/SecuritySnacks/blob/main/2025/Proton66-Coquettte

Sign Up For DomainTools Investigations’ Newsletter for the Latest Research

Want more from DomainTools Investigations? Be sure to sign up for our monthly newsletter to get the latest research from the team – available on LinkedIn or email.

Learn More
Research
Phishing Campaign Targets Defense and Aerospace Firms Linked to Ukraine Conflict

DomainTools Investigations (DTI) identified a large-scale phishing infrastructure heavily focused on defense and aerospace entities with links to the conflict in Ukraine. The infrastructure comprises a small number of mail servers, each supporting a set of domains designed to spoof that of a specific organization. These domains currently host webmail login pages likely intended to harvest credentials from targeted entities.

This activity is not currently attributed to a specific actor, but available evidence indicates this activity is motivated by cyber espionage, with an emphasis on intelligence collection related to the ongoing conflict in Ukraine.

Detection of Phishing on a Spoofed Ukroboronprom Domain

DTI initially identified a likely phishing page hosted on the domain kroboronprom[.]com a domain spoofing Ukroboronprom, Ukraine’s largest arms manufacturer. The phishing page, located at https[:]//kroboronprom[.]com/sso/login?url=/webmail/?homepage, presents a webmail login prompt. The attackers appear to have built the page using Mailu, an open-source mail server software available on GitHub.

Figure 1. Webmail login page hosted on kroboronprom[.]com

Analysis using DomainTools Iris revealed that the kroboronprom[.]com domain was first seen on December 20, 2024, was hosted on GHOSTnet VPS, and displayed the website title “Mailu-Admin | Mailu.” The Iris Pivot Engine identified nine other domains with the same website title, hosted on GHOSTnet VPS, and first seen after December 20, 20241.

scooby-doo[.]xyz
lucky-guy[.]space
santa-clause[.]online
yellow-unicorn[.]site
sun-flower[.]space
rainbow-pony[.]buzz
don-quixote[.]quest
rocky-jellyfish[.]biz
lucky-turtle[.]ink

Table 1. Domains Likely Related to kroboronprom[.]com

These domains were all registered using the registrar Spaceship. A second search2 using the Pivot Engine for domains containing a “-” character, registered via Spaceship, hosted on GHOSTnet VPS IP addresses, and first observed after December 20, 2024 revealed three additional domains: 

  • space-kitty[.]online 
  • stupid-buddy[.]mom 
  • hungry-shark[.]sit

Data from urlscan.io (“urlscan”) shows that each of these domains hosts a Mailu webmail login page identical to one seen on kroboronprom[.]com, strongly suggesting they are being used for credential theft.

Iris data showed that, with the exception of scooby-doo[.]xyz, all of these serve as MX domains for mail servers, which support a large set of spoofed domains imitating organizations in the defense, aerospace, and IT sectors. These domains were registered via Spaceship and first observed some time between December 21, 2024 and March 4, 2025. In total, investigation into this activity identified 878 spoofed domains with naming conventions that added or changed a few characters in the targeted entity’s legitimate domain. 

DTI determined how the actor operationalized this infrastructure. However, the most likely scenario involves phishing emails sent to employees of targeted organizations. The actor likely used spoofed domains in the sender field to make the emails appear as if they originated from within the organization. These emails likely contained malicious links or attachments directing recipients to fake webmail login pages designed to steal credentials.

MX Domain MX IP Address Spoofed Domain Entity Number of Spoofed Domains
hungry-shark[.]site 5.230.38[.]154 Norway-based Defense and Aerospace 75
stupid-buddy[.]mom 5.230.75[.]207 France-based Aerospace 101
space-kitty[.]online 5.230.66[.]98 South Korea-based Defense 56
lucky-turtle[.]ink 5.230.36[.]139 France-based Defense 88
rocky-jellyfish[.]biz 5.230.36[.]138 UK-based Defense 48
don-quixote[.]quest 5.230.253[.]157 Sweden-based Defense and Aerospace 57
rainbow-pony[.]buzz 5.230.68[.]43 France-based Defense and Aerospace 65
sun-flower[.]space 5.230.44[.]151 UK-based Defense and Aerospace 68
yellow-unicorn[.]site 5.230.76[.]174 Italy-based Defense and Aerospace 44
lucky-guy[.]space 5.231.1[.]60 Turkey-based Defense 82
santa-clause[.]online 5.231.1[.]57 United States-based IT 93
kroboronprom[.]com 5.230.45[.]244 Ukraine-based Defense 101

Table 2. Mail servers and the entities they were likely used to target

Expanded Domain Analysis: Links to Credential Phishing and Malicious File Distribution

Further analysis of identified infrastructure using urlscan identified four additional domains likely linked to this activity:

  • rheinemetall[.]com
  • rheinmetall.com[.]de
  • ukrtelecom[.]eu
  • funky-bober.art

These domains were visually similar to the MX domains identified above and were also hosted on GHOSTnet VPS infrastructure. Another domain, ukrtelcom[.]com, is likely related to this activity based on Whois data overlap with ukrtelecom[.]eu and rheinemetall[.]com. However, at the time of analysis, ukrtelcom[.]com was not hosted on GHOSTnet VPS and did not host a Mailu credential collection page.

In addition to credential phishing, the actor likely used the subdomain cryptshare.rheinemetall[.]com to distribute malicious files. Data from urlscan indicates this subdomain was used to facilitate file distribution between late January and mid-February 2025. Screenshots show the page requesting a password before allowing users to retrieve a file. The subdomain name and password request page refer to Cryptshare, a legitimate secure file retrieval service. DTI cannot confirm how the actor used this subdomain; however, given the available evidence, it was most likely used to deliver malicious files.

Figure 2. Screenshot of cryptshare.rheinemetall[.]com

Assessment of Cyber Espionage Activity Targeting Defense and Aerospace Sectors

There is insufficient evidence to attribute this activity to a known actor; however, the activity likely has a cyber espionage motivation. DTI makes this assessment with moderate confidence based on the tactics, techniques, and procedures (TTPs) and the heavy focus on the defense and aerospace sectors. 

The focus on spoofing organizations involved in Ukraine’s defense and telecommunications infrastructure further suggests an intent to gather intelligence related to the conflict in Ukraine. Notably, many of the spoofed defense, aerospace, and IT companies have provided support to Ukraine’s military efforts in its conflict with Russia.

IOCs on GitHub

If the community has any additional input, please let us know.

https://github.com/DomainTools/SecuritySnacks/blob/main/2025/PhishingInfrastructure-UAConflict.csv

Iris Search Hashes

1

U2FsdGVkX1/N26ISOMEKt52j4qVRCFOeOdJm5/SVrHprkuaLnu2BQeUp0P0Kc6qfHvj5jP53SaAxcYJDb48++Vqi4NintEcAPIkll0UFs8Dqv6g+tIbYEPXAR9Yrlkqv5MIad+FOlQ8f26MzOpo/M7Hqo94HE1H63Jj+B+DEHHMQ6nNrWIpiEy4XT6Zo2FHo8wSby4ujxE+xC+G9wp5KlAQxnpiW3NjxO6N0NRwt/Evi88HuqJkaBsiChU45YFRUQ4ssMz6PTRmx0f3r7oWwdg2x+VYe6gewGBmhrSZ+CYh7szWd8XGZ1bkHs3PO/bJoLLkYXugS+pII3U3SHEDxSg==

2

U2FsdGVkX1/Oxch4IdGieQH7IfShNh73KLEDd36UhzMQ42084cwIoGKpsWU0GBGPtg8+Z3ONxs1f6kJufq/vnm2dFC6OYb0EktrRZwhzkyOZDatwnICp9trBVL1Xa1Ep6ZIxAONKhwESx7raSr+qaQv3eTbH263IY49x6aT1i06O2C48+ZIFN06/+K8+2JIB3qRu18qYJvxZ21dsy77VMz3XHgA0210bqp5/8BFbwJB4HcnLKKLNcssqA+CdMgi4IHEoK/dFEBqHjZuPVo11genM2tr89FwcsEMYGfnDc0tZy1O75JMMwVcXc3rugbRLiRehxUSqXrXc9jda0mjM9IDkmgBYIDw28Cp6jRuUf/I=

Sign Up For DomainTools Investigations’ Newsletter for the Latest Research

Want more from DomainTools Investigations? Be sure to sign up for our monthly newsletter to get the latest research from the team – available on LinkedIn or email.

Learn More
Research
Domain Registrars Powering Russian Disinformation: A Deep Dive into Tactics and Trends

In the digital battlefield of influence operations, domain registrations serve as the foundation for launching disinformation campaigns. Russian state-sponsored actors, such as APT28 (Fancy Bear), APT29 (Cozy Bear), and the Internet Research Agency (IRA), have long relied on strategic domain registrations to impersonate trusted entities, spread propaganda, and conduct cyber-enabled espionage.

Despite efforts to curb the abuse of domain registration services, Russian-aligned threat actors continue to exploit specific registrars, hosting providers, and domain obfuscation techniques to evade detection. This analysis explores historical data, cybersecurity reports, and real-world case studies to uncover the domain registrars favored by Russian disinformation operations and the tactics that make their campaigns so effective.

How Russian Disinformation Actors Use Domains

Disguising Disinformation with Fake News Websites

A core strategy of Russian influence operations is the creation of fake news portals that mimic legitimate media organizations. These sites publish pro-Kremlin narratives, fabricated stories, and distorted news articles, often in multiple languages to target diverse audiences.

Example:

  • A 2022 Microsoft report detailed how SEABORGIUM, a Russian state-sponsored group, registered domains mimicking major Western think tanks and media outlets, such as:
    • bloomberg-us[.]com (mimicking Bloomberg)
    • bbcnews[.]site (spoofing BBC News)
    • nato-int[.]org (targeting NATO)

Typosquatting and Homoglyph Attacks

To enhance credibility and fool unsuspecting users, Russian actors frequently engage in typosquatting (registering domains with minor spelling variations) and homoglyph attacks (substituting characters with lookalikes).

Example:

  • APT28 (Fancy Bear) used domains like:
    • dnc-email[.]org instead of dnc.org (2016 U.S. election hack)
    • o365-portal[.]net mimicking Microsoft’s login page

Bulletproof Hosting & Fast Flux Networks

Domain registrations alone are not enough—where a website is hosted matters just as much. Russian influence operators often leverage bulletproof hosting providers in Russia, Moldova, and the Netherlands that turn a blind eye to takedown requests.

Fast Flux techniques (where domain IPs frequently change) further complicate tracking efforts, making it difficult for security teams to take down malicious infrastructure.

Which Domain Registrars Do Russian Disinformation Actors Prefer?

Cyber threat intelligence reports from Mandiant, Recorded Future, Microsoft, Graphika, and Spamhaus reveal a pattern of Russian threat actors registering domains with registrars that offer low-cost, privacy-protected, and anonymous domain services.

Commonly Used Registrars

Registrar Why It's Used Examples of Use in Disinformation Ops
Namecheap Affordable, easy to register anonymously IRA-linked domains used in 2016 U.S. election meddling
Reg.ru (Russia) Domestic registrar, less likely to comply with Western takedowns Used in pro-Kremlin media campaigns
PublicDomainRegistry Bulk domain purchases allowed Used for bot networks spreading fake news
Tucows Lax oversight on domain abuse Hosted domains impersonating U.S. government agencies
Epik Historically associated with extremist content and disinformation Favored by fringe political disinformation campaigns

Case Study:

In 2022, security researchers uncovered a Russian disinformation network that registered over 100 fake media domains via Namecheap and Reg.ru, promoting anti-Ukraine narratives in Western countries.

Russian Disinformation Hosting & Infrastructures

Beyond registrars, Russian actors strategically select hosting providers that offer either complete anonymity or jurisdictional protection from Western law enforcement.

  • Bulletproof Hosting: These providers ignore abuse complaints and host malware, phishing sites, and fake news portals.
  • Cloudflare & Reverse Proxies: Russian threat actors often hide behind Cloudflare to mask their hosting locations.
  • Compromised Websites: Instead of registering new domains, Russian operations increasingly hijack legitimate websites to host disinformation.

Example:

  • The Secondary Infektion campaign (Graphika, 2020) used compromised WordPress sites across Europe to spread anti-NATO propaganda while avoiding detection.

Emerging Trends: How Russian Actors Are Evolving Their Tactics

As domain registration oversight improves, Russian actors are adapting their methods to maintain their influence.

Aging Domains for Credibility

Instead of launching new domains immediately, Russian disinformation operators are now registering domains months in advance to make them appear more legitimate before deploying them in active campaigns.

Greater Use of Third-Party Resellers

Rather than registering domains directly, Russian actors are purchasing through resellers that operate under major registrars but have weaker oversight policies.

Shift Toward Encrypted & Decentralized Infrastructure

There is growing evidence that Russian-aligned actors are exploring blockchain-based domain name services (e.g., .eth, .crypto) and peer-to-peer hosting to avoid centralized control.

Strategically Registered Domains for Disinformation Campaigns

The use of strategically registered domains is a cornerstone of Russian disinformation campaigns, and despite increased scrutiny, these operations remain highly adaptable. By exploiting privacy-friendly registrars, bulletproof hosting, and emerging technologies, Russian actors continue to manipulate public discourse and influence geopolitics.

As cyber defenders, journalists, and policymakers, it is crucial to stay ahead of these evolving tactics and disrupt their ability to weaponize domain infrastructure for disinformation.

Sign Up For DomainTools Investigations' Newsletter for the Latest Research

Want more from DomainTools Investigations? Be sure to sign up for our monthly newsletter to get the latest research from the team - available on LinkedIn or email.

Learn More
Research
Chinese Malware Delivery Domains Part II: Data Collection

This report dives deeper into activity relating to the previously reported cluster of Chinese Malware Delivery domains. Spoofed download websites of many common applications were observed collecting user information and delivering malware to Chinese speaking users.

Details

This report examines a second cluster of over 1100 domains suspected to have been registered by the same group between April 2024 to January 2025.

Cluster 1: The previously reported Chinese Malware Delivery domains appeared dedicated to malware delivery with minimal dynamic content or obfuscation employed. Primarily delivers Windows backdoors and info stealers. Minimal variability in HTML and JavaScript code.

Cluster 2: Suspected to be broadly focused on user data collection and selective malware delivery. Websites employ highly variable and obfuscated JavaScript files and multiple web analytic services. Purport to host binaries for Windows, macOS, iOS, and Android operating systems.

Spoofed Websites

Very similar to Cluster 1, Cluster 2 involves spoofs of many common applications from messenger apps, VPNs, cryptocurrency exchanges, gaming platforms, game emulators, online gambling, web browsers, and multimedia apps.

Below are screenshots of a sampling of the spoofed download websites over the past 60 days:

Domain Registration Details

The majority of the domains identified had common domain registration details:

  • Registrar: WebNIC Support
  • Server Type: Nginx, Cloudflare, Golfe2
  • Nameserver Domains: hndnsv1[.]com, hndnsv2[.]com
  • SSL Duration: 90 days

Emails qingqing7896[@]outlook[.]com
tuyang111888[@]gmail[.]com
yangtu111222[@]outlook[.]com
ck0937064862[@]gmail[.]com
qq752014[@]proton[.]me
yangtu666888[@]outlook[.]com
8tfmy1emr[@]mozmail[.]com
a8ddos[@]gmail[.]com
jtxr15[@]163[.]com
6888758[@]gmail[.]com
Registrant Contact Phone tel:+852[.]6675163
tel:+852[.]66751631
tel:+852[.]63825598
tel:+852[.]65820038
85263825598
tel:+852[.]85279504241
tel:+852[.]285451253
8526675163
Registrant Name wss dss
wangyiyi wangyiyi
caihua li
yi yi wang
wang yilu

The following heatmap shows the domain registration UTC timestamps for over 1000 domains from April 2024 to January 2025. The horizontal lines show the majority of the registrations occurred during the approximate working times 8 AM to 5 PM for China Time Zone and US East for comparison.

Domain registration times are not strong indicators of location as registrations can be done programmatically at any time. A heatmap of the registrations over time could be used to draw inferences on the normal operating times, volume and fluctuations of a threat group. One inference is that the actor commonly registers domains in bulk of 10 to 20 domains. Another is domain registrations continued steadily through recent US holidays of Thanksgiving, Christmas and New Years but made no new domain registrations from January 23 to February 8. The gap in domain registrations approximates to a week prior to and through Chinese New Year celebrations (January 29th - February 4th).

Based on a sampling of the 1200+ actor domains for domain registration costs, the cheapest registrations ranged from approximately $5 to $11 USD. Estimates based on these approximations suggest the actor may have spent over $6,000 in the past 10 months on domain registrations alone.

User Data Collection

Spoofed download websites were observed importing highly obfuscated JavaScript files. Their primary purpose appears to be to collect user data. Data is sent to one or more web analytic services. Primarily using Google Tag Manager (GTM), 51.LA and Baidu. A possible reason for using both a Chinese site analytics tracker and non-Chinese site analytic services is to improve data collection from users in and outside of China.

Typical data observed being collected:

Data collected include the following information about users in addition to setting cookies to potentially allow the tracking of users more long-term tracking across different websites.

  • IP addresses.
  • Browser type and version.
  • Operating system.
  • Screen resolution.
  • Referring website.
  • Pages visited and time spent on each page.
  • Geographic location (based on IP address).

Some websites were observed loading a js-sdk-recorder.min.js file and may attempt to screen record the browser session.

User browser data is collected and checks are performed to include looking for specific browser types and operating system.

The following are trackers extracted from the spoofed download sites and are suspected to be associated with the actor.


Google Tag Managers (GTM-)
GTM-5P954SP
GTM-MG73JRC
GTM-T9RSM2B
GTM-5XB9N2J
GTM-WX6RDCT
GTM-KPB2L23
GTM-PBZC932

Google Analytics (G-)
G-2517DCZEWG
G-5LJSE1G1G3
G-37ZJLQFQXW
G-BFW850DB5X

Google Analytics (UA-)

UA-18527314
Facebook 3440778589358687
2798670340360754
2074369089413155
Baidu 9219f302f4d003586fce1a5e683324f9
749a9b99a1c14a45712efed8c3b8fedd
cfce2b91900d6b26eacc4548cf269142
d4d1ee73c893371d6f711041bf64786f
3e8f2b2bdf2da00ce0564d6c6ef21b48
15a9e7243ee6e6441ab262ba4db61e8b
39f7c9431fdd7a3d6e06a177938de82a


SEO Poisoning and Traffic Generation

Creating thousands of websites and using SEO tactics could be aimed at increasing the site’s search ranking to appear higher in search results than legitimate sources. This can drive traffic to other malicious sites.

Fake Login Dashboards to Deliver Malware

The actor employs several websites themed as merchant backend management dashboards, payment services, crypto exchanges, email, and office applications. It is suspected that links to the fake login sites are distributed via phishing and similar means with the credentials shared to recipients. A mix of English and Chinese language use on the fake login websites and a common theme of merchant and payment backend management applications suggests the actor may be targeting English speaking individuals doing business in China.

Website Title: “Login | Upcube - Admin & Dashboard Template”

UPCUBE 商户后台管理 (“Merchant backend management”)

The sites were observed hard coding the credential validation checks in the HTML login forms such as the following example seen from malicious domain: “otpaycn[.]com”.

Upon Logging into the fake Merchant Backend Dashboard, the following index page is loaded. 

The only functional element is the Home Page at the top of the left panel. Clicking the Home Page loads an image in the center of the page that presents itself as a warning banner with a “Confirm” button. Clicking anywhere on the image initiates a download for a malicious dropper file that upon execution runs ValleyRAT on the system and downloads several modules from an Amazon S3 bucket providing additional functionality.

The image roughly translates to the following:

“VPN Usage Reminder Network connection failed, please use the dedicated network VPN It has been detected that your browser is missing the necessary VPN plug-in. Some functions cannot be used normally. Please update this function version first; if you choose to stop updating, you will not be able to use this function normally. What are the risks and how should I choose Confirm.”


