Home / Industry

Dormant Colors IoC Expansion: Don’t Install Browser Extensions from These Domains

Internet users are being tricked into installing browser extensions that can hijack their web searches. The end goal could be to insert affiliate links, but who knows what other malicious activities the threat actors behind them are capable of? To date, cybersecurity researchers have found 30 variants of the extension with more than 1 million combined installs on the Chrome and Edge web stores.

WhoisXML API researchers analyzed the web properties tagged as indicators of compromise (IoCs) in the campaign dubbed “Dormant Colors.” Our investigation revealed that:

  • 2,400+ domains related to the IoCs through their IP and name server (NS) resolutions, WHOIS records, and text string usage
  • A few of the IoCs that still host pages prompting users to download programs and install browser extensions
  • Several artifacts connected to the IoCs that host similar types of content

A sample of the additional artifacts obtained from our analysis is available for download from our website.

Dormant Colors IoCs through the DNS Lens

Guardio Labs researchers published 34 domains tagged as campaign IoCs. One glance at them tells us that more than half fell under the .xyz space with second-level domains (SLDs) containing 4—6 random alphanumeric characters.

The domains that don’t appear to have been randomly generated contained strings like “smash,” “offer,” and “search.”

A bulk WHOIS lookup for the domains revealed four dominant name servers associated with 27 of the IoCs. The registrar of most of the domains was Porkbun, LLC, and all the IoCs had redacted WHOIS records.

As of 31 October 2022, almost all of the IoCs had active IP resolutions. Although most resolved to 404 pages, screenshot lookup results revealed some interesting live content. Below are some examples.

The content was consistent with that seen from the Dormant Colors campaign, where:

  • After being presented with an ad, the target users were asked to download a program or video similar to that offered in productivitytab[.]co.
  • Users who attempted to download the app were redirected to another page prompting them to install a color-changing browser extension like that offered by simpledark-tab[.]com.

Finding Artifacts Related to the Dormant Colors IoCs

We used everything we learned from our IoC analysis to look for related web properties with the help of reverse WHOIS and reverse IP/DNS tools. From 34 IoCs, we found 2,428 additional artifacts that we’ve broken down into the following types.

IP-Connected Artifacts

The active IoCs resolved to more than a hundred IP addresses, most of which were shared or public. We found 7,500+ connected domains, but we narrowed the artifacts down to those that shared the same IP hosts, WHOIS details, and name servers as the domains tagged as IoCs—222 domains fit the bill.

WHOIS-Connected Artifacts

We retrieved all the domains with the .xyz TLD extension and properties starting with the word “smash” added from 1 July to 28 October 2022 that matched the IoCs’ WHOIS details. Similarities were seen among them, including:

  • The registrar was either Porkbun or Namecheap.
  • The registrant organization was either “Private by Design, LLC” or “Privacy service provided by Withheld for Privacy.”
  • The NSs were terin[.]ns[.]cloudflare[.]com|wanda[.]ns[.]cloudflare[.]com and dan[.]ns[.]cloudflare[.]com|olga[.]ns[.]cloudflare[.]com, exactly the same as those seen in the IoCs’ NS WHOIS field.

In sum, we found more than 600 domains connected to the IoCs in the ways described above.

Name Server-Connected Artifacts

We paid particular attention to the name servers of the domains tagged as IoCs. We found thousands of properties using the four name servers, but narrowed down the list to 1,500+ domains containing the string “search.”

Artifact Screenshot Analysis

We subjected the connected domains to screenshot lookups and found that several hosted questionable content, including outright phishing pages.

We also detected some domains that hosted content similar to the IoCs that prompted users to download programs and install browser extensions. Below are some examples.


The Dormant Colors campaign appears to be financially motivated, as its perpetrators aimed to inject affiliate links to hijacked web searches. That may evolve into more malicious and lucrative activities, such as data theft and ransomware infections.

In fact, a bulk malware check on the artifacts revealed several malicious domains, including those that imitated WhatsApp and the decentralized financial platform dYdX. Timely and regular monitoring of digital properties related to IoCs can help mitigate threats.

If you wish to perform a similar investigation or get access to the full data behind this research, please don’t hesitate to contact us.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign