SecuritySnacks

Back to Homepage
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
No items found.
SECURITYSNACKS
SecuritySnack: 18+E-Crime

Starting in September 2024, a financially motivated cluster of more than 80 spoofed domain names and lure websites began targeting users with fake applications and websites themed as government tax sites, consumer banking, age 18+ social media content, and Windows assistant applications. The actor used these spoofed domains to deliver Android and Windows trojans likely for the purpose of stealing credentials or more overtly through the use of fake login pages.

Starting in September 2024, a financially motivated cluster of more than 80 spoofed domain names and lure websites began targeting users with fake applications and websites themed as government tax sites, consumer banking, age 18+ social media content, and Windows assistant applications. The actor used these spoofed domains to deliver Android and Windows trojans likely for the purpose of stealing credentials or more overtly through the use of fake login pages.

Details

Windows Installation Assistant download themed websites such as the following were used to deliver Windows trojans.

ms32-download[.]pro

corp-ms32-download[.]pro

Download URL: https[:]//cozzystaysemarang[.]com/temp/winsetup-stable-windows_x86_x64_software_package_revision_final.exe

Filename: winsetup-stable-windows_x86_x64_software_package_revision_final.exe

Sha256: 3767140145cef85204ddec1285f5dc8544bfcf8ff22318c11073baaa476385fc

The same delivery domain was previously observed delivering APK files in June 2025.

APK Sha256: a83a442f930fea310d391f852385e3673d8c7128e5bbdc2b68217838c78381fa

More recent versions used a different domain with a long URL likely to hide the filename from automated security tools and, to a lesser extent, human review. The excessive spaces (%20 in URL encoding) and length may bypass some detection rules or regular expressions to match malicious patterns..

Download URL:

https[:]//fleetfedx[.]com/Installer%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20em_OtvJCxP1_installer_Win7-Win11_x86_x64.msi

SHA256: 71cd466073bf23b43111dbc68ccaf1064e737f3f9ffebfec9a6f5146af6a34b9

The download links also contain a Tracking Pixel in the on-click event: onclick="fbq('track', 'Lead');" This indicates that the attacker is running this as a campaign. They are likely using Facebook ads or other methods to drive traffic to this fake page and are tracking their "conversion rate", a metric of how many people they successfully trick into clicking the malicious download link.

Facebook Tracker Ids:

  • 1354988235984551
  • 690114973584418
  • 1327164645166821

Additionally, a Yandex tracker was also identified in use: 97105740

Connective Tissue

Registrar

  • PDR Ltd. d/b/a PublicDomainRegistry.com
  • GMO Internet, Inc.

IP ISP

  • BL Networks
  • H2nexus Ltd
  • H2.nexus Frankfurt Network

Name Server Domain

  • regway[.]com

Top Level Domains

  • Pro, Shop, Com, Icu, Top

Registrant Email Domains

  • fviainboxes[.]com
  • dropjar[.]com
  • replyloop[.]com
  • yopmail[.]com
  • robot-mail[.]com
  • protonmail[.]com

Trackers

  • Facebook: 690114973584418
  • Facebook: 1327164645166821
  • Facebook: 1354988235984551
  • Yandex: 97105740

The majority of the cluster’s domains targeted users with age 18+ themed TikTok, YouTube, and online Gambling Android applications. Other themes specifically involved several prominent consumer banks and cryptocurrency exchanges including USAA, PMC, Bloomberg, and Binance. A subset of the domains resolve fake Windows 11 Installation Assistant and TrustCon VPN application downloads. 

A breakdown of the cluster’s domain and websites by spoofed industries shows the majority are directly financially related, including the Government tax sites.

Sample screenshots of spoofed websites for malware delivery and credential harvesting:

Conclusion

This report highlights a persistent and financially motivated cybercrime operation employing common techniques, including spoofed domains and lure websites to distribute malware and harvest credentials. 

The most common lures preyed on curiosity and desire, which can override a user's normal caution. The promise of forbidden or exclusive content is a powerful social engineering tool. Subsequently, victims are often embarrassed to admit how their device was infected. They are less likely to report the malicious app to authorities, security vendors, or even their IT department, allowing the malware to persist longer and the campaign to remain undetected.

They operate with the mindset of a malicious marketing firm, prioritizing scale and conversion rates over high-level technical sophistication. The use of template-based website builders indicates a focus on rapid deployment and disposability of their infrastructure, allowing them to quickly pivot and evade takedowns, browser-based warnings, and blocklisting mechanisms.

Users are advised to exercise extreme caution when encountering unfamiliar links or download prompts, particularly those related to banking, social media, or system utilities.

IOCs

Emails

host_sdji21cxvmj12[@]dropjar[.]com
pq_bl_6_safs_sssw[@]fviainboxes[.]com
feleko2722[@]replyloop[.]com
lux_bl_22_fdjhgza_reg[@]fviainboxes[.]com
lux_bl_21_sdfgsun_reg[@]fviainboxes[.]com
lux_47_jkscnxkjasd[@]fviainboxes[.]com
lux_49_kcsdfer321[@]fviainboxes[.]com
lux_bl_20_ilskdfgnoi_reg[@]fviainboxes[.]com
pq-black234333123[@]clowmail[.]com
zapuwo3736[@]robot-mail[.]com
simpleflex20934[@]yopmail[.]com
m2mcion[@]protonmail[.]com

Domains

11windows[.]pro
18pllus-tiktok[.]pro
18tiktok-get[.]pro
adac-banklnq-solarlsqroup[.]com
admin-octorate[.]icu
alphazone[.]icu
alveriq[.]run
americanfiscalroots[.]digital
app-degiro[.]life
app-lodgify[.]today
app-mews[.]life
app-tt-eighteenplus[.]pro
arvest-login[.]icu
asflinaq-de[.]com
assurix[.]run
atonovat[.]run
atorishation[.]icu
atotax[.]icu
au-ato[.]com
au-ato[.]info
au-ato[.]org
au-entrance[.]icu
auauth[.]icu
authcu[.]icu
author-glob[.]icu
authtax[.]icu
avaibook[.]today
aviabook[.]icu
balancevector[.]digital
becu[.]life
beginnersguide[.]digital
beytra[.]run
binance-copytrading[.]pro
blueecho[.]icu
bookary[.]digital
brightfoundations[.]run
btexplorer[.]icu
capcat[.]icu
casualabaya[.]icu
center-download[.]pro
center-hubs[.]com
center-upload[.]pro
centerhub[.]pro
chromaguide[.]icu
civiccore[.]digital
clarvexa[.]icu
cleareditlab[.]icu
clearoak[.]icu
cleranta[.]today
cloud-m32s-center[.]pro
cloudmention[.]icu
confirmation-id1174[.]com
confirmation-id1175[.]com
confirmation-id1176[.]com
confirmation-id1177[.]com
coremention[.]icu
corp-ms32-download[.]pro
credenza[.]run
credvoria[.]today
cyberpulse[.]icu
darkvoid[.]icu
datapanel[.]icu
datatransit[.]life
distan[.]icu
dornwell[.]today
dovexa[.]top
download-center-io[.]pro
downloads-center[.]pro
dowloadstake[.]com
drovenor[.]today
droxia[.]top
e-access[.]icu
e-auth[.]icu
economicsinsight[.]icu
econviewpoint[.]digital
eldenhall[.]digital
entcu[.]icu
entsolutions[.]icu
esl-access[.]com
etradeai[.]icu
etradeapi[.]icu
etradelogistic[.]icu
everlynx[.]icu
fidelity-entrance[.]com
fidelity-log[.]com
fidelity-login[.]com
fidellity-online[.]com
financebasics[.]digital
finatracore[.]today
finliteracynetwork[.]world
finlume[.]digital
finolyze[.]digital
finostra[.]digital
finovexa[.]digital
firmara[.]today
first-access[.]icu
fleetfedx[.]com
flexiraq[.]world
flrstrade[.]com
fnbo-access[.]icu
focusinsights[.]pro
focusonsystems[.]run
freyqa[.]bet
g-entrance[.]icu
get-centerapp[.]pro
get-tt-plus-download[.]com
get-upload[.]pro
getdownload-hub[.]com
getdownload-mscenter[.]com
getdownloadhub[.]com
gettaxato[.]icu
getupload-center[.]live
getupload[.]pro
getveridian[.]icu
glaviso[.]top
gov-access[.]icu
govaccess[.]icu
greythorpe[.]world
gridpattern[.]life
grotexor[.]icu
holven[.]icu
hostvista[.]digital
huntington-acc[.]com
huntington-access[.]com
huntington-access[.]icu
huntington-entrance[.]com
huntington-entrance[.]icu
huntington-log[.]com
huntington-online[.]com
huntington-read[.]com
id-centraldispatch[.]life
id-mexem[.]life
id-onpoint[.]life
id-tradestation[.]life
inforelic[.]icu
interactvebroker[.]com
keldra[.]top
kenvia[.]today
Learn More
SECURITYSNACKS
Cybersecurity Reading List - Week of 2025-09-29

Commentary followed by links to cybersecurity articles that caught our interest internally.

The days are getting shorter, and so is the news cycle. 

It’s A Lot. 