Delivery Domain

otpaycn[.]com
Malware Download URL
https[:]//down[.]aydareklam[.]com/anacard.zip

Initial Download

7aa74fc5d5f1c356229fa83cd4330f8bfd1b640e09b897602382557fbeefd5ea anacard.zip
Unzips to 5f39c5fc10130916e3b67e617979eb22febccc274a88af7a43e21cc5311d3f20 anacard.exe
ValleyRAT dropped by anacard.exe
5cd549ca7b5a046afa1f9ddb679dbf04e8879307d2dd813c7d44d00525ab8638
Downloads https[:]//omnisentience[.]s3[.]ap-east-1[.]amazonaws[.]com/MSVCP140[.]dll
https[:]//omnisentience[.]s3[.]ap-east-1[.]amazonaws[.]com/xzc[.]exe
https[:]//omnisentience[.]s3[.]ap-east-1[.]amazonaws[.]com/vcruntime140_1[.]dll
https[:]//omnisentience[.]s3[.]ap-east-1[.]amazonaws[.]com/data[.]ini
https[:]//omnisentience[.]s3[.]ap-east-1[.]amazonaws[.]com/view[.]res
https[:]//omnisentience[.]s3[.]ap-east-1[.]amazonaws[.]com/VCRUNTIME140[.]dll
https[:]//omnisentience[.]s3[.]ap-east-1[.]amazonaws[.]com/libcef[.]dll
9b5957e7d9bf0863fc7247df9ea02deac6f1b1a22fc7b9d4dfd89f41f27a400e  data.ini
0003417d1ba6370aab194d2bab97e709bbf1d8efbf60d02a1c96117a2e7a7e3d  libcef.dll
99e3e25cda404283fbd96b25b7683a8d213e7954674adefa2279123a8d0701fd  MSVCP140.dll
6d3a6cde6fc4d3c79aabf785c04d2736a3e2fd9b0366c9b741f054a13ecd939e  vcruntime140_1.dll
a06c9ea4f815dac75d2c99684d433fbfc782010fae887837a03f085a29a217e8  VCRUNTIME140.dll
f63894af1b84fca6d2cb2732e0cf31d1523d6949edd4738c63663957d46dadae  view.res
7d14ba4da535892e469ca66c1f749bab553c2f9af04eb978d5200431a2f01435  xzc.exe


Malware

Notably, both clusters 1 and 2 were observed delivering identical Gh0stRAT and ValleyRAT binaries. Cluster 2 operates multiple varieties of spoofed website code, which often appear to utilize highly obfuscated JavaScript to collect user information and potentially selectively render functional malware delivery links. The majority of the websites were observed delivering 0-byte files, and less commonly copies of legitimate install files hosted locally on the site. A subset of the spoofed download sites were observed hosting identical Gh0stRat and ValleyRAT binaries as cluster 1 including “googleochrome[.]com” discussed in more depth later.

The 0-byte files are suspected to be placeholders, with real malware being delivered through obfuscated JavaScript dynamically loaded when certain user conditions are identified such as Geo IP location, language settings and browser type.

Earlier versions of the spoofed download sites appeared to typically host malware locally on the same spoofed website server. Later spoofed download sites began hosting files on other servers, commonly using other actor owned domains and often with subdomains “cnd.” or “down.”

More recent spoofed download sites continue to separate the spoofed websites from the hosted files by using Amazon’s CloudFront content delivery network such as the following: 

  • Spoofed download sites for Lets VPN: “letscavpn[.]com” & “letsekvpn[.]com”
  • Download URL: “https[:]//d2g2a3g6fn6aza.cloudfront[.]net/android/letsvpn-latest[.]apk”

Using CDNs such as CloudFront as a delivery network can obscure the true origin location of the malware and make detection and mitigation efforts more difficult. 

C2 Infrastructure

Identified multiple samples of suspected Gh0stRat backdoors being hosted from the spoofed download websites as having Command & Control (C2) to IP addresses. Multiple IP addresses shared the same server scan hash allowing a potential pivot to other IP addresses configured by the actor.

Malware delivery domain “googleochrome[.]com” spoofs as a Chrome browser download site and contains code to load content from a similarly named but different domain: “https[:]//down.googluchrome[.]com”

This initiates a file download for a file named “/Chrome.zip” with a SHA256 hash of “09efbe0c3e69c0f9a578bbbf0d475bd418497717921713779d1aa89dd2be35d6” 

Chrome.zip unzips a file named “Chrome.msi” with a SHA256 hash of “e39e44cb79c5b1918d8139cfbb6d2ada044dbe4b413e86504f10e902072743fd”

Chrome.msi contains a file named “payload”, 522863520bcc368631a2db5016a1af68f60ecb074ddf19c9e7bff9834bb05248

The payload file upon execution calls out to the following IP:

  • TCP 154.91.90[.]102:4433
  • TCP 154.91.90[.]102:10443

At the time of observed use, the IP hosted a WinRM service with a Shodan.io hash of “%3A897366806”. 145 IPs shared this hash and nearly all are under Tcloudnet, Inc organization. 

Triaging the IPs identified several have a recent history of malicious files communicating with them from similar variants.

154[.]82[.]85[.]79
206[.]238[.]115[.]153
154[.]82[.]85[.]14
156[.]251[.]24[.]167
156[.]248[.]77[.]177
206[.]238[.]115[.]38
154[.]82[.]92[.]231
156[.]251[.]18[.]26
206[.]238[.]221[.]10
206[.]238[.]115[.]132
156[.]251[.]25[.]187
206[.]238[.]123[.]166
154[.]91[.]64[.]50
206[.]238[.]198[.]133
154[.]91[.]64[.]75
206[.]238[.]42[.]223
206[.]238[.]70[.]202
206[.]238[.]115[.]203
154[.]82[.]67[.]135

Conclusion

A crucial aspect of this investigation lies in recognizing the broader implications of the observed tactics. History has repeatedly demonstrated that techniques initially deployed against one demographic or vertical are often adapted and repurposed to target others. While this campaign appears to currently focus on Chinese-speaking users, the sophisticated methods employed—including obfuscated JavaScript, strategic use of analytics services, and evolving infrastructure for malware delivery and data collection—represent a readily transferable playbook. Therefore, diligent monitoring and analysis of these tactics are not merely relevant to the current situation.

By proactively studying and understanding these techniques now, the cybersecurity community can better prepare for similar threats that may emerge, targeting different demographics and potentially posing a direct risk to a wider range of users in the future. This proactive approach is essential for developing effective defenses and mitigating the impact of future, related campaigns.

IOCs

Domains
letstxvpn[.]com
letsthvpn[.]com
letstvvpn[.]com
letstevpn[.]com
letstavpn[.]com
letstzvpn[.]com
letstnvpn[.]com
letstdvpn[.]com
letstuvpn[.]com
letstkvpn[.]com
otpaycn[.]com
okpaykol[.]com
todeskzsada[.]top
letscavpn[.]com
letsczvpn[.]com
letscnvpn[.]com
letscuvpn[.]com
letscxvpn[.]com
letscsvpn[.]com
letsckvpn[.]com
letschvpn[.]com
letscevpn[.]com
letscovpn[.]com
lestscvpn[.]com
lestsevpn[.]com
lestskvpn[.]com
lestsvvpn[.]com
lestsovpn[.]com
lestsxvpn[.]com
lestsuvpn[.]com
lestszvpn[.]com
lestsnvpn[.]com
lestsavpn[.]com
googleechrome[.]com
quickqzx[.]com
quickqzs[.]com
quickqzc[.]com
quickqzn[.]com
quickqza[.]com
quickqzk[.]com
quickqzv[.]com
quickqzo[.]com
quickqzu[.]com
quickqze[.]com
googlerchrome[.]com
googlecchrome[.]com
googleschrome[.]com
googlevchrome[.]com
googlezchrome[.]com
googlenchrome[.]com
googleachrome[.]com
googletchrome[.]com
googlexchrome[.]com
googleofanyi[.]com
googleochrome[.]com
letsrsvpn[.]com
letsravpn[.]com
letsrevpn[.]com
letsrnvpn[.]com
letsrzvpn[.]com
letsrxvpn[.]com
letsrvvpn[.]com
letsrkvpn[.]com
letsruvpn[.]com
letsrovpn[.]com
letselvpn[.]com
letsebvpn[.]com
letsevvpn[.]com
letsepvpn[.]com
letsenvpn[.]com
letsehvpn[.]com
letseovpn[.]com
letseuvpn[.]com
letsetvpn[.]com
letsekvpn[.]com
letskkvpn[.]com
quickqcs[.]com
quickqcx[.]com
quickqcz[.]com
letskrvpn[.]com
letskwvpn[.]com
letsksvpn[.]com
letskxvpn[.]com
letskpvpn[.]com
letskzvpn[.]com
letskivpn[.]com
letskuvpn[.]com
letsknvpn[.]com
letskvvpn[.]com
letskovpn[.]com
clashxh[.]com
clasheh[.]com
clashvh[.]com
letezvpn[.]com
letevvpn[.]com
letexvpn[.]com
googlofanyi[.]com
letescvpn[.]com
clashuh[.]com
letecvpn[.]com
clashch[.]com
googluchrome[.]com
googlochrome[.]com
winrarzip[.]com
ldplayerv[.]com
todesksc[.]com
wpsofficerx[.]com
wpsofficera[.]com
wpsofficers[.]com
wpsofficere[.]com
wpsofficerc[.]com
wpsofficeru[.]com
wpsofficerz[.]com
wpsofficerv[.]com
wpsofficero[.]com
wpsofficern[.]com
letsecvpn[.]com
letsexvpn[.]com
letsesvpn[.]com
letseavpn[.]com
letsezvpn[.]com
letsaevpn[.]com
letsacvpn[.]com
letsazvpn[.]com
letsavvpn[.]com
letsaxvpn[.]com
xhjianvpns[.]com
xhjianvpnx[.]com
xhjianvpnz[.]com
kuaimiaospn[.]com
kuaimiaoapn[.]com
kuaimiaoxpn[.]com
kuaimiaocpn[.]com
kuaimiaozpn[.]com
xhjianzpn[.]com
clashxa[.]com
xhjiancpn[.]com
clashxc[.]com
kuaichengz[.]com
kuaichengx[.]com
clashsx[.]com
linecu[.]com
linecf[.]com
clashsc[.]com
linecz[.]com
clashsz[.]com
wpsoffica[.]com
wpsofficc[.]com
wpsofficx[.]com
wpsoffico[.]com
wpsofficu[.]com
wpsofficv[.]com
wpsofficn[.]com
wpsofficb[.]com
wpsofficz[.]com
wpsofficw[.]com
ldplayers[.]com
winrarr[.]com
todesksn[.]com
xhjianvqn[.]com
xhjianvpnc[.]com
todeskzx[.]xyz
xhjianzvpn[.]com
xhjiansvpn[.]com
kuaichencx[.]com
kuaichencz[.]com
kuaichencs[.]com
xhjiannvpn[.]com
xhjianvnpn[.]com
xhjianavpn[.]com
xhjianevpn[.]com
xhjianxvpn[.]com
lestxvpn[.]com
lestvnpn[.]com
lestvwpn[.]com
lestnvpn[.]com
lesntvpn[.]com
lesetvpn[.]com
lestovpn[.]com
lesatvpn[.]com
lesstvpn[.]com
lestkvpn[.]com
xhjevpn[.]com
xhjvepn[.]com
wpsaoffice[.]com
wpsxoffice[.]com
wpscoffice[.]com
wpsooffice[.]com
wpsboffice[.]com
wpswoffice[.]com
wpsvoffice[.]com
wpsuoffice[.]com
wpsnoffice[.]com
wpszoffice[.]com
fallsearth[.]com
klimesh[.]com
rolandca[.]com
o-keil[.]com
yellowfiles[.]com
qmzdd[.]com
clashcx[.]com
clashcu[.]com
clashcv[.]com
cn-kuaifan[.]co
telegramxk[.]com
telegramxv[.]com
telegramxc[.]com
telegramxn[.]com
yiiwaiwai[.]com
telegram-zh[.]cn
xhjianvvpn[.]com
clashru[.]com
quicqkvv[.]com
quicqkvc[.]com
quicqkvn[.]com
quicqkva[.]com
quicqkve[.]com
meiqialx[.]com
meiqialz[.]com
meiqialc[.]com
meiqiale[.]com
meiqiala[.]com
nxhszx[.]com
clashxv[.]com
clashxz[.]com
clashxn[.]com
helloworldra[.]com
letssvbn[.]com
meiqiarrc[.]com
helloworldrc[.]com
letssvrn[.]com
meiqiarrv[.]com
clashvn[.]com
letssvqn[.]com
clashvx[.]com
meiqiarra[.]com
helloworldre[.]com
meiqiarrx[.]com
meiqiarre[.]com
tpidesign[.]com
meiqiacs[.]com
meiqiacx[.]com
meiqiacv[.]com
meiqiaci[.]com
meiqiacc[.]com
meiqiaco[.]com
meiqiaca[.]com
meiqiacr[.]com
meiqiace[.]com
meiqiacu[.]com
sougousruf[.]com
sougousrfo[.]com
sougoushrf[.]com
sougousrfa[.]com
sougousrfx[.]com
sougousrfn[.]com
sougousrfe[.]com
sougousrfu[.]com
sougousrfz[.]com
sougousrfc[.]com
360browseeu[.]com
360browseeo[.]com
360browseen[.]com
360browseeb[.]com
360browseev[.]com
360browseea[.]com
360browseet[.]com
360browseer[.]com
360browseex[.]com
360browseei[.]com
linebx[.]com
linebh[.]com
linebbv[.]com
linebbh[.]com
linebn[.]com
linebbc[.]com
linebu[.]com
linebbe[.]com
linebbr[.]com
linebbx[.]com
potatolen[.]com
potatoler[.]com
potatolea[.]com
potatolex[.]com
potatolec[.]com
potatoleu[.]com
potatoleo[.]com
potatoleb[.]com
potatolek[.]com
potatolez[.]com
letsppnu[.]com
letsppnw[.]com
letsppna[.]com
letsppnh[.]com
letsppni[.]com
letsppnc[.]com
letsppnb[.]com
letsppne[.]com
letsppnr[.]com
letsppnk[.]com
kuaifanrg[.]com
kuaifanga[.]com
kuaifange[.]com
kuaifangn[.]com
kuaifanne[.]com
clashh88[.]com
clashvvh[.]com
clashhvv[.]com
xhjianapn[.]com
xhjianppn[.]com
xhjianvvv[.]com
xhjianvvn[.]com
xhjiangvpn[.]com
potatua[.]com
potatun[.]com
potatue[.]com
potatuc[.]com
potatuo[.]com
clashcnm[.]com
clashcdn[.]com
clashchn[.]com
clashcnn[.]com
clashccn[.]com
clashrrn[.]com
clashrrv[.]com
clashrrs[.]com
clashhes[.]com
clashheu[.]com
clashhea[.]com
clashhew[.]com
clashhee[.]com
clashha[.]com
clashhr[.]com
clashhu[.]com
clashhe[.]com
clashho[.]com
letsvpnmna[.]com
letsvpnmnc[.]com
letsvpnmnb[.]com
letsvpnmnd[.]com
letsvpnmng[.]com
letsvpnmne[.]com
letsvpnmnf[.]com
letsvpnmnh[.]com
letsvpnmno[.]com
letsvpnmnk[.]com
letskbvpn[.]com
letskcvpn[.]com
letskavpn[.]com
letskhvpn[.]com
letskfvpn[.]com
letskkpn[.]com
letskgvpn[.]com
letskdvpn[.]com
letskevpn[.]com
letsktvpn[.]com
imtekkon[.]com
artklick[.]com
gpm-sprinklers[.]com
ratuiklan[.]com
frkls[.]com
davidtickle[.]com
forkling[.]com
backlinkskopen[.]com
kleinoaktrack[.]com
klinik-hp[.]com
lestvvmn[.]com
lestvvmnm[.]com
lestvvnm[.]com
lestvvnnm[.]com
lestvvnmm[.]com
letsvvvvpn[.]com
letswvvvpn[.]com
kuaicheum[.]com
kuaicheim[.]com
kuaichecm[.]com
kuaicheam[.]com
lestvvkpn[.]com
kuaicheem[.]com
lestvvwpn[.]com
lestvvopn[.]com
lestvvupn[.]com
lestvvspn[.]com
aydareklam[.]com
meiqiakefu[.]net
clashrra[.]com
clasheea[.]com
clasheec[.]com
clashees[.]com
clashrrc[.]com
clashrre[.]com
clashttb[.]com
clashtta[.]com
clashttc[.]com
chrome65[.]com
tor-browser[.]cn
tor-project[.]cn
lizengzhi[.]com
kuailianvpnxiazai[.]com
quickqqf[.]com
quickqqi[.]com
quickqqc[.]com
quickqqa[.]com
quickqqb[.]com
quickqqe[.]com
quickqqd[.]com
quickqqj[.]com
quickqqg[.]com
quickqqh[.]com
teleggrammm[.]com
telgeraam[.]com
telgerram[.]com
telgegamm[.]com
telgeranm[.]com
lestvvdpn[.]com
lestvvbpn[.]com
lestvvfpn[.]com
lestvvipn[.]com
lestvvapn[.]com
lestvvcpn[.]com
lestvvgpn[.]com
lestvvepn[.]com
lestvvhpn[.]com
lestvvjpn[.]com
zuqiujingcai[.]cn
teleggaream[.]com
quiqcke[.]com
quiqckc[.]com
quiqcka[.]com
hdktqj[.]cn
hdltdn[.]cn
zh-electrum[.]cn
hfgtpk[.]cn
hlrtfh[.]cn
torbrowser[.]cn
weidaoyou[.]com
title9guy[.]com
zhasang[.]com
dongchuo[.]com
cnmoldmaker[.]com
sddiankeshipin[.]com
clashesm[.]com
clashesn[.]com
clashesd[.]com
quicqker[.]com
quicqkor[.]com
quicqkir[.]com
xiaojiedai[.]com
buylevitrawww[.]com
torproject[.]cn
travel-reviews[.]com
laserdistance[.]com
telegramtcn[.]com
shangpingou[.]com
naxjx[.]com
51lingsheng[.]com
zglian[.]com
tiaojuan[.]com
fywjfang[.]com
ajktzx[.]com
qiasan[.]com
ruihejia[.]com
scyadina[.]com
threadsfind[.]com
yoondao[.]com
yooadao[.]com
youodao[.]com
yaoodao[.]com
youadao[.]com
ggvxlqxk[.]com
rgrvemni[.]com
ruqshjpb[.]com
agydlevy[.]com
urmfirxr[.]com
akozjqjj[.]com
rtoroyua[.]com
deknfmtp[.]com
nfbfeyab[.]com
bbctgkor[.]com
wckzzcln[.]com
vnfmuydn[.]com
xnlnvsnm[.]com
jtscvdnh[.]com
tesrjfqi[.]com
lkcbugrh[.]com
wjywyfht[.]com
vtgeaqvs[.]com
nugepfia[.]com
izvfarqf[.]com
kuaichenn[.]com
kuaichenng[.]com
kuaichemn[.]com
kuaichemm[.]com
kuaichenm[.]com
letsvuvpn[.]com
letsvvvpm[.]com
letsuuvpn[.]com
letsuvvpn[.]com
letsvvvvn[.]com
letszxcvpn[.]com
letsvwvpn[.]com
letsvvvnn[.]com
letsvvvpp[.]com
letsvvvpn[.]com
kuaivvnp[.]com
kuaivnnn[.]com
kuaivppp[.]com
kuaivppnn[.]com
kuaivppn[.]com
kuaivvvvn[.]com
kuaivvnnn[.]com
kuaivwvpn[.]com
kuaivvvpn[.]com
kuaivvvnn[.]com
vpn6[.]cn
whasapp[.]cn
saphagonapps[.]com
letsboppn[.]com
xhj-vpn[.]cn
oy311[.]cn
calshrrh[.]com
calshiiuh[.]com
calshunh[.]com
calshooih[.]com
calshuuh[.]com
calshdhh[.]com
calshhhh[.]com
xhjianvpn[.]com
calshrhh[.]com
xhjvvnpn[.]com
xhjivnvpn[.]com
xhjvvvpn[.]com
kuaicechen[.]com
xhjvwvpn[.]com
clashrsh[.]com
clashesh[.]com
kuaicachen[.]com
klysensor[.]com
sallypickles[.]com
seoiklan[.]com
taklogo[.]com
cbtinbrooklyn[.]com
beklegeliyorum[.]com
chacaraklabin[.]com
reklamagoogle[.]com
michaelklapper[.]com
tahtabisiklet[.]com
web-chrome[.]cn
telgegrame[.]com
quickloans4u[.]com
nepalklubben[.]com
shopfigbrooklyn[.]com
sdmkloire[.]com
nklandscaping[.]com
rocketbacklink[.]com
yesildagnakliyat[.]com
klubdj[.]com
weeklygamejam[.]com
emilyklinepianostudio[.]com
telegrgerm[.]com
letsvvpsv[.]com
telegrmerm[.]com
telegramrm[.]com
telegrxerm[.]com
telegrzerm[.]com
letsvvvsp[.]com
letsvppsn[.]com
letsvppsv[.]com
letsgotrain[.]com
telegroeem[.]com
telegroerm[.]com
telegroetm[.]com
telegroeum[.]com
telegroeom[.]com
telegroenm[.]com
oeokx[.]cn
telegramo[.]cn
telegraaem[.]com
telegraeam[.]com
telegracem[.]com
telegraerm[.]com
telegraenm[.]com
goolgechorme[.]com
gate-zh[.]cn
zh-gateio[.]cn
shdlukj[.]cn
kuaicchen[.]com
kaichenm[.]com
kuaichem[.]com
clashhn[.]com
clashsh[.]com
clsashh[.]com
baiijing[.]com
baijjing[.]com
baijingm[.]com
hellowold95[.]com
hellowold99[.]com
letsvvmp[.]com
letsnmpn[.]com
letsevvmp[.]com
letsvvppm[.]com
letseppn[.]com
letsppnn[.]com
levvvnnp[.]com
lsteppnn[.]com
letsvvvn[.]com
letspppn[.]com
letsvbnn[.]com
letspnvv[.]com
letsppnm[.]com
lesvvvpn[.]com
letsvppm[.]com
lestesvpn[.]com
letswpm[.]com
lesttvpn[.]com
lestepm[.]com
letsvvnn[.]com
zhchrome[.]cn
chromem[.]cn
chromecn[.]cn
letsviipn[.]com
reefhoteleilat[.]com
listgdp[.]com
saklimdasin[.]com
linkleech[.]net
kristalklaket[.]com
huikuaiche[.]com
mgintech[.]com
deeplyu[.]com
deeplqw[.]com
deeplwe[.]com
deeplty[.]com
deeplrt[.]com
deepseasecurity[.]com
mdeeb[.]com
deepdivedivingcenter[.]com
hellowold888[.]com
hellowold999[.]com
hellowold555[.]com
hellowold666[.]com
michelletuckerinternational[.]com
hellowold222[.]com
hekourenjia[.]com
valueshells[.]com
hellhathno[.]com
revsmarttech[.]com
deepwaterworship[.]com
hellarise[.]com
deepbass[.]net
hbklnb[.]com
backlinkmate[.]com
laurenmerkley[.]com
electrologyoklahoma[.]com
iklanutama[.]com
3klangrecords[.]com
tickletickletickle[.]com
omaha4g[.]com
pendikliler[.]com
healthbiweekly[.]com
swapbuckler[.]com
savporno[.]com
klinespeak[.]com
sidhivpharma[.]com
mgssys[.]com
52diaocha[.]com
telgearam[.]com
wpscee[.]com
yoodaofy[.]com
wahapps[.]com
wahastapp[.]com
okwallet[.]cn
sh-chrome[.]com
jordanwalker[.]net
silkypearl[.]com
fmnorfolk[.]com
volkcaravellethailand[.]com
telegasram[.]com
telegxzram[.]com
telegxcram[.]com
telegvcram[.]com
quiacqk[.]com
telegzxram[.]com
clashnn[.]com
quisckq[.]com
quixcqk[.]com
clashcs[.]com
pickledproductions[.]com
karyaiklan[.]com
exklusive-artikel[.]com
attacklive[.]com
catherinekluge[.]com
klipspringerhouse[.]com
davessprinklerrepair[.]com
hoteltaipa[.]com
nemalababaklopoty[.]com
falkenbergsrasfjaderfaklubb[.]com
feixiahao[.]com
aiconzh[.]com
damaiwang08[.]cn
ssrsvpn[.]com
execvpn[.]net
evevpn[.]com
letsmmvpn[.]com
quiqqkc[.]com
chromegglcn[.]com
quiqqck[.]com
quiccqk[.]com
telggearm[.]com
quikkcq[.]com
tellgegarm[.]com
quicqkq[.]com
ladenvpn[.]com
quikkqc[.]com
xhjvvpn[.]com
chromeglcn[.]com
telgegearm[.]com
chromegcn[.]com
signnnal[.]com
quiicqk[.]com
quiackq[.]com
skypeexe[.]com
telggearam[.]com
signnaal[.]com
signnaall[.]com
chromegcnh[.]com
quiecqk[.]com
teelgearm[.]com
chromeggch[.]com
skypenc[.]com
tellgeram[.]com
tellggearm[.]com
quiscqk[.]com
quiqcqk[.]com
guanfangkuailian[.]org
hfdthw[.]cn
hgltmn[.]cn
hscwlr[.]cn
dibzls[.]cn
zh-tradingview[.]cn
hlxtts[.]cn
dusku[.]online
zh-google[.]cn
ydao24[.]pro
yiwaiwai4[.]pro
guanfangkuailian[.]com
eyy13585[.]vip
tyuj234[.]xyz
imtiokon[.]com
imteikon[.]com
imtoikon[.]com
helloworld688[.]com
goagchrome[.]com
eyy8520[.]com
yooodao[.]com
okpaykol[.]com
kuailianletsvpn[.]org
imteeken[.]com
letspovpn[.]com
eyy2550[.]com
eyy2555[.]com
letsnmvpn[.]com
letssdvpn[.]com
letsvbvpn[.]com
letshjvpn[.]com
letsdfvpn[.]com
letscvvpn[.]com
letsxcvpn[.]com
letshkvpn[.]com
letsbmvpn[.]com
letsfgvpn[.]com
letsghvpn[.]com
letsahvpn[.]com
kuailian14[.]com
kuailian18[.]com
kuailian15[.]com
kuailian12[.]com
kuailian13[.]com
letsqwvpn[.]com
letstyvpn[.]com
kuailian17[.]com
kuailian16[.]com
letsrtvpn[.]com
letsuivpn[.]com
letswevpn[.]com
lets333vpn[.]com
kuailianvpn333[.]com
lets222vpn[.]com
lets999vpn[.]com
lets444vpn[.]com
lets666vpn[.]com
lets888vpn[.]com
lets777vpn[.]com
lets555vpn[.]com
kuailianvpn444[.]com
lets111vpn[.]com
kuailianvpn777[.]com
kuailianvpn1111[.]com
lets000vpn[.]com
kuailianvpn888[.]com
kuailianvpn2222[.]com
kuailianvpn555[.]com
kuailianvpn999[.]com
kuailianvpn666[.]com
kuailianvpn000[.]com
letsvpnop[.]com
letsvpner[.]com
letsvpnty[.]com
letsvpnio[.]com
letsvpnrt[.]com
letsvpnwwe[.]com
letsvpnqw[.]com
letsvpnyu[.]com
letsvpnui[.]com
letsvpnpa[.]com
letsvpn[.]lat
kuailian003[.]com
kuailian006[.]com
kuailian002[.]com
kuai04vpn[.]com
lets01vpn[.]com
kuailian004[.]com
lets02vpn[.]com
kuailian005[.]com
lets03vpn[.]com
lets04vpn[.]com
lets05vpn[.]com
kuai02vpn[.]com
kuai03vpn[.]com
kuai01vpn[.]com
kuai05vpn[.]com
irawc[.]cn
eyyej[.]cn
xrvdj[.]cn
vqxgs[.]cn
kuai3lian[.]com
kuai2lian[.]com
kuai1lian[.]com
kuai4lian[.]com
kuai5lian[.]com
lets11vpn[.]com
lets22vpn[.]com
lets33vpn[.]com
lets55vpn[.]com
lets44vpn[.]com
uxepr[.]cn
bzcrh[.]cn
iehpj[.]cn
zirhs[.]cn
pehby[.]cn
ibwtr[.]cn
eiqip[.]cn
ojply[.]cn
vglzd[.]cn
zuwlf[.]cn
vymip[.]cn
ozunv[.]cn
euaij[.]cn
azedg[.]cn
jqizv[.]cn
jvspq[.]cn
cibnj[.]cn
zfdfo[.]cn
kuaivpn777[.]com
kuaivpn666[.]com
kuaivpn999[.]com
letsvpn222[.]com
kuailian777[.]com
kuaivpn1[.]com
kuailian88[.]com
kuailian999[.]com
letsvpn444[.]com
letsvpn333[.]com
letsvpn555[.]com
kuailian668[.]com
kuaivpn555[.]com
kuaivpn4[.]com
letsvpn111[.]com
kuaivpn2[.]com
kuaivpn3[.]com
kuaivpn5[.]com
kuaivpn888[.]com
kuailian555[.]com
vkksc[.]cn
fliia[.]cn
fpewl[.]cn
kglbt[.]cn
sunraes[.]top
dfrub[.]cn
eatcg[.]cn
efcbh[.]cn
yxdxu[.]cn
unbcp[.]cn
vqbda[.]cn
nvlow[.]cn
steih[.]cn
azwmp[.]cn
letsppvv[.]com
letsnnn[.]com
letsddd[.]com
kuailian55[.]com
letsvvvv[.]com
kuailian44[.]com
letsllp[.]com
kuailian66[.]com
kuailian33[.]com
kuailian11[.]com
letsddvpn[.]com
letsggvpn[.]com
letsffvpn[.]com
letsiivpn[.]com
interparklogistics[.]com
66fj5[.]xyz
93va5[.]xyz
88nf1[.]xyz
44jw2[.]xyz
62ht6[.]xyz
18js8[.]xyz
letsvpncn[.]com
eyy258[.]com
chromegooch[.]com
fanyiyodao[.]com
telgearm[.]com
gmailgoole[.]com
wpssss[.]com
letsvpnnv[.]com
finalshell[.]cn
wpseee[.]com
letsrrvpn[.]com
letsllvpn[.]com
letshhvpn[.]com
qiuckqc[.]com
qiucqk[.]com
qiuqck[.]com
aisii4[.]com
todssk[.]com
todseks[.]com
todkes[.]com
imtuken[.]com
24gx6[.]xyz
44mu8[.]xyz
eyydowgm[.]com
eyydowm[.]com
eyykowm[.]com
eyydowz[.]com
eyydowr[.]top
xingcaiyinlong[.]com
zghjxh168[.]com
faribu[.]com
msklb[.]com
boatdeepcreeklake[.]com
keyklaw[.]com
kloewoman[.]com
shmingtao[.]com
fanshu8[.]net
zgfzzc[.]net
yuwtrde[.]buzz
eyydowom[.]xyz
eyydowi[.]xyz
zahjeaw[.]top
fazmake[.]top
nzaraw[.]top
znmakaf[.]top
makwtga[.]top
kznarfs[.]top
abwradk[.]top
zakermur[.]top
nahrewa[.]top
shazamr[.]top
nkawzae[.]top
letservpn[.]com
letsstvpn[.]com
letsbnvpn[.]com
letsvmvpn[.]com
letwwvpn[.]com
letstsvpn[.]com
letsvnvpn[.]com
acu97[.]cn
letszxvpn[.]com
awnliua[.]top
letsasvpn[.]com
hbgad[.]cn
letsssvpn[.]com
letsccvpn[.]com
letsaavpn[.]com
qdpmo[.]cn
udnucloud[.]com
letsbbvpn[.]com
letseevpn[.]com
letsttvpn[.]com
letsvpnpm[.]com
letsvpnvn[.]com
tokonim[.]com
fkaoq[.]top
fkooq[.]top
fkwoq[.]top
telegrm[.]cn
eyy255[.]com
eyy205[.]com
chromeggad[.]com
letsgvp[.]com
letsvvvnp[.]com
letsppvpn[.]com
kuailianwpn[.]com
letesvvpn[.]com
kuailianppvn[.]com
letsnnpvn[.]com
kuaivnp[.]com
letppvpn[.]com
letyyvpn[.]com
letfvvpn[.]com
letovvpn[.]com
letszvvpn[.]com
letxvvpn[.]com
letlvvpn[.]com
chromegoggl[.]com
0ray[.]cn
imtokonm[.]com
imtokom[.]com
letsvpnb[.]com
letsvpna[.]com
teiegrm[.]cn
buleyy[.]buzz
sineyy[.]buzz
mitucka[.]com
cheapchom[.]xyz
letsvpn[.]cn
letsvpne[.]com
lsetvvpn[.]com
ccbb122[.]com
kuaifanguanfang[.]org
kuaifanguanfang[.]com
kuaifangf[.]com
kuaifanguanwang[.]com
afdesede[.]xyz
hoipq[.]cn
cgdqg[.]cn
oevcb[.]cn
yukkm[.]cn
fbsen[.]cn
golchrome[.]com
vpupi[.]cn
utfpi[.]cn
zxywe[.]cn
tfewr[.]cn
wfekj[.]cn
qiecre[.]live
qvokj[.]cn
wuskj[.]cn
meiqianen[.]buzz
zyzmg[.]cn
meiqiapp[.]icu
kwjee[.]cn
ghdmxti[.]cn
dldvjf[.]cn
affeyy[.]buzz
nsebuy[.]cn
meicia[.]com
lstenvp[.]com
lsetpvn[.]com
lesttpn[.]com
lestgvpn[.]com
dianbaotg[.]store
letesvnp[.]com
speedsvpn[.]com
thzxmr[.]cn
letrpvn[.]com
lestnvp[.]com
lestpvn[.]com
todsek[.]com
todesks[.]com
letsgpn[.]com
marmeiq[.]xyz
qiemeato[.]com
meitoqia[.]app
winnrayr[.]top
yyaa9[.]buzz
yyaa7[.]buzz
letmvpn[.]com
yiwaiwaicselw[.]icu
meiqianc[.]buzz
kuailiao[.]org
yourman[.]mom
iefbp[.]cn
eyynly[.]xyz
meiqia[.]store
letspvn[.]com
lestcpn[.]com
jhtbj[.]mom
ghdhj[.]mom
hredhb[.]mom
sddjkg[.]mom
fhrtdh[.]mom
dgrghn[.]mom
shabdus[.]com
gjfkjgri[.]mom
lettsvpn[.]com
starlinkvpn[.]cn
miqialt[.]com
nejiwks[.]com
levtspn[.]com
womil[.]cn
letlvpn[.]com
kuailian[.]tv
mtrangqia[.]com
meiiqa[.]com
fkgds[.]com
uuu78[.]cn
xbshangcheng[.]vip
chgools[.]xyz
grhd[.]xyz
yww92[.]buzz
letsppn[.]com
meiqal[.]com
mieiarqia[.]com
weimqaia[.]xyz
kuailianguanfang[.]org
latsvpn[.]com
letovpn[.]com
meimq[.]cyou
letrvpn[.]com
letgvpn[.]com
vpn234[.]com
kuikell[.]com
letxvpn[.]com
letavpn[.]com
eyy252[.]com
kuai10[.]com
meiqea[.]com
kuailiat[.]xyz
letzvpn[.]com
fastsvpn[.]com
checkaso09[.]com
checkaso04[.]com
checkaso01[.]com
checkaso6[.]com
letshvpn[.]com
eyye[.]club
huwnag[.]com
eeeym[.]com
web3-corgi[.]world
meiqla[.]com
shanjiabao[.]top
meiqai[.]com
eyy66[.]com
uduncloud[.]icu
hellowold88[.]com
vip5005[.]com
okxym[.]com
letspn[.]com
lettvpn[.]com
whsatsapp[.]top
whasasapp[.]top
dyks68[.]com
letsxvpn[.]com
meiqiaapp[.]com
wahtsaipp[.]com
whasitsapp[.]com
siengl[.]com
kuailian[.]website
eyyche[.]buzz
letvspn[.]com
letsmvpn[.]com
whats-sapp[.]com
getmonero[.]net[.]cn
letsvpn[.]win
xhonghua[.]cn
xiaohongh[.]com
hppayplop[.]com
hppayolap[.]com
www[.]upc-ube[.]com
upcube[.]cc

IOCs on GitHub

If the community has any additional input, please let us know.

https://github.com/DomainTools/SecuritySnacks/blob/main/2025/CNMalwareDelivery-Pt2

Learn More
Research
Account Trafficking Websites in December 2024

This report examines the illicit online trade of aged and verified accounts for platforms like social media, email, and Google Ads. These accounts, often obtained through hacking or phishing, are valuable for bypassing security and leveraging established trust. They fuel a range of activities, from grey-area marketing tactics to serious crimes like fraud and disinformation, highlighting a significant security risk and a growing challenge in the digital landscape.

Details

In December, 2024, over 100 newly registered domains were observed hosting websites alleging to sell pre-verified and aged accounts. These additions to the burgeoning illicit online market for aged and verified accounts alleged to sell accounts across a range of platforms including social media, email providers, cloud services, and advertising networks like Google Ads. These underground marketplaces cater to a demand for pre-existing, reputable digital identities, often acquired through illicit means such as data breaches, phishing scams, or account takeovers.

Buyers are drawn to these accounts for a variety of reasons, primarily the ability to bypass security measures and leverage the established trust associated with older or verified profiles. While some may employ these accounts for seemingly innocuous purposes like gaining an edge in social media marketing or accessing region-locked content, a significant portion fuels malicious activities, including spam campaigns, fraud, disinformation dissemination, and even more nefarious operations. 

This investigation will delve into recently configured domains and websites in the ecosystem of these account markets, examining the types of accounts traded and techniques employed to drive traffic to their sites.

Cloud and BHW Accounts

Based on domain registration overlaps, the following 3 domains were likely created by the same actor. The websites advertise the sale of cloud accounts from top providers as well as ads accounts, Apple developer accounts, Google Voice accounts, and payment gateway accounts such as Amazon Pay and Cash App accounts. The site alleges the accounts are pre-verified and customers are granted full access to the accounts.

  • IP ISP: Hostinger International Limited
  • IP Country: US
  • Website Title contains all: buy, account

topcloudacc[.]com
acctrusted[.]com
buybhwaccounts[.]xyz

Domain `topcloudacc[.]com` purports to sell AWS, Cloud, Ads, and other accounts.

Website Title: “Buy AWS Account | Best 32-vCPU & Credit Account - 2025”

Domain `acctrusted[.]com` purports to sell cloud accounts for AWS, Azure, Vultr, DigitalOcean and others for sale. 

Website Title: “Buy AWS Accounts | Best Vcpu & Credit Account For Sale 2024”

Domain `buybhwaccounts[.]xyz` purports to sell AWS, Google Cloud, Oracle, Digital Ocean, Ads Accounts, and BHW accounts.

Website Title: “Buy BHW Accounts - BHW Accounts For Sale - buybhwaccounts[.]xyz”

Domain `isp-rebellion[.]com` purports to sell Apple 2FA Accounts.

Website Title: “Apple 2FA Accounts for Sale”

Social Media Accounts for Sale

Domain `regularpva[.]com` purports to sell a variety of social media, email and dating accounts such as Facebook, Instagram, Gmail, Outlook, Twitter, and Yahoo. 

Website Title: “Buy Social Media Accounts - Social Media Pages for Sale - SecurePVA”

Domain `shiftxchange[.]biz` purports to be a marketplace for buying and selling social media accounts among other alleged service offerings.

Website Title: “Social Media Accounts for Sale”

Domains twitterxarena[.]com and redditarena[.]com both redirect to discordarena[.]com and purport to sell premium aged social media accounts including Discord and Reddit.

Website Title: “Premium Aged Discord Accounts for Sale | Discord Arena”

Domain `redditaccsbuy[.]com` purports to sell aged reddit accounts

Website Title: “Reddit Accounts with Karma for Sale | Buy Verified, Aged Reddit Accounts Instantly | Affordable Reddit Account Marketplace”

Examining One Such Network: Aged Google Ads Accounts for Sale

Over 100 identical websites were created in December, 2024 purporting to sell aged Google Ads accounts and invite codes to illicit marketplaces. For awareness, selling or buying Google Ads accounts is a violation of Google's terms of service. Aged accounts might be perceived as having more authority or being less likely to be flagged for suspicious activity, making them attractive to those trying to game the system. 

