Research

Back to Homepage
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
No items found.
Research
Chinese Malware Delivery Websites

Malicious Browsers, Messengers, VPNs, and More…

Hundreds of newly registered domains are actively targeting Chinese-speaking users with malware. This report analyzes this activity, detailing the range of deceptive lures employed, including imitations of messengers, browsers, VPNs, email services, and Adobe software.

Details

Since at least June of 2024, a cluster of over four hundred domains have been registered to host spoofed websites to deliver malware to Chinese-speaking users. Spoofed application download websites have included web browsers, VPNs, chat and email applications, as well as crypto wallet and online gambling related apps. These websites share several commonalities in registration details, backend infrastructure, website configurations, and theme. The following is a sampling of those domains.

Identified malware families have included Gh0stRAT, ValleyRAT, RemKos RAT, LummaStealer, RedLine and others.

Common registration details:

  • IP ASN: Amazon, CloudFlare, Alibaba, CloudRadium
  • Registrar: Dominet (HK) Limited, 22net, webcc, Gname
  • Nameserver Domain: alidns[.]com, cloudflare[.]cp, hndnsv1[.]com
  • IPs Resolved: 54.215.49[.]143 & 54.193.24[.]113
  • SSL Duration: 90 day

Screenshot of malicious domain “chrmpw[.]top”, which spoofs as a GPT Chrome download application

Delivery Domain chrmpw[.]top
Download URL https[:]//chrmpw.top/download.html
Filename GPTChromX64.exe
SHA256 29163c8afb477b27f700e1c5eac694a6cbb816a86c8eadbbbac6ba5c034a9c96
Dropped Files 443a4ce93232d56f0d1d15e6875f7eff5fc581f25df320e277608be0d1148fa1
Suspected Malware Family Gh0stRAT

Malicious domain kuailianlow[.]com, which spoofs as Kuailian Accelerator VPN (快连加速器)

Index.html

Both Download buttons contain an onclick=”down()” function call. 

The down() function call is contained in a script within the HTML. Its purpose is to construct the file download path. To accomplish this it references a dictionary variable “window” to retrieve the value from the key “filename”. 

The “filename.js” script is imported in the HTML and contains the window[‘filename’] value.

Delivery Domain kuailianlow[.]com
Download URL kuailianlow[.]com/download/letspn-latest.exe
Filename letspn-latest.exe
SHA256 1f58903b39f58568589776333d2752957c1dd1a2c5296fd2fd5343560f6be860
Contacted URLs http[:]//47.242.127[.]63:15628
Suspected Malware Trojan Downloader

“Where there's one rat, there's a nest”

Expanding the search for similar websites and domain registration patterns identifies several spoofed VPN download websites.

Commonalities include the use of a filename.js to hold the malicious filename, and coding Chinese language text as opposed to the legitimate websites displaying content based on the language settings in the client’s browser settings. The latter suggests a preference for targeting Chinese language users.

Multiple spoofed VPNs such as LetsVPN appear in online guides as popular choices for bypassing the censorship of the Great Chinese Firewall.

Delivery Domain kipkshsa[.]top
Download URL kipkshsa[.]top/download/letsvppn-latest.msi
Filename letsvppn-latest.msi
SHA256 d1c9957bd55933a619d22e741fadcee6085e679e66af5cd8edbff7d9cf8fd4cf927474984e549f9d1269950e5782f755cb96f11d404a3cac56114d1e795609c5
Stage 2Download URL https[:]//fs-im-kefu.7moor-fs1[.]com/ly/4d2c3f00-7d4c-11e5-af15-41bf63ae4ea0/1733466890455/3.txt
Sha256 839e314d6027977399ee486d1cadba972685550ab97467ec77ef746ffc81a4787ac5b8905c760bf38d38761efc56362799f8a40b4fe2d570f56472b83a625360
Suspected Malware Gh0stRAT

A similar variation employs an additional imported JavaScript file to dynamically load the page content and button download actions.

Malicious domain, letscdn[.]world, which spoofs as LetsVPN 

Excerpt from Index.html - File Download Buttons with href JavaScript function calls to onDownload()

Excerpt from Index.html - Importing “/assets/js/jquery.min.js” via script tags.

Excerpt from “/assets/js/jquery.min.js” - loads script “/assets/download/filename.js” and returns the download URL as “https[:]//” + “letscdn[.]world” + “/assets/download” + “letsvpn-latest.rar”

The value for the “window.filename” is contained in another imported JavaScript file: “/assets/download/filename.js”

Delivery Domain letscdn[.]world
Download URL https[:]//letscdn[.]world/assets/download/letsvpn-latest.rar
Filename letsvpn-latest.rarletsvpn-latest.exe
SHA256 bb152e75a72aa3ae675561f308614eba6c070e55e3895bc1b67125689dc24ceec7531f022be3a5e33aa71aadcd5f0b5ae9989c7980b3a218e1e1415f6b61953d

Fake Login Pages Delivering Malware

Examples of fake login pages to deliver malware were also identified. 

The following screenshot of malicious domains “xmengapp[.]top” and “xinmeng[.]xyz”, which spoof a company called Genting Trust Union, which is purportedly an enterprise management platform for businesses to engage customers, however no apparent legitimate company by the name was identified. It is suspected that this is a fabricated company and website to lure in prospective marketing and sales teams. The website purportedly offers several service and data integrator apps for marketing purposes but in fact only delivers trojans described below. 

Included in the website’s imported JavaScript files is “/assets/js/ebzcecf9.js”, which contain login credentials for the website.

Logging into the application would load the following landing page:

Notably, the top bar “cloudtop” is a download button for a suspected malicious file but returns a 404.

The main section (right) is a range of services and tools related to online marketing and lead generation such as driving traffic to websites, automating tasks, managing multiple accounts, managing phone numbers for telemarketing, integrating proxies, overseas payments, AI tools for content creation and the like. 

The left panel contains a page link for “User Management”.

Clicking the blue “Click verification” button shown in the screen capture above opens a pop up alert with the following message

"Detected that the bundled plugin is not installed. Please install and retry."

Clicking “OK”, opens a download prompt for the following .msi file. The msi file is bundled with multiple files including those that AV scanners tag as Gh0stRAT and Farfli trojans. A possible C2 was identified as “134.122.135[.]95”, which is a suspected ValleyRAT C2.

Filename GoogleAuthPc_Installer.msi
SHA256 9ba254138f5e79354334a0deb48e38d04fa3754ac43b4a2adc388f81705ef044c7ba88724118bacaad78ff46794b6d2ebb7f1c55753d95249f6bcd0c49a8cd74
ValleyRAT C2 134.122.135[.]95:4443

Associated malware, activity and methodologies appear to overlap closely with reporting by Knownsec 404 team and Fortinet of a suspected APT activity named “Silver Fox”.

Compendium of Chinese Malware Delivery Domains

The following are all examples of the spoofed websites for delivering malware utilized in this cluster of activity from at least June 2024 to January 2025. Example malware delivery domains and their respective malware download URLs and SHA256 hashes are provided as available for each example below. This listing is non-exhaustive of the variety of spoofed websites for delivering malware. 

Spoofs as QuickQ, a network accelerator and encrypted traffic tool.

quickqi[.]net

quickiq[.]top

quickqi[.]net/assets/download/quicqk66.12.msi

quickiq[.]top/assets/download/win32-quicq.msi

1a793de251bffb1edc309aa0b7fd02354c7c99d3cb1f24b3e0140d2015dc49a
fe1b5431ae27c85b1c652e3ac9541c2a801540c02c04fa7f4a3a9543c284eca5
Spoofs as WhiteWhale VPN (白鲸加速器)

isdndjsq[.]top

isdndjsq[.]top/assets/download/win32-quicq.msi

fe1b5431ae27c85b1c652e3ac9541c2a801540c02c04fa7f4a3a9543c284eca5
Spoofs as Yiwaiwai Customer Service Chat Assistant download purportedly for Chrome, QQ, WeChat, Quanniu, Pinduoduo, Doudian, and others.

eyy5201[.]top

https[:]//eyy5201[.]top/static/download/yiwaiwai66.31.msi

fe86e1fff0afefd79de4fd26f041757495c5fadd116400699411a200978f0e41
Spoof as Lets VPN download sites

letsvpn-ui[.]top

kingtelmfng[.]top

https[:]//letsvpn-ui[.]top/assets/download/letsvpn-latest.exe

e09056567f146da73aa0c4266a15cd61655e4402146b75a836d1c92926cd37c4
Screenshot of malicious domain “z42f1m[.]top”, which spoofs as a Microsoft login page for Outlook but delivers malware.

https[:]//pub-bbd4563a163f414086e62f5cf87a6b4e.r2[.]dev/fah-0.zip

73083665902ccc0cf7cbd48af24ecd62205ff2f0970e3206f6f9be5ae096bc46a099f02c95b99abfcb3825d795797a11d69a08dc0d95e9171325dc13a9bcd796Ce34cc14e8d26119e1bf28a3a8368da6e10d13851004e2675976c5ad58b122e2

RedLine
LummaStealer
Screenshot of malicious domain “vejm60[.]top”, which spoofs as a Google mail login page but delivers the same malware.

https[:]//pub-bbd4563a163f414086e62f5cf87a6b4e.r2[.]dev/fah-0.zip

73083665902ccc0cf7cbd48af24ecd62205ff2f0970e3206f6f9be5ae096bc46
a099f02c95b99abfcb3825d795797a11d69a08dc0d95e9171325dc13a9bcd796
Ce34cc14e8d26119e1bf28a3a8368da6e10d13851004e2675976c5ad58b122e2

RedLine
LummaStealer
Screenshot of malicious domain “vzvlco[.]top”, which spoofs as a QQ mail login page but delivers malware.

https[:]//pub-bbd4563a163f414086e62f5cf87a6b4e.r2[.]dev/fah-0.zip

73083665902ccc0cf7cbd48af24ecd62205ff2f0970e3206f6f9be5ae096bc46a099f02c95b99abfcb3825d795797a11d69a08dc0d95e9171325dc13a9bcd796Ce34cc14e8d26119e1bf28a3a8368da6e10d13851004e2675976c5ad58b122e2

RedLine
LummaStealer
Screenshot of malicious domain “taufp6[.]top”, which spoofs as a 163 mail login page but delivers malware.

https[:]//pub-bbd4563a163f414086e62f5cf87a6b4e.r2[.]dev/fah-0.zip

73083665902ccc0cf7cbd48af24ecd62205ff2f0970e3206f6f9be5ae096bc46a099f02c95b99abfcb3825d795797a11d69a08dc0d95e9171325dc13a9bcd796Ce34cc14e8d26119e1bf28a3a8368da6e10d13851004e2675976c5ad58b122e2

RedLine
LummaStealer
Spoofs as AnyDesk remote desktop application.

andesksr[.]com

https[:]//andesksr[.]com/assets/download/anydeskx64-32.3.0.zip
Spoofs as Yiji Pay, a financial payment application.

yijfu[.]com

https[:]//yijfu[.]com/assets/download/PassGuardSetuhz.exe
Spoof of iTools for Windows, a tool used for managing Apple mobile devices.

i4z[.]xyz
Spoof of Huorong Internet Security website. Download links spoof as personal and enterprise security applications.

huurongs[.]top

huoroug[.]top
Spoofs as a game download link for QQ. 

qqsgs[.]com
Spoofs as Google Chrome download site.

oogiie[.]top
Spoofs as Youdao Dictionary software, a dictionary for translating text between Chinese and English and other languages.

yoodaou[.]xyz

https[:]//yoodaou[.]xyz/assets/download/QuarkUpdaterSetup_fuzz_1.rar

1a48a730cdd4982a5ac0b44984d70253eab9ea070285d9fc2124c83270576cf4f8c117a65e11fd370cb0673d1066af3415dfd9c8fde98225498f6e4ac92c213e
Spoofs as ToDesk remote desktop software.

todeskzis[.]xyz

https[:]//todeskzis[.]xyz/assets/download/ToDesk (2).zip

215872ff03e4a9d0baf12643b94d8cb60a5dba86153fa05148bd52344567e030d5b9d07f1aa0bf738521db66439d448913da86420f2c2a0753e35ba6b63a393a
Spoofs as ToDesk remote desktop software.

todeskeq[.]top

https[:]//0h6ai2g7.oss-ap-southeast-1.aliyuncs[.]com/ToDesk_Setup.zip

(is a .rar file)

134cba7e74c243b3f58535fd224f14a637445e176a5017a8d2938f357a88e9cb3823cc7228d7d8f75f007a4eafc0e4f4f1789ce26a6e1ca15c5045e17810396d

Retrieves:
https[:]//ws636rj.oss-ap-southeast-1.aliyuncs[.]com/encrypted_shellcode.bin
Spoof of WuYou, a service for receiving verification codes such as SMS and online platforms. 

wuyoujieee[.]com
oracl[.]top
Spoofs as Skype teleconference application download.

skyes1[.]top
Spoof of Youdao, a translation App.

yoadao[.]xyz
Gaming platform.