Bright spots emerge from the pattern, and one of the brightest in a while occurred last week for me - LABScon. SentinelOne and various sponsors manage to gather nearly two hundred of the top cybersecurity folks every year to talk and listen to each other, and I was honored to be admitted this year. The agenda itself is public and tells you enough to know just what kind of impact speakers can have: human rights investigators, harassment fighters, nation-state espionage mitigators, and more. 

While a lot of it was TLP:RED, one thing I’m confident in sharing is the week showed me a community of folks intent and determined on doing good for the world. Many are positioned to follow through on that in some way and are excited to talk about it to a full room or one-on-one with a complete stranger. 

It’s a posture I’m trying hard to carry back from con and out into the world.

On another note, something I’m seeing more of that I want to flag for folks: RecordedFuture published a great report on Stark Industries workarounds to deal with EU sanctions, and Brian Krebs expanded upon it with a great post as well. 

One of the common themes in conversation alongside harder research lately has been the intermediate and long-term ineffectiveness of many of our interventions targeting malicious actors, groups, and campaigns. Takedowns are momentarily gratifying - as I’ve said before, we need to celebrate the wins where we can - but do not seem to provide longitudinal benefits. What does effective long term disruption look like, and is it feasible? What are the models, and what are the realities?

For my part, I’ve been looking at bad actors’ activities before and after US OFAC and UK OFSI sanctions to understand both preparation and reaction. Emerging from technical observables like DNS and BGP is an opaque but solid understanding that bad actors are much better at reliability engineering and disaster recovery than we want to admit, from domain mirroring all the way up to anticipatory Autonomous System takeover. I’ve submitted a talk to CYBERWARCON on the topic (and hopefully it’s accepted!), but if folks reading this know of work around long-term disruption, cybersecurity-related sanctions research, or adjacent topics, I’d love to hear from you. Please shoot me an email at CSRL at domaintools[.]com. 

Podcasts

Microsoft Threat Intelligence - Stopping Domain Impersonation with AI - I know, I know, I’m tired of AI all the time too. But it’s timely and important to stay on top of. Good conversation, especially around how the problem is one of scale rather than sophistication.

Three Buddy Problem - I can’t choose between them, so you get all three Live from LABScon episodes. 

Articles

The Record - Ransomware gang takedowns causing explosion of new, smaller groups - Immediately thought of research we conducted with Analyst1 and Scylla Intel and presented at SLEUTHCON earlier this year. Of particular interest is the finding that disruption tends to result in smaller groups reconstituting around critical trust relationships. 

Infoblox - Deniability by Design: DNS-Driven Insights into a Malicious Ad Network - Incredibly good work by Infoblox weaving deep technical details and deep narrative into a systematic understanding of not just malicious adtech but the behavior behind it and thorough methods to fingerprint and track it. 

Morningstar - Unit 221B Raises $5M in Seed Funding To Convert Threat Intelligence into Real World Arrests - You love to see it. Congratulations to our friends at Unit 221B, who should have people throwing large piles of cash at them all the time, given how excellent their work is. 

Google TIG - Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors - Targeting profile prioritized “legal services, Software as a Service (SaaS) providers, Business Process Outsourcers (BPOs), and Technology.” Excellent writeup by TIG, as always.

Schneier - Surveying the Global Spyware Market - Schneier highlights two important points: that investment in spyware companies has risen lately, and the role of brokers and resellers that often go unnoticed in the chain. 

Koi Security - First Malicious MCP in the Wild - Thousands of downloads a week and it’s copying every email to the dev’s personal server. Because the S in MCP stands for Security!

CSO - Why domain-based attacks will continue to wreak havoc - The dangerousness of these attacks long predated AI, including at scale, but this is a pretty good review of some domain attacks to take note of and ensure you’ve worked into your defenses and simulations.

Group-IB - Mapping the Infrastructure and Malware Ecosystem of MuddyWater - Not always the biggest fan of Group-IB, but indicators are indicators, and there’s some good work here about how Muddy Water’s tradecraft is evolving.

Microsoft - Microsoft seizes 338 websites to disrupt rapidly growing ‘RaccoonO365’ phishing service - Joint work between Microsoft DCU and Health-ISAC, highlighting the role RaccoonO365 has adopted in targeting the healthcare sector.

Research Papers and Reports

arXiv - Large Language Models for Security Operations Centers: A Comprehensive Survey - Not ground-breaking, but some valuable LLM/SOC fundamentals covered here.

Entertainment

GadgetReview - Massive Attack Turns Concert Into Facial Recognition Surveillance Experiment - Massive Attack hasn’t commented on data retention from the event, laying bare the ambiguity and lack of agency that goes unseen in all the other applications. A+

Learn More
SECURITYSNACKS
Banker Trojan Targeting Indonesian and Vietnamese Android Users

A group has been targeting Indonesian and Vietnamese Android users with banking trojans disguised as legitimate payment and government identity applications. The operators exhibit distinct domain registration patterns, often reusing TLS certificates and grouping domains to resolve to the same IP addresses, with a strong operational focus during Eastern Asia's daytime hours.

Since approximately August 2024, a group has been targeting Indonesian and Vietnamese Android users with banking trojans disguised as legitimate payment and government identity applications. The operators exhibit distinct domain registration patterns, often reusing TLS certificates and grouping domains to resolve to the same IP addresses, with a strong operational focus during Eastern Asia's daytime hours.

Details

The pattern was initially identified through the monitoring of suspicious site elements such as those associated to Google Play Store http.html:"VfPpkd-jY41G-V67aGc" that may suggest spoofed Play store websites for malware delivery. 

icrossingappxyz[.]com

The page contains fake buttons for Google Play Store and App Store application downloads. Clicking the Google Play starts an on-page download progression bar and then prompts for a file store download location on device. The Apple App Store link was nonfunctional.

The site uses an obfuscation wrapper with Socket.IO library, which enables real-time, bidirectional communication with a server. This is highly abnormal for a download page. Instead of linking directly to a file download, when a user clicks the Android button, it initiates a WebSocket connection: socket.emit('startDownload', ...). The server responds by sending the .apk file back to the browser in many small chunks. The browser listens for these with “socket.on('chunk', (chunk) => { chunks.push(chunk); });”. As the server sends data, it also sends progress messages (downloadProgress). The script uses these to update the on-screen progress bar, making the user believe a normal download is occurring. When the server sends the “downloadComplete” message, the script combines all the chunks in memory and sets the type to 'application/vnd.android.package-archive', the MIME type for an APK file. It then creates a temporary local URL for the file and creates an invisible <a> link, pointing to the temporary file URL and programmatically clicks it. This initiates a user download prompt from the browser. 

The malicious site operators likely attempted to evade detection and hide their malware store through the elaborate download method. Network security and firewalls might be configured to block direct downloads of .apk files. However, by hiding the file transfer inside WebSocket traffic, it can often slip through undetected. Since there is no static URL pointing to the malicious file, automated security scanners that crawl websites looking for malicious links will not find it.

It is worth noting that some browsers correctly flagged these downloads as suspicious with download warning prompts such as the following:

IdentitasKependudukanDigital.apk

1f9253092c5a2abdb7bc3d93fccad85f23ce5bfde38377c792a242f045afcdb5

The file was detected as BankBot.Remo.1.origin, a previously closed source banking trojan that had its source code leaked on Russian-language forums in 2016. This has resulted in many variants.

Other much more commonplace malware delivery sites were also used such as the following spoof of M-Pajak, a tax payment app. It simply spoofs the Google App Store page and has a direct download URL to the malicious file stored on the server. Notably, the site used a mix of Thai, Vietnamese, Portuguese, and Indonesian language in the HTML code instead of dynamically inserting the correct language strings based on the visitor's Accept-Language header or GeoIP. This suggests these are template files used by unsophisticated operators. 

twmlwcs[.]cc

Download URL: https[:]//twmlwcs[.]cc/tax-app/M-Pajak.apk

M-Pajak.apk

SHA256 Hash: e9d3f6211d4ebbe0c5c564b234903fbf5a0dd3f531b518e13ef0dcc8bedc4a6d  

The downloaded file is also a loader for BankBot and is configured with the following C2 domains: 

saping.ynhqhu[.]com
aaping.ynhqhu[.]com
admin.congdichvucongdancuquocgia[.]cc
admin.outdoormovietheaters[.]com

Of the over 100 domains identified in this activity for malware distribution, there were a very limited number of variations in the spoofed content used for delivery. There were slight variations as can be seen from the following sample screenshots in addition to following the fake verification trends that have become commonplace over the past year. 