Registration Overlaps:

  • Registrar: Dynadot LLC
  • Name Server: cloudFlare.com
  • Server Type: CloudFlare
  • ISP IP: CloudFlare Inc.
  • Domain Name or Website Title contains: google ads or adwords

During December 2024, 128 domains were identified with nearly identical domain registration details. All domains were configured with nearly identical website content. The websites contain links to illicit marketplaces such as credit card number verification and acquisition services, and illicit Russian markets. The websites also contain multiple links with the other 128 domains such that all 128 domains have websites directing traffic to each other. 

This configuration of interconnected website links is characteristic of search engine optimization (SEO) manipulation techniques. Specifically, in also considering the illicit content of these websites, this activity may be created solely to build backlinks to a main "money site" to manipulate search engine rankings typically referred to as a Private Blog Networks (PBN). PBNs can be a particularly effective SEO manipulation technique as search engines like Google consider backlinks as a signal of authority. The more backlinks, the higher the ranking. PBNs attempt to artificially inflate these rankings to drive traffic to their main sites. As such, search engine providers may penalize these networks and main sites by dropping their search rankings or completely removing them from search results. 

Example Google search query results for Google Ad accounts for sale:

Conclusion

In conclusion, the illicit market for aged and verified accounts across social media, email, and advertising platforms represents a persistent and evolving threat. Resold accounts are often acquired through illegitimate means and through account farming and reselling. Aged and pre-verified accounts provide a foundation for a spectrum of illicit and grey-area activities, ranging from spam campaigns, fraud, obfuscated ownership of hosting malicious resources on cloud providers, to manipulating online discourse. 

This activity underscores the critical need for enhanced security measures and robust verification processes by platform providers. Detecting and mitigating account handoff behaviors, such as suspicious login patterns or unusual activity spikes, is crucial to prevent the reselling and abuse of verified accounts. Furthermore, marketing and sales teams must exercise heightened vigilance when encountering accounts with seemingly high engagement or suspicious activity. Aged or re-verified accounts may appear more legitimate, but their origins should be carefully scrutinized. 

Proactive threat intelligence, increased awareness among users and businesses, and collaborative efforts between platforms, law enforcement, and cybersecurity researchers are essential to combat the acquisition and exploitation of these compromised accounts, which continue to undermine the integrity and trustworthiness of the digital landscape.

Appendix

Google Ad Account domains related by overlapping registration and hosting details adwordsad[.]cv
adgoogle[.]cv
googlead[.]cv
adgoogle[.]my
googlead[.]my
googleadwords[.]biz
adgoogle[.]shop
adsgoogle[.]tube
googleadwords[.]tube
googlead[.]best
adgoogle[.]blog
googlead[.]shop
adgoogle[.]best
adgoogle[.]cyou
googlead[.]co
googleadwords[.]bond
adgoogle[.]qpon
adgoogle[.]sbs
adgoogle[.]pro
googleadwords[.]lol
googlead[.]cheap
adgoogle[.]me
googlead[.]asia
googlead[.]vip
adsgoogle[.]lat
adgoogle[.]help
googlead[.]pro
googleadwords[.]help
googlead[.]lat
adgoogle[.]click
googlead[.]info
googlead[.]click
adgoogle[.]one
googleadwords[.]top
adgoogle[.]lat
adsgoogle[.]lol
adgoogle[.]tube
adgoogle[.]bet
googlead[.]bet
googlead[.]lol
googlead[.]me
adgoogle[.]vip
adgoogle[.]top
googlead[.]bid
googlead[.]cc
adgoogle[.]bid
googlead[.]one
adgoogle[.]cc
adsgoogle[.]bond
adgoogle[.]info
googleadwords[.]beauty
googlead[.]beauty
adsgoogle[.]pics
adgoogle[.]xyz
adwordsad[.]me
adwordsad[.]sbs
adwordsad[.]shop
adwordsad[.]co
adwordsad[.]blog
adwordsad[.]biz
adwordsad[.]best
adwordsad[.]my
adwordsad[.]cyou
adwordsad[.]org
adwordsad[.]art
adwordsad[.]one
adwordsad[.]click
adwordsad[.]pro
adwordsad[.]asia
adwordsad[.]vip
adwordsad[.]bet
adwordsad[.]tube
adwordsad[.]bid
adwordsad[.]cc
adwordsad[.]icu
adwordsad[.]lol
adwordsad[.]pw
adwordsad[.]info
googleadwords[.]cv
adsgoogle[.]cv
adsgoogle[.]sbs
adsgoogle[.]best
adsgoogle[.]blog
adsgoogle[.]cyou
adsgoogle[.]pro
adsgoogle[.]icu
adsgoogle[.]click
adsgoogle[.]one
adsgoogle[.]bid
googleadwords[.]icu
googleadwords[.]shop
googleadwords[.]my
googleadwords[.]lat
googleadwords[.]club
googleadwords[.]info
googleadwords[.]cheap
googleadwords[.]me
googleadwords[.]bid
googleadwords[.]org
googleadwords[.]click
googleadwords[.]vip
googleadwords[.]best
googleadwords[.]blog
googleadwords[.]cloud
googleadwords[.]cc
googleadwords[.]buzz
googleadwords[.]cfd
googleadwords[.]cyou
googleadwords[.]pro
googleadwords[.]sbs
buyadwords[.]cv
buyadwords[.]bid
buyadwords[.]org
buyadwords[.]vip
buyadwords[.]click
buyadwords[.]one
buyadwords[.]my
selladwords[.]cv
selladwords[.]click
selladwords[.]co
buyadwords[.]sbs
buyadwords[.]icu
selladwords[.]xyz
selladwords[.]com
selladwords[.]shop

Social Media Accounts
redditaccsbuy[.]com
user-sale[.]com
regularpva[.]com
shiftxchange[.]biz
twitterxarena[.]com
redditarena[.]com
discordarena[.]com
Game Accounts atshopr[.]com
nonlethalweaponsbook[.]com
mysticmisery[.]com
roadaccounts[.]com
fndrop[.]com
fortniteaccs[.]com
accountshubs[.]com
bootybay[.]gg
totalbattleaccounts[.]com
Apple 2FA Accounts isp-rebellion[.]com

Cloud and BHW Accounts
buybhwaccounts[.]xyz
acctrusted[.]com
topcloudacc[.]com
Retail Accounts instantaccountshop[.]com

IOCs on GitHub

If the community has any additional input, please let us know.

https://github.com/DomainTools/SecuritySnacks/blob/main/2025/AccountsForSale

Learn More
Research
Chinese Malware Delivery Websites

Malicious Browsers, Messengers, VPNs, and More…

Hundreds of newly registered domains are actively targeting Chinese-speaking users with malware. This report analyzes this activity, detailing the range of deceptive lures employed, including imitations of messengers, browsers, VPNs, email services, and Adobe software.

Details

Since at least June of 2024, a cluster of over four hundred domains have been registered to host spoofed websites to deliver malware to Chinese-speaking users. Spoofed application download websites have included web browsers, VPNs, chat and email applications, as well as crypto wallet and online gambling related apps. These websites share several commonalities in registration details, backend infrastructure, website configurations, and theme. The following is a sampling of those domains.

Identified malware families have included Gh0stRAT, ValleyRAT, RemKos RAT, LummaStealer, RedLine and others.

Common registration details:

  • IP ASN: Amazon, CloudFlare, Alibaba, CloudRadium
  • Registrar: Dominet (HK) Limited, 22net, webcc, Gname
  • Nameserver Domain: alidns[.]com, cloudflare[.]cp, hndnsv1[.]com
  • IPs Resolved: 54.215.49[.]143 & 54.193.24[.]113
  • SSL Duration: 90 day

Screenshot of malicious domain “chrmpw[.]top”, which spoofs as a GPT Chrome download application

Delivery Domain chrmpw[.]top
Download URL https[:]//chrmpw.top/download.html
Filename GPTChromX64.exe
SHA256 29163c8afb477b27f700e1c5eac694a6cbb816a86c8eadbbbac6ba5c034a9c96
Dropped Files 443a4ce93232d56f0d1d15e6875f7eff5fc581f25df320e277608be0d1148fa1
Suspected Malware Family Gh0stRAT

Malicious domain kuailianlow[.]com, which spoofs as Kuailian Accelerator VPN (快连加速器)

Index.html

Both Download buttons contain an onclick=”down()” function call. 

The down() function call is contained in a script within the HTML. Its purpose is to construct the file download path. To accomplish this it references a dictionary variable “window” to retrieve the value from the key “filename”. 

The “filename.js” script is imported in the HTML and contains the window[‘filename’] value.

Delivery Domain kuailianlow[.]com
Download URL kuailianlow[.]com/download/letspn-latest.exe
Filename letspn-latest.exe
SHA256 1f58903b39f58568589776333d2752957c1dd1a2c5296fd2fd5343560f6be860
Contacted URLs http[:]//47.242.127[.]63:15628
Suspected Malware Trojan Downloader

“Where there's one rat, there's a nest”

Expanding the search for similar websites and domain registration patterns identifies several spoofed VPN download websites.

Commonalities include the use of a filename.js to hold the malicious filename, and coding Chinese language text as opposed to the legitimate websites displaying content based on the language settings in the client’s browser settings. The latter suggests a preference for targeting Chinese language users.

Multiple spoofed VPNs such as LetsVPN appear in online guides as popular choices for bypassing the censorship of the Great Chinese Firewall.

Delivery Domain kipkshsa[.]top
Download URL kipkshsa[.]top/download/letsvppn-latest.msi
Filename letsvppn-latest.msi
SHA256 d1c9957bd55933a619d22e741fadcee6085e679e66af5cd8edbff7d9cf8fd4cf927474984e549f9d1269950e5782f755cb96f11d404a3cac56114d1e795609c5
Stage 2Download URL https[:]//fs-im-kefu.7moor-fs1[.]com/ly/4d2c3f00-7d4c-11e5-af15-41bf63ae4ea0/1733466890455/3.txt
Sha256 839e314d6027977399ee486d1cadba972685550ab97467ec77ef746ffc81a4787ac5b8905c760bf38d38761efc56362799f8a40b4fe2d570f56472b83a625360
Suspected Malware Gh0stRAT

A similar variation employs an additional imported JavaScript file to dynamically load the page content and button download actions.

Malicious domain, letscdn[.]world, which spoofs as LetsVPN 

Excerpt from Index.html - File Download Buttons with href JavaScript function calls to onDownload()

Excerpt from Index.html - Importing “/assets/js/jquery.min.js” via script tags.

Excerpt from “/assets/js/jquery.min.js” - loads script “/assets/download/filename.js” and returns the download URL as “https[:]//” + “letscdn[.]world” + “/assets/download” + “letsvpn-latest.rar”

The value for the “window.filename” is contained in another imported JavaScript file: “/assets/download/filename.js”

Delivery Domain letscdn[.]world
Download URL https[:]//letscdn[.]world/assets/download/letsvpn-latest.rar
Filename letsvpn-latest.rarletsvpn-latest.exe
SHA256 bb152e75a72aa3ae675561f308614eba6c070e55e3895bc1b67125689dc24ceec7531f022be3a5e33aa71aadcd5f0b5ae9989c7980b3a218e1e1415f6b61953d

Fake Login Pages Delivering Malware

Examples of fake login pages to deliver malware were also identified. 

The following screenshot of malicious domains “xmengapp[.]top” and “xinmeng[.]xyz”, which spoof a company called Genting Trust Union, which is purportedly an enterprise management platform for businesses to engage customers, however no apparent legitimate company by the name was identified. It is suspected that this is a fabricated company and website to lure in prospective marketing and sales teams. The website purportedly offers several service and data integrator apps for marketing purposes but in fact only delivers trojans described below. 

Included in the website’s imported JavaScript files is “/assets/js/ebzcecf9.js”, which contain login credentials for the website.

Logging into the application would load the following landing page:

Notably, the top bar “cloudtop” is a download button for a suspected malicious file but returns a 404.

The main section (right) is a range of services and tools related to online marketing and lead generation such as driving traffic to websites, automating tasks, managing multiple accounts, managing phone numbers for telemarketing, integrating proxies, overseas payments, AI tools for content creation and the like. 

The left panel contains a page link for “User Management”.

Clicking the blue “Click verification” button shown in the screen capture above opens a pop up alert with the following message

"Detected that the bundled plugin is not installed. Please install and retry."

Clicking “OK”, opens a download prompt for the following .msi file. The msi file is bundled with multiple files including those that AV scanners tag as Gh0stRAT and Farfli trojans. A possible C2 was identified as “134.122.135[.]95”, which is a suspected ValleyRAT C2.

Filename GoogleAuthPc_Installer.msi
SHA256 9ba254138f5e79354334a0deb48e38d04fa3754ac43b4a2adc388f81705ef044c7ba88724118bacaad78ff46794b6d2ebb7f1c55753d95249f6bcd0c49a8cd74
ValleyRAT C2 134.122.135[.]95:4443

Associated malware, activity and methodologies appear to overlap closely with reporting by Knownsec 404 team and Fortinet of a suspected APT activity named “Silver Fox”.

Compendium of Chinese Malware Delivery Domains

The following are all examples of the spoofed websites for delivering malware utilized in this cluster of activity from at least June 2024 to January 2025. Example malware delivery domains and their respective malware download URLs and SHA256 hashes are provided as available for each example below. This listing is non-exhaustive of the variety of spoofed websites for delivering malware. 

Spoofs as QuickQ, a network accelerator and encrypted traffic tool.

quickqi[.]net

quickiq[.]top

quickqi[.]net/assets/download/quicqk66.12.msi

quickiq[.]top/assets/download/win32-quicq.msi

1a793de251bffb1edc309aa0b7fd02354c7c99d3cb1f24b3e0140d2015dc49a
fe1b5431ae27c85b1c652e3ac9541c2a801540c02c04fa7f4a3a9543c284eca5
Spoofs as WhiteWhale VPN (白鲸加速器)

isdndjsq[.]top

isdndjsq[.]top/assets/download/win32-quicq.msi

fe1b5431ae27c85b1c652e3ac9541c2a801540c02c04fa7f4a3a9543c284eca5
Spoofs as Yiwaiwai Customer Service Chat Assistant download purportedly for Chrome, QQ, WeChat, Quanniu, Pinduoduo, Doudian, and others.

eyy5201[.]top

https[:]//eyy5201[.]top/static/download/yiwaiwai66.31.msi

fe86e1fff0afefd79de4fd26f041757495c5fadd116400699411a200978f0e41
Spoof as Lets VPN download sites

letsvpn-ui[.]top

kingtelmfng[.]top

https[:]//letsvpn-ui[.]top/assets/download/letsvpn-latest.exe

e09056567f146da73aa0c4266a15cd61655e4402146b75a836d1c92926cd37c4
Screenshot of malicious domain “z42f1m[.]top”, which spoofs as a Microsoft login page for Outlook but delivers malware.

https[:]//pub-bbd4563a163f414086e62f5cf87a6b4e.r2[.]dev/fah-0.zip

73083665902ccc0cf7cbd48af24ecd62205ff2f0970e3206f6f9be5ae096bc46a099f02c95b99abfcb3825d795797a11d69a08dc0d95e9171325dc13a9bcd796Ce34cc14e8d26119e1bf28a3a8368da6e10d13851004e2675976c5ad58b122e2

RedLine
LummaStealer
Screenshot of malicious domain “vejm60[.]top”, which spoofs as a Google mail login page but delivers the same malware.

https[:]//pub-bbd4563a163f414086e62f5cf87a6b4e.r2[.]dev/fah-0.zip

73083665902ccc0cf7cbd48af24ecd62205ff2f0970e3206f6f9be5ae096bc46
a099f02c95b99abfcb3825d795797a11d69a08dc0d95e9171325dc13a9bcd796
Ce34cc14e8d26119e1bf28a3a8368da6e10d13851004e2675976c5ad58b122e2

RedLine
LummaStealer
Screenshot of malicious domain “vzvlco[.]top”, which spoofs as a QQ mail login page but delivers malware.

https[:]//pub-bbd4563a163f414086e62f5cf87a6b4e.r2[.]dev/fah-0.zip

73083665902ccc0cf7cbd48af24ecd62205ff2f0970e3206f6f9be5ae096bc46a099f02c95b99abfcb3825d795797a11d69a08dc0d95e9171325dc13a9bcd796Ce34cc14e8d26119e1bf28a3a8368da6e10d13851004e2675976c5ad58b122e2

RedLine
LummaStealer
Screenshot of malicious domain “taufp6[.]top”, which spoofs as a 163 mail login page but delivers malware.

https[:]//pub-bbd4563a163f414086e62f5cf87a6b4e.r2[.]dev/fah-0.zip

73083665902ccc0cf7cbd48af24ecd62205ff2f0970e3206f6f9be5ae096bc46a099f02c95b99abfcb3825d795797a11d69a08dc0d95e9171325dc13a9bcd796Ce34cc14e8d26119e1bf28a3a8368da6e10d13851004e2675976c5ad58b122e2

RedLine
LummaStealer
Spoofs as AnyDesk remote desktop application.

andesksr[.]com

https[:]//andesksr[.]com/assets/download/anydeskx64-32.3.0.zip
Spoofs as Yiji Pay, a financial payment application.

yijfu[.]com

https[:]//yijfu[.]com/assets/download/PassGuardSetuhz.exe
Spoof of iTools for Windows, a tool used for managing Apple mobile devices.

i4z[.]xyz
Spoof of Huorong Internet Security website. Download links spoof as personal and enterprise security applications.

huurongs[.]top

huoroug[.]top
Spoofs as a game download link for QQ. 

qqsgs[.]com
Spoofs as Google Chrome download site.

oogiie[.]top
Spoofs as Youdao Dictionary software, a dictionary for translating text between Chinese and English and other languages.

yoodaou[.]xyz

https[:]//yoodaou[.]xyz/assets/download/QuarkUpdaterSetup_fuzz_1.rar

1a48a730cdd4982a5ac0b44984d70253eab9ea070285d9fc2124c83270576cf4f8c117a65e11fd370cb0673d1066af3415dfd9c8fde98225498f6e4ac92c213e
Spoofs as ToDesk remote desktop software.

todeskzis[.]xyz

https[:]//todeskzis[.]xyz/assets/download/ToDesk (2).zip

215872ff03e4a9d0baf12643b94d8cb60a5dba86153fa05148bd52344567e030d5b9d07f1aa0bf738521db66439d448913da86420f2c2a0753e35ba6b63a393a
Spoofs as ToDesk remote desktop software.

todeskeq[.]top

https[:]//0h6ai2g7.oss-ap-southeast-1.aliyuncs[.]com/ToDesk_Setup.zip

(is a .rar file)

134cba7e74c243b3f58535fd224f14a637445e176a5017a8d2938f357a88e9cb3823cc7228d7d8f75f007a4eafc0e4f4f1789ce26a6e1ca15c5045e17810396d

Retrieves:
https[:]//ws636rj.oss-ap-southeast-1.aliyuncs[.]com/encrypted_shellcode.bin
Spoof of WuYou, a service for receiving verification codes such as SMS and online platforms. 

wuyoujieee[.]com
oracl[.]top
Spoofs as Skype teleconference application download.

skyes1[.]top
Spoof of Youdao, a translation App.

yoadao[.]xyz
Gaming platform.

163i[.]tophttps[:]//mumu.163i[.]top/assets/download/Mumu模拟器.zip
Android Emulator to run from Windows Machine - purportedly to play simulate mobile games on desktop.

lediam[.]xyz

https[:]//d9gc24pw.oss-ap-southeast-1.aliyuncs[.]com/%E9%9B%B7%E7%94%B5%E6%A8%A1%E6%8B%9F%E5%99%A8.zip

ffe3be504d0a89ace9271a6a1fc51f6b0539903a10b1bf89285875606852ba65
clashcn[.]xyz
“QC7 goes overseas to navigate global social traffic”

“Accurate overseas customer acquisition starts with filtering number data”

“Overseas account screening platform”

007z[.]top

https[:]//007z[.]top/assets/download/007-Setup.exe

e34fd0f5fbc5f09f55ccdf2e6a5f70215c8686f9c83c45f421ac2a475d8bfd47
Spoof of Yuanqi, a website and app providing anime wallpapers without watermarks.

yqdesk[.]top
Spoof of KARIOS, which purports to be a “SMS Provider” such as sending text messages.

karlosqp[.]xyz
Spoofs as an unnamed merchant backend login page. Clicking login results in a popup with a “please install” link for a malicious file spoofing as a cryptokit_sando. Clicking OK directs to /update page with a banner to download the same file. This time spoofing as a Flashplayer update link.

shanghud[.]com

https[:]//shanghud[.]com/assets/download/k3.2.6.0升级组件.exe

65049df06de78a4fda14d5f07d83eef1b316c0dea0ecfc3dbec7e5e1b7b20754
T Star Diamond Payment-Merchant Backstage.