163i[.]tophttps[:]//mumu.163i[.]top/assets/download/Mumu模拟器.zip
Android Emulator to run from Windows Machine - purportedly to play simulate mobile games on desktop.

lediam[.]xyz

https[:]//d9gc24pw.oss-ap-southeast-1.aliyuncs[.]com/%E9%9B%B7%E7%94%B5%E6%A8%A1%E6%8B%9F%E5%99%A8.zip

ffe3be504d0a89ace9271a6a1fc51f6b0539903a10b1bf89285875606852ba65
clashcn[.]xyz
“QC7 goes overseas to navigate global social traffic”

“Accurate overseas customer acquisition starts with filtering number data”

“Overseas account screening platform”

007z[.]top

https[:]//007z[.]top/assets/download/007-Setup.exe

e34fd0f5fbc5f09f55ccdf2e6a5f70215c8686f9c83c45f421ac2a475d8bfd47
Spoof of Yuanqi, a website and app providing anime wallpapers without watermarks.

yqdesk[.]top
Spoof of KARIOS, which purports to be a “SMS Provider” such as sending text messages.

karlosqp[.]xyz
Spoofs as an unnamed merchant backend login page. Clicking login results in a popup with a “please install” link for a malicious file spoofing as a cryptokit_sando. Clicking OK directs to /update page with a banner to download the same file. This time spoofing as a Flashplayer update link.

shanghud[.]com

https[:]//shanghud[.]com/assets/download/k3.2.6.0升级组件.exe

65049df06de78a4fda14d5f07d83eef1b316c0dea0ecfc3dbec7e5e1b7b20754
T Star Diamond Payment-Merchant Backstage.

Spoofs as a login page. Clicking the login button downloads Gh0stRAT malware.

xingzuan[.]xyz

https[:]//xingzuan[.]xyz/assets/download/xingzuansetupg5.exe

5e1d7275b0abd484c15f186690db73c42e861311da3f5f048563636336933b4a

Downloads additional files from:
https[:]//wwwchongqingget-1328031368.cos.ap-chongqing.myqcloud[.]com
Spoofs as Dex Screener, a cryptocurrency website. Clicking any buttons initiates a popup with download link spoofing as a Flashplayer update. It contains samples of Gh0stRAT and Blackmoon malware.

dexscreeners[.]icu

https[:]//aaa8999.oss-us-west-1.aliyuncs[.]com/Flash_x32.zip

86f8239224a0ace2b1e0a2216511b0a0aea1bf055f7cbeca2fcf9c316f3de921
Spoofs as popular Line messenger application.

iines[.]xyz
Spoofs of DeepL Pro, a machine translation company. The service purports to emphasize data security with end-to-end encryption and automatic deletion of translated text. 

deepil[.]top
Spoofs of DeepL Pro, a machine translation company. The service purports to emphasize data security with end-to-end encryption and automatic deletion of translated text.

deeplx[.]top
Spoofs as 2345 Image King, software for viewing images.
 
2345ktws[.]xyz
Spoofs as Quark, AI. An AI-powered assistant application.

quarki[.]top
Spoofs as a cryptocurrency exchange.

chachap[.]top

https[:]//0l1hsqvd.oss-ap-southeast-1.aliyuncs[.]com/uCheckerInst.zip
Spoofs as 360 browser, a web browser developed by the Chinese internet security company, Qihoo 360.

360browsap[.]top
Spoofs as a mobile and web game site.

ttcy365[.]com
Spoofs as Sunflower Remote Control Software, which purports to allow remote access to other computers, file transfer, and remote assistance.

orays[.]top
A banner displayed warning of malicious activity spoofing their brand but is in fact also a spoof.

baofuupay[.]com

https[:]//baofuupay[.]com/assets/download/setup.exe

2901ca8eefd1d431d25f3d45dbf42dc48136b74692801ca0f6b606541d645baf
Spoofs as Enigma Messenger App, an end-to-end encrypted chat app.

immersivetranslate[.]top
Spoofs as a cryptocurrency exchange app.

tradingview[.]trade
Spoofs Signal messaging application, an end-to-end encrypted chat app. 

signall[.]xyz
Spoofs Signal messaging application, an end-to-end encrypted chat app.

signel[.]top
Spoofs as AdsPower app, an anti-detect browser for managing multiple online accounts.

adspowerr[.]top
Spoofs as 360 Security Guard - Software Manager to download iTools app. iTools is used for managing Apple mobile devices.

i4app[.]top
Spoofs as FireFox browser download.

firefoxz[.]top
Spoofs of LianLian Pay application.

lianlianpoy[.]com
Spoofs as a financial payments management website.

shengfuton[.]com
Spoofs as a music streaming app.

wymusic[.]top
Spoofs as Snipaste, a screenshot and screen recording tool.

snipaste[.]top
Spoofs as Aurora PDF, a service for creating, editing and viewing PDF files. 

jiguang[.]icu
Spoofs as Steam, a popular digital distribution platform for video games.

steams[.]top
Spoofs as 163 VPN built by NetEase, a Chinese tech company. 163 VPN is primarily designed for users within China to access websites blocked by the Great Firewall of China. 

163e[.]top
Spoofs of Gmail Login Page. 

qmails[.]top
Spoof of Telegram messenger application.

telegrinxkam[.]top

https[:]//telegrinxkam[.]top/assets/download/Ttsetuphdmgj.exe

d219a6056e1f65507c984475711bd7e674b1319d11fd7a1149f3da983fd4f7c8
Spoof of Telegram messenger application.

telegrcm[.]ing

teiegram[.]ing
Spoofs as SaleSmartly, a customer communication platform.

salesmart[.]top

https[:]//wien.oss-ap-southeast-1.aliyuncs[.]com/win7-salesmartly.zip
Spoofs of Google Play store to download a malicious application.

goople[.]top
Spoofs of Telegram messaging application.

telegrpcm[.]xyz

Conclusion

The spoofed malware delivery websites sampled in this report all share commonalities in configuration, domain registration patterns, and a suspected intent to target Chinese-speaking users. Indications suggest a broader target audience of Chinese language speakers outside of China including Malaysia and Hong Kong. 

The majority of the malware identified being delivered by the spoofed websites were stealers and trojans with capabilities to steal credentials and provide remote access to compromised systems. All malware identified were intended for Windows operating systems. Among them were multiple samples AV vendors assessed to be Gh0stRAT, Lummanstealer, RedLine, Farfli and ValleyRAT. Of which, C2s were also identified as associated with ValleyRAT. 

The activity and infrastructure of this cluster suggests a strong overlap with previously reported APT group SilverFox. Similarities include the spoofed websites, a focus on targeting Chinese-language speakers, and the use of ValleyRAT. Additionally, the overall volume, variety, and duration of the activity involved aligns with previous reports of SilverFox and suggests an organized and professional enterprise such as a commercial hack-for-hire or nation state sponsored contract. 

While spoofing websites to deliver malware is nothing new, the sustained volume and consistency speaks to a larger systematic approach to target a specific demographic with an apparent intent on gaining access to Windows devices likely to initially steal credentials and provide continued access for follow-on engagements. In the past, speculation around similar campaigns involved acting as access brokers to sell to government organizations or other criminal groups. Another possibility may be the collateral targeting of a population to opportunistically compromise high-value targets. In other words, indiscriminate compromises until they strike gold on gaining access to, for example, a corporation’s system or credentials.

IOCs

Type Value Descriptor
Sample 1
Domain kipkshsa[.]top Lure Website
URL kipkshsa[.]top/download/letsvppn-latest.msi Download URL
Filename letsvppn-latest.msi
SHA256 d1c9957bd55933a619d22e741fadcee6085e679e66af5cd8edbff7d9cf8fd4cf Stage 1
Filename QQQQ.exe
SHA256 927474984e549f9d1269950e5782f755cb96f11d404a3cac56114d1e795609c5 Stage 2 Downloader
URL https[:]//fs-im-kefu.7moor-fs1[.]com/ly/4d2c3f00-7d4c-11e5-af15-41bf63ae4ea0/1733466890455/3.txt Stage 2 Download URL
Filename 3.txt
SHA256 839e314d6027977399ee486d1cadba972685550ab97467ec77ef746ffc81a478 Stage 2 Dropper
SHA256 7ac5b8905c760bf38d38761efc56362799f8a40b4fe2d570f56472b83a625360 Stage 2 Trojan: Gh0stRAT
Sample 2
Domain opjs[.]club Lure Website
URL https[:]//ni1kpuro.oss-ap-southeast-1.aliyuncs[.]com/QuickQ.zip Download URL
Filename QuickQ.zip
Filename QuickQ.msi
SHA256 7aa498dc87e734e306f850082fad723ca7c05ef2f0a84c5232111eb3e86156fc
SHA256 adb6afadbd9f31a2c6548b6e3c6378a7164a3604c04332e48a409c16faf4f598 Spyware: Chinad / FlyStudio
Sample 3
Domain kuailiani[.]net Lure Website
URL kuailiani[.]net/download/kuailian64.52.msi Download URL
Filename kuailian64.52.msi
SHA256 d75a2b9d03aab50d9f3eb6afbde06034adec7a183dfcaf090ce78e4cd7a59117
Filename AICustAct.dll
SHA256 ce34cc14e8d26119e1bf28a3a8368da6e10d13851004e2675976c5ad58b122e2 RedLine / LummaStealer
Sample 4
Domain quiirkq[.]club Lure Website
URL https[:]//caiyun1688.oss-cn-shenzhen.aliyuncs[.]com/QuickQ-18.zip Download URL
Filename QuickQ-18.zip
Sample 5
Domain mctuqqe4z.top Lure Website
URL mctuqqe4z[.]top/qucke1.2_快客.zip Download URL
Filename qucke1.2_快客.zip
Filename qucke1.2_快客.exe
SHA256 5283873308336ae1011ebfe1d057621413b7d528340e45d76359850d5589e662
SHA256 e15a6646d20b4aa486f06fa81a1af55be0bd99dbff85cbd7a7a29d15ad73a693
Filename win32-67-quickq.exe
SHA256 e5205e1964b63ce14c85dd2c1ff6cdb06b3b1d323ccdbe0b2d6368a88dfe8f70 Trojan
Sample 6
Domain quickqi[.]net Lure Website
URL quickqi[.]net/assets/download/quicqk66.12.msi Download URL
Filename quicqk66.12.msi
SHA256 1a793de251bffb1edc309aa0b7fd02354c7c99d3cb1f24b3e0140d2015dc49a
Sample 7
Domain quickiq[.]top Lure Website
URL quickiq[.]top/assets/download/win32-quicq.msi Download URL
Domain isdndjsq[.]top Lure Website
URL isdndjsq[.]top/assets/download/win32-quicq.msi Download URL
Filename win32-quicq.msi
SHA256 fe1b5431ae27c85b1c652e3ac9541c2a801540c02c04fa7f4a3a9543c284eca5 Trojan Downloader
Sample 9
Domain letscdn[.]world Lure Website
URL https[:]//letscdn[.]world/assets/download/letsvpn-latest.rar Download URL
Filename letsvpn-latest.rar
Filename letsvpn-latest.exe
SHA256 bb152e75a72aa3ae675561f308614eba6c070e55e3895bc1b67125689dc24cee
SHA256 c7531f022be3a5e33aa71aadcd5f0b5ae9989c7980b3a218e1e1415f6b61953d Trojan
Sample 10
Domain telegrinxkam[.]top Lure Website
URL https[:]//telegrinxkam[.]top/assets/download/Ttsetuphdmgj.exe Download URL
Filename Ttsetuphdmgj.exe
SHA256 d219a6056e1f65507c984475711bd7e674b1319d11fd7a1149f3da983fd4f7c8
SHA256 f309c2c4847a5c888a580a2b154dfa1168016a9c3a335890f1b9e201819857e3 trojan: vmprotected
Sample 11
Domain eyy5201[.]top Lure Website
URL https[:]//eyy5201[.]top/static/download/yiwaiwai66.31.msi Download URL
Filename yiwaiwai66.31.msi
SHA256 fe86e1fff0afefd79de4fd26f041757495c5fadd116400699411a200978f0e41 Trojan
Sample 12
Domain letsvpn-ui[.]top Lure Website
Domain kingtelmfng[.]top Lure Website
URL https[:]//letsvpn-ui[.]top/assets/download/letsvpn-latest.exe Download URL
Filename letsvpn-latest.exe
Filename letsvpn-latesa.msi
SHA256 e09056567f146da73aa0c4266a15cd61655e4402146b75a836d1c92926cd37c4 Trojan
Sample 13
Domain chrmpw[.]top Lure Website
URL https[:]//chrmpw.top/download.html Download URL
Filename GPTChromX64.exe
SHA256 29163c8afb477b27f700e1c5eac694a6cbb816a86c8eadbbbac6ba5c034a9c96 Stage 1 Loader
SHA256 443a4ce93232d56f0d1d15e6875f7eff5fc581f25df320e277608be0d1148fa1 Stage 2 Trojan: Gh0stRAT
Sample 14
Domain z42f1m[.]top Lure Website
Domain vejm60[.]top Lure Website
Domain vzvlco[.]top Lure Website
Domain taufp6[.]top Lure Website
URL https[:]//pub-bbd4563a163f414086e62f5cf87a6b4e.r2[.]dev/fah-0.zip Download URL
Filename fah-0.zip
Filename fah-0.msi
SHA256 73083665902ccc0cf7cbd48af24ecd62205ff2f0970e3206f6f9be5ae096bc46
SHA256 a099f02c95b99abfcb3825d795797a11d69a08dc0d95e9171325dc13a9bcd796
SHA256 ce34cc14e8d26119e1bf28a3a8368da6e10d13851004e2675976c5ad58b122e2 LummaStealer
Sample 15
Domain qwapmuuq[.]com Lure Website
Domain fsquhgne[.]com Lure Website
Domain rtuoxxsr[.]com Lure Website
Domain fzqecfyi[.]com Lure Website
Domain modbydto[.]com Lure Website
Domain szyyotmp[.]com Lure Website
Domain vltlpung[.]com Lure Website
Domain twyudoft[.]com Lure Website
URL https[:]//quiiqq[.]com/win32-quickq.zip Download URL
Filename win32-quickq.zip
Filename win32-quickq.exe
SHA256 005bdfdde6a0d0718ac60bcc7071bd87d0ac869308cf8dd7ed8afa7478709ba9
SHA256 11254884edbc797e36d84b8305e63f2f8d1e3289fcb289a0be5b3b2d663055e
Sample 16
Domain quickq[.]fit Lure Website
URL http[:]//quickq[.]fit/sdk/win32-quickq.exe Download URL
URL https[:]//setupx64.oss-cn-hongkong.aliyuncs[.]com/QuickSetup.msi Download URL
Filename win32-quickq.exe
Filename QuickSetup.msi
SHA256 bfb90dfe0d6b4342489c4e8aa9c5ef803e462e0b451cb9ad016f2afba39fedf9 Trojan
Filename AICustAct.dll
SHA256 ce34cc14e8d26119e1bf28a3a8368da6e10d13851004e2675976c5ad58b122e2 RedLine / LummaStealer