The group also has a nice habit of keeping their malware in open web directories such as the following:

Open Index of dgpyynxzb[.]com

BCA.apk 0de69fad50b9e0800ba0120fe2b2f7ebb414e1ae335149a77dae3544b0a46139
BCA mobile-8-5.apk 68fb18d67bb2314ff70a0fb42e05c40463cceb9657c62682179e62809429ad99
BRI-JR (1).apk 9ada0f54f0eaa0349c63759172848fcb1dd123d892ece8d74002f96d6f095a43
BRImo_0320SXZ_1 (1).apk 0d36bb982c7b4d7b309f34653af7f5abe80b1503971d9832d617c5f6b35f362c
D-Bank Pro_0725_UU.apk d47246c9bd4961f692cef6e3d8cdc5aa5f64e16946104cc9c194eb47077fd897
Livin.apk 4eb7a289af4ea7c65c4926e4b5e2c9ec3fb4d0b9cc425f704b7d1634c23a03a9
MyBCA-8-5.apk 680eb952cfff2fb39563abc6321851f4b7e6a8014d09ed2744465bcb192562ce
MY_BCA.apk b847b228ed7993136b390bdd6c4afaadc7a441afabf28524bd236e002cf58d47
OCBCmobileid_02202025AC.apk f7a148d0da5bea32a823b27cf8c45e7532d5e0a964cc4a102fa006ea4ff7e64d
OCBC mobile Indonesia_02272025AC.apk 90aa611b5a258d36220afad46aa52f7496dc11211999ea84e0e7182dc3476aa5
WondrBNI727.apk e433744f2372bc1ef925007f1f2a17509b4a498472d68c671bb8849265c61475

Open Index of ykkadm[.]icu

3fb8add8f3b3f6755c6f427c05cc3acc690yLYUy.apk e29c4a157ac2e1a233f9a59e63cb203fd8eac0595c452d93ed9b72e264dbc8f9
ACBONE01172025U.apk 2386baafae215fee4c27b955dd6786a7d70d32e5d6eff54cfd8a1353d3d1b473 
KienlongBank01172025Ucompatible.apk ec5b55d4829d043ed3998cc90f633fab5d37bcf5476c6b274eeba85b9f5baaa7 
NamABank01162025U.apk 359a032427342b32bcd85a40e0f99496732f03bbce15aa0d8c92a2b9cfd493dc 
SHBmobile_01232025U.apk 14ce035b4bc33458612f3b692e9d9f3304e4eb0455c933452ec49d56549520c4 
VTB1212025.apk 33939f391dab818e6bbda531f64280869adbaafc213c2f4773169f561c88f19f 

indiemusicacademi[.]com

Domain Registration Patterns

Over the past 12 months, the actor was observed using distinct domain registration patterns. This often included the reuse of TLS certificates on two domains and grouping multiple domains to resolve to the same IP addresses. 

  • ISP:
    • Alibaba
    • Scloud
    • CloudFlare
  • IP Country: SG, ID
  • Common Website title and page:
    • Identitas Kependudukan Digital- Apps on Google Play
  • Server Type: nginx
  • Nameserver:
    • share-dns[.]net 
    • cloudflare[.]com
  • SSL Issuer: R10, R11, WE1
  • Registrar:
    • Gname.com Pte. Ltd.

The most prolific registration patterns were the use of Alibaba ISP, Gname Registrar, and share-dns[.]net nameservers. 

Heatmaps showing the domain registration (left) and first seen DNS requests (right) with the time of day (UTC) over the year.

With the heatmaps for both domain registration and first seen DNS resolutions showing a visually similar grouping, it can also be observed that the delta relative to the domain registrations and first seen DNS requests averaged 10.5 hours over the year. This suggests the domains may be consistently operationalized quickly after registration though not nearly as rapidly as other more prominent cyber crime groups. 

The time data shows a strong grouping around eastern Asia's daytime hours, as is expected with the likely focus on targeting Indonesian and Vietnamese mobile users. It may also suggest the operators are working during the same times, if not also located in the same region.

Conclusion

The malicious operators employed some methodologies to bypass network security that might block direct downloads and prevent static URL-based security scanners from detecting the malicious files. However, it is worth noting that some browsers correctly flag these downloads as suspicious, displaying warning prompts to users and serving as a crucial line of defense for end users. Additionally, several commonplace methodologies employed prominently by less sophisticated financially-motivated groups such as spoofing Google Play Store allow for the identification of these spoofed malware delivery sites. The consistent use of Alibaba ISP, Gname Registrar, and share-dns[.]net nameservers across their operations provides a clear footprint of their infrastructure. While some spoofed sites, like twmlwcs[.]cc, show mixed language code possibly indicating template use by less sophisticated elements, the overall campaign exhibits a coordinated approach to malware delivery. Overall it is likely financially motivated and suspected of being operated by a group in the same region.

IOCs

Domains (see them on our Github as well)

asdrjswer678[.]com
asociaciondehotelesdemexico[.]com
bocongan-congdichvucong[.]com
bps-ikd[.]com
bpsikd[.]com
brightter-efg[.]com
brightter-ysl[.]com
capnhat-etvn[.]cc
capnhatdulieu-et[.]com
care-ind[.]cc
chinhphutt[.]com
cong-dich-vu-cong-quoc-gia[.]com
cong-dichvucong[.]com
congdichvu[.]cc
congdichvu[.]vip
congdichvucong-bocongan[.]com
congdichvucong-quocgia-dvc[.]com
congdichvucong-quocgia[.]com
congdichvucong[.]cc
congdichvucongbocongan[.]com
congdichvucongdancuquocgia[.]cc
congdichvucongdancuquocgia[.]com
congdichvucongquocgia[.]com
coring-ind-care[.]cc
coring-ind-care[.]com
cpvn-eta[.]cc
cski-evn[.]cc
dich-vu-cong[.]com
dichvucong-dvc-quocgia[.]cc
dichvucong-qg[.]com
dichvucong-quoc-gia[.]com
dichvucong-quocgia[.]cc
dichvucong-quocgia[.]com
dichvucongquocgia[.]com
dichvuquocgia[.]com
dichvuquocgia[.]org
digital-idn[.]com
dirjenpajak-caring-idn[.]com
dirjenpajak-idn-caring[.]com
djp-idn-pajak[.]cc
djp-mpajak-idn[.]cc
djp-mpajak-idn[.]cyou
djp-mpajak-idn[.]top
djpcare-mpajak-idn[.]cc
djpcare-mpajak-idn[.]com
djpcareloop[.]top
down-loadmpajakidn[.]com
download-djpidn[.]com
download-idnpajak[.]com
downloaddjpidn[.]com
downloadmpajakidn[.]com
downloadmpajakidn[.]vip
downloadpajak[.]cc
dulieu-etvn[.]cc
dvc-chinhphu[.]com
dvc-dichvucong[.]com
dvc-quocgia[.]cc
dvc-quocgia[.]com
dvc-quocgia[.]net
dvc-quocgia[.]org
dvcdichvucong[.]com
dvcqg[.]cc
dvcqg[.]org
dvcqg[.]vip
dvcquocgia[.]com
dvcvn-congdichvucongquocgia[.]cc
dvcvn-dichvucongquoccgla[.]online
dvcvn-dichvucongquocgla[.]online
dvcvn-dichvucongquocglaa[.]online
dvcvn-dichvucongquoocgla[.]online
dvcvn-trungtamdulieu[.]com
dxgjsgw[.]com
e-djp[.]com
e-ikd[.]com
e-pajak[.]cc
etx-dongbodulieu[.]com
evn-ctdl[.]cc
fbpsikd[.]click
hdgjgw[.]com
hosodongbo-etvn[.]cc
hsgjsgw[.]com
i-djp-pajak[.]com
icrossingappxyz[.]com
id-djp-dl[.]com
id-ektp[.]com
id-pemerintah[.]com
idmpajak[.]com
idn-digital[.]com
idn-dirjenpajak-caring[.]cc
idn-dirjenpajak-caring[.]com
idn-pajak-djp[.]cc
idn-pajak-djp[.]top
idngov[.]com
idnpajak[.]com
idnpajakdownload[.]com
iheartusnf6[.]com
ikddigital[.]online
ind-ikddps[.]cc
ind-ikddps[.]online
ind-ikddpzs[.]online
ind-ikddpzz[.]online
indiemusicacademi[.]com
japavest[.]com
japfunds[.]com
jfjygw[.]com
keelvari1[.]cc
m-djp-download[.]com
m-pajak[.]cc
m-pajak[.]vip
mpajak-djp-idn[.]cc
mpajak-djp-idn[.]top
mpajak-djp-idn[.]vip
mpajak-idn-download[.]cc
mpajak[.]cc
onlinedjp[.]com
onlinepajak[.]cc
outshine-byd[.]com
outshine-ryg[.]com
outshine-sem[.]com
pa-jak[.]org
pajakdownload[.]com
pemerimtahx[.]com
pemerintah[.]cc
phatnguoicsgt[.]com
registerktp[.]com
registerktp[.]online
toptraditional[.]com
topunfortunately[.]com
topviolent[.]com
ttcskhdl[.]cc
twmlwcs[.]cc
vietnamchinhphu[.]org
vncirclek[.]com
vndichvucongtructuyen[.]com
ykkadm[.]icu
ynhqhu[.]com

Sha256 Hashes

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
Learn More
SECURITYSNACKS
Cybersecurity Reading List - Week of 2025-08-25

The sun has come for us, in the US. We escaped the desert only to trudge back into summer heat. But all is not lost - some things are looking better, and voluminous research has emerged from Hacker Summer Camp.

And now we enter the belly of the beast.

Summer is in its full effect in the United States as many of us return from the surface of the sun Hacker Summer Camp in Las Vegas (covered in a separate post here). Post-BlackHat and DEF CON also arrives with an abundance of gifts for practitioners and researchers: the publication of tons of new research. As always, the items linked below aren’t intended to be a round-up but rather what caught attention internally, having stood out from the rest. 

The rest of the year looms, but not without hope. 