Spoofs as a login page. Clicking the login button downloads Gh0stRAT malware.

xingzuan[.]xyz

https[:]//xingzuan[.]xyz/assets/download/xingzuansetupg5.exe

5e1d7275b0abd484c15f186690db73c42e861311da3f5f048563636336933b4a

Downloads additional files from:
https[:]//wwwchongqingget-1328031368.cos.ap-chongqing.myqcloud[.]com
Spoofs as Dex Screener, a cryptocurrency website. Clicking any buttons initiates a popup with download link spoofing as a Flashplayer update. It contains samples of Gh0stRAT and Blackmoon malware.

dexscreeners[.]icu

https[:]//aaa8999.oss-us-west-1.aliyuncs[.]com/Flash_x32.zip

86f8239224a0ace2b1e0a2216511b0a0aea1bf055f7cbeca2fcf9c316f3de921
Spoofs as popular Line messenger application.

iines[.]xyz
Spoofs of DeepL Pro, a machine translation company. The service purports to emphasize data security with end-to-end encryption and automatic deletion of translated text. 

deepil[.]top
Spoofs of DeepL Pro, a machine translation company. The service purports to emphasize data security with end-to-end encryption and automatic deletion of translated text.

deeplx[.]top
Spoofs as 2345 Image King, software for viewing images.
 
2345ktws[.]xyz
Spoofs as Quark, AI. An AI-powered assistant application.

quarki[.]top
Spoofs as a cryptocurrency exchange.

chachap[.]top

https[:]//0l1hsqvd.oss-ap-southeast-1.aliyuncs[.]com/uCheckerInst.zip
Spoofs as 360 browser, a web browser developed by the Chinese internet security company, Qihoo 360.

360browsap[.]top
Spoofs as a mobile and web game site.

ttcy365[.]com
Spoofs as Sunflower Remote Control Software, which purports to allow remote access to other computers, file transfer, and remote assistance.

orays[.]top
A banner displayed warning of malicious activity spoofing their brand but is in fact also a spoof.

baofuupay[.]com

https[:]//baofuupay[.]com/assets/download/setup.exe

2901ca8eefd1d431d25f3d45dbf42dc48136b74692801ca0f6b606541d645baf
Spoofs as Enigma Messenger App, an end-to-end encrypted chat app.

immersivetranslate[.]top
Spoofs as a cryptocurrency exchange app.

tradingview[.]trade
Spoofs Signal messaging application, an end-to-end encrypted chat app. 

signall[.]xyz
Spoofs Signal messaging application, an end-to-end encrypted chat app.

signel[.]top
Spoofs as AdsPower app, an anti-detect browser for managing multiple online accounts.

adspowerr[.]top
Spoofs as 360 Security Guard - Software Manager to download iTools app. iTools is used for managing Apple mobile devices.

i4app[.]top
Spoofs as FireFox browser download.

firefoxz[.]top
Spoofs of LianLian Pay application.

lianlianpoy[.]com
Spoofs as a financial payments management website.

shengfuton[.]com
Spoofs as a music streaming app.

wymusic[.]top
Spoofs as Snipaste, a screenshot and screen recording tool.

snipaste[.]top
Spoofs as Aurora PDF, a service for creating, editing and viewing PDF files. 

jiguang[.]icu
Spoofs as Steam, a popular digital distribution platform for video games.

steams[.]top
Spoofs as 163 VPN built by NetEase, a Chinese tech company. 163 VPN is primarily designed for users within China to access websites blocked by the Great Firewall of China. 

163e[.]top
Spoofs of Gmail Login Page. 

qmails[.]top
Spoof of Telegram messenger application.

telegrinxkam[.]top

https[:]//telegrinxkam[.]top/assets/download/Ttsetuphdmgj.exe

d219a6056e1f65507c984475711bd7e674b1319d11fd7a1149f3da983fd4f7c8
Spoof of Telegram messenger application.

telegrcm[.]ing

teiegram[.]ing
Spoofs as SaleSmartly, a customer communication platform.

salesmart[.]top

https[:]//wien.oss-ap-southeast-1.aliyuncs[.]com/win7-salesmartly.zip
Spoofs of Google Play store to download a malicious application.

goople[.]top
Spoofs of Telegram messaging application.

telegrpcm[.]xyz

Conclusion

The spoofed malware delivery websites sampled in this report all share commonalities in configuration, domain registration patterns, and a suspected intent to target Chinese-speaking users. Indications suggest a broader target audience of Chinese language speakers outside of China including Malaysia and Hong Kong. 

The majority of the malware identified being delivered by the spoofed websites were stealers and trojans with capabilities to steal credentials and provide remote access to compromised systems. All malware identified were intended for Windows operating systems. Among them were multiple samples AV vendors assessed to be Gh0stRAT, Lummanstealer, RedLine, Farfli and ValleyRAT. Of which, C2s were also identified as associated with ValleyRAT. 

The activity and infrastructure of this cluster suggests a strong overlap with previously reported APT group SilverFox. Similarities include the spoofed websites, a focus on targeting Chinese-language speakers, and the use of ValleyRAT. Additionally, the overall volume, variety, and duration of the activity involved aligns with previous reports of SilverFox and suggests an organized and professional enterprise such as a commercial hack-for-hire or nation state sponsored contract. 

While spoofing websites to deliver malware is nothing new, the sustained volume and consistency speaks to a larger systematic approach to target a specific demographic with an apparent intent on gaining access to Windows devices likely to initially steal credentials and provide continued access for follow-on engagements. In the past, speculation around similar campaigns involved acting as access brokers to sell to government organizations or other criminal groups. Another possibility may be the collateral targeting of a population to opportunistically compromise high-value targets. In other words, indiscriminate compromises until they strike gold on gaining access to, for example, a corporation’s system or credentials.

IOCs

Type Value Descriptor
Sample 1
Domain kipkshsa[.]top Lure Website
URL kipkshsa[.]top/download/letsvppn-latest.msi Download URL
Filename letsvppn-latest.msi
SHA256 d1c9957bd55933a619d22e741fadcee6085e679e66af5cd8edbff7d9cf8fd4cf Stage 1
Filename QQQQ.exe
SHA256 927474984e549f9d1269950e5782f755cb96f11d404a3cac56114d1e795609c5 Stage 2 Downloader
URL https[:]//fs-im-kefu.7moor-fs1[.]com/ly/4d2c3f00-7d4c-11e5-af15-41bf63ae4ea0/1733466890455/3.txt Stage 2 Download URL
Filename 3.txt
SHA256 839e314d6027977399ee486d1cadba972685550ab97467ec77ef746ffc81a478 Stage 2 Dropper
SHA256 7ac5b8905c760bf38d38761efc56362799f8a40b4fe2d570f56472b83a625360 Stage 2 Trojan: Gh0stRAT
Sample 2
Domain opjs[.]club Lure Website
URL https[:]//ni1kpuro.oss-ap-southeast-1.aliyuncs[.]com/QuickQ.zip Download URL
Filename QuickQ.zip
Filename QuickQ.msi
SHA256 7aa498dc87e734e306f850082fad723ca7c05ef2f0a84c5232111eb3e86156fc
SHA256 adb6afadbd9f31a2c6548b6e3c6378a7164a3604c04332e48a409c16faf4f598 Spyware: Chinad / FlyStudio
Sample 3
Domain kuailiani[.]net Lure Website
URL kuailiani[.]net/download/kuailian64.52.msi Download URL
Filename kuailian64.52.msi
SHA256 d75a2b9d03aab50d9f3eb6afbde06034adec7a183dfcaf090ce78e4cd7a59117
Filename AICustAct.dll
SHA256 ce34cc14e8d26119e1bf28a3a8368da6e10d13851004e2675976c5ad58b122e2 RedLine / LummaStealer
Sample 4
Domain quiirkq[.]club Lure Website
URL https[:]//caiyun1688.oss-cn-shenzhen.aliyuncs[.]com/QuickQ-18.zip Download URL
Filename QuickQ-18.zip
Sample 5
Domain mctuqqe4z.top Lure Website
URL mctuqqe4z[.]top/qucke1.2_快客.zip Download URL
Filename qucke1.2_快客.zip
Filename qucke1.2_快客.exe
SHA256 5283873308336ae1011ebfe1d057621413b7d528340e45d76359850d5589e662
SHA256 e15a6646d20b4aa486f06fa81a1af55be0bd99dbff85cbd7a7a29d15ad73a693
Filename win32-67-quickq.exe
SHA256 e5205e1964b63ce14c85dd2c1ff6cdb06b3b1d323ccdbe0b2d6368a88dfe8f70 Trojan
Sample 6
Domain quickqi[.]net Lure Website
URL quickqi[.]net/assets/download/quicqk66.12.msi Download URL
Filename quicqk66.12.msi
SHA256 1a793de251bffb1edc309aa0b7fd02354c7c99d3cb1f24b3e0140d2015dc49a
Sample 7
Domain quickiq[.]top Lure Website
URL quickiq[.]top/assets/download/win32-quicq.msi Download URL
Domain isdndjsq[.]top Lure Website
URL isdndjsq[.]top/assets/download/win32-quicq.msi Download URL
Filename win32-quicq.msi
SHA256 fe1b5431ae27c85b1c652e3ac9541c2a801540c02c04fa7f4a3a9543c284eca5 Trojan Downloader
Sample 9
Domain letscdn[.]world Lure Website
URL https[:]//letscdn[.]world/assets/download/letsvpn-latest.rar Download URL
Filename letsvpn-latest.rar
Filename letsvpn-latest.exe
SHA256 bb152e75a72aa3ae675561f308614eba6c070e55e3895bc1b67125689dc24cee
SHA256 c7531f022be3a5e33aa71aadcd5f0b5ae9989c7980b3a218e1e1415f6b61953d Trojan
Sample 10
Domain telegrinxkam[.]top Lure Website
URL https[:]//telegrinxkam[.]top/assets/download/Ttsetuphdmgj.exe Download URL
Filename Ttsetuphdmgj.exe
SHA256 d219a6056e1f65507c984475711bd7e674b1319d11fd7a1149f3da983fd4f7c8
SHA256 f309c2c4847a5c888a580a2b154dfa1168016a9c3a335890f1b9e201819857e3 trojan: vmprotected
Sample 11
Domain eyy5201[.]top Lure Website
URL https[:]//eyy5201[.]top/static/download/yiwaiwai66.31.msi Download URL
Filename yiwaiwai66.31.msi
SHA256 fe86e1fff0afefd79de4fd26f041757495c5fadd116400699411a200978f0e41 Trojan
Sample 12
Domain letsvpn-ui[.]top Lure Website
Domain kingtelmfng[.]top Lure Website
URL https[:]//letsvpn-ui[.]top/assets/download/letsvpn-latest.exe Download URL
Filename letsvpn-latest.exe
Filename letsvpn-latesa.msi
SHA256 e09056567f146da73aa0c4266a15cd61655e4402146b75a836d1c92926cd37c4 Trojan
Sample 13
Domain chrmpw[.]top Lure Website
URL https[:]//chrmpw.top/download.html Download URL
Filename GPTChromX64.exe
SHA256 29163c8afb477b27f700e1c5eac694a6cbb816a86c8eadbbbac6ba5c034a9c96 Stage 1 Loader
SHA256 443a4ce93232d56f0d1d15e6875f7eff5fc581f25df320e277608be0d1148fa1 Stage 2 Trojan: Gh0stRAT
Sample 14
Domain z42f1m[.]top Lure Website
Domain vejm60[.]top Lure Website
Domain vzvlco[.]top Lure Website
Domain taufp6[.]top Lure Website
URL https[:]//pub-bbd4563a163f414086e62f5cf87a6b4e.r2[.]dev/fah-0.zip Download URL
Filename fah-0.zip
Filename fah-0.msi
SHA256 73083665902ccc0cf7cbd48af24ecd62205ff2f0970e3206f6f9be5ae096bc46
SHA256 a099f02c95b99abfcb3825d795797a11d69a08dc0d95e9171325dc13a9bcd796
SHA256 ce34cc14e8d26119e1bf28a3a8368da6e10d13851004e2675976c5ad58b122e2 LummaStealer
Sample 15
Domain qwapmuuq[.]com Lure Website
Domain fsquhgne[.]com Lure Website
Domain rtuoxxsr[.]com Lure Website
Domain fzqecfyi[.]com Lure Website
Domain modbydto[.]com Lure Website
Domain szyyotmp[.]com Lure Website
Domain vltlpung[.]com Lure Website
Domain twyudoft[.]com Lure Website
URL https[:]//quiiqq[.]com/win32-quickq.zip Download URL
Filename win32-quickq.zip
Filename win32-quickq.exe
SHA256 005bdfdde6a0d0718ac60bcc7071bd87d0ac869308cf8dd7ed8afa7478709ba9
SHA256 11254884edbc797e36d84b8305e63f2f8d1e3289fcb289a0be5b3b2d663055e
Sample 16
Domain quickq[.]fit Lure Website
URL http[:]//quickq[.]fit/sdk/win32-quickq.exe Download URL
URL https[:]//setupx64.oss-cn-hongkong.aliyuncs[.]com/QuickSetup.msi Download URL
Filename win32-quickq.exe
Filename QuickSetup.msi
SHA256 bfb90dfe0d6b4342489c4e8aa9c5ef803e462e0b451cb9ad016f2afba39fedf9 Trojan
Filename AICustAct.dll
SHA256 ce34cc14e8d26119e1bf28a3a8368da6e10d13851004e2675976c5ad58b122e2 RedLine / LummaStealer

Suspected Malware Delivery Domains:

007z[.]top
1633[.]site
163e[.]top
163i[.]top
16cilz[.]xyz
1o2mp[.]cyou
2345kantup[.]xyz
2345kingtuwang[.]com
2345ktws[.]xyz
360browsap[.]top
360z[.]fit
6h4s3s[.]top
70ka[.]club
a1shung[.]club
adober[.]club
adspowerr[.]top
aisbb[.]cyou
andesksr[.]com
anydeisk[.]top
anydesik[.]com
anydesik[.]top
anydesikq[.]top
anydeskcn[.]top
anydeskq[.]online
anydeslk[.]top
avez[.]top
avre[.]work
baidu-a[.]cyou
baidu-a[.]top
baili888[.]club
bananagun[.]fit
bananagunn[.]cyou
bananaguns[.]club
baofupay[.]top
baofuupay[.]com
bitbrowcer[.]xyz
bitbrowsec[.]top
bitbrowseq[.]top
bitbrowsers[.]work
bitbrowsez[.]top
bitbrowsri[.]top
bitbrowszer[.]top
bitbrwoser[.]fit
bitbrwoser[.]top
bitbrwwser[.]top
bitpiez[.]club
bitteroser[.]top
b-jipay[.]com
b-jlpay[.]top
bmgsn6[.]top
bntbrowcer[.]xyz
bpss5vp[.]top
browseri[.]vip
btbrowserq[.]top
btxueo[.]top
cgpay[.]vip
chachap[.]top
chme1[.]xyz
chmole[.]club
chrmpw[.]top
chromexn[.]com
clashcn[.]club
clashcn[.]top
clashcn[.]xyz
cnacn3[.]top
comprz[.]top
cpgpay[.]site
crlg1wm[.]com
cs-quickq[.]com
deepil[.]top
deepli[.]top
deepll[.]top
deepll[.]xyz
deeplti[.]xyz
deeplx[.]top
dexscreener[.]fit
dexscreeners[.]icu
dezscreener[.]work
dfapp188[.]world
domain
easytran[.]top
ecprss[.]com
eiyy[.]top
enigmar[.]fit
eniigme[.]club
eu0af6[.]club
eyy350[.]top
eyyqp[.]top
eyys[.]xyz
eyysi[.]top
eyysm[.]com
eyyz[.]top
f3jb5x[.]top
fckjo9[.]club
firefoxz[.]top
flashproxy[.]cc
freetalk[.]online
g2ks0z[.]com
g465cn[.]com
gckgmwc1[.]top
gmaib[.]top
gmgmai[.]club
gmgmai[.]work
goe[.]icu
googleseso[.]top
googlez[.]top
googlre1[.]top
goople[.]top
gotonesms[.]xyz
gotonesn[.]top
heepayx[.]xyz
hellowordx[.]club
hellowordx[.]fit
hellowordz[.]top
helloworldcz[.]xyz
helloworldw[.]site
helloworldw[.]top
helloworldz[.]top
helloworlids[.]top
hgb4hxl070[.]com
huifub[.]club
huionepay[.]vip
huorong[.]online
huorong[.]site
huorong[.]work
huoroug[.]top
huorrong[.]xyz
huoswe[.]top
huurongs[.]top
hvr3ez[.]work
i4app[.]top
i4b6[.]club
i4sa[.]xyz
i4sapp[.]top
i4sp[.]top
i4toos[.]life
i4z[.]xyz
ibzeha[.]vip
iilne[.]fit
iilne[.]top
iines[.]xyz
ilren[.]top
imbken[.]club
immersivetranslate[.]top
Inspect2 Guided Pivots
interhclp[.]com
isdndjsq[.]top
j6ahar4i[.]top
jdad7q[.]work
jiguang[.]icu
kantu2345[.]club
karlospt[.]top
karlosqp[.]xyz
karlost[.]club
keuailian[.]top
kingtelmfng[.]top
kipkshsa[.]top
klxiazopai[.]com
kuaiiam[.]fit
kuaiilianoo[.]icu
kuaiiyian[.]com
kuai-lian[.]xyz
kuailian0[.]com
kuailian8[.]com
kuailiani[.]net
kuailianlow[.]com
kuailiant[.]com
kuailianz[.]com
kuailiien[.]xyz
kuailijen[.]xyz
kuailim[.]buzz
kuailxian[.]com
kuaizip[.]top
kualien[.]xyz
kueliien[.]xyz
kuellien[.]xyz
kwgiz1[.]club
lanlevp[.]top
lediam[.]xyz
letrscp[.]fit
lets-alyays-connect[.]com
letsbutr[.]com
letscdn[.]world
letscgn[.]top
letscqn[.]top
letskuail[.]icu
letspcm[.]top
letspcn[.]icu
letspcn[.]xyz
letspqc[.]top
letspqw[.]fit
letspw[.]top
letsqpr[.]top
letsqpw[.]club
letsqpz[.]club
letsqqp[.]club
letsrpm[.]top
letsrqn[.]top
letsvpn-ui[.]top
letsvqm[.]xyz
letsvqr[.]xyz
letwvpn[.]com
lianlianpoy[.]com
liien[.]top
liine[.]fit
liine[.]work
llnes[.]world
lltslian[.]life
loubom[.]club
lttslian[.]xyz
luoboo[.]online
m7neqzz[.]fit
mavishub[.]xyz
mctuqqe4z[.]top
me18qiyg[.]xyz
meipai[.]work
meiqias[.]xyz
mesenger[.]club
messengers[.]work
messengerz[.]club
mexiko[.]cn
mi163[.]top
miitu[.]top
miluvpn[.]com
mwai1[.]xyz
nexchattc[.]cc
nn3cotp[.]top
nsmnst[.]club
officeim[.]club
oggie[.]club
oggie[.]fit
oggie[.]top
oggiechr[.]work
ogglchomr[.]top
oggle[.]club
oggle[.]top
oggle[.]xyz
oggles[.]xyz
ogglesr[.]top
oiggle[.]club
okyi[.]work
oogchrm[.]club
ooggie[.]top
ooggie[.]xyz
ooggle[.]top
ooggles[.]top
oogglez[.]top
oogglez[.]xyz
oogie[.]club
oogie[.]fit
oogiel[.]top
oogiew[.]work
oogiie[.]top
oogles[.]top
ooglex[.]top
ooglex[.]xyz
ooglie[.]xyz
ooglz[.]top
ooglze[.]fit
ooigle[.]xyz
oolqow[.]top
opjs[.]club
oracl[.]top
orayi[.]world
orays[.]top
orey[.]online
oreyr[.]work
oreyz[.]top
ouggle[.]fit
paga1io[.]top
paopaom[.]online
paydocs8[.]com
pgaab[.]icu
pht0j[.]cyou
potatocn[.]xyz
pppicd[.]icu
pqqle[.]club
q0nmsl[.]fit
qeaick[.]buzz
qmail[.]work
qmails[.]top
qqgj[.]online
qqis[.]work
qqsgs[.]com
quarki[.]top
quicka[.]top
quickiq[.]top
quickq0101[.]cyou
quickq2[.]cc
quickqgf[.]com
quickqgf[.]net
quickqgw[.]com
quickqgw[.]net
quickqi[.]net
quickqi[.]top
quickqza[.]icu
quickqzc[.]top
quickxq[.]xyz
quiicka[.]xyz
quiickqz[.]top
quiirkq[.]club
quirkq[.]work
qwf123[.]cyou
rggmo7j[.]club
salesmart[.]top
sanderpay[.]top
sandipay[.]top
sandlpay[.]top
sandpray[.]top
shandpay[.]top
shandpey[.]world
shanghud[.]com
shengfuton[.]com
shimoc[.]club
signall[.]xyz
signel[.]top
skyes1[.]top
slqdgo[.]club
sms-activation[.]club
smsactive[.]top
smsnet[.]top
snapcheat[.]club
snipaste[.]top
soogoo[.]icu
soogou[.]store
sougoo[.]site
sougous[.]top
sougous[.]xyz
soulgou[.]club
steams[.]top
sublitmext[.]xyz
subllmatxt[.]top
surrl9oa[.]top
t0v0hlp[.]top
taufp6[.]top
teamviewers[.]club
teiegram[.]ing
telagrmaxjsq[.]top
teleagrmone[.]top
teleepcrme[.]work
teleeqcrme[.]top
telegcvme[.]fit
telegczem[.]club
telegramn[.]vip
telegrcm[.]ing
telegrimz[.]club
telegrinxkam[.]top
telegrpcm[.]xyz
teleigpcm[.]club
teleigpcm[.]vip
telepcem[.]club
telepcems[.]fit
telepeqrm[.]fit
telepqrm[.]work
teleprzm[.]fit
telepwam[.]club
teleqcam[.]club
teleqcrmn[.]club
teleqcrmn[.]fit
teleqercm[.]work
teleqpczm[.]club
tgsheng[.]top
tittia[.]top
tletsvpn[.]xyz
todaskek[.]xyz
todaski[.]club
todesik[.]top
todeskc[.]top
todeskei[.]xyz
todeskeq[.]top
todeskiz[.]club
todeskze[.]top
todeskzis[.]xyz
tradingview[.]trade
ttcy365[.]com
ui4[.]club
uletsvpn[.]xyz
upcupe[.]xyz
uphot[.]net
uq7djw[.]xyz
utuncloud[.]world
vb0ep[.]club
vejm60[.]top
viber[.]cc
viber[.]cyou
viberi[.]xyz
vibers[.]site
vibers[.]top
vibers[.]work
villa[.]yiluying[.]com
visvpn[.]cyou
vletsvpn[.]xyz
vzvlco[.]top
wangr[.]club
wangwangtalk[.]club
wgoole[.]fit
whapps[.]club
whapps[.]fit
whapps[.]work
whatsacppy[.]club
whhapps[.]club
whhapps[.]fit
whtpps[.]club
whtpps[.]fit
whtpps[.]work
whtsaps[.]club
whtsaps[.]fit
whtsaps[.]vip
whtsaps[.]work
wiinrar[.]top
winrarsz[.]top
winzips[.]work
wipses[.]fit
wletsvpn[.]xyz
wppsi[.]top
wpsco[.]xyz
wpsei[.]com
wpsie[.]top
wpsim[.]top
wpsio[.]top
wpsiz[.]xyz
wpsla[.]site
wpsma[.]top
wpsqm[.]com
wpsqr[.]xyz
wpsqx[.]top
wpsrc[.]top
wpsrc[.]work
wpsrs[.]xyz
wpss[.]xyz
wpssq[.]top
wpsxi[.]club
wpsxm[.]xyz
wpsxz[.]xyz
wpsyz[.]top
wpszm[.]top
wudps[.]xyz
wuyoujieee[.]com
wymusic[.]fit
wymusic[.]top
xiaohuojians[.]top
ximmlang[.]club
xingqiiu[.]club
xingzuan[.]club
xingzuan[.]fit
xingzuan[.]online
xingzuan[.]xyz
xinlang[.]work
xinmeng[.]xyz
xinzuan[.]top
xmengapp[.]top
xxyy[.]work
xzpay[.]work
yiiji[.]xyz
yiijifu[.]com
yijfu[.]com
yoadao[.]xyz
yodaou[.]top
yoodao[.]fit
yoodaoi[.]club
yoodaou[.]xyz
yoodau[.]top
yoodau[.]xyz
yoodou[.]top
youdaoie[.]top
youdaox[.]top
youdaoz[.]top
youdoau[.]top
youdoo[.]top
youdou[.]xyz
yqdesk[.]top
yuanq[.]top
yuduba[.]xyz
z42f1m[.]top
zhekou838[.]cn
ziniao[.]fit
zoomi[.]fit