Suspected Malware Delivery Domains:

007z[.]top
1633[.]site
163e[.]top
163i[.]top
16cilz[.]xyz
1o2mp[.]cyou
2345kantup[.]xyz
2345kingtuwang[.]com
2345ktws[.]xyz
360browsap[.]top
360z[.]fit
6h4s3s[.]top
70ka[.]club
a1shung[.]club
adober[.]club
adspowerr[.]top
aisbb[.]cyou
andesksr[.]com
anydeisk[.]top
anydesik[.]com
anydesik[.]top
anydesikq[.]top
anydeskcn[.]top
anydeskq[.]online
anydeslk[.]top
avez[.]top
avre[.]work
baidu-a[.]cyou
baidu-a[.]top
baili888[.]club
bananagun[.]fit
bananagunn[.]cyou
bananaguns[.]club
baofupay[.]top
baofuupay[.]com
bitbrowcer[.]xyz
bitbrowsec[.]top
bitbrowseq[.]top
bitbrowsers[.]work
bitbrowsez[.]top
bitbrowsri[.]top
bitbrowszer[.]top
bitbrwoser[.]fit
bitbrwoser[.]top
bitbrwwser[.]top
bitpiez[.]club
bitteroser[.]top
b-jipay[.]com
b-jlpay[.]top
bmgsn6[.]top
bntbrowcer[.]xyz
bpss5vp[.]top
browseri[.]vip
btbrowserq[.]top
btxueo[.]top
cgpay[.]vip
chachap[.]top
chme1[.]xyz
chmole[.]club
chrmpw[.]top
chromexn[.]com
clashcn[.]club
clashcn[.]top
clashcn[.]xyz
cnacn3[.]top
comprz[.]top
cpgpay[.]site
crlg1wm[.]com
cs-quickq[.]com
deepil[.]top
deepli[.]top
deepll[.]top
deepll[.]xyz
deeplti[.]xyz
deeplx[.]top
dexscreener[.]fit
dexscreeners[.]icu
dezscreener[.]work
dfapp188[.]world
domain
easytran[.]top
ecprss[.]com
eiyy[.]top
enigmar[.]fit
eniigme[.]club
eu0af6[.]club
eyy350[.]top
eyyqp[.]top
eyys[.]xyz
eyysi[.]top
eyysm[.]com
eyyz[.]top
f3jb5x[.]top
fckjo9[.]club
firefoxz[.]top
flashproxy[.]cc
freetalk[.]online
g2ks0z[.]com
g465cn[.]com
gckgmwc1[.]top
gmaib[.]top
gmgmai[.]club
gmgmai[.]work
goe[.]icu
googleseso[.]top
googlez[.]top
googlre1[.]top
goople[.]top
gotonesms[.]xyz
gotonesn[.]top
heepayx[.]xyz
hellowordx[.]club
hellowordx[.]fit
hellowordz[.]top
helloworldcz[.]xyz
helloworldw[.]site
helloworldw[.]top
helloworldz[.]top
helloworlids[.]top
hgb4hxl070[.]com
huifub[.]club
huionepay[.]vip
huorong[.]online
huorong[.]site
huorong[.]work
huoroug[.]top
huorrong[.]xyz
huoswe[.]top
huurongs[.]top
hvr3ez[.]work
i4app[.]top
i4b6[.]club
i4sa[.]xyz
i4sapp[.]top
i4sp[.]top
i4toos[.]life
i4z[.]xyz
ibzeha[.]vip
iilne[.]fit
iilne[.]top
iines[.]xyz
ilren[.]top
imbken[.]club
immersivetranslate[.]top
Inspect2 Guided Pivots
interhclp[.]com
isdndjsq[.]top
j6ahar4i[.]top
jdad7q[.]work
jiguang[.]icu
kantu2345[.]club
karlospt[.]top
karlosqp[.]xyz
karlost[.]club
keuailian[.]top
kingtelmfng[.]top
kipkshsa[.]top
klxiazopai[.]com
kuaiiam[.]fit
kuaiilianoo[.]icu
kuaiiyian[.]com
kuai-lian[.]xyz
kuailian0[.]com
kuailian8[.]com
kuailiani[.]net
kuailianlow[.]com
kuailiant[.]com
kuailianz[.]com
kuailiien[.]xyz
kuailijen[.]xyz
kuailim[.]buzz
kuailxian[.]com
kuaizip[.]top
kualien[.]xyz
kueliien[.]xyz
kuellien[.]xyz
kwgiz1[.]club
lanlevp[.]top
lediam[.]xyz
letrscp[.]fit
lets-alyays-connect[.]com
letsbutr[.]com
letscdn[.]world
letscgn[.]top
letscqn[.]top
letskuail[.]icu
letspcm[.]top
letspcn[.]icu
letspcn[.]xyz
letspqc[.]top
letspqw[.]fit
letspw[.]top
letsqpr[.]top
letsqpw[.]club
letsqpz[.]club
letsqqp[.]club
letsrpm[.]top
letsrqn[.]top
letsvpn-ui[.]top
letsvqm[.]xyz
letsvqr[.]xyz
letwvpn[.]com
lianlianpoy[.]com
liien[.]top
liine[.]fit
liine[.]work
llnes[.]world
lltslian[.]life
loubom[.]club
lttslian[.]xyz
luoboo[.]online
m7neqzz[.]fit
mavishub[.]xyz
mctuqqe4z[.]top
me18qiyg[.]xyz
meipai[.]work
meiqias[.]xyz
mesenger[.]club
messengers[.]work
messengerz[.]club
mexiko[.]cn
mi163[.]top
miitu[.]top
miluvpn[.]com
mwai1[.]xyz
nexchattc[.]cc
nn3cotp[.]top
nsmnst[.]club
officeim[.]club
oggie[.]club
oggie[.]fit
oggie[.]top
oggiechr[.]work
ogglchomr[.]top
oggle[.]club
oggle[.]top
oggle[.]xyz
oggles[.]xyz
ogglesr[.]top
oiggle[.]club
okyi[.]work
oogchrm[.]club
ooggie[.]top
ooggie[.]xyz
ooggle[.]top
ooggles[.]top
oogglez[.]top
oogglez[.]xyz
oogie[.]club
oogie[.]fit
oogiel[.]top
oogiew[.]work
oogiie[.]top
oogles[.]top
ooglex[.]top
ooglex[.]xyz
ooglie[.]xyz
ooglz[.]top
ooglze[.]fit
ooigle[.]xyz
oolqow[.]top
opjs[.]club
oracl[.]top
orayi[.]world
orays[.]top
orey[.]online
oreyr[.]work
oreyz[.]top
ouggle[.]fit
paga1io[.]top
paopaom[.]online
paydocs8[.]com
pgaab[.]icu
pht0j[.]cyou
potatocn[.]xyz
pppicd[.]icu
pqqle[.]club
q0nmsl[.]fit
qeaick[.]buzz
qmail[.]work
qmails[.]top
qqgj[.]online
qqis[.]work
qqsgs[.]com
quarki[.]top
quicka[.]top
quickiq[.]top
quickq0101[.]cyou
quickq2[.]cc
quickqgf[.]com
quickqgf[.]net
quickqgw[.]com
quickqgw[.]net
quickqi[.]net
quickqi[.]top
quickqza[.]icu
quickqzc[.]top
quickxq[.]xyz
quiicka[.]xyz
quiickqz[.]top
quiirkq[.]club
quirkq[.]work
qwf123[.]cyou
rggmo7j[.]club
salesmart[.]top
sanderpay[.]top
sandipay[.]top
sandlpay[.]top
sandpray[.]top
shandpay[.]top
shandpey[.]world
shanghud[.]com
shengfuton[.]com
shimoc[.]club
signall[.]xyz
signel[.]top
skyes1[.]top
slqdgo[.]club
sms-activation[.]club
smsactive[.]top
smsnet[.]top
snapcheat[.]club
snipaste[.]top
soogoo[.]icu
soogou[.]store
sougoo[.]site
sougous[.]top
sougous[.]xyz
soulgou[.]club
steams[.]top
sublitmext[.]xyz
subllmatxt[.]top
surrl9oa[.]top
t0v0hlp[.]top
taufp6[.]top
teamviewers[.]club
teiegram[.]ing
telagrmaxjsq[.]top
teleagrmone[.]top
teleepcrme[.]work
teleeqcrme[.]top
telegcvme[.]fit
telegczem[.]club
telegramn[.]vip
telegrcm[.]ing
telegrimz[.]club
telegrinxkam[.]top
telegrpcm[.]xyz
teleigpcm[.]club
teleigpcm[.]vip
telepcem[.]club
telepcems[.]fit
telepeqrm[.]fit
telepqrm[.]work
teleprzm[.]fit
telepwam[.]club
teleqcam[.]club
teleqcrmn[.]club
teleqcrmn[.]fit
teleqercm[.]work
teleqpczm[.]club
tgsheng[.]top
tittia[.]top
tletsvpn[.]xyz
todaskek[.]xyz
todaski[.]club
todesik[.]top
todeskc[.]top
todeskei[.]xyz
todeskeq[.]top
todeskiz[.]club
todeskze[.]top
todeskzis[.]xyz
tradingview[.]trade
ttcy365[.]com
ui4[.]club
uletsvpn[.]xyz
upcupe[.]xyz
uphot[.]net
uq7djw[.]xyz
utuncloud[.]world
vb0ep[.]club
vejm60[.]top
viber[.]cc
viber[.]cyou
viberi[.]xyz
vibers[.]site
vibers[.]top
vibers[.]work
villa[.]yiluying[.]com
visvpn[.]cyou
vletsvpn[.]xyz
vzvlco[.]top
wangr[.]club
wangwangtalk[.]club
wgoole[.]fit
whapps[.]club
whapps[.]fit
whapps[.]work
whatsacppy[.]club
whhapps[.]club
whhapps[.]fit
whtpps[.]club
whtpps[.]fit
whtpps[.]work
whtsaps[.]club
whtsaps[.]fit
whtsaps[.]vip
whtsaps[.]work
wiinrar[.]top
winrarsz[.]top
winzips[.]work
wipses[.]fit
wletsvpn[.]xyz
wppsi[.]top
wpsco[.]xyz
wpsei[.]com
wpsie[.]top
wpsim[.]top
wpsio[.]top
wpsiz[.]xyz
wpsla[.]site
wpsma[.]top
wpsqm[.]com
wpsqr[.]xyz
wpsqx[.]top
wpsrc[.]top
wpsrc[.]work
wpsrs[.]xyz
wpss[.]xyz
wpssq[.]top
wpsxi[.]club
wpsxm[.]xyz
wpsxz[.]xyz
wpsyz[.]top
wpszm[.]top
wudps[.]xyz
wuyoujieee[.]com
wymusic[.]fit
wymusic[.]top
xiaohuojians[.]top
ximmlang[.]club
xingqiiu[.]club
xingzuan[.]club
xingzuan[.]fit
xingzuan[.]online
xingzuan[.]xyz
xinlang[.]work
xinmeng[.]xyz
xinzuan[.]top
xmengapp[.]top
xxyy[.]work
xzpay[.]work
yiiji[.]xyz
yiijifu[.]com
yijfu[.]com
yoadao[.]xyz
yodaou[.]top
yoodao[.]fit
yoodaoi[.]club
yoodaou[.]xyz
yoodau[.]top
yoodau[.]xyz
yoodou[.]top
youdaoie[.]top
youdaox[.]top
youdaoz[.]top
youdoau[.]top
youdoo[.]top
youdou[.]xyz
yqdesk[.]top
yuanq[.]top
yuduba[.]xyz
z42f1m[.]top
zhekou838[.]cn
ziniao[.]fit
zoomi[.]fit

IOCs on GitHub

If the community has any additional input, please let us know.

https://github.com/DomainTools/SecuritySnacks/blob/main/2025/CNMalwareDelivery-Pt1

Learn More
Research
No items found.
CTI Grapevine Becomes DomainTools Investigations

Hello CTI Grapevine Superfriends!

You may have noticed some subtle changes to our website: As of today, CTI Grapevine became part of the newly-launched DomainTools Investigations (DTI) family. Since this shift may come as a surprise to some of our avid readers, I wanted to share why we believe it is a great move for our community:

CTI Grapevine was started as an initiative by us, for us: The researchers, analysts, defenders, and the quiet types you never hear about publicly, but who behind the scenes help make the Internet a safer place. You know who you are. We wanted to explore what it would be like for the community if we published relevant and timely Domain- and DNS-related security snacks - “bite size research,” if you will. We had some really great success with this in 2024. You, the community, gave us both positive and constructive feedback on areas of growth, what you wanted us to improve on, and how we could be a better resource to the community at large. As we brainstormed on how to grow the program, we kept coming back to a DomainTools core principle: Community First! 

On a personal note, this core principle is one of the top reasons I stayed with DomainTools after my previous employer Farsight Security was acquired - The InfoSec Community has been a key part of my career for over 20 years, I would not be where I am today without it. In 2002, I started attending The Agora in Seattle, one of the first quarterly closed-vetted InfoSec meetups. After a few years as an attendee, I got involved and helped to organize and host the events for another decade+. Around 2007, I started attending other great community-focussed conferences like ISOI, and later ACoD, DCC, UE - IYKYK. I mention all this to underline how serious I am in my commitment to The Community, and as the Head of DomainTools Investigations, I will make sure we do not stray from that path.