There are some signs that spending freezes are easing up and hiring may be easing up. Even in this heat, that’s cold comfort for those in the middle of the job hunt. It’s never been harder or more filled with frustration, dead ends, and deeper hazards like identity theft or financial scams. If you’re in a place to help, try to do what you can. 

If you’re still on the hunt, keep pushing, and get through however you can. 

Podcasts

Adversary Universe from Crowdstrike - Live at Black Hat: What’s AI Really Capable Of? - 33min - Good, grounded (but relatively upbeat) perspective on AI capabilities for both defenders and attackers. Also some interesting recent attack campaigns seen, including one with convincing multi-persona smishing threads (no evidence of AI in this latter, yet). 

CyberWire Research Saturday - Beyond the smoke screen - 22min- Excellent interview with Dr. Renee Burton of Infoblox Threat Threat Intel detailing their extensive work on the VexTrio cybercriminal group. They gave a great BlackHat briefing on this topic, and the interview is similarly compelling in both technical and behavioral aspects.

Prompt||GTFO - Youtube playlists for episodes one, two, three - ~90min each - Fascinating series of “prompt pits” in which mostly infosec practitioners get together to share use cases and experiences with AI, with a strict “no slides” rule, demos only. Not an endorsement of AI, but interesting to see how practitioners are using it, and most views involved are pretty reasonable and experience-driven. 

Articles

Infoblox - VexTrio Origin Story, Unmasked, and Inside the Robot - A three-part investigation highlighting world class-level research by Infoblox Threat Intel into the evolution, behavior, and technology of a major adtech-related spam and scam actor. Highly recommended to read all three in order to get a better idea of what you end up looking at in the wild. 

Analyst1 - Ransomware Diaries Volume 7: “I Had to Take the Guilt For Everyone” – The Kaseya Hacker Breaks His Silence - Jon DiMaggio’s DEF CON talk with Jon Fokker gripped a full theater for an hour, and the accompanying blog post is even better. There are few investigators on his level, and even fewer storytellers.

Wunderwuzzi - Claude Code: Data Exfiltration with DNS (CVE-2025-55284) - Okay. So. I’m trying to be less adversarial towards GenAI, really I am. But when you allowlist a bunch of bash commands for your autonomous agent and include DNS lookups, you clear a direct path for a long-known and well-researched data exfiltration and command & control method. And then I have to get all mad and shouty again. 

RiskyBulletin - Hackers sabotage Iranian ships at sea, again - “According to an analysis of the leaked files, the group hacked the company's network, identified all maritime communications terminals in its MySQL database, and then deployed malicious code to each ship's satellite terminal that wiped its disk storage.” 

TechCrunch - North Korean spies posing as remote workers have infiltrated hundreds of companies, says CrowdStrike - What I can’t decide is if the seeming overwhelming success of this campaign is down to good execution on the part of DPRK or the sad, sad state of enterprise security, especially whenever it causes friction in hiring processes.

Cofense - Spain TLD’s Recent Rise to Dominance - Anecdotally I’d been seeing .es show up in my investigators more lately even before reading this, and once the article crossed my desk it made more sense. 

Research Papers and Reports

Greynoise Intelligence - Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities - Greynoise looked backward and found that in 80% of cases, a spike in attempted attacks on a particular technology presaged a CVE release for that technology within six weeks. Excellent work and findings, worth reading the full report. Also covered by Research Saturday interviewing Greynoise VP of Data Science Bob Rudis (30min). 

RecordedFuture - Cloud Threat Hunting and Defense Landscape - In which Insikt Group lays out five prominent attack vectors threatening cloud environments, including details on common misconfigurations as well as logging and hunting internally.

CAIDA - Hunting in the Dark: Metrics for Early Stage Traffic Discovery - “Using a metric for discoverability, we model the ability of defenders to measure Crackonosh traffic as the malware population decreases, evaluate the strength of various detection methods, and demonstrate how different darkspace sizes affect both the ability to track the malware, but enable emergent behaviors by exploiting attacker mistakes.”

arXiv - Security Challenges in AI Agent Deployment: Insights from a Large Scale Public Competition - Results of wide-scale competitive testing across several dozen agents and models, with an eye to evaluating attack transferability and common vulnerabilities. Some significant findings, including limited correlation between size, robustness, or inference-time, meaning that the “better” and “bigger” models didn’t do better than the bargain basement models. 

Tools and Resources

CSO Online - CISA releases Thorium, an open-source, scalable platform for malware analysis - Curious to see where this goes, relative to NSA’s Ghidra.

Entertaining Reading

Wikipedia - The Berners Street Hoax - “Hook spent six weeks sending between a thousand and four thousand letters to tradespeople and businesses ordering deliveries of their goods and services to 54 Berners Street, Westminster, at various times on 27 November 1810.”

Learn More
SECURITYSNACKS
Hunting for Malware Networks

Hunting for new malware delivery infrastructure often entails the identification and tracking of common techniques to deliver various stages of malware. See what our researchers stumbled upon.

Details

Hunting for new malware delivery infrastructure often entails the identification and tracking of common techniques to deliver various stages of malware. Take malware-as-a-service providers for instance, some commonalities in a recent activity cluster entailed the use of hosted powershell scripts acting as a reference to the next malware to download and execute. 

Multiple clusters of stealer activity were observed through early July using PowerShell scripts as an intermediate stage for malware delivery. Creating multiple stages of delivery reduces the initial risk of exposing all malware and associated infrastructure if it is detected early on in execution. It may also slow down response investigations and analysis. 

Hunting for malicious web hosted PowerShell scripts can be as simple as using a Shodan query such as: http.html:"Invoke-WebRequest”.

Example Finding:
77.110.118.195 Resolved malicious domain “alababababa[.]cloud”.

A reused web-hosted powershell script to retrieve a malicious executable, build.exe, which it then starts as a new process.

Filename: build.exe
Sha256: 7ada4d7dfc00943780cb51ea182c7a221953cdabc394011204ba5cd8e4e8f0d3

This script acts as a trojan and connects to a commonly used C2 domain “anodes[.]pro”, which has communicated with more than60 malicious files in the past 2 months, including multiple stealer malware families such as Amadey, Lumma,  Luca, DeerStealer, and RedLine as well as other malware families Rugmi, BlackBasta and DarkGate.

Expanding on the domain behavior in VirusTotal, one additional DeerStealer sample was identified, which also used the same C2 domain. 

Sha256: bd269a6328de0e534f4d8c3a42ea88a4343168053f63da0da95318f4ed17e705

Expanding on the associated infrastructure of the identified intermediary domain “alababababa[.]cloud” through domain registration overlaps identified potentially related activity.

  • NameServer: cloudflare[.]com
  • IP ISP: CloudFlare Inc
  • Address: compliance_abuse[@]webnic[.]cc
  • Registrar: WebNIC
  • SSL Issuer: WE1
alababababa[.]cloud
hugevcdn[.]pro
anodes[.]pro
servicesmesh[.]pro
interconstructionsite[.]pro
zurichinsurince[.]com
zhuchengsantian[.]com

Repeating the previous steps identifies additional malware with commonalities in stealer and C2 usage such as Amadey malware being observed with domain “hugevcdn[.]pro”.

Sha256: 02c158c63d28fd5be24424e41b70a7a361c9be8897590c0453b0d30bd6e0d842
C2: "185.156.72[.]96/te4h2nus/index.php

Similar but considerably higher volume to the C2 domain “anodes[.].pro”, the C2 IP 185.156.72[.]96 has been observed with over 2,700 malicious files communicating to it. Notably with many of the same wide range of malware-as-a-service families using it as a C2.  

In addition, many of the malicious files for LummaStealer and Amadey shared a common C2 IP “185.156.72[.]96” and overlaps with a previous LummaStealer IP “185.156.72[.]2”.

Both IPs are part of an obscure ASN (AS61432) TOV VAIZ PARTNER. This ASN has only one prefix (185.156.72.0/24), which shows only 1 out 719 BGP peer propagations for Hurricane Electric Services. The ASN claims Ukrainian origin and appears to only be propagated by 1 other ASN, AS50073 Webcraft Found LLC in Ukraine. This may generally suggest the ASN is part of a BPHS, bulletproof hosting service.

Example LummaStealer C2s associated to IP 185.156.72[.]2 and 185.156.72[.]96 and anodes[.]pro

0a401e0be28cb02b549b63db4681a881ec03091ca058103debe30ef20070aba230dd56520191f9ac29e7eb87c3e428dec6c3ea90baca523ec46f9ce58c6179210dd80560bfc501a9bcdcc45e76b232655eb8cba78d09a8414dc77236a3ead1741149a01c5c8a3870ba40ca68f8e801cc38e5542c1938ed7ee01b14cf2e571258293bf1f2b901f02f23af5c9221989ac82f27b2de061d7df9a035e09e713f914d
hxxps[:]//battlefled[.]top/gaoi
hxxps[:]//citellcagt[.]top/gjtu
hxxps[:]//diecam[.]top/laur/api
hxxps[:]//escczlv[.]top/bufi
hxxps[:]//korxddl[.]top/qidz
hxxps[:]//localixbiw[.]top/zlpa
hxxps[:]//narrathfpt[.]top/tekq
hxxps[:]//peppinqikp[.]xyz/xaow
hxxps[:]//sstemxehg[.]shop/gaks
hxxps[:]//stochalyqp[.]xyz/alfp

Noting a reused SSH certificate “hash:896675070” and “hash:-434889431” from the C2 IP address identifies several historic overlaps such as the following recent IPs:

185.156.72[.]97 > 0176.46.157[.]50 > 570 malicious communicating files185.156.72[.]96 > 2,800 malicious communicating files66.114.52[.]156 > 1 malicious communicating files176.46.157[.]32 > 660 malicious communicating files

In addition to indications that the large cluster of malware employs Amazon CloudFront, Amazon Global Accelerator EC2s, and Github user content being used to store and distribute malware. All of which create challenges in proactively blocking malicious domains.