IOCs on GitHub

If the community has any additional input, please let us know.

https://github.com/DomainTools/SecuritySnacks/blob/main/2025/CNMalwareDelivery-Pt1

Learn More
Research
No items found.
CTI Grapevine Becomes DomainTools Investigations

Hello CTI Grapevine Superfriends!

You may have noticed some subtle changes to our website: As of today, CTI Grapevine became part of the newly-launched DomainTools Investigations (DTI) family. Since this shift may come as a surprise to some of our avid readers, I wanted to share why we believe it is a great move for our community:

CTI Grapevine was started as an initiative by us, for us: The researchers, analysts, defenders, and the quiet types you never hear about publicly, but who behind the scenes help make the Internet a safer place. You know who you are. We wanted to explore what it would be like for the community if we published relevant and timely Domain- and DNS-related security snacks - “bite size research,” if you will. We had some really great success with this in 2024. You, the community, gave us both positive and constructive feedback on areas of growth, what you wanted us to improve on, and how we could be a better resource to the community at large. As we brainstormed on how to grow the program, we kept coming back to a DomainTools core principle: Community First! 

On a personal note, this core principle is one of the top reasons I stayed with DomainTools after my previous employer Farsight Security was acquired - The InfoSec Community has been a key part of my career for over 20 years, I would not be where I am today without it. In 2002, I started attending The Agora in Seattle, one of the first quarterly closed-vetted InfoSec meetups. After a few years as an attendee, I got involved and helped to organize and host the events for another decade+. Around 2007, I started attending other great community-focussed conferences like ISOI, and later ACoD, DCC, UE - IYKYK. I mention all this to underline how serious I am in my commitment to The Community, and as the Head of DomainTools Investigations, I will make sure we do not stray from that path.

In the spirit of supporting the community, we knew we needed to be extremely thoughtful in providing more resources. We pitched a program that could attract and sustain kickass researchers and analysts who could focus on providing their expertise on an ongoing basis. Our bosses listened, and decided to give us a year to prove ourselves. And so, DTI was formed as a community-based research effort focused on investigating, mitigating, and preventing Domain- and DNS-based attacks. (And yes, we love puns and DTI is a play on CTI…see what we did there?) With the launch of DTI, building on the foundation of CTI Grapevine, the cybersecurity community will have expanded access to:

  • Insights on advanced persistent threats (APTs), nation-states, cyber-espionage groups, business email compromise (BEC), and more
  • Published research on the DTI website and available via webinars, closed door sessions, and conferences
  • A yearly report that dives into the nuances of Domain- and DNS-based attacks

You can get all of this goodness right here on the site, and never miss an update by setting up an RSS feed to dti.domaintools.com. Additionally, you can find us on the socials (Mastodon: @domaintools@infosec.exchange, Bluesky @domaintools, X @domaintools, LinkedIn https://www.linkedin.com/company/domaintools/ ), or come say “Hi” at various conferences and events we will be frequenting all year long!

Here is to an exciting year ahead, and to borrow a signature word from one of my friends and mentors: Excelsior!

Daniel Schwalbe
CISO and Head of Investigations
DomainTools

PS: Let’s talk about tracking for a minute. More specifically website page views, and email open tracking, or what the kids call “engagement” these days. When we first launched CTI Grapevine, we intentionally had zero tracking on the site. This is somewhat rare in the industry, but as a security and privacy professional, I am allergic to tracking. I block it wherever and however I can. Being in control of DNS resolutions on your own Network is very useful for that purpose. 

But if as a business you must track, at least be as transparent as possible about it. So this is the approach we are taking here. The bargain we made with our bosses in order to take DTI to the next level was to sign up for some KPIs, and we need some kind of measurement to see if we hit those KPIs. We use Google Analytics with tags, and Marketo Measure (Bizible / Adobe). We won’t gate content, and we won’t use more invasive tracking.

Sure, tracking on websites can be blocked by the browser, and almost every email client now has the ability to block open tracking. We accept it, and are OK with that. But if you feel so inclined and want to support our program, maybe consider letting some of that tracking through. 


Learn More
Research
Cyberhaven Breach Likely Part of a Long-Term Criminal Campaign

Overview

On 27 December 2024, the technology company Cyberhaven reported that an unnamed actor replaced its Google Chrome extension on the Google Chrome Web Store with a malicious version. The actor used a phishing email to compromise a developer’s account via authorizing a malicious third-party application. DomainTools researchers reviewed publicly available information related to this incident and discovered that the Cyberhaven incident is part of a months-long campaign likely attempting to impact multiple companies primarily in the technology sector.

Summary of the Cyberhaven Incident

Cyberhaven’s initial analysis of the incident revealed that the actor sent a phishing email claiming that the recipient’s Chrome extension was at risk of being removed from the Chrome Web Store due to policy violations. A link in the email purported to allow the recipient to acknowledge those policies and avoid removal of the extension. Clicking on the link led the recipient through the process of adding a malicious third-party application named “Privacy Policy Extension” to the recipient’s Google account - a tactic commonly known as OAuth phishing. The malicious application received permissions to publish Chrome Web Store extensions, allowing the actor to replace Cyberhaven’s extension with a new version containing malicious code.    

The malicious code comprised two altered JavaScript files:

  • worker.js: This script contacted the actor-controlled domain, cyberhavenext[.]pro, which served as command and control (C2) for the incident.  The server hosted configuration data, which it stored in Chrome’s local storage and monitored events from the second script, content.js.
  • content.js: This script collected user data from specific websites. The file used in the Cyberhaven incident specifically targeted Facebook-related data such as access tokens, user IDs, account details, business accounts, ad account information, cookies, and user agent strings. The script exfiltrated all compromised data to actor-controlled infrastructure.

Connections to a Broader Campaign

Cyberhaven shared indicators of compromise (IOCs) related to the attack. DomainTools researchers analyzed this information and discovered a large network of infrastructure likely used in similar attacks against other targets. Some of the related domains include:

  • cyberhavenext[.]pro
  • api.cyberhaven[.]pro
  • app.checkpolicy[.]site

The reported C2 domain for the incident, cyberhavenext[.]pro, resolved to the IP address 149.28.124[.]84 which is allocated to the hosting provider Vultr. Passive DNS data in the Iris Investigate platform shows 18 domains resolving to this IP address since 5 November 2024 with the majority beginning to resolve in the last week of December 2024. It is likely that these domains are part of a broader campaign that includes the Cyberhaven incident. This assessment is made with high confidence based on the following factors:

  • IP address overlap - likely related domains resolve to the same IP addresses within close time proximity  
  • Whois similarities - Domains share similarities in whois information: Namecheap registry, registrar-servers[.]com for NS and MX, and use of Let’s Encrypt certificates
  • Domain naming conventions - Domain names spoof specific software products such as AI tools, VPNs, adblockers, and other general web browsing tools.
  • Top Level Domains (TLDs) - Heavy use of .pro TLD along with .live, .info, .com, .net, .ink, and .vip 

Research revealed additional related domains on other Vultr IP addresses:

  • 149.248.2[.]160
  • 136.244.115[.]219
  • 45.76.225[.]148

Data from the urlscan platform shows that some of the related domains hosted configurations similar to that reported by Cyberhaven. For example, urlscan data for the domain internxtvpn[.]pro shows a similarly formatted configuration for targeting data from the ChatGPT platform

{"code":2000,"internxtvpna":"https:\/\/chatgpt.com\/api\/*","internxtvpnb":"https:\/\/chatgpt.com\/public-api\/conversation_limit","internxtvpnc":"chatgpt.com","internxtvpnd":"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","internxtvpne":"backend-api\/me","internxtvpnf":"https:\/\/chatgpt.com","internxtvpng":"https:\/\/chatgpt.com\/backend-api\/compliance","internxtvpnh":"https:\/\/chatgpt.com\/api\/auth\/session","internxtvpni":"auth","internxtvpnk":"https:\/\/chatgpt.com"}

Configuration Recorded by URLscan on 29 December 2024

Urls can data also shows some of the identified infrastructure hosting credential phishing pages as far back as February 2024. Figure 2 shows a credential phishing page for an unidentified service hosted on admin-set.tkpartner[.]pro (left) and a phishing page likely meant to spoof Facebook’s Business Manager service hosted on tkadmin7.tkv2[.]pro (right). There is not enough evidence to determine how potential victims were directed to these pages or how the actor responsible leveraged compromised credentials. 

Figure 2. Credential phishing pages hosted on infrastructure likely related to that used in the Cyberhaven incident.

Conclusion

It is likely that the Cyberhaven incident was part of a months-long campaign seeking access to sensitive data related to popular web services such as Facebook and ChatGPT. This assessment is made with high confidence based on identified infrastructure, the usage time frame of the infrastructure, and code within the actor’s configuration files. Observed tactics, techniques, and procedures (TTPs) indicate this actor is more likely criminal than state-sponsored.

IOCs

149.28.124[.]84 136.244.115[.]219
cyberhavenext[.]pro
graphqlnetwork[.]pro
yescaptcha[.]pro
videodownloadhelper[.]pro
castorus[.]info
bookmarkfc[.]info
uvoice[.]live
iobit[.]pro
primusext[.]pro
yujaverity[.]info
parrottalks[.]info
internxtvpn[.]pro
censortracker[.]pro
vpncity[.]live
wayinai[.]live
readermodeext[.]info
moonsift[.]store
extensionpolicyprivacy[.]com
policyextension[.]info
extensionpolicy[.]net
checkpolicy[.]site
extensionbuysell[.]com
aiforgemini[.]com
blockforads[.]com
ytbadblocker[.]com
geminiforads[.]com
adskiper[.]net
149[.]248[.]2[.]160 45.76.225[.]148
Here are the base domains extracted from the provided list:
chatgptextension[.]site
graphqlnetwork[.]pro
tkv2[.]pro
iobit[.]pro
internetdownloadmanager[.]pro
searchgptchat[.]info
pieadblock[.]pro
gptdetector[.]live
castorus[.]info
searchaiassitant[.]info
ultrablock[.]pro
internxtvpn[.]pro
savechatgpt[.]site
tkpartner[.]pro
wakelet[.]ink
yescaptcha[.]pro
videodownloadhelper[.]pro
parrottalks[.]info
proxyswitchyomega[.]pro
bookmarkfc[.]info
dearflip[.]pro
cyberhavenext[.]pro
uvoice[.]live
primusext[.]pro
yujaverity[.]info
censortracker[.]pro
vidnozflex[.]live
extensionpolicyprivacy[.]com
tinamind[.]info
locallyext[.]ink
vpncity[.]live
policyextension[.]info
wayinai[.]live
moonsift[.]store
readermodeext[.]info
checkpolicy[.]site
extensionpolicy[.]net
linewizeconnect[.]com
extensionbuysell[.]com
savgptforchrome[.]pro
bardaiforchrome[.]live
searchcopilot[.]co
chatgptextent[.]pro
youtubeadsblocker[.]live
geminiaigg[.]pro
gpt4summary[.]ink
blockadsonyt[.]vip
chataiassistant[.]pro
savegptforyou[.]live
goodenhancerblocker[.]site
ultrablock[.]pro
proxyswitchyomega[.]pro
dearflip[.]pro
vidnozflex[.]live
wakelet[.]ink
pieadblock[.]pro
locallyext[.]ink
tinamind[.]info

IOCs on GitHub

If the community has any additional input, please let us know.

https://github.com/DomainTools/SecuritySnacks/blob/main/2025/CyberhavenCampaign

Learn More
Research
Industrial Spam Network

Overview

Domain hijacking attacks like subdomain takeover and SPF hijacking take advantage of vulnerable or stale configurations in a target domain. The vulnerable domains are then leveraged in spam or phishing campaigns or to spread malware. They can be particularly successful as they can take advantage of the target domain’s established reputation to subvert spam filters and other reputation-based detections.

Subdomain Takeover

In the case of subdomain takeover, attackers look for subdomains that are configured to point to a service that does not appropriately handle subdomain ownership verifications. 

Attackers can identify subdomains pointing to other services by using a range of openly available tools such as Sublist3r, Assetfinder, and ReconNG. Attackers would then check for vulnerable services such as those that allow custom domain names like GitHub pages, AWS S3 or by looking for domains that continue to point to services that no longer exist. 

Exploiting these vulnerable domains allows the attacker to host malicious content such as phishing pages or malware from the domain. This type of attack may allow for “subdomailing”, which refers to the type of email spoofing attack that leverages subdomains of a legitimate domain to send fraudulent emails.

Example DNS log of a potentially vulnerable subdomain:

mail.vulnerable-domain[.]com.  IN  CNAME  
pages.githubusercontent[.]com.

This shows that mail.vulnerable-domain[.]com points to GitHub pages. If for example the associated GitHub pages repository were deleted and the DNS record is unchanged, an attacker could re-create the deleted repository under the same name. In effect, allowing the attacker to control the content of the target domain.

SPF Hijacking

In contrast to subdomain takeover, SPF Hijacking occurs when an attacker gains access to a target’s DNS records either via the registrar or by exploiting vulnerabilities in the DNS infrastructure. Once the attacker has access they can modify the SPF record of a domain. For example, the attacker could add in one of their own domains into the target domain’s SPF record. In effect, this would allow the attacker to send emails that would appear to be originating from the target’s domain.

Example DNS log of a vulnerable SPF record:
vulnerable-domain[.]com. IN TXT "v=spf1 mx -all"

Example attacker tool to modify a DNS record of a target domain:
pdnsutil modify record vulnerable-domain[.]com TXT 'v=spf1 mx attacker-domain[.]com -all'

Example DNS log of the compromised SPF record for domain insertion:
vulnerable-domain[.]com. IN TXT "v=spf1 mx attacker-domain[.]com -all"

In the examples above, pdnsutil, a powerful DNS management tool, is used to modify the “TXT” record of a vulnerable domain to include the attacker’s domain in a new SPF record "v=spf1 mx attacker-domain[.]com -all"

Hunting

Pivoting off a report by Guardio in February 2024, which detailed a large campaign of subdomailing activity involving two attacker domains inserted into vulnerable DNS records.

harrisburgjetcenter[.]com
greaterversatile[.]com

Equipped with knowledge about domain takeover attacks, we can hunt for characteristics of subdomain takeover and SPF hijacking.

To start, we may take similar approaches to an attacker in which passive reconnaissance tools or historical DNS and web scanner data aggregators are leveraged to passively identify potentially vulnerable domain configurations.