In the spirit of supporting the community, we knew we needed to be extremely thoughtful in providing more resources. We pitched a program that could attract and sustain kickass researchers and analysts who could focus on providing their expertise on an ongoing basis. Our bosses listened, and decided to give us a year to prove ourselves. And so, DTI was formed as a community-based research effort focused on investigating, mitigating, and preventing Domain- and DNS-based attacks. (And yes, we love puns and DTI is a play on CTI…see what we did there?) With the launch of DTI, building on the foundation of CTI Grapevine, the cybersecurity community will have expanded access to:

  • Insights on advanced persistent threats (APTs), nation-states, cyber-espionage groups, business email compromise (BEC), and more
  • Published research on the DTI website and available via webinars, closed door sessions, and conferences
  • A yearly report that dives into the nuances of Domain- and DNS-based attacks

You can get all of this goodness right here on the site, and never miss an update by setting up an RSS feed to dti.domaintools.com. Additionally, you can find us on the socials (Mastodon: @domaintools@infosec.exchange, Bluesky @domaintools, X @domaintools, LinkedIn https://www.linkedin.com/company/domaintools/ ), or come say “Hi” at various conferences and events we will be frequenting all year long!

Here is to an exciting year ahead, and to borrow a signature word from one of my friends and mentors: Excelsior!

Daniel Schwalbe
CISO and Head of Investigations
DomainTools

PS: Let’s talk about tracking for a minute. More specifically website page views, and email open tracking, or what the kids call “engagement” these days. When we first launched CTI Grapevine, we intentionally had zero tracking on the site. This is somewhat rare in the industry, but as a security and privacy professional, I am allergic to tracking. I block it wherever and however I can. Being in control of DNS resolutions on your own Network is very useful for that purpose. 

But if as a business you must track, at least be as transparent as possible about it. So this is the approach we are taking here. The bargain we made with our bosses in order to take DTI to the next level was to sign up for some KPIs, and we need some kind of measurement to see if we hit those KPIs. We use Google Analytics with tags, and Marketo Measure (Bizible / Adobe). We won’t gate content, and we won’t use more invasive tracking.

Sure, tracking on websites can be blocked by the browser, and almost every email client now has the ability to block open tracking. We accept it, and are OK with that. But if you feel so inclined and want to support our program, maybe consider letting some of that tracking through. 

Learn More
Research
Cyberhaven Breach Likely Part of a Long-Term Criminal Campaign

Overview

On 27 December 2024, the technology company Cyberhaven reported that an unnamed actor replaced its Google Chrome extension on the Google Chrome Web Store with a malicious version. The actor used a phishing email to compromise a developer’s account via authorizing a malicious third-party application. DomainTools researchers reviewed publicly available information related to this incident and discovered that the Cyberhaven incident is part of a months-long campaign likely attempting to impact multiple companies primarily in the technology sector.

Summary of the Cyberhaven Incident

Cyberhaven’s initial analysis of the incident revealed that the actor sent a phishing email claiming that the recipient’s Chrome extension was at risk of being removed from the Chrome Web Store due to policy violations. A link in the email purported to allow the recipient to acknowledge those policies and avoid removal of the extension. Clicking on the link led the recipient through the process of adding a malicious third-party application named “Privacy Policy Extension” to the recipient’s Google account - a tactic commonly known as OAuth phishing. The malicious application received permissions to publish Chrome Web Store extensions, allowing the actor to replace Cyberhaven’s extension with a new version containing malicious code.    

The malicious code comprised two altered JavaScript files:

  • worker.js: This script contacted the actor-controlled domain, cyberhavenext[.]pro, which served as command and control (C2) for the incident.  The server hosted configuration data, which it stored in Chrome’s local storage and monitored events from the second script, content.js.
  • content.js: This script collected user data from specific websites. The file used in the Cyberhaven incident specifically targeted Facebook-related data such as access tokens, user IDs, account details, business accounts, ad account information, cookies, and user agent strings. The script exfiltrated all compromised data to actor-controlled infrastructure.

Connections to a Broader Campaign

Cyberhaven shared indicators of compromise (IOCs) related to the attack. DomainTools researchers analyzed this information and discovered a large network of infrastructure likely used in similar attacks against other targets. Some of the related domains include:

  • cyberhavenext[.]pro
  • api.cyberhaven[.]pro
  • app.checkpolicy[.]site

The reported C2 domain for the incident, cyberhavenext[.]pro, resolved to the IP address 149.28.124[.]84 which is allocated to the hosting provider Vultr. Passive DNS data in the Iris Investigate platform shows 18 domains resolving to this IP address since 5 November 2024 with the majority beginning to resolve in the last week of December 2024. It is likely that these domains are part of a broader campaign that includes the Cyberhaven incident. This assessment is made with high confidence based on the following factors:

  • IP address overlap - likely related domains resolve to the same IP addresses within close time proximity  
  • Whois similarities - Domains share similarities in whois information: Namecheap registry, registrar-servers[.]com for NS and MX, and use of Let’s Encrypt certificates
  • Domain naming conventions - Domain names spoof specific software products such as AI tools, VPNs, adblockers, and other general web browsing tools.
  • Top Level Domains (TLDs) - Heavy use of .pro TLD along with .live, .info, .com, .net, .ink, and .vip 

Research revealed additional related domains on other Vultr IP addresses:

  • 149.248.2[.]160
  • 136.244.115[.]219
  • 45.76.225[.]148

Data from the urlscan platform shows that some of the related domains hosted configurations similar to that reported by Cyberhaven. For example, urlscan data for the domain internxtvpn[.]pro shows a similarly formatted configuration for targeting data from the ChatGPT platform

{"code":2000,"internxtvpna":"https:\/\/chatgpt.com\/api\/*","internxtvpnb":"https:\/\/chatgpt.com\/public-api\/conversation_limit","internxtvpnc":"chatgpt.com","internxtvpnd":"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","internxtvpne":"backend-api\/me","internxtvpnf":"https:\/\/chatgpt.com","internxtvpng":"https:\/\/chatgpt.com\/backend-api\/compliance","internxtvpnh":"https:\/\/chatgpt.com\/api\/auth\/session","internxtvpni":"auth","internxtvpnk":"https:\/\/chatgpt.com"}

Configuration Recorded by URLscan on 29 December 2024

Urls can data also shows some of the identified infrastructure hosting credential phishing pages as far back as February 2024. Figure 2 shows a credential phishing page for an unidentified service hosted on admin-set.tkpartner[.]pro (left) and a phishing page likely meant to spoof Facebook’s Business Manager service hosted on tkadmin7.tkv2[.]pro (right). There is not enough evidence to determine how potential victims were directed to these pages or how the actor responsible leveraged compromised credentials. 

Figure 2. Credential phishing pages hosted on infrastructure likely related to that used in the Cyberhaven incident.

Conclusion

It is likely that the Cyberhaven incident was part of a months-long campaign seeking access to sensitive data related to popular web services such as Facebook and ChatGPT. This assessment is made with high confidence based on identified infrastructure, the usage time frame of the infrastructure, and code within the actor’s configuration files. Observed tactics, techniques, and procedures (TTPs) indicate this actor is more likely criminal than state-sponsored.

IOCs

149.28.124[.]84 136.244.115[.]219
cyberhavenext[.]pro
graphqlnetwork[.]pro
yescaptcha[.]pro
videodownloadhelper[.]pro
castorus[.]info
bookmarkfc[.]info
uvoice[.]live
iobit[.]pro
primusext[.]pro
yujaverity[.]info
parrottalks[.]info
internxtvpn[.]pro
censortracker[.]pro
vpncity[.]live
wayinai[.]live
readermodeext[.]info
moonsift[.]store
extensionpolicyprivacy[.]com
policyextension[.]info
extensionpolicy[.]net
checkpolicy[.]site
extensionbuysell[.]com
aiforgemini[.]com
blockforads[.]com
ytbadblocker[.]com
geminiforads[.]com
adskiper[.]net
149[.]248[.]2[.]160 45.76.225[.]148
Here are the base domains extracted from the provided list:
chatgptextension[.]site
graphqlnetwork[.]pro
tkv2[.]pro
iobit[.]pro
internetdownloadmanager[.]pro
searchgptchat[.]info
pieadblock[.]pro
gptdetector[.]live
castorus[.]info
searchaiassitant[.]info
ultrablock[.]pro
internxtvpn[.]pro
savechatgpt[.]site
tkpartner[.]pro
wakelet[.]ink
yescaptcha[.]pro
videodownloadhelper[.]pro
parrottalks[.]info
proxyswitchyomega[.]pro
bookmarkfc[.]info
dearflip[.]pro
cyberhavenext[.]pro
uvoice[.]live
primusext[.]pro
yujaverity[.]info
censortracker[.]pro
vidnozflex[.]live
extensionpolicyprivacy[.]com
tinamind[.]info
locallyext[.]ink
vpncity[.]live
policyextension[.]info
wayinai[.]live
moonsift[.]store
readermodeext[.]info
checkpolicy[.]site
extensionpolicy[.]net
linewizeconnect[.]com
extensionbuysell[.]com
savgptforchrome[.]pro
bardaiforchrome[.]live
searchcopilot[.]co
chatgptextent[.]pro
youtubeadsblocker[.]live
geminiaigg[.]pro
gpt4summary[.]ink
blockadsonyt[.]vip
chataiassistant[.]pro
savegptforyou[.]live
goodenhancerblocker[.]site
ultrablock[.]pro
proxyswitchyomega[.]pro
dearflip[.]pro
vidnozflex[.]live
wakelet[.]ink
pieadblock[.]pro
locallyext[.]ink
tinamind[.]info

IOCs on GitHub

If the community has any additional input, please let us know.

https://github.com/DomainTools/SecuritySnacks/blob/main/2025/CyberhavenCampaign

Learn More
Research
Industrial Spam Network

Overview

Domain hijacking attacks like subdomain takeover and SPF hijacking take advantage of vulnerable or stale configurations in a target domain. The vulnerable domains are then leveraged in spam or phishing campaigns or to spread malware. They can be particularly successful as they can take advantage of the target domain’s established reputation to subvert spam filters and other reputation-based detections.

Subdomain Takeover

In the case of subdomain takeover, attackers look for subdomains that are configured to point to a service that does not appropriately handle subdomain ownership verifications. 

Attackers can identify subdomains pointing to other services by using a range of openly available tools such as Sublist3r, Assetfinder, and ReconNG. Attackers would then check for vulnerable services such as those that allow custom domain names like GitHub pages, AWS S3 or by looking for domains that continue to point to services that no longer exist. 

Exploiting these vulnerable domains allows the attacker to host malicious content such as phishing pages or malware from the domain. This type of attack may allow for “subdomailing”, which refers to the type of email spoofing attack that leverages subdomains of a legitimate domain to send fraudulent emails.

Example DNS log of a potentially vulnerable subdomain:

mail.vulnerable-domain[.]com.  IN  CNAME  
pages.githubusercontent[.]com.

This shows that mail.vulnerable-domain[.]com points to GitHub pages. If for example the associated GitHub pages repository were deleted and the DNS record is unchanged, an attacker could re-create the deleted repository under the same name. In effect, allowing the attacker to control the content of the target domain.

SPF Hijacking

In contrast to subdomain takeover, SPF Hijacking occurs when an attacker gains access to a target’s DNS records either via the registrar or by exploiting vulnerabilities in the DNS infrastructure. Once the attacker has access they can modify the SPF record of a domain. For example, the attacker could add in one of their own domains into the target domain’s SPF record. In effect, this would allow the attacker to send emails that would appear to be originating from the target’s domain.

Example DNS log of a vulnerable SPF record:
vulnerable-domain[.]com. IN TXT "v=spf1 mx -all"

Example attacker tool to modify a DNS record of a target domain:
pdnsutil modify record vulnerable-domain[.]com TXT 'v=spf1 mx attacker-domain[.]com -all'

Example DNS log of the compromised SPF record for domain insertion:
vulnerable-domain[.]com. IN TXT "v=spf1 mx attacker-domain[.]com -all"

In the examples above, pdnsutil, a powerful DNS management tool, is used to modify the “TXT” record of a vulnerable domain to include the attacker’s domain in a new SPF record "v=spf1 mx attacker-domain[.]com -all"

Hunting

Pivoting off a report by Guardio in February 2024, which detailed a large campaign of subdomailing activity involving two attacker domains inserted into vulnerable DNS records.

harrisburgjetcenter[.]com
greaterversatile[.]com

Equipped with knowledge about domain takeover attacks, we can hunt for characteristics of subdomain takeover and SPF hijacking.

To start, we may take similar approaches to an attacker in which passive reconnaissance tools or historical DNS and web scanner data aggregators are leveraged to passively identify potentially vulnerable domain configurations.

Reviewing recent DNS records for actor domain greaterversatile[.]com in RDATA:

First Seen RRNAME RDATA
2024-11-03 tracks.vooyo[.]id. "v=spf1 include:harrisburgjetcenter[.]com include:greaterversatile[.]com -all"
2024-08-04 sync-me.co[.]uk. "v=spf1 include:harrisburgjetcenter[.]com include:greaterversatile[.]com -all"
2024-08-02 hangzhousccom.s5k.86sudu[.]net. "v=spf1 include:harrisburgjetcenter[.]com include:greaterversatile[.]com -all"
2024-08-02 alboan_lp.thephilanthropicapp[.]com. "v=spf1 include:harrisburgjetcenter[.]com include:greaterversatile[.]com -all"

Breaking down the RDATA: "v=spf1 include:harrisburgjetcenter[.]com include:greaterversatile[.]com -all"

  1. v=spf1: indicates it's an SPF record version 1, the most commonly used version.
  2. include:harrisburgjetcenter[.]com: instructs the receiving mail server to consult the SPF record hosted on the domain harrisburgjetcenter[.]com. The receiving server will then use that record to determine if an email claiming to originate from the original domain is legitimate.
  3. include:greaterversatile[.]com: the receiving server will also consult the SPF record hosted on greaterversatile[.]com
  4. -all: specifies a "hard fail" for any email that doesn't pass the SPF check based on the included records. In other words, any email not authorized by the records from harrisburgjetcenter[.]com or greaterversatile[.]com will be rejected.