Example 1:
https[:]//raw.githubusercontent[.]com/peterson643eu/projecttop/36b05b6030459ba5435705d8b91aae11f0ba268b/NIOAHYWM.exe
https[:]//raw.githubusercontent[.]com/peterson643eu/projecttop/6fd8d0859aa9d3d300bf79f3da8032b04b1ed540/OURDUBDV.exe
https[:]//github[.]com/peterson643eu/projecttop/raw/refs/heads/main/OURDUBDV.exe

Makes request to http[:]//nexuswarps[.]shop/c
C2s: anodes[.]pro, multiport[.]shop

SSL Hash overlaps with a CloudFront IP resolving “70d9ae273c860e606f236c528381f9ca[.]cloudfront[.]net” suggests the CloudFront service may be used to relay traffic to another endpoint serving malware.

Sampling 200 of the communicating files with meaningful detection names in VirusTotal and limiting to the past 3 months there is an overrepresentative share of LummaC2 and Amadey.

Despite law enforcement takedowns targeting LummaStealer infrastructure in May 2025, it appears Lumma is still operating and continues to be a prominent choice. Though we speculate that this particular cluster of malicious activity decidedly experimented with alternative choices during the month of June and may have opted to continue operations with LummaStealer.  

Conclusion

Despite a May 2025 law enforcement takedown targeting LummaStealer, the malware family appears to remain active and a popular choice for threat actors, particularly through bulletproof hosting services (BPHS) IPs. This analysis of observed malicious activity, with a focus on C2 IPs 185.156.72[.]96 and 185.156.72[.]2 (both part of AS61432, a suspected BPHS), suggests that while there may have been some experimentation with alternative malware during June, operations have largely continued with LummaStealer.

IOCs

kinwlyo[.]xyz
sstemxehg[.]shop
anodes[.]pro
stochalyqp[.]xyz
peppinqikp[.]xyz
financialway[.]pro
alababababa[.]cloud
chainnode[.]shop
multiport[.]shop
battlefled[.]top
localixbiw[.]top
korxddl[.]top
diecam[.]top
escczlv[.]top
citellcagt[.]top
narrathfpt[.]top
zurichinsurince[.]com
zhuchengsantian[.]com
metaskins[.]gg
blogcrptodevelopments[.]com
ripple-regulatory[.]com
ripple-legal[.]com
ripple-regulation[.]com
cfd-regulations[.]com
avatrade-supervision[.]com
avatrade-global[.]com
londonoffvisit[.]com
avatrade-regulation[.]com
avatrade-compliance[.]com
avatrade-services[.]com
betrunk[.]rocks
hugevcdn[.]pro
mary-mijote[.]frs
ervicesmesh[.]pro
interconstructionsite[.]pro
osuszaczemlawa[.]pl
registrokim[.]online
orlideti[.]com
Learn More
SECURITYSNACKS
Hacker Summer Camp Recap - A Snick Snack

What do scavenger hunts, malware, and wildcards have in common?

Hacker Summer Camp recedes into the rearview mirror and the world starts back up again.

Morning standup. Q3 sprint. Follow-ups and circle-backs. But perhaps we’re changed. Perhaps we re-enter the frays in a slightly different way, shedding data of a marginally changed nature. Philosopher and media theorist Marshall McLuhan said that as a species, “We look at the present through a rear-view mirror” in our “march backwards into the future.”

He continued: “Because of the invisibility of any environment during the period of its innovation, man is only conscious of the environment that has preceded it; in other words, an environment becomes fully visible only when it has been superseded by a new environment.”

Does the landscape after BSidesLV, Black Hat, and DEF CON count as a new environment? Could the information gleaned, hands shaken, and drinks shared change us significantly going forward?

For my part, I always emerge from this week in Las Vegas and find my surroundings drawn into sharper relief. Finer lines mark more edges, but they also bring us together in more ways, if we let them. Light sources are brighter, or revealed as so bright they hid now-revealed details, like a message written on the lightbulb only visible in the briefest of moments upon flicking the switch off. 

McLuhan’s observation in mind, that may be my sign that our chaotic week of community each year marks a new environment, superseding the old and making the latter finally visible. 

Or perhaps that I just need more sleep this year.

—-------

Folks often pose the question: “Which is better, Black Hat or DEF CON?”

The real answer is, “It depends.” 

Black Hat starts the week out with everyone fresh and wide-eyed, staring down the barrel of at least six days of scrambling if they attend both conferences. It is to my benefit that we take care of the business end first before the social and sensory overwhelm hits - I’m much more articulate and sociable, moving mountains to meet practitioners, collaborators, and customers. Discussions are more hard-nosed, shorter, and more focused. Metrics rule the day.

That being said, Black Hat is a delight of a different sort. It’s a much more focused and organized entity rather than creeping chaos. Meeting up with other practitioners and talking shop involves a lot less small talk, with a substantial chunk of theory discussion and an even larger space held to talk practice. 

Plus, less bare concrete. 

One highlight of my Black Hat arrived early; my first briefing was From Prompts to Pwns: Exploiting and Securing AI Agents, presented by NVIDIA AI Red Teamers Rebecca Lynch and Rich Harang. Lynch and Harang began by providing an excellent technical foundation. Points included LLM compromise as enabled by a “universal anti-pattern” that allows for the attacks, as well as agentic autonomy classifications and their relation to both systems architecture and the introduction of nondeterminism into the system. They then pivoted to the practical nature of their red teaming and the realities that informed it. LLM guardrails are mostly just other LLMs performing checks, and so subject to similar attacks. And since these platforms are often crawling the web, the ability to introduce untrusted content spans the entire Internet. Specific technical observables included Cursor rules files, ASCII smuggling, and more. And the idea that malicious actors can more effectively use LLMs to socially engineer the user than other technologies was a brilliant insight.

The talk was equal parts funny and grim, and I’m now hungry to see more from NVIDIA’s AI Red Team.

Another highlight came from the venerable Threat Intel team at Infoblox, No Hoodies Here: Organized Crime in AdTech. The talk revolved around long-term and fascinating research around spam & scam cybercriminals VexTrio, accompanied by the second in Infoblox’ blog series on the group (you can find the first post here). Their research laid bare the evolution of VexTrio into an adtech powerhouse of villainy, complete with Instagram photos of their fast cars, lavish meals, and expensive boats. A deep understanding of both the technologies involved and the human behavior behind them emerged through excellent research and storytelling.

—-------

DEF CON is, of course, an entirely different animal. It’s about one-tenth the price, and I’d guess at least twice the size of Black Hat. And the chaos only ends where the concrete does too (that’s not hyperbole by the way, the floors are all concrete, bring good shoes and ibuprofen).

Now that DEF CON has moved to a single venue it’s become a little more manageable, and staff learned the ins and outs of the new complex last year and applied those lessons to great effect. Attendance is much wider spread than Black Hat, with enthusiasts and other kinds of technologists in attendance. 

There’s more swagger, but there’s also more joy; folks assembling under an umbrella of energetic curiosity and irreverence and self-organizing across a number of villages as well as the main stage talks. 

We were able and honored to show up to and share with DEF CON 33 in a big way three separate talks in three separate villages. 

DNS Scavenger Hunt
Security Advisor Malachi Walker gave an interactive talk at the Blacks in Cyber Village: Following Threat Actors’ Rhythm — to Give Them More Blues. The talk provided indicators to follow around threat actor activity and then engaged the crowd in a DNS-based scavenger hunt from the terminal.

Malware in DNS
Malachi Walker and Senior Security Operations Engineer Ian Campbell spoke on investigative findings in the Malware Village: Plain TXT, Malicious Context: Uncovering DNS Malware. Included were DNS investigation basics, and then several real-world examples of DNS TXT records being used for malware storage and retrieval as well as the step-by-step detection specifics. There’s a bonus round at the end of the slide deck for folks interested in domain mysteries!

Pre-Identifying DNS Wildcards: A New Standard of Care
CISO and Head of Investigations Daniel Schwalbe presented original research and enablement at Recon Village. Informed by a DEF CON 31 win at the Subdomain Enumeration Contest, an alternative method identifying 100 times the winning results required a parallel new solution to identifying and removing wildcarded domains.

Of course, other folks were there too. A LOT of them, actually. And many giving great talks on stages or in villages. Yale Grauer in the Crypto and Privacy Village on Cyber Defenses, cooperq and oopsbagel in the hackers.town community on Rayhunter Internals, and our friend Jon DiMaggio co-speaking with Jon Fokker on the Track 5 stage spilling the tea about a REvil actor, to name just a few. This latter was a fantastic talk that showed the deep and inextricable connection between ransomware observables, human behavior, and group dynamics with substantial realness. 