Reviewing recent DNS records for actor domain greaterversatile[.]com in RDATA:

First Seen RRNAME RDATA
2024-11-03 tracks.vooyo[.]id. "v=spf1 include:harrisburgjetcenter[.]com include:greaterversatile[.]com -all"
2024-08-04 sync-me.co[.]uk. "v=spf1 include:harrisburgjetcenter[.]com include:greaterversatile[.]com -all"
2024-08-02 hangzhousccom.s5k.86sudu[.]net. "v=spf1 include:harrisburgjetcenter[.]com include:greaterversatile[.]com -all"
2024-08-02 alboan_lp.thephilanthropicapp[.]com. "v=spf1 include:harrisburgjetcenter[.]com include:greaterversatile[.]com -all"

Breaking down the RDATA: "v=spf1 include:harrisburgjetcenter[.]com include:greaterversatile[.]com -all"

  1. v=spf1: indicates it's an SPF record version 1, the most commonly used version.
  2. include:harrisburgjetcenter[.]com: instructs the receiving mail server to consult the SPF record hosted on the domain harrisburgjetcenter[.]com. The receiving server will then use that record to determine if an email claiming to originate from the original domain is legitimate.
  3. include:greaterversatile[.]com: the receiving server will also consult the SPF record hosted on greaterversatile[.]com
  4. -all: specifies a "hard fail" for any email that doesn't pass the SPF check based on the included records. In other words, any email not authorized by the records from harrisburgjetcenter[.]com or greaterversatile[.]com will be rejected.

Reviewing recent DNS records for actor domain greaterversatile[.]com in RRNAME:

First Seen RRNAME RDATA
2024-02-06 greaterversatile[.]com. "v=spf1 include:nostrezz[.]com include:discussionapps[.]com include:tessiesantiago[.]com include:winningwebs[.]com include:crowleylouisiana[.]com include:constancespry[.]com include:gigabytestores[.]com include:mailmyorder[.]com include:clothesforfit[.]online include:bamboozlebarges[.]com ip4:139.162.114.162 ip4:139.162.114.194 ip4:139.162.114.243 ip4:139.162.114.252 ip4:139.162.114.77 ip4:139.162.135.240 ip4:139.162.135.50 ip4:139.162.150.80 ip4:139.162.154.171 ip4:139.162.154.181 ip4:139.162.154.222 ip4:139.162.176.50 ip4:1" "39.162.154.43 ip4:139.162.186.198 ip4:139.162.186.64 ip4:139.162.34.36 ip4:139.177.176.124 ip4:139.162.36.56 ip4:139.177.176.143 ip4:139.177.176.189 ip4:139.177.176.34 ip4:172.104.115.104 ip4:172.104.115.106 ip4:172.104.115.110 ip4:172.104.110.219 ip4:172" ".104.120.48 ip4:172.104.115.112 ip4:172.104.132.134 ip4:172.104.115.113 ip4:172.104.159.162 ip4:172.104.115.114 ip4:172.104.159.25 ip4:172.104.159.45 ip4:172.104.115.131 ip4:172.104.115.134 ip4:172.104.115.135 ip4:172.104.115.143 ip4:172.104.115.145 ip4:1" "72.104.115.150 ip4:172.104.115.182 ip4:172.104.115.194 ip4:172.104.115.201 ip4:172.104.115.210 ip4:172.104.115.220 ip4:172.104.115.227 ip4:172.104.115.234 ip4:172.104.115.242 ip4:172.104.115.243 ip4:172.104.115.5 ip4:172.104.115.75 ip4:172.104.115.76 ip4:" "172.104.115.79 ip4:172.104.115.83 ip4:172.104.115.95 ip4:172.104.151.14 ip4:172.104.151.76 ip4:172.104.243.226 ip4:172.104.245.100 ip4:172.104.245.102 ip4:172.104.245.12 ip4:172.105.249.106 ip4:172.105.90.47 ip4:172.105.90.63 ip4:172.105.92.60 ip4:172.105" ".92.98 ip4:194.233.164.223 ip4:194.233.164.99 ip4:194.233.167.103 ip4:194.233.167.108 -all"
2024-10-24 greaterversatile[.]com. ""v=spf1 include:instanttranslates.dynu[.]net include:informationshout.dynu[.]net -all""

The above DNS records shows that the actor domain greaterversatile[.]com had SPF records in February 2024 that point to several domains and hundreds of IP addresses and in October 2024 was updated to point to two dynamic DNS domains.

Due to the grouping of SPF record placing, the following domains are likely also actor owned during their respective times of association.

nostrezz[.]com
discussionapps[.]com
tessiesantiago[.]com
winningwebs[.]com
crowleylouisiana[.]com
constancespry[.]com
gigabytestores[.]com
mailmyorder[.]com
clothesforfit[.]online
bamboozlebarges[.]com
instanttranslates.dynu[.]net
informationshout.dynu[.]net

In summary of the above records if the domain tracks.vooyo[.]id sends email, the receiving mail server would attempt to validate the SPF records from the actor domains harrisburgjetcenter[.]com and greaterversatile[.]com, which would then be routed again to instanttranslates.dynu[.]net and informationshout.dynu[.]net.

The following DNS records for instanttranslates.dynu[.]net. indicate additional SPF routing would take place.

First Seen RRNAME RDATA
2024-10-21 instanttranslates.dynu[.]net. "v=spf1 include:universitygreatchoices.gleeze[.]com include:perfectdiplomaforyou.kozow[.]com include:neverstoplearning.dynuddns[.]com include:instantuniversityinscription.ddnsfree[.]com include:universityexchangeinfo.freeddns[.]org include:strategyandplansaction.fre" "eddns[.]org include:universitygrades.mywire[.]org include:resourcesanddocuments.gleeze[.]com include:multimedialearningskills.kozow[.]com -all"
2024-10-21 instanttranslates.dynu[.]net. "v=spf1 include:universitygreatchoices.gleeze[.]com include:perfectdiplomaforyou.kozow[.]com include:neverstoplearning.dynuddns[.]com include:instantuniversityinscription.ddnsfree[.]com include:universityexchangeinfo.freeddns[.]org include:strategyandplansaction.freeddns[.]org include:universitygrades.mywire[.]org include:resourcesanddocuments.gleeze[.]com include:multimedialearningskills.kozow[.]com -all"
2024-08-08 instanttranslates.dynu[.]net. "v=spf1 include:justifyintegrated.accesscam[.]org include:handlerhedriver.accesscam[.]org include:occupationsociety.casacam[.]net include:commemorate.ddnsfree[.]com include:requestdistort.ddnsgeek[.]com include:strategicpromote.freeddns[.]org include:biographydetermine.giize[.]com include:compartmentrelevance.gleeze[.]com include:multimediatan.kozow[.]com -all"

Due to their use in the SPF records of other actor domains, these additional dynamic DNS domains also acting as SPF redirectors are likely actor operated domains as well:

universitygreatchoices.gleeze[.]com
biographydetermine.giize[.]com
commemorate.ddnsfree[.]com
compartmentrelevance.gleeze[.]com
handlerhedriver.accesscam[.]org
instantuniversityinscription.ddnsfree[.]com
justifyintegrated.accesscam[.]org
multimedialearningskills.kozow[.]com
multimediatan.kozow[.]com
neverstoplearning.dynuddns[.]com
occupationsociety.casacam[.]net
perfectdiplomaforyou.kozow[.]com
requestdistort.ddnsgeek[.]com
resourcesanddocuments.gleeze[.]com
strategicpromote.freeddns[.]org
strategyandplansaction.freeddns[.]org
universityexchangeinfo.freeddns[.]org
universitygrades.mywire[.]org

Subsequently looking up the SPF redirects for universitygreatchoices.gleeze[.]com and others identifies records such as the following in which the designated IP ranges are authorized to send mail by the original domain.

First Seen RRNAME RDATA
2024-12-09 universitygreatchoices.gleeze[.]com. ""v=spf1 ip4:169.254.95.120 ip4:81.7.16.166 ip4:91.143.91.100 ip4:212.23.222.100 ip4:212.23.222.102/31 ip4:91.228.12.147/28 ip4:91.228.12.160/28 ip4:91.228.12.176 ip4:63.141.247.144/29 ip4:158.69.99.224/29 ip4:167.114.154.18 ip4:192.95.49.96/30 ip4:198.27.9" "5.240/28 ip4:198.50.160.232 ip4:198.50.160.250 ip4:61.255.174.141/30 ip4:61.255.174.144/28 ip4:61.255.174.160/30 ip4:61.255.174.179/29 ip4:195.254.134.64/27 ip4:23.105.32.64/29 ip4:23.105.32.73 ip4:45.92.29.240/28 ip4:193.39.184.224/28 ip4:23.105.132.157/30 ip4:23.105.132.160/29 ip4:45.130.201.8/30 ip4:45.130.201.88/29 ip4:45.130.201.128/28 ip4:45.130.201.150 ip4:45.130.201.161 ip4:45.130.201.180 ip4:45.130.201.186 ip4:45.130.201.201 ip4:45.130.201.211 ip4:45.130.201.240/28 ip4:37.235.49.209 ip4:37.235.49.214 ip4:51.38.246.64/30 ip4:69.61.90.49 ip4:69.61.94.33 ip4:69.61.95.20 ip4:69.174.102.208 ip4:104.223.94.253 ip4:142.4.195.32/29 ip4:142.44.135.12 ip4:142.44.135.127 ip4:144.217.46.144/29 ip4:144.217.117.34 ip4:149.56.78.219 ip4:151.236.24.159 ip4:185.215.186.128/29 ip4:192.71.218.35 ip4:192.71.218.82 ip4:192.95.57.0/30 ip4:192.99.176.248/29 ip4:217.182.120.160/30 ip4:5.189.187.81 ip4:5.189.134.15 ip4:5.189.134.16/30 ip4:2.58.203.26 ip4:2.58.203.33 ip4:2.58.203.36 ip4:2.58.203.51 ip4:45.67.85.8/31 ip4:45.67.85.12 ip4:45.67.85.20 ip4:45.67.85.28 ip4:45.67.85.41 ip4:45.67.85.47 ip4:45.67.85.62/31 ip4:63.141.232.128/27 ip4:89.34.97.64/27 ip4:216.211.204.63 ip4:216.211.204.64 ip4:216.211.204.71 ip4:216.211.204.77 ip4:216.211.204.79 ip4:149.50.96.53 ip4:149.50.102.119 ip4:149.50.102.120/29 ip4:149.50.102.128/29 ip4:149.50.102.144 ip4:149.50.102.254 ip4:149.50.103.0/28 ip4:149.50.103.24 ip4:94.156.239.216/29 ip4:94.156.239.224/27 ip4:185.99.2.80/28 ip4:185.99.2.96/30 ip4:185.164.32.96/28 ip4:185.164.32.112/29 ip4:185.164.32.11 ip4:31.56.241.27 ip4:31.56.241.86 ip4:31.56.241.120/30 ip4:162.213.211.64/29 ip4:162.251.120.172 ip4:162.251.122.160/27 ip4:172.96.14.24/29 ip4:204.10.162.128/29 ip4:45.92.29.224/28 ip4:199.66.92.32/27 -all""

The following diagram shows how the chained SPF records create multiple layers of redirects.

In summary, the chained SPF records create multiple layers of SPF redirects. This may serve to obfuscate the originating mail servers and distribute infrastructure to increase resiliency from disruptions affecting portions of the network. It may also serve to evade detection by hindering analysis by making it difficult for anti-spam and security researchers to identify patterns and write signatures to detect and block the network and the activity it is being used for.

The Senders

Sampling the IP addresses in the RDATA records show a trend of mail servers, reverse DNS, Apache HTTP servers, and Squid Cache servers.

The IPs associated domains to the SPF records were also observed hosting content such as the following samples:

Indicators & Search Hashes Web Screenshots
*[.]megajobsusa[.]com
Shodan hash:-1137946516
ShodanHttp.html_hash:581214383
Censysservices.banner_hashes="sha256:3a47dc2a58324647af74c539d6e9eceb994f5ec3b49ff1744d164e6f340a9e29"
angelcamach0-github-io.pages[.]dev
callor[.]com
gamerchallenger[.]com
sunillulla[.]com

Domains hosting similar web content:

727.tcrouzet[.]com
aids.rainesupport[.]com
andrecordeiro[.]ch
andynope.maid-cafe[.]ch
angelcamach0-github-io.pages[.]dev
arianmisini[.]com
arizonaloud[.]de
asmicloudsolutions.github[.]io
bc.tekysupport[.]com
bluegum[.]media
callor[.]com
codefoundry.co[.]id
contier[.]kr
csms4.sistech[.]ai
cyberzootopia[.]com
dates.rainesupport[.]com
discoverplymouth[.]net
fhalo-resources[.]com
fu.hrps-it[.]com
gallotreeservices[.]com
github.speicher-dein-strom[.]de
helpinneed.asso.eu[.]org
hi.applyer.cn
leak[.]lk
ljxcfdfhkjgcqfeesvarpjqxegetudn.helpinneed.asso.eu[.]org
moneyantra[.]com
muhammeddemircan[.]com
nextlab[.]biz
pwaf2023[.]click
radarnextboy.rainesupport[.]com
regional-one[.]com.lga[.]sc
respons.gvcreation[.]fr
safecall.givero.co[.]kr
santiagolamora[.]com
sobatsoba[.]com
socarenergie[.]ch
tabiri[.]compassionateheartskenya[.]org
tuneastwood.rainesupport[.]com
twwebsitenotificationguardian.justinl[.]in
vorteile.hrps-it[.]com
www.adrygurumi.ortscorporate[.]com
www.dagondevelopment[.]com
www.donaubuild[.]com
www.hidro2clean[.]com/www/
www.insightsdigitalagency[.]com
www.khstalentbank[.]com
www.ldfg[.]se
xn--krakena-kb4c[.]com
zmv[.]sk

Conclusion

This research has only touched the surface of what appears to be a very large and well coordinated spam and phishing network taking advantage of DNS-related misconfigurations or weaknesses. Indications from domain and infrastructure pivots suggest the network has been operating since at least 2019 to present. The operators of the network appear to demonstrate awareness and response to security reports of their infrastructure and appear to have made multiple attempts to improve its resiliency to identification and disruptions.

Observables

727.tcrouzet[.]com
aaafield[.]com
aborretag[.]com
achingdish[.]com
adnecaring[.]com
adnespres[.]com
aerchers[.]com
ahniab[.]com
aids.rainesupport[.]com
airsacy[.]com
albuquerquejobsite[.]com
alsquil[.]com
amerstv[.]com
andrecordeiro[.]ch
andynope.maid-cafe[.]ch
anescat[.]com
angcheap[.]com
angelcamach0-github-io.pages[.]dev
anthigh[.]com
arcadiadomains[.]com
arianmisini[.]com
arizonaloud.de
aromaver[.]com
asecort[.]com
asmanspecs[.]com
asmicloudsolutions.github[.]io
ationmov[.]com
atiosurte[.]com
aucomplex[.]com
autoferbar[.]com
avemusica[.]com
bartapy[.]com
bartsam[.]com
basicempre[.]com
bc.tekysupport[.]com
bearele[.]com
beargy[.]com
bearrope[.]com
befull[.]pro
begieclose[.]com
bericbires[.]com
betterhal[.]com
betterove[.]com
binarydron[.]com
biographydetermine.giize[.]com
biresth[.]com
bithorts[.]com
bitquil[.]com
blecally[.]com
blespeaker[.]com
blognapic[.]com
bluegum[.]media
blushdicid[.]com
blushtable[.]com
bonusang[.]com
bookcles[.]com
bughtsurte[.]com
bulathoon[.]com
bumpergris[.]com
bundemidis[.]com
bunnymov[.]com
callor[.]com
callycous[.]com
capusabor[.]com
capuslong[.]com
caserojo[.]com
cenblush[.]com
chersberic[.]com
chocoundab[.]com
ciacat[.]com
circleqts[.]com
circuithed[.]com
civiccovercove[.]com
cliffaria[.]com
cliffjuly[.]com
cloeruby[.]com
cobalpalm[.]com
cocecheap[.]com
codefoundry.co[.]id
coleenv[.]com
collstran[.]com
commemorate.ddnsfree[.]com
compartmentrelevance.gleeze[.]com
contier[.]kr
coofwiki[.]com
cophhar[.]com
cophreor[.]com
cornmove[.]com
csms4.sistech.ai
currentrad[.]com
cyanapy[.]com
cyanbonnet[.]com
cyberzootopia[.]com
dates.rainesupport[.]com
daticol[.]com
dedhetera[.]com
defcips[.]com
defspoiler[.]com
denamark[.]com
dentalscroll[.]com
depiness[.]com
derdiving[.]com
derpear[.]com
desstequal[.]com
desstnorra[.]com
diacips[.]com
dicrhombus[.]com
dicwisty[.]com
discoverplymouth[.]net
dismsec[.]com
ditydesert[.]com
diuminfos[.]com
donepron[.]com
dopermo[.]com
duckoc[.]com
duodrawing[.]com
durablepic[.]com
eapmily[.]com
earthorm[.]com
elecoral[.]com
elerapid[.]com
elerased[.]com
ennicbus[.]com
entsdic[.]com
entsearth[.]com
envsky[.]com
envwer[.]com
eomeganet[.]com
eptcat[.]com
eptli[.]com
equesolive[.]com
essbumper[.]com
estwer[.]com
etcout[.]com
express-door[.]ru
falsignal[.]com
faradrain[.]com
farmsteadassist[.]com
feeldugout[.]com
ferspic[.]com
fhalo-resources[.]com
fieldabor[.]com
firenippe[.]com
fivevail[.]com
floodshieldguide[.]com
flowerpsed[.]com
fluxnorra[.]com
foundpurd[.]com
foxingtime[.]com
fu.hrps-it[.]com
fullcoil[.]com
gallotreeservices[.]com
gebumper[.]com
gerspask[.]com
gicpene[.]com
giculgusit[.]com
giculscan[.]com
giftedvist[.]com
github.speicher-dein-strom[.]de
glymain[.]com
glysource[.]com
greaterversatile[.]com
greygicul[.]com
grisphold[.]com
gusitbits[.]com
halclose[.]com
handleoper[.]com
handlerhedriver.accesscam[.]org
harrisburgjetcenter[.]com
hedhill[.]com
helpinneed.asso.eu[.]org
hesclose[.]com
heterafuel[.]com
heteratal[.]com
hexagonb[.]com
hexaspecs[.]com
hi.applyer.cn
hoodnero[.]com
hoodte[.]com
hoschers[.]com
idealcellphones[.]com
ilygu[.]com
ilytedd[.]com
inaayas[.]me
ineduse[.]com
infarmasa[.]com
infosdef[.]com
ingsous[.]com
ingunit[.]com
innersof[.]com
instantuniversityinscription.ddnsfree[.]com
inycooper[.]com
ioneplane[.]com
italyivers[.]com
ittunner[.]com
jamesest[.]com
jarstand[.]com
jarundes[.]com
jouleworld[.]com
justifyintegrated.accesscam[.]org
justlyjournal[.]com
kledfers[.]com
leak[.]lk
leftfarad[.]com
lentgon[.]com
letdiplay[.]com
levcobal[.]com
liglissa[.]com
lilaccyan[.]com
lilcheap[.]com
liliotegli[.]com
lisemain[.]com
lissachor[.]com
listhy[.]com
litelev[.]com
ljxcfdfhkjgcqfeesvarpjqxegetudn.helpinneed.asso.eu[.]org
lobyvill[.]com
logerbus[.]com
logergy[.]com
longtermcover[.]com
lublicgear[.]com
macbookdigest[.]com
maggede[.]me
makeapy[.]com
maltditing[.]com
mangrapid[.]com
mantdrove[.]com
marryzinc[.]com
maticgic[.]com
mauveitaly[.]com
mauveplug[.]com
meansarrow[.]com
meetve[.]com
mesany[.]com
mesotheliomainsights[.]org
mesplug[.]com
mikcheap[.]com
miromali[.]com
mishdep[.]com
mishsy[.]com
misshans[.]com
mixgifted[.]com
mizrrworold[.]ru
mollyrhes[.]com
monesnic[.]com
moneyantra[.]com
monodvill[.]com
mopmeni[.]com
mostmit[.]com
movieeap[.]com
mrscoph[.]com
muhammeddemircan[.]com
multimedialearningskills.kozow[.]com
multimediatan.kozow[.]com
muncatic[.]com
namecapus[.]com
nanomoder[.]com
nauticalguardian[.]com
nearmagnet[.]com
needvist[.]com
neverstoplearning.dynuddns[.]com
nextlab[.]biz
ninebash[.]com
nippelia[.]com
norratesla[.]com
nyakundireport[.]com
occupationsociety.casacam[.]net
ockledel[.]com
ocklerased[.]com
octomation[.]app
ohmmilky[.]com
olrosa[.]com
onicpic[.]com
opagarin[.]com
operrojo[.]com
ormamber[.]com
ormcoof[.]com
orsexess[.]com
osnhans[.]com
ovepres[.]com
partsruppo[.]com
pastroll[.]com
pearhyl[.]com
pediarous[.]com
perfectdiplomaforyou.kozow[.]com
permostar[.]com
picofrank[.]com
picomeans[.]com
picsspres[.]com
pinhaged[.]com
pizzakled[.]com
placeooo[.]com
plateoze[.]com
playloger[.]com
porkgro[.]com
powlsquick[.]com
psedined[.]com
psloon[.]com
pwaf2023[.]click
pykelly[.]com
qsurte[.]com
quickine[.]com
quilthat[.]com
radarnextboy.rainesupport[.]com
raindroel[.]com
ramtable[.]com
rapidpor[.]com
rasedenity[.]com
realtrion[.]com
regional-one[.]com.lga.sc
reorwif[.]com
requestdistort.ddnsgeek[.]com
resourcesanddocuments.gleeze[.]com
respons.gvcreation[.]fr
resslear[.]com
restliam[.]com
rfmac[.]com
riddlearea[.]com
rinlook[.]com
roerin[.]com
rollwer[.]com
rosapic[.]com
rotcoffe[.]com
rousrin[.]com
rouwal[.]com
safecall.givero.co[.]kr
samberic[.]com
santiagolamora[.]com
sarumi[.]ir
sarumihome[.]ir
scanged[.]com
scrormake[.]com
sheildmona[.]com
shieldshelf[.]com
shiftity[.]com
sifemedia[.]com
siotitan[.]com
sitegicul[.]com
sitesstorm[.]com
smuerule[.]com
sobatsoba[.]com
socarenergie[.]ch
somonlus[.]com
somonscror[.]com
spersosel[.]com
spoilerus[.]com
stased[.]com
strategicpromote.freeddns[.]org
strategyandplansaction.freeddns[.]org
sunillulla[.]com
surtecal[.]com
susdem[.]com
syletc[.]com
symgrey[.]com
tabiri[.]compassionateheartskenya[.]org
tealblanco[.]com
tealcharge[.]com
tebaned[.]com
thilystat[.]com
tinhexagon[.]com
tiptrent[.]com
tolltunner[.]com
toothidly[.]com
tuneastwood.rainesupport[.]com
tunnerhar[.]com
turdess[.]com
turelses[.]com
turkeyhigh[.]com
turkishtraders[.]net
twwebsitenotificationguardian.justinl[.]in
tydraw[.]com
uncerain[.]com
unclemones[.]com
undbory[.]com
undesquil[.]com
uniqrapid[.]com
universityexchangeinfo.freeddns[.]org
universitygrades.mywire[.]org
universitygreatchoices.gleeze[.]com
unraoanker[.]com
untprint[.]com
verrhes[.]com
videosinfo[.]com
videothily[.]com
viewank[.]com
villdeer[.]com
vipcys[.]com
vipspask[.]com
vitmisly[.]com
volveenv[.]com
volvesing[.]com
volvesus[.]com
vorteile.hrps-it[.]com
watchfal[.]com
websoff[.]net
weekge[.]com
wellnavy[.]com
whivecpu[.]com
whiveparts[.]com
wootybag[.]com
wormicro[.]com
wrindia[.]com
www.adrygurumi.ortscorporate[.]com
www.dagondevelopment[.]com
www.donaubuild[.]com
www.hidro2clean[.]com/www/
www.insightsdigitalagency[.]com
www.khstalentbank[.]com
www.ldfg[.]se
xn--krakena-kb4c[.]com
yearnano[.]com
yedsures[.]com
yercraig[.]com
yerunt[.]com
yukedmin[.]com
yukedtupe[.]com
zapedit[.]com
zincbart[.]com
zincwinter[.]com
zipperazul[.]com
zippermake[.]com
zipsiren[.]com
zmv[.]sk

