|
Internet users are being tricked into installing browser extensions that can hijack their web searches. The end goal could be to insert affiliate links, but who knows what other malicious activities the threat actors behind them are capable of? To date, cybersecurity researchers have found 30 variants of the extension with more than 1 million combined installs on the Chrome and Edge web stores.
WhoisXML API researchers analyzed the web properties tagged as indicators of compromise (IoCs) in the campaign dubbed “Dormant Colors.” Our investigation revealed that:
A sample of the additional artifacts obtained from our analysis is available for download from our website.
Guardio Labs researchers published 34 domains tagged as campaign IoCs. One glance at them tells us that more than half fell under the .xyz space with second-level domains (SLDs) containing 4—6 random alphanumeric characters.
The domains that don’t appear to have been randomly generated contained strings like “smash,” “offer,” and “search.”
A bulk WHOIS lookup for the domains revealed four dominant name servers associated with 27 of the IoCs. The registrar of most of the domains was Porkbun, LLC, and all the IoCs had redacted WHOIS records.
As of 31 October 2022, almost all of the IoCs had active IP resolutions. Although most resolved to 404 pages, screenshot lookup results revealed some interesting live content. Below are some examples.
The content was consistent with that seen from the Dormant Colors campaign, where:
We used everything we learned from our IoC analysis to look for related web properties with the help of reverse WHOIS and reverse IP/DNS tools. From 34 IoCs, we found 2,428 additional artifacts that we’ve broken down into the following types.
The active IoCs resolved to more than a hundred IP addresses, most of which were shared or public. We found 7,500+ connected domains, but we narrowed the artifacts down to those that shared the same IP hosts, WHOIS details, and name servers as the domains tagged as IoCs—222 domains fit the bill.
We retrieved all the domains with the .xyz TLD extension and properties starting with the word “smash” added from 1 July to 28 October 2022 that matched the IoCs’ WHOIS details. Similarities were seen among them, including:
In sum, we found more than 600 domains connected to the IoCs in the ways described above.
We paid particular attention to the name servers of the domains tagged as IoCs. We found thousands of properties using the four name servers, but narrowed down the list to 1,500+ domains containing the string “search.”
We subjected the connected domains to screenshot lookups and found that several hosted questionable content, including outright phishing pages.
We also detected some domains that hosted content similar to the IoCs that prompted users to download programs and install browser extensions. Below are some examples.
The Dormant Colors campaign appears to be financially motivated, as its perpetrators aimed to inject affiliate links to hijacked web searches. That may evolve into more malicious and lucrative activities, such as data theft and ransomware infections.
In fact, a bulk malware check on the artifacts revealed several malicious domains, including those that imitated WhatsApp and the decentralized financial platform dYdX. Timely and regular monitoring of digital properties related to IoCs can help mitigate threats.
If you wish to perform a similar investigation or get access to the full data behind this research, please don’t hesitate to contact us.
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byVerisign