Summer in Las Vegas is always hot, and uncomfortable, and packed with people. But at the same time, filled to the brim with joy and curiosity, serious business alongside frenetic nerdery. Different but often parallel strains of justice running through many diverse communities celebrating their uniqueness and their shared loves and interests simultaneously. 

I don’t know of another week like it anywhere, and I wouldn’t have it any other way.

(except for maybe the concrete floors.)

Join our teams as they share their DEF CON talks on Tuesday, September 30: https://www.domaintools.com/defcon-session-recap-customer-webinar/

Learn More
SECURITYSNACKS
Cybersecurity Reading List - Week of 2025-07-28

Commentary followed by links to cybersecurity articles that caught our interest internally.

It is a lovely day in information security,

and you are a horrible goose.

(Collected from IRC, original source unknown. Reach out if you know.)

We’re a week away from Hacker Summer Camp, and I’m curious: similar to the writer conversation of “plotters versus pantsers” are your shenanigans all lined up in advance, or are your Vegas shenanigans more opportunistic and inspired by the moment? Do you carefully clean and arrange your tools, pack and unpack and repack in advance? Or do you live off the land and a few strips of rusty aluminum stripped from a can of Surge in 1997 and tucked in your wallet ever since?

Unless of course you’re the type of person to avoid shenanigans. Apparently those people exist.

This year’s Hacker Summer Camp includes some steam to vent. We’re charging into the desert amidst a cloud of hot dust and exploited Sharepoint embers, a mass-breach of women’s data after they sought safer dating, a new technology seemingly bent on speedrunning all the lessons computing has learned the hard way, and that’s not even getting into this year’s complexities around domestic agency capabilities. Everything considered, it’s enough to turn to nihilistic partying to cope.

But what I expect to see more of, what I’ve seen from the various clusters assembling for BlackHat, DEF CON, and BSides Las Vegas, is community. It’s our strongest power and our greatest defense. It’s often said that the Internet perceives censorship as damage and routes around it; and there may be drama, there may be dark points, there may be jerks, but community can react to damage the same way. And in many cases, it is.

Find the others. Reach out. Make grand collaborative plans, scale them back, amplify them further. Make room for the quieter voices. And don’t forget to make time to play.

Next week, let’s come to play. 

Podcasts

Lawfare - The Double Black Box: Ashley Deeks on National Security AI - Excellent, thoughtful exploration of ‘the idea that the use of artificial intelligence in the national security space creates a "double black box." The first box is the traditional secrecy surrounding national security activities, and the second, inner box is the inscrutable nature of AI systems themselves, whose decision-making processes can be opaque even to their creators.’ I picked up Deeks’ book immediately after listening to the podcast.

Srsly Risky Biz - Four key players drive Scattered Spider - Some interesting conclusions coming out lately. For instance, incident response investigators cross-referencing incidents attributed to SCATTERED SPIDER keep running across the same voices in voice-delivered social engineering attacks. Also, a few folks playing “Project Manager” roles. 

Articles

Okta - Okta observes v0 AI tool used to build phishing sites - Cheat-sheet style hint here: most Vercel-built sites have telltale DNS records CNAMEing back to vercel[.]com subdomains, and use vercel-dns[.]com nameservers. Maybe start building that into your detections and reassess once Vercel gets a handle on this. Looking at their nameservers for domains first seen July 28, I saw multiple career/application/hiring domains pretending to be from major corporations, several attempts at emulating the customer service platform of a major mobile provider, attempts to emulate adclick revenue and CRM platforms, and more. Just one day’s worth of new AI creations.

Proofpoint - NET RFQ: Request for Quote Scammers Casting Wide Net to Steal Real Goods | Proofpoint US - Good work by Proofpoint here amidst a fascinating scam leveraging “net-30” type financing to get goods or services, and then vanish. 

Resecurity - Cybercriminals Attack Seychelles – Offshore Banking as a Target - Well. That’s a shame.

The Record - Russian bulletproof hosting service Aeza Group sanctioned by US for ransomware work - Within a few days they started shifting their nameservers, and the primary ASN moved behind another Russia-aligned BGP safewall for its announcements. One of these days I need to dive deeper into technical observations after international sanctions; if you’ve got good examples, please reach out. 

knostic.ai - Exposing the Unseen: Mapping MCP Servers Across the Internet - Knostic (the startup brainchild of Gadi Evron and Sounil Yu) doing some great foundational fact-finding here around how organizations are deploying Anthropic’s Model Context Protocol. Unsurprisingly, the news isn’t good. 

Cisco Talos - Cybercriminal abuse of large language models - General but good roundup on some of the malicious uses seen in the wild. 

Lawfare - AI and Secure Code Generation - I don’t necessarily agree with everything, but Geer and Aitel know their stuff and make some very good points. 

Reuters - China-linked hackers target Taiwan's chip industry with increasing attacks, researchers say 

DTI - Malware in DNS - This was a quick but clever piece by one of our researchers that struck far louder chords than we expected. 

FT - Disinformation warriors are ‘grooming’ chatbots - LLM-grooming is the new cache poisoning, pass it on.

Research Papers and Reports

Censys - 2025 Sate of the Internet Report 

WEIS - Examining Newly Registered Phishing Domains at Scale 

Tools and Resources

INTERPOL - INTERPOL launches our new external newsletter  

Quad9 - Globe of Wonder - The good folks at Quad9 DNS have open-sourced their visualization tool for mapping realtime events onto a view of the Earth. 

Learn More
SECURITYSNACKS
Malware in DNS

Because it's always DNS, we wanted to share this fun finding of malware stored across DNS TXT records.

Recent reports of hiding images in DNS records inspired an exploration for such files in the wild from passively collected DNS records available in DNSDB Scout. Put very simply, files can be partitioned and stored in DNS TXT records. They can then be retrieved via DNS requests and put back together. This also means these files may persist until the DNS server removes the records or overwrites them thereby providing a form of unwitting file or data storage. The initial report detailed the partitioning of image files and converting them to hexadecimal before issuing writes to a domain’s TXT records. For that reason, we began a search at the beginning of DNS RDATA TXT records for magic file bytes in hexadecimal format for a wide range of executables and common file types using regex patterns such as the following:

^"((ffd8ffe[0-9a-f].{12,})|(89504e47.{12,})|(47494638[79]61.{8,})|(255044462d.{10,})|(504b0304.{12,})|(4d5a.{16,59}|4d5a.{61,})|(7f454c46.{12,})|(c[ef]faedfe.{12,})|(1f8b08.{14,})|(377abcaf271c.{8,})|(526172211a07.{8,}))

One of the findings from 2021-2022 were TXT records beginning with the magic sequence for an executable file header.

C83464356139303030303330303030303030343030303030306666666630303030623830303030303030303030303030303430303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030306538303030303030306531666261306530306234303963643231623830313463636432313534363836393733323037303732366636373732363136643230363336313665366536663734323036323635

The same .exe header value was seen on 3 different domains, each sharing the same subdomain pattern. 

Digging into one of the domains, “*.felix.stf.whitetreecollective[.]com.”, we see that it has several hundreds of iterated subdomain integer values each with different TXT RDATA values. This suggested that they were fragmenting the .exe file across all the subdomains using the integer value to track the correct sequence.

By exporting the json of the domain TXT records and having a Generative AI throw a script together to piece the file back together in the correct order, we were able to observe the SHA256 file hashes of the files stored in DNS TXT records:

  • 7ff0ecf2953b8662ede1577e330a514f09992c18aa3c14ed77cf2ffc115b0866
  • e7b22ba761a7f853b63933ffe517cc61596710dbdee992a429ac1bc8d04186a1

Both files appear to be Joke Screenmate malware. These are a form of prank software and may commonly exhibit the following behaviors once run on machines:

  • Simulating destructive actions: The program might display fake error messages, fictitious virus warnings, or animations that mimic the deletion of system files, causing panic for the user.
  • Interfering with user control: Some screenmates are designed to be difficult to close, may multiply on the screen, or actively evade the user's mouse cursor.
  • Displaying unsolicited content: These programs can present a continuous stream of jokes, images, or animations that can be distracting and difficult to stop.
  • System performance issues: Like any running application, they consume system resources, and poorly coded screenmates can lead to system slowdowns or crashes.

A brief review of other TXT records for the 3 domains opened another line of inquiry, malicious commands stored in TXT records. This was seen with multiple TXT records associated to drsmitty[.]com such as the following subdomain’s TXT record: 15392.484f5fa5d2.dnsm.in.drsmitty[.]com.

The command contains an encoded Powershell script that acts as a stager and connects to another domain: cspg[.]pw. The URL it requests (/api/v1/nps/payload/stage1) is the default endpoint for a Covenant C2 server to serve its next-stage payload.

Being that the stager script is stored in a DNS TXT record is not by itself enough, some other action would have to take place first on a system to retrieve and execute the script such as the following:

In summary, in 2021-2022 an actor was using DNS TXT records to store and possibly deliver ScreenMate malware and stagers for likely Covenant C2 malware infections. The same C2 domain was seen in another domain’s TXT record in July 2017, msg1.rickrick.qa.urab[.]org.