Learn More
Research
BlackBerry, SloppyLemming, and Guess Who...Cloudflare

On 18 November 2024, BlackBerry’s threat research team reported on a cyber espionage campaign targeting the Pakistan Navy. This campaign used malicious documents to collect credentials and distribute malware. While BlackBerry did not attribute this activity to a specific actor, subsequent analysis by DomainTools revealed significant overlaps in tactics, techniques, procedures (TTPs), and targeting scope with the cyber-espionage group known as SloppyLemming.

Review of BlackBerry Report

Recent activity from this campaign involved the deployment of a malicious PDF document in early September 2024. The document resembles an internal IT memo, instructing recipients on integrating Axigen Thunderbird for secure email communications. The document contained a link to a malicious website (paknavy.rf[.]gd) mimicking the legitimate Pakistan Navy domain.

Upon visiting the fraudulent site, users were prompted to download a ZIP file, “Axigen_Thunderbird.zip,” which included a malicious Thunderbird extension. Once installed, the extension requested credentials for “@paknavy.gov.pk” email addresses. Entered credentials were transmitted to an actor-controlled domain (updateschedulers[.]com), and the extension downloaded a malware payload hosted on the same domain. BlackBerry researchers identified the malware as a variant of Sync-Scheduler. Public reporting from March 2024 first identified this malware family and its use of  the domain packageupdates[.]net for command and control (C2). BlackBerry also identified related activity in the May/June 2024 time frame using the C2 domain extension.webmailmigration[.]com.

Further analysis by DomainTools uncovered an additional likely associated domain: diplomaticservices[.]link. Whois data from this domain shows a registrant organization of “National Telecom Corporation” likely referencing the Pakistani government’s telecommunications provider. The only other domain using this registrant organization since 2010 is the webmailmigration[.]com domain from the BlackBerry report. 

Overlap with SloppyLemming Actor 

In September 2024, Cloudflare’s threat research team reported on an India-nexus cyber espionage actor it dubbed SloppyLemming (aka OUTRIDER TIGER). This actor primarily targets Pakistan, with a focus on government and defense. SloppyLemming frequently leverages its custom CloudPhish credential logging tool on Cloudflare Worker domains to compromise email credentials from targeted individuals. One of the mail clients CloudPhish specifically targeted was Axigen, which was the mail client referenced in the malicious activity covered in the BlackBerry report. SloppyLemming also employed PDF documents for credential collection and malware delivery.

Data from the urlscan.io scanning service shows an Axigen webmail credential phishing page present on www.login.webmailmigration[.]com in April 2024. Similar Axigen phishing pages present on the following domains between February and July 2024:

  • mail-pakchinainvest-com.niancao010.workers[.]dev
  • webmail.cybar-net-pk.workers[.]dev
  • mail.pof-gov-pk.workers[.]dev

These domains use a similar domain naming convention to that detailed in the SloppyLemming report.

Figure 1. Screenshot of credential phishing pages present on www.login.webmailmigration[.]com in April 2024 (left) and mail.pof-gov-pk.workers[.]dev in August 2024 (right)

Additional similarities between the recent BlackBerry and Cloudflare’s reports include the actor’s use of malicious PDFs malware delivery and a Pakistan-centric target scope. 

Conclusion

It is likely that SloppyLemming is the actor responsible for the malicious activity described in BlackBerry’s recent report. This assessment is made with low confidence based on similar credential phishing and malware delivery TTPs, as well a Pakistan-focused target scope. However, it is plausible that the BlackBerry report discusses a separate actor from SloppyLemming that is employing similar TTPs.

IOCs

paknavy[.]rf[.]gd
updateschedulers[.]com
packageupdates[.]net
finance-gov-pk[.]rf[.]gd
extension[.]webmailmigration[.]com
diplomaticservices[.]link

Learn More
Research
Fake Job Boards

Fake government job boards attempt to trick job seekers into providing personal information that may be used for fraud, phishing, or other malicious purposes. The bad actors behind these fake job boards cause harm by either soliciting an application fee from victims or by instructing them to download malicious files or deceiving victims into giving personal information such as resumes, historic addresses and contact information.

Multiple countries were identified as targeted by a high number of fake government job boards. For instance, many of the identified domains masquerading as US government job boards were reportedly associated with email campaigns. Those in Pakistan and India appear largely fraud related and employ WhatsApp and Telegram groups. Fake Taiwanese government job postings are suspected to be harvesting personal information for phishing and fraud.

Similarly, nation states such as North Korea also host fake job postings for phishing, and creating fake personas in attempts to be hired by and gain access to western tech companies.

Details

Fake US Government Job Websites

A cluster of domains that goes back to early as 2017 and associated mail servers have been used in email spam. The domain names masquerade as government job or contract bid sites. The domains are frequently configured to redirect to legitimate government job sites such as govcb[.]com and governmentcontracts[.]us likely for the purpose of appearing more legitimate upon inspection.

Example mail server:

Website Titles Domains
Government Contracts | State, Local, and Federal Contract Opportunities in U.S. govcb-bids-alert[.]us
govcb-bids-bulletin[.]us
govcb-bids-notice[.]us
govcb-contracts-alert[.]us
govcb-contracts-news[.]us
govcb-contracts-notice[.]us
governmentbiddersinfo[.]us
governmentbiddinginfo[.]us
governmentcontracts-bids[.]us
governmentcontracts-opps[.]us
govnt-contracts-bulletin[.]us
govnt-contracts-news[.]us
govnt-contracts-notice[.]us
govtcontracts-bids-news[.]us
govtcontracts-bids-notice[.]us
topicfocus[.]com
usagovnmt-bids-alert[.]us
usagovnmt-contracts-alert[.]us
IP Addresses Email Addresses
185.227.110.78
44.215.207.48
bizoppscast[@]gmail[.]com
9d8a0b48cf9f33e2s[@]gmail[.]com
openfos[@]gmail[.]com
ibcwork2000[@]gmail[.]com
bobbykin[@]gmail[.]com
dnswizard[@]gmail[.]com

Fake Taiwanese Government Job Websites

Spoofing as the legitimate taiwanjobs[.]gov[.]tw website for the purposes of phishing, information gathering, and credential harvesting. Taiwanjobs[.]gov[.]tw website reports the following message of ongoing phishing activity using fake look alike websites.

Website Titles Domains
台灣就業通 - 找工作 -- 一般會員登入 taiwanjobs-govi[.]store
job-taiwanjobs-gov[.]shop
taiwanjobs-gov[.]shop
taiwanjobs-govl[.]shop
taiwanjobs-govi[.]shop
taiwanjobs-govi[.]store
taiwanjobs.tv-login[.]shop
taiwanjobs.login-hk[.]shop

Fake MELA Government Job Websites

Mela Network is the Middle Eastern arm of a global network spanning 46 countries. Their website states: “Mela's mission is to help executives in the MENA (Middle East and North Africa) region grow professionally and personally by exposing them to best practices in leadership and connecting them with a global network of peers.” [https://melanetwork.org/]

Website Titles Domains
Latest Government Job Updates govtjobmela[.]com
WhatsApp / Telegram / Form Links Trackers
https[:]//whatsapp[.]com/channel/0029VamcZ7z2f3EFetXjBT0Y
https[:]//forms[.]gle/cMGVxKaQtedP5aEn9
https[:]//docs.google[.]com/forms/d/e/1FAIpQLSc6XXH5piHCg6NAqf32tqifOCgGLoxsvSvvI7z7K7GDVvJGJw/viewform?usp=send_form
N/A

Fake Indian Government Job Websites

Website Titles Domains
Homepage - Indian government job
Odisha govt job.in
Free Govt.Jobs New
indiangovermentjob[.]com
odishagovtjobb[.]com
freegovtjobsnews[.]in
WhatsApp / Telegram Links Trackers
https[:]//whatsapp[.]com/channel/0029Vaf9yFa8qIzszkVsxC22
https[:]//t[.]me/odishagovtjobs_in
https[:]//telegram[.]me/freegovtjobsnews
https[:]//whatsapp[.]com/channel/0029Va9BF444tRrpPdiJ9Q3m
https[:]//www.googletagmanager[.]com/gtag/js?id=AW-827762966
https[:]//www.googletagmanager[.]com/gtag/js?id=G-CB0GVX4XGH
https[:]//www.googletagmanager[.]com/gtag/js?id=G-2FFTX02ZD9
https[:]//www.googletagmanager[.]com/gtag/js?id=G-B2J2TJBSQ1

Fake Pakistan Government Job Websites

Fake Pakistan government job boards similar to those for Indian government job boards. WhatsApp channels and Telegram group links are displayed on pages. Many of these sites are suspected to be used for phishing and fraud. 

Website Titles Domains
Latest Government Jobs in Pakistan
Pakistan Governments Jobs 2024
Pakistan Governments Jobs
Government Jobs in Pakistan
govtpakjobz[.]com
govtpakjobz[.]world
govtsjobspak[.]com
pakgovtsjobs[.]com
govtjobspk[.]online
dailygovtjob[.]site
allgovtjobz[.]pk
pkgovtjobz[.]site
pakistanigovtjobs[.]com
govtjobz[.]online
WhatsApp / Telegram Links
https[:]//whatsapp[.]com/channel/0029VakKrcuHLHQaZ1GCtn0y

Conclusion

Fake job boards are common around the world. They seek to take advantage of job seeker’s motivations in order to harvest personal information and may lead into additional fraud schemes, phishing, identity theft, and malware delivery.

Job seekers should conduct research on job postings before applying, recognize domain name masquerades and be wary of unsolicited job offers. Additionally, it's crucial to recognize red flags such as unexpected fees, high-pressure tactics, requests for sensitive personal information, and unknown personas offering special favors.

IOCs

govcb-bids-bulletin[.]us
govtcontracts-bids-notice[.]us
govtcontracts-bids-news[.]us
govcb-bids-alert[.]us
governmentbiddinginfo[.]us
governmentbiddersinfo[.]us
govcb-bids-notice[.]us
govcb-contracts-notice[.]us
govcb-contracts-news[.]us
govcb-contracts-alert[.]us
governmentcontracts-opps[.]us
governmentcontracts-bids[.]us
topicfocus[.]com
govnt-contracts-notice[.]us
govnt-contracts-news[.]us
govnt-contracts-bulletin[.]us
usagovnmt-contracts-alert[.]us
usagovnmt-bids-alert[.]us
govnmtcontractsbulletin[.]us
govnmt-contracts-notice[.]us
usagovnmt-bid-opps[.]us
usagovnmt-contract-opps[.]us
govnmt-contracts-board[.]us
usagovnmt-contractopps[.]us
govnmt-contractsboard[.]us
usagovnmt-bizopps[.]us
govnmt-contractbids[.]us
govnmtcontractsboard[.]us
govnmtcontractbids[.]us
usagovnmtbizopps[.]us
usagovnmtcontractopps[.]us
usa-govt-bid-opps[.]us
government-bids-notice[.]us
usagov-bidopps[.]us
usa-govt-bizopps[.]us
usa-govt-biz-opps[.]us
usa-govt-bids[.]us
governmentbids-alert[.]us
usa-govtbidopps[.]us
govbids-alert[.]us
usagovt-bidopps[.]us
usa-gov-bidopps[.]us
usa-gov-bizopps[.]us
usagov-bizopps[.]us
gov-bidsnotice[.]us
govbidopps[.]com
thytalk[.]us
wzip[.]us
usagvnmtcontractopps[.]us
usagvnmtbizopps[.]us
govnmtcontractsalert[.]us
govnmtcontractsnotice[.]us
govnmtcontractsnews[.]us
govnmtcontractsannounce[.]us
usagvnmtcontracts[.]us
usagvnmtbusiness[.]us
government-contracts[.]us
bidsguide[.]com
govnmtcontractnotice[.]us
usagovnmtbusiness[.]us
usagovnmtcontracts[.]us
govntcontractsbulletin[.]us
govntcontractnotice[.]us
usagovntcontracts[.]us
usagovntbusiness[.]us
govntcontractsnews[.]us
govntcontractsannounce[.]us
usagvntcontracts[.]us
usagvntbusiness[.]us
govntcontractsnotice[.]us
usagvntbizopps[.]us
govntcontractsalert[.]us
usagvntcontractopps[.]us
bidopps[.]us
govbids[.]us
govnt-contractsnotice[.]us
usagvnt-contractopps[.]us
govnt-contractsalert[.]us
usagvnt-bizopps[.]us
govnt-contracts-alert[.]us
usagovnt-contract-opps[.]us
usagovnt-businessopps[.]us
usagovt-contract-opps[.]us
govt-contractsnetwork[.]us
usagovt-business-opps[.]us
govt-bidsnetwork[.]us
usagovt-contractopps[.]us
gov-bidsnetwork[.]us
gov-contractsnetwork[.]us
usagovt-businessopps[.]us
usagovt-bids[.]us
usagov-business-opps[.]us
usagov-contract-opps[.]us
govt-contracts-notice[.]us
govt-contracts-alert[.]us
government-contracts-alert[.]us
usagov-businessoopps[.]us
gov-contracts-notice[.]us
gov-contracts-alert[.]us
usa-govtbizopps[.]us
usagov-businessopps[.]us
usagov-contractopps[.]us
government-contracts-notice[.]us
govnt-bidsnotice[.]us
govnt-bidsalert[.]us
usagovbiz-opps[.]us
usagovbid-opps[.]us
government-contractsalert[.]us
government-contractsnotice[.]us
government-bidsnotice[.]us
government-bidsalert[.]us
usagovnt-businessopportunities[.]us
usagovnt-contractopportunities[.]us
govt-bids-notice[.]us
govt-bids-alert[.]us
government-bids-alert[.]us
governmentbids-notice[.]us
gov-bids-alert[.]us
govbids-notice[.]us
usagovt-bizopps[.]us
gov-bidsalert[.]us
gov-bidsnotice[.]us
govt-bids[.]us
govt-contracts[.]us
usagovntbidsnetwork[.]us
usagovntcontractsnetwork[.]us
government-bids[.]us
usagovtbidsnetwork[.]us
usagovtcontractsnetwork[.]us
govtbidsnetwork[.]us
govtcontractsnetwork[.]us
usagovntbusinessopportunities[.]us
usagovntcontractopportunities[.]us
topicfacts[.]com
govntbidsalert[.]us
govntbidsnotice[.]us
usagovntbidopps[.]us
usagovntbizopps[.]us
mfgpages-update[.]com
govntbusiness[.]us
govntcontract[.]us
usagovntbusinessopps[.]us
usagovntopportunities[.]us
wordvia[.]com
anydic[.]com
bidsalert[.]us
citydataregistry[.]com
citydirectorylisting[.]com
cityfoslisting[.]com
cityprofilelisting[.]com
cityprofileregistry[.]com
contractopps[.]us
govbidalert[.]com
govbidnotices[.]com
govbidsalert[.]com
govbidsnetwork[.]us
govbizopportunities[.]com
govbusinessopportunities[.]us
govcbinc[.]com
govcontractalert[.]com
govcontractopportunities[.]us
govcontractopps[.]com
govcontractsnetwork[.]us
governmentbidsguide[.]com
governmentbusinessopps[.]us
governmentcontractopps[.]us
governmentcontractsalert[.]us
governmentcontractsannounce[.]us
governmentcontractsbids[.]us
governmentcontractsinfo[.]us
governmentcontractsnotice[.]us
governmentcontractsopps[.]us
governmentopportunities[.]us
govtbidalerts[.]us
govtbids[.]us
govtbidsalert[.]us
govtbidsfocus[.]us
govtbidsnotice[.]us
govtbizopps[.]us
govtbusinessopportunities[.]us
govtcontractalerts[.]us
govtcontractopportunities[.]us
govtcontracts[.]us
govtcontractsfocus[.]us
gvtender[.]com
openb2bdirectory[.]com
openb2bsearch[.]com
openbizsearch[.]com
slbidgov[.]com
statelocalbids[.]com
usabidopportunities[.]com
usabidopps[.]com
usabizopportunities[.]com
usabizopps[.]com
usacontractingopps[.]us
usacontractopportunities[.]us
usagovbizopps[.]us
usagovcontractopps[.]us
usagovernmentbids[.]us
usagovernmentbusinessopportunities[.]us
usagovernmentcontractopportunities[.]us
usagovernmentcontracts[.]us
usagovernmentopportunities[.]us
usagovtbidopps[.]us
usagovtbizopps[.]us
usagovtbusinessopportunities[.]us
usagovtbusinessopps[.]us
usagovtcontractopportunities[.]us
usagovtcontractopps[.]us
usaopportunities[.]us
Learn More