Reviewing recent DNS records for actor domain greaterversatile[.]com in RRNAME:

First Seen RRNAME RDATA
2024-02-06 greaterversatile[.]com. "v=spf1 include:nostrezz[.]com include:discussionapps[.]com include:tessiesantiago[.]com include:winningwebs[.]com include:crowleylouisiana[.]com include:constancespry[.]com include:gigabytestores[.]com include:mailmyorder[.]com include:clothesforfit[.]online include:bamboozlebarges[.]com ip4:139.162.114.162 ip4:139.162.114.194 ip4:139.162.114.243 ip4:139.162.114.252 ip4:139.162.114.77 ip4:139.162.135.240 ip4:139.162.135.50 ip4:139.162.150.80 ip4:139.162.154.171 ip4:139.162.154.181 ip4:139.162.154.222 ip4:139.162.176.50 ip4:1" "39.162.154.43 ip4:139.162.186.198 ip4:139.162.186.64 ip4:139.162.34.36 ip4:139.177.176.124 ip4:139.162.36.56 ip4:139.177.176.143 ip4:139.177.176.189 ip4:139.177.176.34 ip4:172.104.115.104 ip4:172.104.115.106 ip4:172.104.115.110 ip4:172.104.110.219 ip4:172" ".104.120.48 ip4:172.104.115.112 ip4:172.104.132.134 ip4:172.104.115.113 ip4:172.104.159.162 ip4:172.104.115.114 ip4:172.104.159.25 ip4:172.104.159.45 ip4:172.104.115.131 ip4:172.104.115.134 ip4:172.104.115.135 ip4:172.104.115.143 ip4:172.104.115.145 ip4:1" "72.104.115.150 ip4:172.104.115.182 ip4:172.104.115.194 ip4:172.104.115.201 ip4:172.104.115.210 ip4:172.104.115.220 ip4:172.104.115.227 ip4:172.104.115.234 ip4:172.104.115.242 ip4:172.104.115.243 ip4:172.104.115.5 ip4:172.104.115.75 ip4:172.104.115.76 ip4:" "172.104.115.79 ip4:172.104.115.83 ip4:172.104.115.95 ip4:172.104.151.14 ip4:172.104.151.76 ip4:172.104.243.226 ip4:172.104.245.100 ip4:172.104.245.102 ip4:172.104.245.12 ip4:172.105.249.106 ip4:172.105.90.47 ip4:172.105.90.63 ip4:172.105.92.60 ip4:172.105" ".92.98 ip4:194.233.164.223 ip4:194.233.164.99 ip4:194.233.167.103 ip4:194.233.167.108 -all"
2024-10-24 greaterversatile[.]com. ""v=spf1 include:instanttranslates.dynu[.]net include:informationshout.dynu[.]net -all""

The above DNS records shows that the actor domain greaterversatile[.]com had SPF records in February 2024 that point to several domains and hundreds of IP addresses and in October 2024 was updated to point to two dynamic DNS domains.

Due to the grouping of SPF record placing, the following domains are likely also actor owned during their respective times of association.

nostrezz[.]com
discussionapps[.]com
tessiesantiago[.]com
winningwebs[.]com
crowleylouisiana[.]com
constancespry[.]com
gigabytestores[.]com
mailmyorder[.]com
clothesforfit[.]online
bamboozlebarges[.]com
instanttranslates.dynu[.]net
informationshout.dynu[.]net

In summary of the above records if the domain tracks.vooyo[.]id sends email, the receiving mail server would attempt to validate the SPF records from the actor domains harrisburgjetcenter[.]com and greaterversatile[.]com, which would then be routed again to instanttranslates.dynu[.]net and informationshout.dynu[.]net.

The following DNS records for instanttranslates.dynu[.]net. indicate additional SPF routing would take place.

First Seen RRNAME RDATA
2024-10-21 instanttranslates.dynu[.]net. "v=spf1 include:universitygreatchoices.gleeze[.]com include:perfectdiplomaforyou.kozow[.]com include:neverstoplearning.dynuddns[.]com include:instantuniversityinscription.ddnsfree[.]com include:universityexchangeinfo.freeddns[.]org include:strategyandplansaction.fre" "eddns[.]org include:universitygrades.mywire[.]org include:resourcesanddocuments.gleeze[.]com include:multimedialearningskills.kozow[.]com -all"
2024-10-21 instanttranslates.dynu[.]net. "v=spf1 include:universitygreatchoices.gleeze[.]com include:perfectdiplomaforyou.kozow[.]com include:neverstoplearning.dynuddns[.]com include:instantuniversityinscription.ddnsfree[.]com include:universityexchangeinfo.freeddns[.]org include:strategyandplansaction.freeddns[.]org include:universitygrades.mywire[.]org include:resourcesanddocuments.gleeze[.]com include:multimedialearningskills.kozow[.]com -all"
2024-08-08 instanttranslates.dynu[.]net. "v=spf1 include:justifyintegrated.accesscam[.]org include:handlerhedriver.accesscam[.]org include:occupationsociety.casacam[.]net include:commemorate.ddnsfree[.]com include:requestdistort.ddnsgeek[.]com include:strategicpromote.freeddns[.]org include:biographydetermine.giize[.]com include:compartmentrelevance.gleeze[.]com include:multimediatan.kozow[.]com -all"

Due to their use in the SPF records of other actor domains, these additional dynamic DNS domains also acting as SPF redirectors are likely actor operated domains as well:

universitygreatchoices.gleeze[.]com
biographydetermine.giize[.]com
commemorate.ddnsfree[.]com
compartmentrelevance.gleeze[.]com
handlerhedriver.accesscam[.]org
instantuniversityinscription.ddnsfree[.]com
justifyintegrated.accesscam[.]org
multimedialearningskills.kozow[.]com
multimediatan.kozow[.]com
neverstoplearning.dynuddns[.]com
occupationsociety.casacam[.]net
perfectdiplomaforyou.kozow[.]com
requestdistort.ddnsgeek[.]com
resourcesanddocuments.gleeze[.]com
strategicpromote.freeddns[.]org
strategyandplansaction.freeddns[.]org
universityexchangeinfo.freeddns[.]org
universitygrades.mywire[.]org

Subsequently looking up the SPF redirects for universitygreatchoices.gleeze[.]com and others identifies records such as the following in which the designated IP ranges are authorized to send mail by the original domain.

First Seen RRNAME RDATA
2024-12-09 universitygreatchoices.gleeze[.]com. ""v=spf1 ip4:169.254.95.120 ip4:81.7.16.166 ip4:91.143.91.100 ip4:212.23.222.100 ip4:212.23.222.102/31 ip4:91.228.12.147/28 ip4:91.228.12.160/28 ip4:91.228.12.176 ip4:63.141.247.144/29 ip4:158.69.99.224/29 ip4:167.114.154.18 ip4:192.95.49.96/30 ip4:198.27.9" "5.240/28 ip4:198.50.160.232 ip4:198.50.160.250 ip4:61.255.174.141/30 ip4:61.255.174.144/28 ip4:61.255.174.160/30 ip4:61.255.174.179/29 ip4:195.254.134.64/27 ip4:23.105.32.64/29 ip4:23.105.32.73 ip4:45.92.29.240/28 ip4:193.39.184.224/28 ip4:23.105.132.157/30 ip4:23.105.132.160/29 ip4:45.130.201.8/30 ip4:45.130.201.88/29 ip4:45.130.201.128/28 ip4:45.130.201.150 ip4:45.130.201.161 ip4:45.130.201.180 ip4:45.130.201.186 ip4:45.130.201.201 ip4:45.130.201.211 ip4:45.130.201.240/28 ip4:37.235.49.209 ip4:37.235.49.214 ip4:51.38.246.64/30 ip4:69.61.90.49 ip4:69.61.94.33 ip4:69.61.95.20 ip4:69.174.102.208 ip4:104.223.94.253 ip4:142.4.195.32/29 ip4:142.44.135.12 ip4:142.44.135.127 ip4:144.217.46.144/29 ip4:144.217.117.34 ip4:149.56.78.219 ip4:151.236.24.159 ip4:185.215.186.128/29 ip4:192.71.218.35 ip4:192.71.218.82 ip4:192.95.57.0/30 ip4:192.99.176.248/29 ip4:217.182.120.160/30 ip4:5.189.187.81 ip4:5.189.134.15 ip4:5.189.134.16/30 ip4:2.58.203.26 ip4:2.58.203.33 ip4:2.58.203.36 ip4:2.58.203.51 ip4:45.67.85.8/31 ip4:45.67.85.12 ip4:45.67.85.20 ip4:45.67.85.28 ip4:45.67.85.41 ip4:45.67.85.47 ip4:45.67.85.62/31 ip4:63.141.232.128/27 ip4:89.34.97.64/27 ip4:216.211.204.63 ip4:216.211.204.64 ip4:216.211.204.71 ip4:216.211.204.77 ip4:216.211.204.79 ip4:149.50.96.53 ip4:149.50.102.119 ip4:149.50.102.120/29 ip4:149.50.102.128/29 ip4:149.50.102.144 ip4:149.50.102.254 ip4:149.50.103.0/28 ip4:149.50.103.24 ip4:94.156.239.216/29 ip4:94.156.239.224/27 ip4:185.99.2.80/28 ip4:185.99.2.96/30 ip4:185.164.32.96/28 ip4:185.164.32.112/29 ip4:185.164.32.11 ip4:31.56.241.27 ip4:31.56.241.86 ip4:31.56.241.120/30 ip4:162.213.211.64/29 ip4:162.251.120.172 ip4:162.251.122.160/27 ip4:172.96.14.24/29 ip4:204.10.162.128/29 ip4:45.92.29.224/28 ip4:199.66.92.32/27 -all""

The following diagram shows how the chained SPF records create multiple layers of redirects.

In summary, the chained SPF records create multiple layers of SPF redirects. This may serve to obfuscate the originating mail servers and distribute infrastructure to increase resiliency from disruptions affecting portions of the network. It may also serve to evade detection by hindering analysis by making it difficult for anti-spam and security researchers to identify patterns and write signatures to detect and block the network and the activity it is being used for.

The Senders

Sampling the IP addresses in the RDATA records show a trend of mail servers, reverse DNS, Apache HTTP servers, and Squid Cache servers.

The IPs associated domains to the SPF records were also observed hosting content such as the following samples:

Indicators & Search Hashes Web Screenshots
*[.]megajobsusa[.]com
Shodan hash:-1137946516
ShodanHttp.html_hash:581214383
Censysservices.banner_hashes="sha256:3a47dc2a58324647af74c539d6e9eceb994f5ec3b49ff1744d164e6f340a9e29"
angelcamach0-github-io.pages[.]dev
callor[.]com
gamerchallenger[.]com
sunillulla[.]com

Domains hosting similar web content:

727.tcrouzet[.]com
aids.rainesupport[.]com
andrecordeiro[.]ch
andynope.maid-cafe[.]ch
angelcamach0-github-io.pages[.]dev
arianmisini[.]com
arizonaloud[.]de
asmicloudsolutions.github[.]io
bc.tekysupport[.]com
bluegum[.]media
callor[.]com
codefoundry.co[.]id
contier[.]kr
csms4.sistech[.]ai
cyberzootopia[.]com
dates.rainesupport[.]com
discoverplymouth[.]net
fhalo-resources[.]com
fu.hrps-it[.]com
gallotreeservices[.]com
github.speicher-dein-strom[.]de
helpinneed.asso.eu[.]org
hi.applyer.cn
leak[.]lk
ljxcfdfhkjgcqfeesvarpjqxegetudn.helpinneed.asso.eu[.]org
moneyantra[.]com
muhammeddemircan[.]com
nextlab[.]biz
pwaf2023[.]click
radarnextboy.rainesupport[.]com
regional-one[.]com.lga[.]sc
respons.gvcreation[.]fr
safecall.givero.co[.]kr
santiagolamora[.]com
sobatsoba[.]com
socarenergie[.]ch
tabiri[.]compassionateheartskenya[.]org
tuneastwood.rainesupport[.]com
twwebsitenotificationguardian.justinl[.]in
vorteile.hrps-it[.]com
www.adrygurumi.ortscorporate[.]com
www.dagondevelopment[.]com
www.donaubuild[.]com
www.hidro2clean[.]com/www/
www.insightsdigitalagency[.]com
www.khstalentbank[.]com
www.ldfg[.]se
xn--krakena-kb4c[.]com
zmv[.]sk

Conclusion

This research has only touched the surface of what appears to be a very large and well coordinated spam and phishing network taking advantage of DNS-related misconfigurations or weaknesses. Indications from domain and infrastructure pivots suggest the network has been operating since at least 2019 to present. The operators of the network appear to demonstrate awareness and response to security reports of their infrastructure and appear to have made multiple attempts to improve its resiliency to identification and disruptions.