Learn More
Ian Campbell
Malware in DNS
SECURITYSNACKS
Cybersecurity Reading List - Week of 2025-06-16

June arrives with more heat, everywhere, and not just regarding the weather.

Law enforcement is counting up some recent disruption and arrest operation wins like Operation RapTor, covered below, or the Lumma takedown, or Operation Endgame (covered here in Srsly Risky Biz). And in the humid biomass of Washington D.C., several hundred finding-hungry investigators, hunters, and defenders gathered last week to attend SLEUTHCON.

SLEUTHCON is a popular, limited-capacity conference in Crystal City themed on financially-motivated actors and crime. The venue and setting are not a sales setup, but rather a place for practitioners to talk turkey between single-track presentations targeted enough to be relevant to most or all attendees. I was a first-timer there this year, and it has immediately become a must-attend conference for me. The relaxed nature, shared purpose, and sense of humor hooked me.

I’d be remiss if I didn’t mention that DomainTools CISO and Head of Investigations Daniel Schwalbe co-spoke with Analyst1, hunter Jon DiMaggio on the complex human realities of the Russian-affiliated ransomware ecosystem, and published a parallel post here. The research challenges our typical approach to and typology of ransomware groups, and argues for changes necessary in order to better investigate and disrupt them.

On another conference note, looking forward to this BlackHat briefing by Infoblox Threat Intel folks, as they always bring the best tea.

With all that sorted, let’s get sweaty.

Recommended Cybersecurity Podcasts

Team Cymru - Future of Threat Intelligence - 6mins - Frost & Sullivan cybersecurity principal Martin Naydenov on AI in cybersecurity right now. Contains a really interesting insight: because of the (accurate) trust gap, an AI product may differentiate itself in analyst use by providing a path to validate the AI output as accurate, alongside the GenAI output itself. 

Ologies with Alie Ward - Cryptology, with author Simon Singh - Nothing groundbreaking, but thoroughly entertaining. There are few things more fun than listening to someone gush about a topic they’re passionate about, which is more or less the basis of the entire Ologies podcast.

Must-Read Cybersecurity Articles and Blog Posts

Qualys - Inside LockBit: Defense Lessons from the Leaked LockBit Negotiations - Good, brief post from Qualys threat researchers on LockBit insights gleaned from the recent dump. Worth your time.

Proofpoint - The Bitter End: Unraveling Eight Years of Espionage Antics—Part One - Excellent work by Proofpoint and Threatray, and some great passive DNS work in particular, which made digging through the provided IOCs a fun little hyperfocus.

Mandiant - Hello, Operator? A Technical Analysis of Vishing Threats - Good general information, but the point to really note is UNC6040 specifically targeting enterprise Salesforce instances for compromise, exfiltration and extortion.

Intel 471 - Two critical challenges facing CTI teams and how to overcome them: Intel 471’s additional insights into the SANS 2025 CTI Survey - The importance of including geopolitics in CTI, along with how to show the value of CTI programs - important, well-made points.

DomainTools Investigations - Eggs in a Cloudy Basket: Skeleton Spider’s Trusted Cloud Malware Delivery - We cracked, fried, and served up recent FIN6 activity leveraging a social-engineering jobseeker approach to execute phishing and malware delivery operations. IOCs, as always, up on GitHub

Europol - 270 arrested in global dark web crackdown targeting online drug and criminal networks - “The suspects were identified through coordinated investigations based on intelligence from the takedowns of the dark web marketplaces Nemesis, Tor2Door, Bohemia and Kingdom Markets.” 

KrebsOnSecurity - Proxy Services Feat on Ukraine’s IP Address Exodus - This is particularly grim. A fifth of their IP space is no longer under their control, either seized by Russian-affiliated organizations or held by opaque proxy service providers. Incredibly important to consider as an element of the cyber domain in conflicts going forward.

KrebsOnSecurity - Pakistan Arrests 21 in ‘Heartsender’ Malware Service - Krebs identified major players in 2021 after they infected themselves with their own malware. The wheels may move slowly, but it’s nice to see them move once in a while.

The Record - Major food wholesaler says cyberattack impacting distribution - Following playbooks unleashed in the UK, looks like retail first, grocery second, in current US compromises. Has me kind of wondering if some cluster is treating the UK as proving ground, the US as validating deployment. As Gossi mentioned on Mastodon, deploying shortly before a company is due for an earnings report is also a unique way to apply pressure to pay a ransom.

Natto Thoughts - Defense-Through-Offense Mindset: From a Taiwanese Hacker to the Engine of China’s Cybersecurity Industry - Excellent insights and details here that dovetail with some of our internal research. Always worth knowing better the people behind the keyboards.   

SentinelOne - Follow the Smoke | China-nexus Threat Actors Hammer At The Door of Top-Tier Targets - “This research underscores the persistent threat Chinese cyberespionage actors pose to global industries and public sector organizations, while also highlighting a rarely discussed target they pursue: cybersecurity vendors.” - You don’t say…

Domain Name Wire - PayPal wants patent for system that scans newly-registered domains - Specifically scanning for typical elements of a shopping checkout system, and then simulating a checkout process in an automated manner. Clever, and probably effective - this is one of the places where AI shines, in that you can train one model in detection, and one model adversarially, and pit them against each other on staggering timescales. Both systems end up providing insight.

Semafor - The hottest new vibe coding startup may be a sitting duck for hackers - Vibe-coded app platform populated a single critical vulnerability into at least 10% of apps it created, allowing anyone to access app usernames, email addresses, financial information, and secret API keys. 

Latest Cybersecurity Research Papers, Reports, and Books

caida - From Scarcity to Opportunity: Examining Abuse of the IPv4 Leasing Market - “We examine leasing market data, leveraging blocklists as an indirect measure of involvement in various forms of network abuse. In February 2025, leased prefixes were 2.89× more likely to be flagged by blocklists compared to non-leased prefixes.” - Spent a little while thinking about this one in the context of the above Krebs article on IPv4 leasing allowing Russia to increasingly isolate and infiltrate Ukrainian IP space.

arXiv - Stop Anthropomorphizing Intermediate Tokens as Reasoning/Thinking Traces! - The dangers of anthropomorphizing generative AI.

Apple Machine Learning Research - The Illusion of Thinking: Understanding the Strengths and Limitations of Reasoning Models via the Lens of Problem Complexity - Included herein, phrases like “complete accuracy collapse beyond certain complexities.” 

Domain Name Wire - ICANN study links low-cost, automated registrations to phishing abuse - In other news, water makes things wet. I’d love to think hard data like this might cause registrars to start doing the right thing, but while I was born at night, it wasn’t last night.

Learn More
SECURITYSNACKS
Cybersecurity Reading List - Week of 2025-05-19

May as well. 

No, I really mean it: we have to endure May as well? Oof, buddies, oof.

The horrors persist, but so do the little treats, and the wins that make you dance at your desk. We’ve got a few of those coming at DomainTools Investigations (DTI). But once the dancing is done, we still have to sit back down and do the work; pouring through research, grinding through logs, immersing ourselves into countless records, a hundred cases of watching expected connections fall flat only for an unexpected finding to relight that hunter’s spark within. 

I hope the rest of you dance at your desks as well. It’s not that I’m worried about looking silly doing it alone, I just don’t want you to miss a good time. And if I can’t dance while hunting through DNS, it’s not my kind of resolution. 

As usual, quotes are in quotation marks, comments by me in italics.

Recommended Cybersecurity Podcasts

Maltego - Human Element - Our friends at Maltego launched a new podcast hosted by CTO Ben April, with the first episode guest being Unit 221B founder James Lance. Ben is one of my favorite people to talk technology with, so I recommend subscribing to Human Element ASAP. Find it wherever you get your podcasts.

This Week in Machine Learning - CTIBench: Evaluating LLMs in Cyber Threat Intelligence with Nidhi Rastogi - Excellent, well-grounded conversation on the advantages and disadvantages of large language models in cyber threat intelligence. All about realistic performance evaluation, no hype.

Must-Read Cybersecurity Articles and Blog Posts

Qualys - Inside LockBit: Defense Lessons from the Leaked LockBit Negotiations - Good, brief post from Qualys threat researchers on LockBit insights gleaned from the recent dump. Worth your time.

Citizen Lab - Uyghur Language Software Hijacked to Deliver Malware - Few orgs have had the kind of impact on world freedom and human rights that Citizen Lab does, and this report does not disappoint. Technical and behavioral indicators are abundant for further hunting.

Cofense - Using Blob URLs to Bypass SEGs and Evade Analysis - The HTTP call is coming from inside the house. Or the computer. Blob URLs are locally generated, circumventing a few different defense techniques, and so are a natural staging point for phishing pages.

Proofpoint - CoGUI Phish Kit Targets Japan with Millions of Messages - Finding it interesting that Japan seems to be getting hit harder than usual right now, especially the financial sector. Great writeup by Proofpoint on the CoGUI campaign.

IC3/FBI - Phishing Domains Associated with LabHost PhaaS Platform Users (PDF link) - domain list CSV - List hasn’t been entirely validated, but there’s 42,000 starting points for your next hunt.

