|
A few weeks back, we added unpublicized artifacts to the list of indicators of compromise (IoCs) published by both FireEye and Open Source Context back in December 2020. Some would have thought that would put a stop to the havoc the SolarWinds threat actors have been wreaking, but the group targeted Malwarebytes just recently according to a company report.
As we have done before, this post sought to expand the list of published additional IoCs using a variety of domain and IP intelligence tools.
Apart from some IoCs publicized in December 2020, the Cybersecurity & Infrastructure Security Agency (CISA) published the following additional data points, among others, on 6 January 2021:
We subjected the three domain additions to WHOIS lookups (including WHOIS history) and found that:
To see if additional artifacts could be added to the updated list of IoCs CISA published, we queried the newly added domains on DNS Lookup API. Our findings are listed below.
Six of the nine additional IP addresses listed above are tagged “malicious” on VirusTotal. These are:
To find out more about the additional IP addresses we uncovered, we subjected them to reverse IP/DNS lookups, which revealed that:
As this post showed, further scrutiny of IoCs using domain and IP/DNS intelligence tools can uncover more artifacts. That said, organizations may not need to stop at including publicized IoCs to their blacklists and can strive to cover as many potential additional attack vectors where possible.
If you’re a security researcher, architect, or product developer working toward making the world safe from threats, contact us if you want to know more about the artifacts mentioned in this post or just want to collaborate with us for any security research initiative.
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byCSC
Sponsored byRadix
Sponsored byVerisign