Observables

727.tcrouzet[.]com
aaafield[.]com
aborretag[.]com
achingdish[.]com
adnecaring[.]com
adnespres[.]com
aerchers[.]com
ahniab[.]com
aids.rainesupport[.]com
airsacy[.]com
albuquerquejobsite[.]com
alsquil[.]com
amerstv[.]com
andrecordeiro[.]ch
andynope.maid-cafe[.]ch
anescat[.]com
angcheap[.]com
angelcamach0-github-io.pages[.]dev
anthigh[.]com
arcadiadomains[.]com
arianmisini[.]com
arizonaloud.de
aromaver[.]com
asecort[.]com
asmanspecs[.]com
asmicloudsolutions.github[.]io
ationmov[.]com
atiosurte[.]com
aucomplex[.]com
autoferbar[.]com
avemusica[.]com
bartapy[.]com
bartsam[.]com
basicempre[.]com
bc.tekysupport[.]com
bearele[.]com
beargy[.]com
bearrope[.]com
befull[.]pro
begieclose[.]com
bericbires[.]com
betterhal[.]com
betterove[.]com
binarydron[.]com
biographydetermine.giize[.]com
biresth[.]com
bithorts[.]com
bitquil[.]com
blecally[.]com
blespeaker[.]com
blognapic[.]com
bluegum[.]media
blushdicid[.]com
blushtable[.]com
bonusang[.]com
bookcles[.]com
bughtsurte[.]com
bulathoon[.]com
bumpergris[.]com
bundemidis[.]com
bunnymov[.]com
callor[.]com
callycous[.]com
capusabor[.]com
capuslong[.]com
caserojo[.]com
cenblush[.]com
chersberic[.]com
chocoundab[.]com
ciacat[.]com
circleqts[.]com
circuithed[.]com
civiccovercove[.]com
cliffaria[.]com
cliffjuly[.]com
cloeruby[.]com
cobalpalm[.]com
cocecheap[.]com
codefoundry.co[.]id
coleenv[.]com
collstran[.]com
commemorate.ddnsfree[.]com
compartmentrelevance.gleeze[.]com
contier[.]kr
coofwiki[.]com
cophhar[.]com
cophreor[.]com
cornmove[.]com
csms4.sistech.ai
currentrad[.]com
cyanapy[.]com
cyanbonnet[.]com
cyberzootopia[.]com
dates.rainesupport[.]com
daticol[.]com
dedhetera[.]com
defcips[.]com
defspoiler[.]com
denamark[.]com
dentalscroll[.]com
depiness[.]com
derdiving[.]com
derpear[.]com
desstequal[.]com
desstnorra[.]com
diacips[.]com
dicrhombus[.]com
dicwisty[.]com
discoverplymouth[.]net
dismsec[.]com
ditydesert[.]com
diuminfos[.]com
donepron[.]com
dopermo[.]com
duckoc[.]com
duodrawing[.]com
durablepic[.]com
eapmily[.]com
earthorm[.]com
elecoral[.]com
elerapid[.]com
elerased[.]com
ennicbus[.]com
entsdic[.]com
entsearth[.]com
envsky[.]com
envwer[.]com
eomeganet[.]com
eptcat[.]com
eptli[.]com
equesolive[.]com
essbumper[.]com
estwer[.]com
etcout[.]com
express-door[.]ru
falsignal[.]com
faradrain[.]com
farmsteadassist[.]com
feeldugout[.]com
ferspic[.]com
fhalo-resources[.]com
fieldabor[.]com
firenippe[.]com
fivevail[.]com
floodshieldguide[.]com
flowerpsed[.]com
fluxnorra[.]com
foundpurd[.]com
foxingtime[.]com
fu.hrps-it[.]com
fullcoil[.]com
gallotreeservices[.]com
gebumper[.]com
gerspask[.]com
gicpene[.]com
giculgusit[.]com
giculscan[.]com
giftedvist[.]com
github.speicher-dein-strom[.]de
glymain[.]com
glysource[.]com
greaterversatile[.]com
greygicul[.]com
grisphold[.]com
gusitbits[.]com
halclose[.]com
handleoper[.]com
handlerhedriver.accesscam[.]org
harrisburgjetcenter[.]com
hedhill[.]com
helpinneed.asso.eu[.]org
hesclose[.]com
heterafuel[.]com
heteratal[.]com
hexagonb[.]com
hexaspecs[.]com
hi.applyer.cn
hoodnero[.]com
hoodte[.]com
hoschers[.]com
idealcellphones[.]com
ilygu[.]com
ilytedd[.]com
inaayas[.]me
ineduse[.]com
infarmasa[.]com
infosdef[.]com
ingsous[.]com
ingunit[.]com
innersof[.]com
instantuniversityinscription.ddnsfree[.]com
inycooper[.]com
ioneplane[.]com
italyivers[.]com
ittunner[.]com
jamesest[.]com
jarstand[.]com
jarundes[.]com
jouleworld[.]com
justifyintegrated.accesscam[.]org
justlyjournal[.]com
kledfers[.]com
leak[.]lk
leftfarad[.]com
lentgon[.]com
letdiplay[.]com
levcobal[.]com
liglissa[.]com
lilaccyan[.]com
lilcheap[.]com
liliotegli[.]com
lisemain[.]com
lissachor[.]com
listhy[.]com
litelev[.]com
ljxcfdfhkjgcqfeesvarpjqxegetudn.helpinneed.asso.eu[.]org
lobyvill[.]com
logerbus[.]com
logergy[.]com
longtermcover[.]com
lublicgear[.]com
macbookdigest[.]com
maggede[.]me
makeapy[.]com
maltditing[.]com
mangrapid[.]com
mantdrove[.]com
marryzinc[.]com
maticgic[.]com
mauveitaly[.]com
mauveplug[.]com
meansarrow[.]com
meetve[.]com
mesany[.]com
mesotheliomainsights[.]org
mesplug[.]com
mikcheap[.]com
miromali[.]com
mishdep[.]com
mishsy[.]com
misshans[.]com
mixgifted[.]com
mizrrworold[.]ru
mollyrhes[.]com
monesnic[.]com
moneyantra[.]com
monodvill[.]com
mopmeni[.]com
mostmit[.]com
movieeap[.]com
mrscoph[.]com
muhammeddemircan[.]com
multimedialearningskills.kozow[.]com
multimediatan.kozow[.]com
muncatic[.]com
namecapus[.]com
nanomoder[.]com
nauticalguardian[.]com
nearmagnet[.]com
needvist[.]com
neverstoplearning.dynuddns[.]com
nextlab[.]biz
ninebash[.]com
nippelia[.]com
norratesla[.]com
nyakundireport[.]com
occupationsociety.casacam[.]net
ockledel[.]com
ocklerased[.]com
octomation[.]app
ohmmilky[.]com
olrosa[.]com
onicpic[.]com
opagarin[.]com
operrojo[.]com
ormamber[.]com
ormcoof[.]com
orsexess[.]com
osnhans[.]com
ovepres[.]com
partsruppo[.]com
pastroll[.]com
pearhyl[.]com
pediarous[.]com
perfectdiplomaforyou.kozow[.]com
permostar[.]com
picofrank[.]com
picomeans[.]com
picsspres[.]com
pinhaged[.]com
pizzakled[.]com
placeooo[.]com
plateoze[.]com
playloger[.]com
porkgro[.]com
powlsquick[.]com
psedined[.]com
psloon[.]com
pwaf2023[.]click
pykelly[.]com
qsurte[.]com
quickine[.]com
quilthat[.]com
radarnextboy.rainesupport[.]com
raindroel[.]com
ramtable[.]com
rapidpor[.]com
rasedenity[.]com
realtrion[.]com
regional-one[.]com.lga.sc
reorwif[.]com
requestdistort.ddnsgeek[.]com
resourcesanddocuments.gleeze[.]com
respons.gvcreation[.]fr
resslear[.]com
restliam[.]com
rfmac[.]com
riddlearea[.]com
rinlook[.]com
roerin[.]com
rollwer[.]com
rosapic[.]com
rotcoffe[.]com
rousrin[.]com
rouwal[.]com
safecall.givero.co[.]kr
samberic[.]com
santiagolamora[.]com
sarumi[.]ir
sarumihome[.]ir
scanged[.]com
scrormake[.]com
sheildmona[.]com
shieldshelf[.]com
shiftity[.]com
sifemedia[.]com
siotitan[.]com
sitegicul[.]com
sitesstorm[.]com
smuerule[.]com
sobatsoba[.]com
socarenergie[.]ch
somonlus[.]com
somonscror[.]com
spersosel[.]com
spoilerus[.]com
stased[.]com
strategicpromote.freeddns[.]org
strategyandplansaction.freeddns[.]org
sunillulla[.]com
surtecal[.]com
susdem[.]com
syletc[.]com
symgrey[.]com
tabiri[.]compassionateheartskenya[.]org
tealblanco[.]com
tealcharge[.]com
tebaned[.]com
thilystat[.]com
tinhexagon[.]com
tiptrent[.]com
tolltunner[.]com
toothidly[.]com
tuneastwood.rainesupport[.]com
tunnerhar[.]com
turdess[.]com
turelses[.]com
turkeyhigh[.]com
turkishtraders[.]net
twwebsitenotificationguardian.justinl[.]in
tydraw[.]com
uncerain[.]com
unclemones[.]com
undbory[.]com
undesquil[.]com
uniqrapid[.]com
universityexchangeinfo.freeddns[.]org
universitygrades.mywire[.]org
universitygreatchoices.gleeze[.]com
unraoanker[.]com
untprint[.]com
verrhes[.]com
videosinfo[.]com
videothily[.]com
viewank[.]com
villdeer[.]com
vipcys[.]com
vipspask[.]com
vitmisly[.]com
volveenv[.]com
volvesing[.]com
volvesus[.]com
vorteile.hrps-it[.]com
watchfal[.]com
websoff[.]net
weekge[.]com
wellnavy[.]com
whivecpu[.]com
whiveparts[.]com
wootybag[.]com
wormicro[.]com
wrindia[.]com
www.adrygurumi.ortscorporate[.]com
www.dagondevelopment[.]com
www.donaubuild[.]com
www.hidro2clean[.]com/www/
www.insightsdigitalagency[.]com
www.khstalentbank[.]com
www.ldfg[.]se
xn--krakena-kb4c[.]com
yearnano[.]com
yedsures[.]com
yercraig[.]com
yerunt[.]com
yukedmin[.]com
yukedtupe[.]com
zapedit[.]com
zincbart[.]com
zincwinter[.]com
zipperazul[.]com
zippermake[.]com
zipsiren[.]com
zmv[.]sk

Learn More
Research
BlackBerry, SloppyLemming, and Guess Who...Cloudflare

On 18 November 2024, BlackBerry’s threat research team reported on a cyber espionage campaign targeting the Pakistan Navy. This campaign used malicious documents to collect credentials and distribute malware. While BlackBerry did not attribute this activity to a specific actor, subsequent analysis by DomainTools revealed significant overlaps in tactics, techniques, procedures (TTPs), and targeting scope with the cyber-espionage group known as SloppyLemming.

Review of BlackBerry Report

Recent activity from this campaign involved the deployment of a malicious PDF document in early September 2024. The document resembles an internal IT memo, instructing recipients on integrating Axigen Thunderbird for secure email communications. The document contained a link to a malicious website (paknavy.rf[.]gd) mimicking the legitimate Pakistan Navy domain.

Upon visiting the fraudulent site, users were prompted to download a ZIP file, “Axigen_Thunderbird.zip,” which included a malicious Thunderbird extension. Once installed, the extension requested credentials for “@paknavy.gov.pk” email addresses. Entered credentials were transmitted to an actor-controlled domain (updateschedulers[.]com), and the extension downloaded a malware payload hosted on the same domain. BlackBerry researchers identified the malware as a variant of Sync-Scheduler. Public reporting from March 2024 first identified this malware family and its use of  the domain packageupdates[.]net for command and control (C2). BlackBerry also identified related activity in the May/June 2024 time frame using the C2 domain extension.webmailmigration[.]com.

Further analysis by DomainTools uncovered an additional likely associated domain: diplomaticservices[.]link. Whois data from this domain shows a registrant organization of “National Telecom Corporation” likely referencing the Pakistani government’s telecommunications provider. The only other domain using this registrant organization since 2010 is the webmailmigration[.]com domain from the BlackBerry report. 

Overlap with SloppyLemming Actor 

In September 2024, Cloudflare’s threat research team reported on an India-nexus cyber espionage actor it dubbed SloppyLemming (aka OUTRIDER TIGER). This actor primarily targets Pakistan, with a focus on government and defense. SloppyLemming frequently leverages its custom CloudPhish credential logging tool on Cloudflare Worker domains to compromise email credentials from targeted individuals. One of the mail clients CloudPhish specifically targeted was Axigen, which was the mail client referenced in the malicious activity covered in the BlackBerry report. SloppyLemming also employed PDF documents for credential collection and malware delivery.

Data from the urlscan.io scanning service shows an Axigen webmail credential phishing page present on www.login.webmailmigration[.]com in April 2024. Similar Axigen phishing pages present on the following domains between February and July 2024:

  • mail-pakchinainvest-com.niancao010.workers[.]dev
  • webmail.cybar-net-pk.workers[.]dev
  • mail.pof-gov-pk.workers[.]dev

These domains use a similar domain naming convention to that detailed in the SloppyLemming report.

Figure 1. Screenshot of credential phishing pages present on www.login.webmailmigration[.]com in April 2024 (left) and mail.pof-gov-pk.workers[.]dev in August 2024 (right)

Additional similarities between the recent BlackBerry and Cloudflare’s reports include the actor’s use of malicious PDFs malware delivery and a Pakistan-centric target scope. 

Conclusion

It is likely that SloppyLemming is the actor responsible for the malicious activity described in BlackBerry’s recent report. This assessment is made with low confidence based on similar credential phishing and malware delivery TTPs, as well a Pakistan-focused target scope. However, it is plausible that the BlackBerry report discusses a separate actor from SloppyLemming that is employing similar TTPs.