NextGov - Salt Typhoon hacks to influence final round of DARPA’s AI-cyber competition - “Kathleen Fisher, director of the Information Innovation Office at DARPA, told Nextgov/FCW at the RSAC Conference in San Francisco, California that that DARPA is ‘100% inspired by the Salt Typhoon and Volt Typhoon stories, and needing to make the critical infrastructure software more robust from all those stories.’”

PenTest Partners - Exploiting Copilot AI for Sharepoint - One of those worst-case scenarios for defenders: once you lose control of sensitive enterprise data to an agent, it’s gone for good. Teachable moment for organizations looking to incorporate LLMs at that level.

Blood in the Machine - Four Bad AI Futures Take Root - Grim opinion-ish piece on four generative AI stories that landed last week and appear poised to cause significant collateral damage. Black Mirror imaginations meet Torment Nexus self-awareness.

Latest Cybersecurity Research Papers, Reports, and Books

NCSC - Impact of AI on cyber threat from now to 2027 - “This report builds on NCSC Assessment of near-term impact of AI on cyber threat published in January 2024. It highlights the assessment of the most significant impacts on cyber threat from AI developments between now and 2027. It focuses on the use of AI in cyber intrusion. It does not cover wider threat [sic] enabled by AI, such as influence operations. AI and its application to cyber operations is changing fast. Technical surprise is likely.” - Light reading for your evening. Hoping we see TRADOC’s Mad Scientist Laboratory lean in on a fiction contest around this concept to pull in some more unorthodox possibilities.

Tools and Other Resources

Jellybyte - local LLM-powered threat intelligence lab.


Learn More
SECURITYSNACKS
Cybersecurity Reading List - Week of 2025-04-21

The ground softens, the skies pour fourth; and now is the time to begin planting our flowers.

We put our CVEs in; we take our CVEs out. We put our CVEs in and shake them all about! The funding is at risk, the funding is dead, the funding is back on track for a year! Watching the forced changes to the national cybersecurity ecosystem happening is extremely concerning, and yet: seeing some of that same ecosystem recognize and route around the damage to plant and nurture new paths forward is exactly what we need.

ChatGPT is now a pinpoint GeoGuessr for $20/mo. 4chan, having not updated its infrastructure since the Obama administration, has reached an inevitable conclusion. NSO Group is trying to make new inroads into mainstream contracts. And seasoned security practitioners who have stood for truth and against disinformation are being directly targeted for harassment. 

We’re going to need a lot more coffee. But also, flowers. Let’s get to brewing, planting, and planning.

Recommended Cybersecurity Podcasts

Cisco Talos - Talos Takes - Year in Review special part 1: vulnerabilities, email threats, and adversary tooling, and Year in Review special part 2: The biggest ransomware trends

Must-Read Cybersecurity Articles and Blog Posts

SpyCloud - Exposed Credentials & Ransomware Operations: Using LLMs to Digest 200K Messages from the Black Basta Chats - Whoever added credential defense advice to the cybercrime gang at the bottom of this post deserves a raise. 

Reuters - Cybersecurity industry falls silent as Trump turns ire on SentinelOne 

Metacurity - CISA pulls MITRE's CVE program back from the brink of death at the 11th hour - Lots of CVE talk this week, naturally. We’ve now got private and ad-hoc informal buddings of new collaborations. The community obviously sees a need for it, if not necessarily in the current form. 

CybersecurityNews - CVE Foundation Launched To Ensure Long-term Vulnerability Tracking - Happened prior to the above, but looks like a smart path to follow. Also see the informal CVE-related Discord server in the “Tools” section. 

NextGov - User with Russian IP address tried to log into NLRB systems following DOGE access, whistleblower says - Minutes after account creation, auth requests from Russia with the correct username and password began. Whistleblower provided technical data to Congress and I’m very, very interested in seeing it. Also, a great lesson in creating and preserving defensive geoblocks.

404 Media - 4chan Is Down Following What Looks to Be a Major Hack Spurred By Meme War - This looks Real Bad. IP info especially. Also looks like 4chan infra hasn’t been updated in more than a decade.

Politico - Pentagon’s ‘SWAT team of nerds’ resigns en masse - “Under pressure from the Elon Musk-led Department of Government Efficiency, nearly all the staff of the Defense Digital Service — the Pentagon’s fast-track tech development arm — are resigning over the coming month, according to the director and three other current members of the office granted anonymity to discuss their job status freely, as well as internal emails.”

Infoblox - Disrupting Fast Flux With Protective DNS - Everything old is new again. I thought Fast Flux was done and dusted, turns out it was but is also the new hotness. Not a huge fan of this retro vibe.

MIT Technology Review - US office that counters foreign disinformation is being eliminated 

Zoom - Incident Report - Including this one mostly for shock value. The April 16 Zoom outage was traced back to miscommunication between MarkMonitor and Godaddy, causing Godaddy to issue a domain shutdown for Zoom’s primary operational domain.

Latest Cybersecurity Research Papers, Reports, and Books

arXiv - LLMs are unreliable for cyber threat intelligence - I didn’t see any publication footnotes so I assume it’s a preprint article, but worth reading to scope some of the limitations.

Tools and Other Resources

Discord - Extended Vulnerability Community - pop-up Discord server with a bunch of vulnerability folks who assembled under the looming Mitre CVE defunding, before the extension.

Learn More
SECURITYSNACKS
Cybersecurity Reading List - Week of 2025-03-24

The thaw continues here in DomainTools Intelligence's (DTI) satellite office outside Boston, and so does the cyber. Typhoon APT news arrives almost as fast as genAI “content” and we are still trying to decide which is more malicious. The undocumented tools in ESP32 chips are worrying. The Wizoogle deal is back on, Cloudflare continues to Cloudflare, and Patch Tuesday this month required an extra twelve hours on the clock. Luckily, Redmond now controls all clocks, so they just plugged the extra hours in. 

It’s Copilot O’Clock. Let’s dive in!

Recommended Cybersecurity Podcasts

To Catch A Thief: China’s Rise to Cyber Supremacy - Brand new on the podcast scene, cyber journo Nicole Perlroth documents Chinese government-related attacks, surveillance, positioning, and more. Episode one also includes Dmitri Alperovitch, who’s very much worth listening to on topics like this. Two episodes up so far, produced by security firm Rubrik.

Data Skeptic - Criminal Networks - Network science as applied to law enforcement and criminal interventions. Really neat episode; worth noting it’s theory-heavy but brings interesting applications into view. PhD Candidate Justin Wang Ngai Yeung looks like one to watch.

Must-Read Cybersecurity Articles and Blog Posts

Trend Micro - Windows Shortcut Exploit Abused as Zero-Day in Widespread APT Campaigns

Veriti - OpenAI Under Attack: CVE-2024-27564 Actively Exploited in the Wild - “Attackers are actively targeting OpenAI, exploiting CVE-2024-27564, a Server-Side Request Forgery (SSRF) vulnerability in OpenAI’s ChatGPT infrastructure. Veriti’s latest research reveals that this vulnerability, despite being classified as medium severity, has already been weaponized in real world attacks.” - It’s a good thing we’ve plumbed AI into everything as fast as possible, huh?

SpyCloud - Cybercrime Wins in 2024: Major Takedowns & Arrests - Never forget to celebrate the wins. 

Quarkslab - Beyond the Hook: A Technical Deep Dive into Modern Phishing Methodologies - Not a fan of phishing tests, but this is an excellent breakdown of email phishing techniques and worth reading for all n-teamers, blue, purple, red, and otherwise.

DataBreachToday - UK Official Says Russian Disinfo Blocked in 2024 Election 

Cisco Talos - Unmasking New Persistent Attacks on Japan

Infoblox - Work Hard, Pay Harder - Recruitment scams aren’t new, but this is a great joyride through scammer infrastructure all beginning with a one-word WhatsApp message.

RiskyBiz - China says Taiwan's military is behind PoisonIvy APT - Catalin Cimpanu provides not only a breakdown of the announcement, but some critical context related to this and similar past announcements from the Chinese government, including the increasing lockstep coordination between Chinese public and private sector report releases.

DomainTools Investigations (DTI) - Domain Registrars Powering Russian Disinformation: A Deep Dive into Tactics and Trends - It may seem corny, but confronting disinformation and its enablers makes me fiercely proud to be part of DTI.

Latest Cybersecurity Research Papers, Reports, and Books

SpyCloud - 2025 Identity Exposure Report: Breaking Down the Identity Threat Landscape - “SpyCloud’s total collection of recaptured data grew 22% in the past year, from 43.7 billion to 53.3 billion distinct identity records – representing a growing underground economy that thrives on compromised accounts and exposed credentials.” - Hard to wrap your head around those numbers. Harder to do so without getting nihilistic.

Essential Cybersecurity Tools and Resources Tools and Other Resources

EFF - Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying - Anecdotally, I took a train from Boston down to DC and back up last week with a Rayhunter running. The results were… interesting. Not conclusive, as Rayhunter’s brand new and there are many false-positive scenarios, but definitely interesting.

LayerOne - Call for Papers - open until April 12. 

DEF CON - Theme Drop: Access Everywhere - “This year we’re thinking about how to make information and services available to everyone. Available wherever you are, whoever you are, and usable no matter how you need to connect… Less walled gardens, more sunlight.”

Epieos - “The ultimate OSINT tool for email and phone reverse lookup” - Neat tool getting some good word-of-mouth lately.




Learn More