IOCs

paknavy[.]rf[.]gd
updateschedulers[.]com
packageupdates[.]net
finance-gov-pk[.]rf[.]gd
extension[.]webmailmigration[.]com
diplomaticservices[.]link

Learn More
Research
Fake Job Boards

Fake government job boards attempt to trick job seekers into providing personal information that may be used for fraud, phishing, or other malicious purposes. The bad actors behind these fake job boards cause harm by either soliciting an application fee from victims or by instructing them to download malicious files or deceiving victims into giving personal information such as resumes, historic addresses and contact information.

Multiple countries were identified as targeted by a high number of fake government job boards. For instance, many of the identified domains masquerading as US government job boards were reportedly associated with email campaigns. Those in Pakistan and India appear largely fraud related and employ WhatsApp and Telegram groups. Fake Taiwanese government job postings are suspected to be harvesting personal information for phishing and fraud.

Similarly, nation states such as North Korea also host fake job postings for phishing, and creating fake personas in attempts to be hired by and gain access to western tech companies.

Details

Fake US Government Job Websites

A cluster of domains that goes back to early as 2017 and associated mail servers have been used in email spam. The domain names masquerade as government job or contract bid sites. The domains are frequently configured to redirect to legitimate government job sites such as govcb[.]com and governmentcontracts[.]us likely for the purpose of appearing more legitimate upon inspection.

Example mail server:

Website Titles Domains
Government Contracts | State, Local, and Federal Contract Opportunities in U.S. govcb-bids-alert[.]us
govcb-bids-bulletin[.]us
govcb-bids-notice[.]us
govcb-contracts-alert[.]us
govcb-contracts-news[.]us
govcb-contracts-notice[.]us
governmentbiddersinfo[.]us
governmentbiddinginfo[.]us
governmentcontracts-bids[.]us
governmentcontracts-opps[.]us
govnt-contracts-bulletin[.]us
govnt-contracts-news[.]us
govnt-contracts-notice[.]us
govtcontracts-bids-news[.]us
govtcontracts-bids-notice[.]us
topicfocus[.]com
usagovnmt-bids-alert[.]us
usagovnmt-contracts-alert[.]us
IP Addresses Email Addresses
185.227.110.78
44.215.207.48
bizoppscast[@]gmail[.]com
9d8a0b48cf9f33e2s[@]gmail[.]com
openfos[@]gmail[.]com
ibcwork2000[@]gmail[.]com
bobbykin[@]gmail[.]com
dnswizard[@]gmail[.]com

Fake Taiwanese Government Job Websites

Spoofing as the legitimate taiwanjobs[.]gov[.]tw website for the purposes of phishing, information gathering, and credential harvesting. Taiwanjobs[.]gov[.]tw website reports the following message of ongoing phishing activity using fake look alike websites.

Website Titles Domains
台灣就業通 - 找工作 -- 一般會員登入 taiwanjobs-govi[.]store
job-taiwanjobs-gov[.]shop
taiwanjobs-gov[.]shop
taiwanjobs-govl[.]shop
taiwanjobs-govi[.]shop
taiwanjobs-govi[.]store
taiwanjobs.tv-login[.]shop
taiwanjobs.login-hk[.]shop

Fake MELA Government Job Websites

Mela Network is the Middle Eastern arm of a global network spanning 46 countries. Their website states: “Mela's mission is to help executives in the MENA (Middle East and North Africa) region grow professionally and personally by exposing them to best practices in leadership and connecting them with a global network of peers.” [https://melanetwork.org/]

Website Titles Domains
Latest Government Job Updates govtjobmela[.]com
WhatsApp / Telegram / Form Links Trackers
https[:]//whatsapp[.]com/channel/0029VamcZ7z2f3EFetXjBT0Y
https[:]//forms[.]gle/cMGVxKaQtedP5aEn9
https[:]//docs.google[.]com/forms/d/e/1FAIpQLSc6XXH5piHCg6NAqf32tqifOCgGLoxsvSvvI7z7K7GDVvJGJw/viewform?usp=send_form
N/A

Fake Indian Government Job Websites

Website Titles Domains
Homepage - Indian government job
Odisha govt job.in
Free Govt.Jobs New
indiangovermentjob[.]com
odishagovtjobb[.]com
freegovtjobsnews[.]in
WhatsApp / Telegram Links Trackers
https[:]//whatsapp[.]com/channel/0029Vaf9yFa8qIzszkVsxC22
https[:]//t[.]me/odishagovtjobs_in
https[:]//telegram[.]me/freegovtjobsnews
https[:]//whatsapp[.]com/channel/0029Va9BF444tRrpPdiJ9Q3m
https[:]//www.googletagmanager[.]com/gtag/js?id=AW-827762966
https[:]//www.googletagmanager[.]com/gtag/js?id=G-CB0GVX4XGH
https[:]//www.googletagmanager[.]com/gtag/js?id=G-2FFTX02ZD9
https[:]//www.googletagmanager[.]com/gtag/js?id=G-B2J2TJBSQ1

Fake Pakistan Government Job Websites

Fake Pakistan government job boards similar to those for Indian government job boards. WhatsApp channels and Telegram group links are displayed on pages. Many of these sites are suspected to be used for phishing and fraud. 

Website Titles Domains
Latest Government Jobs in Pakistan
Pakistan Governments Jobs 2024
Pakistan Governments Jobs
Government Jobs in Pakistan
govtpakjobz[.]com
govtpakjobz[.]world
govtsjobspak[.]com
pakgovtsjobs[.]com
govtjobspk[.]online
dailygovtjob[.]site
allgovtjobz[.]pk
pkgovtjobz[.]site
pakistanigovtjobs[.]com
govtjobz[.]online
WhatsApp / Telegram Links
https[:]//whatsapp[.]com/channel/0029VakKrcuHLHQaZ1GCtn0y

Conclusion

Fake job boards are common around the world. They seek to take advantage of job seeker’s motivations in order to harvest personal information and may lead into additional fraud schemes, phishing, identity theft, and malware delivery.

Job seekers should conduct research on job postings before applying, recognize domain name masquerades and be wary of unsolicited job offers. Additionally, it's crucial to recognize red flags such as unexpected fees, high-pressure tactics, requests for sensitive personal information, and unknown personas offering special favors.

IOCs

govcb-bids-bulletin[.]us
govtcontracts-bids-notice[.]us
govtcontracts-bids-news[.]us
govcb-bids-alert[.]us
governmentbiddinginfo[.]us
governmentbiddersinfo[.]us
govcb-bids-notice[.]us
govcb-contracts-notice[.]us
govcb-contracts-news[.]us
govcb-contracts-alert[.]us
governmentcontracts-opps[.]us
governmentcontracts-bids[.]us
topicfocus[.]com
govnt-contracts-notice[.]us
govnt-contracts-news[.]us
govnt-contracts-bulletin[.]us
usagovnmt-contracts-alert[.]us
usagovnmt-bids-alert[.]us
govnmtcontractsbulletin[.]us
govnmt-contracts-notice[.]us
usagovnmt-bid-opps[.]us
usagovnmt-contract-opps[.]us
govnmt-contracts-board[.]us
usagovnmt-contractopps[.]us
govnmt-contractsboard[.]us
usagovnmt-bizopps[.]us
govnmt-contractbids[.]us
govnmtcontractsboard[.]us
govnmtcontractbids[.]us
usagovnmtbizopps[.]us
usagovnmtcontractopps[.]us
usa-govt-bid-opps[.]us
government-bids-notice[.]us
usagov-bidopps[.]us
usa-govt-bizopps[.]us
usa-govt-biz-opps[.]us
usa-govt-bids[.]us
governmentbids-alert[.]us
usa-govtbidopps[.]us
govbids-alert[.]us
usagovt-bidopps[.]us
usa-gov-bidopps[.]us
usa-gov-bizopps[.]us
usagov-bizopps[.]us
gov-bidsnotice[.]us
govbidopps[.]com
thytalk[.]us
wzip[.]us
usagvnmtcontractopps[.]us
usagvnmtbizopps[.]us
govnmtcontractsalert[.]us
govnmtcontractsnotice[.]us
govnmtcontractsnews[.]us
govnmtcontractsannounce[.]us
usagvnmtcontracts[.]us
usagvnmtbusiness[.]us
government-contracts[.]us
bidsguide[.]com
govnmtcontractnotice[.]us
usagovnmtbusiness[.]us
usagovnmtcontracts[.]us
govntcontractsbulletin[.]us
govntcontractnotice[.]us
usagovntcontracts[.]us
usagovntbusiness[.]us
govntcontractsnews[.]us
govntcontractsannounce[.]us
usagvntcontracts[.]us
usagvntbusiness[.]us
govntcontractsnotice[.]us
usagvntbizopps[.]us
govntcontractsalert[.]us
usagvntcontractopps[.]us
bidopps[.]us
govbids[.]us
govnt-contractsnotice[.]us
usagvnt-contractopps[.]us
govnt-contractsalert[.]us
usagvnt-bizopps[.]us
govnt-contracts-alert[.]us
usagovnt-contract-opps[.]us
usagovnt-businessopps[.]us
usagovt-contract-opps[.]us
govt-contractsnetwork[.]us
usagovt-business-opps[.]us
govt-bidsnetwork[.]us
usagovt-contractopps[.]us
gov-bidsnetwork[.]us
gov-contractsnetwork[.]us
usagovt-businessopps[.]us
usagovt-bids[.]us
usagov-business-opps[.]us
usagov-contract-opps[.]us
govt-contracts-notice[.]us
govt-contracts-alert[.]us
government-contracts-alert[.]us
usagov-businessoopps[.]us
gov-contracts-notice[.]us
gov-contracts-alert[.]us
usa-govtbizopps[.]us
usagov-businessopps[.]us
usagov-contractopps[.]us
government-contracts-notice[.]us
govnt-bidsnotice[.]us
govnt-bidsalert[.]us
usagovbiz-opps[.]us
usagovbid-opps[.]us
government-contractsalert[.]us
government-contractsnotice[.]us
government-bidsnotice[.]us
government-bidsalert[.]us
usagovnt-businessopportunities[.]us
usagovnt-contractopportunities[.]us
govt-bids-notice[.]us
govt-bids-alert[.]us
government-bids-alert[.]us
governmentbids-notice[.]us
gov-bids-alert[.]us
govbids-notice[.]us
usagovt-bizopps[.]us
gov-bidsalert[.]us
gov-bidsnotice[.]us
govt-bids[.]us
govt-contracts[.]us
usagovntbidsnetwork[.]us
usagovntcontractsnetwork[.]us
government-bids[.]us
usagovtbidsnetwork[.]us
usagovtcontractsnetwork[.]us
govtbidsnetwork[.]us
govtcontractsnetwork[.]us
usagovntbusinessopportunities[.]us
usagovntcontractopportunities[.]us
topicfacts[.]com
govntbidsalert[.]us
govntbidsnotice[.]us
usagovntbidopps[.]us
usagovntbizopps[.]us
mfgpages-update[.]com
govntbusiness[.]us
govntcontract[.]us
usagovntbusinessopps[.]us
usagovntopportunities[.]us
wordvia[.]com
anydic[.]com
bidsalert[.]us
citydataregistry[.]com
citydirectorylisting[.]com
cityfoslisting[.]com
cityprofilelisting[.]com
cityprofileregistry[.]com
contractopps[.]us
govbidalert[.]com
govbidnotices[.]com
govbidsalert[.]com
govbidsnetwork[.]us
govbizopportunities[.]com
govbusinessopportunities[.]us
govcbinc[.]com
govcontractalert[.]com
govcontractopportunities[.]us
govcontractopps[.]com
govcontractsnetwork[.]us
governmentbidsguide[.]com
governmentbusinessopps[.]us
governmentcontractopps[.]us
governmentcontractsalert[.]us
governmentcontractsannounce[.]us
governmentcontractsbids[.]us
governmentcontractsinfo[.]us
governmentcontractsnotice[.]us
governmentcontractsopps[.]us
governmentopportunities[.]us
govtbidalerts[.]us
govtbids[.]us
govtbidsalert[.]us
govtbidsfocus[.]us
govtbidsnotice[.]us
govtbizopps[.]us
govtbusinessopportunities[.]us
govtcontractalerts[.]us
govtcontractopportunities[.]us
govtcontracts[.]us
govtcontractsfocus[.]us
gvtender[.]com
openb2bdirectory[.]com
openb2bsearch[.]com
openbizsearch[.]com
slbidgov[.]com
statelocalbids[.]com
usabidopportunities[.]com
usabidopps[.]com
usabizopportunities[.]com
usabizopps[.]com
usacontractingopps[.]us
usacontractopportunities[.]us
usagovbizopps[.]us
usagovcontractopps[.]us
usagovernmentbids[.]us
usagovernmentbusinessopportunities[.]us
usagovernmentcontractopportunities[.]us
usagovernmentcontracts[.]us
usagovernmentopportunities[.]us
usagovtbidopps[.]us
usagovtbizopps[.]us
usagovtbusinessopportunities[.]us
usagovtbusinessopps[.]us
usagovtcontractopportunities[.]us
usagovtcontractopps[.]us
usaopportunities[.]us
Learn More
Research
Hunting Phishers

Ever think about the duality of fishing and hunting? Folks may argue fishing is a more passive endeavor. One sets a lure and waits. Hunting on the other hand, folks may argue, is a more active endeavor in which a hunter might generally be expected to seek out their intended target. 

Let’s put this in terms of cyber threats. Most humans by now have undoubtedly heard of cyber attacks and perhaps even had some experiences with phishing in its various forms be it over email, text, voice call or a discord channel. But, what about the threat hunters? Threat hunting proactively seeks out undetected threats, usually within an organization’s network. Investigating indicators in a threat report can identify suspicious domains, detect patterns, and correlate findings with other sources. 

With that said, thousands upon thousands of ill-intent domains are registered every day and some few fine folks set out the hounds and have a proper hunt. As one does, the trails are scoured and more indicators are found. But without further ado, this is one such quarry.

Opening Meet

This hunt got its start from a CloudFlare report on SloppyLemming. Also known as Outrider Tiger, SloppyLemming has reportedly been targeting Pakistani entities among others in Southeast Asia since late 2022. A range of domains have been utilized to lure victims into credential harvesting sites and deliver malware.

Frequent Domain Registration Patterns

  • Use of CloudFlare services
  • 90 day SSL Certificates
  • Trends in domain naming convention 
  • Frequently assessed with risk scores of 100 by DomainTools

There’s the scent and the hunt begins. Sifting through domain registrations, DNS records, web scan data and the like, the lines form.

Hunting For Associated Indicators:

SloppyLemming domain `aljazeerak[.]online`

Website Title `Pakistan International Airlines - PIA | Great People to Fly With`
-> Unreported domain `fly-pakistan[.]com`

Historic Screenshot of domain aljazeerak[.]online masquerading as a Pakistani Airline

SloppyLemming domain `itsupport-gov[.]com`

whois email `abdulrehm8282[@]gmail[.]com`

-> Unreported domain `itsupport-gov[.]net`

- SSL temok[.]com + MX eye-mail[.]net + Registrar NameSilo 

- Has Google Code `G-5XJE64N2SQ`

SloppyLemming domains `cflayerprotection[.]com, cloudlflares[.]com`

Whois Email `cht8p9zpl5[@]domprivacy[.]de`

-> Unreported domains

mfaturk[.]com

firebasebackups[.]com

cloudproxyserv[.]com

Historic Screenshot of domain paknavy-pk[.]org

Hunting CloudFlare Worker With SubDomain Name Masquaredes in DNS Records

Next, we search for CloudFlare Workers[.]dev subdomains with navy or gov and pk or lk naming elements using DNSDB Scout

;; query: Regex RRNames (navy|gov)-(pk|lk).+workers\.dev\.$ ANY (Limit 5000) // Last After: 2024-09-26 00:00:00 (UTC)

Sample:

```

anfbalochistan-gov-pk.workers[.]dev
clickonce.pakistan-gov-pk.workers[.]dev
cpanel-nha-gov-pk.pakistan-gov-pk.workers[.]dev
discordoutput.pakistan-gov-pk.workers[.]dev
email-moitt-gov-pk.pakistan-gov-pk.workers[.]dev
fbr-gov-pk-auth.workers[.]dev
gda-gov-pk.kr-i-sas-orv-e-l-a.workers[.]dev
gov-pk.workers[.]dev
gov-pkgov.workers[.]dev
gwadarport-gov-pk.gwadarportt.workers[.]dev
helpdesk-police-gov-pk.aabhimulla446.workers[.]dev
instagram-com.pakistan-gov-pk.workers[.]dev
ispr-gov-pk.workers[.]dev
kpt-gov-pk.workers[.]dev
maif-piac-aero.gov-pkgov.workers[.]dev
mail-asian-parliament-org.pakistan-gov-pk.workers[.]dev
mail-communication-gov-pk.pakistan-gov-pk.workers[.]dev
mail-depo-gov-pk.govtpak.workers[.]dev
mail-depo-gov-pk.ntc-telecomcorporation.workers[.]dev
mail-dgdp-gov-pk.ntc-telecomcorporation.workers[.]dev
mail-ecac-gov-pk.pakistan-gov-pk.workers[.]dev
mail-ecp-gov-pk.ntc-telecomcorporation.workers[.]dev
mail-ecp-gov-pk.pakistan-gov-pk.workers[.]dev
mail-fbr.gov-pk.workers[.]dev
mail-gwadarport-gov-pk.kr-i-sas-orv-e-l-a.workers[.]dev
mail-gwadarport-gov-pk.ntc-telecomcorporation.workers[.]dev
mail-hit-gov-pk.ntc-telecomcorporation.workers[.]dev
mail-invest-gov-pk.gwadarportt.workers[.]dev
mail-islamabadpolice-gov-pk.ntc-telecommunication-safecity.workers[.]dev
mail-kpt-gov-pk.gob-pk.workers[.]dev
mail-kpt-gov-pk.niancao010.workers[.]dev
mail-kpt-gov-pk.pak-gov-pk.workers[.]dev
mail-mod-gov-pk.pakistan-gov-pk.workers[.]dev
mail-modp.gov-pkgov.workers[.]dev
mail-modp-gov-pk.govtpak.workers[.]dev
mail-modp-gov-pk.ntc-telecomcorporation.workers[.]dev
mail-modp-gov-pk.pak-gov-pk.workers[.]dev
mail-mofa-gov-pk.pakistan-gov-pk.workers[.]dev
mail-na-gov-pk.na-gov-pk.workers[.]dev
mail-nba-gov-pk.pakistan-gov-pk.workers[.]dev
mail-ntc-net-pk.gov-pkgov.workers[.]dev
mail-paf-gov-pk.ntc-telecomcorporation.workers[.]dev
mail-paknavy.gov-pk.workers[.]dev
mail-pc-gov-pk-login.ethanhunthero125.workers[.]dev
mail-pof-gov-pk.govtpak.workers[.]dev
mail-ppra-org-pk.pakistan-gov-pk.workers[.]dev
mail-punjab-gov-pk.ntc-telecomcorporation.workers[.]dev
mail-punjab-gov-pk.ntc-telecommunication-safecity.workers[.]dev
mail-punjab-gov-pk.punjab-info-tech-board.workers[.]dev
mail-sco-gov-pk.mil-bd.workers[.]dev
mail-sco-gov-pk.ntc-telecomcorporation.workers[.]dev
meharusman524gov-pk.workers[.]dev
meharusman524gov-pk4230.workers[.]dev
na-gov-pk.workers[.]dev
na-gov-pk-bfd.workers[.]dev
navy-lk.workers[.]dev
nha-gov-pk.pakistan-gov-pk.workers[.]dev
old-violet-aae5.meharusman524gov-pk4230.workers[.]dev
pak-gov-pk.workers[.]dev
pakistan-gov-pk.workers[.]dev
paknavy-gov-pk.workers[.]dev
pitb.gov-pkgov.workers[.]dev
pitb-gov-pk.workers[.]dev
pmo-gov-pk-auth.workers[.]dev
pof-gov-pk.workers[.]dev
pythonscanner.gov-pkgov.workers[.]dev
reports-ecp-gov-pk.mlc-landdistribution.workers[.]dev
throbbing-sun-f4e8.meharusman524gov-pk4230.workers[.]dev
wapda-gov-pk.workers[.]dev
webmail.wapda-gov-pk.workers[.]dev
webmail-gda-gov-pk.gwadarportt.workers[.]dev
webmail-wapda-gov-pk.pakistan-gov-pk.workers[.]dev
worker-cool-credit-6d6f.navy-lk.workers[.]dev
worker-dark-paper-2231.gov-pkgov.workers[.]dev
worker-patient-wave-96d1.pakistan-gov-pk.workers[.]dev
worker-plain-wind-01a9.pakistan-gov-pk.workers[.]dev
worker-silent-pond-c90d.pakistan-gov-pk.workers[.]dev

```

  • Site content of domain `pythonscanner.gov-pkgov.workers[.]dev`

Hunting for Domain Masquerades in Whois and Web Scans

Hunting for Pakistani domain masquerades using cloudflare. The nature of these broader hunts are apt to uncover unintended prey. In this case, the stumbling on a mix of Pakistani travel and government job boards, and Crypto exchange masquerades.

```

govtjobspak[.]live
pakkjob[.]com
pakgovtsjobs[.]com
gov-declare[.]help
karakfinance[.]cfd
fi-ton[.]org

```

```

search:query=CoinTelegraphLegal.pdf&crumb=location:\\45.82.13[.]15@80\Downloads\&displayname=Downloads

```

Conclusion

Hunting for undetected threats can take on many forms. Prompted by threat reports and intelligence, threat hunters may cast a wider net to seek out undetected indicators, detect patterns, and correlate findings with other sources of information. That said, wider nets can catch more than the intended quarry. In this case, finding an ecosystem of websites impersonating as Pakistani airlines, government job boards, as well as remnants of malicious domains and scanners on Pakistani government domains. While it may not all be SloppyLemming activity, it highlights an apparent wider spread targeting of Pakistan.

References

https://www.cloudflare.com/threat-intelligence/research/report/unraveling-sloppylemmings-operations-across-south-asia/

Learn More
Research
Credential Phishing Pages Mimicking Legitimate Webmail Login Portals

Since 1 August 2024, a likely India-nexus targeted intrusion actor has targeted entities in China and South Asia using credential phishing pages mimicking legitimate webmail login portals. Domain naming conventions as well as observed phishing pages reveal likely targeting of entities in the government and defense sectors. Observed tactics, techniques, and procedures and target scope are consistent with public reporting on Indian targeted intrusion actors.  

Details

Identified domains share the following similarities:

  • Registration via 1api registrar service
  • Use of Royalhost nameservers
  • Resolving to the IP address 65.21.85[.]206
  • Domain naming convention using webmail login or file download themes often combined with references to specific, likely targeted entities

The 65.21.85[.]206 IP address is a shared host resolving numerous domains likely unrelated to the India-nexus targeted intrusion activity. However, historical data from this host indicates the India-nexus actor has used 65.21.85[.]206 since at least April 2024 to host phishing domains.  

Figure 1. Example Credential Phishing Page from nepal-mofa[.]com

Analysis of this activity also shows one of the actor-registered domains (never-giveup.mail-downloadfiles[.]com) redirecting to a credential phishing page hosted on the cloud service Netlify (large-files-d0wnl0ad-session-expired.netlify[.]app). These domains are likely being used to target Chinese entities.

Figure 2. Chinese-language Credential Phishing Page Hosted on Netlify

IOCs

South Asia China
navy.lk.mails-gov[.]com (Sri Lanka) mod.gov.cn.inviation.mail-files-open-preview[.]com
mailbox-owa-bd[.]com (Bangladesh) never-giveup.mail-downloadfiles[.]com
nepal-mofa[.]com (Nepal) all-files.mail-sessionexpired[.]com
mail-sessionexpired[.]com
preview-files-login.mail-sessionexpired[.]com
proposal-pdf-login.mail-sessionexpired[.]com
securitychallenge-cetci.mail-sessionexpired[.]com
alitcn.mail-files-open-preview[.]com
app-all.mail-files-open-preview[.]com
attachments-secure-check.mail-files-open-preview[.]com
coremail-downloads.mail-files-open-preview[.]com
coremail-files-downloads.mail-files-open-preview[.]com
download-all.mail-files-open-preview[.]com
download-attachments.mail-files-open-preview[.]com
mail-files-open-preview[.]com
netease-secure.mail-files-open-preview[.]com
pla-navy-seecure-drive.mail-files-open-preview[.]com

Conclusion

This activity is consistent with targeted intrusion activity identified in previous public reporting. Naming conventions are generally consistent with activity from the group known as Sidewinder with domains spoofing webmail login portals and the targeting of entities in China and South Asia. The India-nexus targeted intrusion group known as Patchwork also historically exhibited a similar target scope. 

Learn More
Research
Researchers: Weak Security Defaults Enabled Squarespace Domains Hijacks

In a recent article from KrebsonSecurity, they detail that at least a dozen organizations with domain names at domain registrar Squarespace saw their websites hijacked last week. Squarespace bought all assets of Google Domains a year ago, but many customers still haven’t set up their new accounts. Experts say malicious hackers learned they could commandeer any migrated Squarespace accounts that hadn’t yet been registered, merely by supplying an email address tied to an existing domain.

Read the research: https://krebsonsecurity.com/2024/07/researchers-weak-security-defaults-enabled-squarespace-domains-hijacks/

Learn More
Research
M-Trends 2024 Special Report

In this 15th edition, M-Trends provides an inside look at the evolving cyber threat landscape, with data drawn directly from frontline incident response investigations and threat intelligence findings of high-impact attacks and remediations around the globe.

  • The latest incident response metrics including dwell times, detection sources, initial infection vectors, and so much more
  • China-nexus attackers increasingly targeting edge devices and platforms that lack EDR
  • Trending adversary operations and motivations behind zero day attacks
  • The evolution of phishing techniques amidst modern security controls
  • How attackers are leveraging AiTM to compromise multi-factor authentication safeguards
  • The reasons and solutions behind growing cloud and hybrid cloud environment intrusions
  • How AI is effectively used in red and purple team operations to help boost cyber defenses

Read Anton Chavakin's take on the report: https://medium.com/anton-on-security/reading-the-mandiant-m-trends-2024-acb3208add80

Learn More
Research
2024 Data Breach Investigations Report

Another year has passed and that means another Verizon DBIR. For those that don’t want to read the full DBIR, here was our perspective from the Internet intelligence side of cybersecurity:

  • Median time for users to fall for phishing emails is 49 seconds
  • Pretexting is a more likely social action than Phishing
  • Ransomware was a top threat across 92% of industries (less representative than last year - median ratio of initially requested ransom and company revenue was only 1.34%)
  • The human element was a component of 68% of breaches


What do these threats all have in common? DNS!

https://www.verizon.com/business/resources/reports/dbir

Learn More
Research
‘The Manipulaters’ Improve Phishing, Still Fail at Opsec

The Resurgence of the “Manipulaters” Team - Breaking HeartSenders

In January 2024, The Manipulaters pleaded with Brian Krebs to unpublish previous stories about their work, claiming the group had turned over a new leaf and gone legitimate. But new research suggests that while they have improved the quality of their products and services, these nitwits still fail spectacularly at hiding their illegal activities.

https://krebsonsecurity.com/2024/04/the-manipulaters-improve-phishing-still-fail-at-opsec

Learn More