NordVPN Promotion

Home / Industry

Searching for Potential Propaganda Vehicle Presence in the DNS

Protect your privacy:  Get NordVPN  [ Deal: 73% off 2-year plans + 3 extra months ]
10 facts about NordVPN that aren't commonly known
  • Meshnet Feature for Personal Encrypted Networks: NordVPN offers a unique feature called Meshnet, which allows users to connect their devices directly and securely over the internet. This means you can create your own private, encrypted network for activities like gaming, file sharing, or remote access to your home devices from anywhere in the world.
  • RAM-Only Servers for Enhanced Security: Unlike many VPN providers, NordVPN uses RAM-only (diskless) servers. Since these servers run entirely on volatile memory, all data is wiped with every reboot. This ensures that no user data is stored long-term, significantly reducing the risk of data breaches and enhancing overall security.
  • Servers in a Former Military Bunker: Some of NordVPN's servers are housed in a former military bunker located deep underground. This unique location provides an extra layer of physical security against natural disasters and unauthorized access, ensuring that the servers are protected in all circumstances.
  • NordLynx Protocol with Double NAT Technology: NordVPN developed its own VPN protocol called NordLynx, built around the ultra-fast WireGuard protocol. What sets NordLynx apart is its implementation of a double Network Address Translation (NAT) system, which enhances user privacy without sacrificing speed. This innovative approach solves the potential privacy issues inherent in the standard WireGuard protocol.
  • Dark Web Monitor Feature: NordVPN includes a feature known as Dark Web Monitor. This tool actively scans dark web sites and forums for credentials associated with your email address. If it detects that your information has been compromised or appears in any data breaches, it promptly alerts you so you can take necessary actions to protect your accounts.

The Citizen Lab recently uncovered an ongoing online propaganda campaign they have dubbed “PAPERWALL” that has been targeting local news outlets across 30 countries in Europe, Asia, and Latin America.

PAPERWALL bore similarities with HaiEnergy, an influence operation Mandiant reported about in July 2023. Both threats specifically drew significant portions of content from Times Newswire. But PAPERWALL seemed distinct in that it had different operators and unique tools, tactics, and procedures (TTPs).

The WhoisXML API research team dove deeper into the threat to uncover possible traces of PAPERWALL’s presence in the DNS. We analyzed 132 indicators of compromise (IoCs) comprising 123 domain names and nine IP addresses, which led to the discovery of:

  • 681 email-connected domains
  • One additional IP address
  • One IP-connected domain
  • 193 string-connected domains, one of which turned out to be malicious

A sample of the additional artifacts obtained from our analysis is available for download from our website.

PAPERWALL IoC DNS Facts

As our usual first step, we sought to find more information about the 132 IoCs The Citizen Lab reported.

We started with a bulk WHOIS lookup for the 123 domain names identified as IoCs, which revealed that:

  • All of them were obtained from GoDaddy.com LLC.
  • They were created between 2019 and 2023. A majority, 41 to be exact, were created in 2023, 33 in 2020, 27 in 2021, 21 in 2022, and one in 2019.
  • One of them did not have registrant country data in its current WHOIS record while 122 were registered in the U.S.

The news-related text strings that appeared most among the 123 domain IoCs were daily and post. Each string appeared in nine domain names.

We then performed a bulk IP geolocation lookup for the nine IP addresses classified as IoCs and found that:

  • They were geolocated in four countries—four in the U.S., three in Germany, and one each in Japan and South Korea.
  • They were distributed among three ISPs led by Shenzhen Tencent Computer Systems Company Limited, which accounted for six IP addresses. Tencent Cloud Computing (Beijing) Co. came in second place, administering two IP addresses, while OPHL handled one.

Search for PAPERWALL IoC-Connected Artifacts

To start off our in-depth analysis, we subjected the 123 domain names categorized as IoCs to WHOIS History API searches. They led to the discovery of 56 email addresses in their historical WHOIS records after duplicates were removed. Thirty-three were public email addresses.

We used the 33 unredacted email addresses as Reverse WHOIS API inputs. That allowed us to uncover 681 email-connected domains based on their current WHOIS records after removing duplicates and the IoCs.

It is also interesting to note that 103 of the email-connected domains contained news-related text strings akin to the domains tagged as IoCs. Sixty-four of them, in fact, had the string diario, a Spanish word for “diary” or “daily” and a term commonly used to refer to a newspaper. The other news-related text strings found among the connected domains include:

  • critic
  • daily
  • desk
  • dia (Spanish word for “day”)
  • global
  • government
  • journal
  • magasin (Filipino word for “magazine”)
  • magazine
  • monthly
  • paper
  • periodico (Spanish word for “newspaper”)
  • press
  • radio
  • television
  • today
  • video
  • weekend
  • writer

None of the email-connected domains contained the string post, which was present among the IoCs, though.

Screenshot API also revealed that seven of the email-connected domains continued to point to live pages although none seemed to lead to a news feed.

Next, we used the 123 domains named as IoCs as DNS Lookup inputs and found one additional IP address—128[.]14[.]74[.]124. Like a majority of the IP addresses identified as IoCs, it was geolocated in the U.S. It was, however, administered by an ISP that is not on our previous list, that is, Zenlayer, Inc.

Reverse IP lookups for the 10 potentially dedicated IP addresses we collated (i.e., nine IoCs and one additional host) uncovered one IP-connected domain—timesnewswire[.]com—after duplicates, the IoCs, and email-connected domains were filtered out. This connected domain was the one HaiEnergy used in attacks according to The Citizen Lab and Mandiant. It remains accessible to date and continues to host news updates.

Screenshot of the page hosted on IP-connected domain timesnewswire[.]com

As our final step, we trooped to Domains & Subdomains Discovery to look for domain names containing text strings found among the domain IoCs, namely:

  • alpsbiz.
  • bohemiadaily.
  • cctimes.
  • cordovapress.
  • dkindustry.
  • doloreshoy.
  • euleader.
  • friendlyparis.
  • fukuoka-ken.
  • gwangjuedu.
  • kanagawa-ken.
  • kazanculture.
  • londonclup.
  • louispress.
  • nlpress.
  • romajournal.
  • rostovlife.
  • saitama-ken.
  • samaraindustry.
  • sanrafaelscoop.
  • seoulpr.
  • stptb.
  • updatenews.
  • usa-aa.
  • vikingun.
  • volgogradpost.
  • vtnay.
  • wakhan.
  • wdpp.

We found 193 string-connected domains after duplicates, the IoCs, and email- and IP-connected domains were removed. One of them—updatenews[.]me—turned out to be associated with a malware attack, according to Threat Intelligence API results.

Screenshot API also showed that 57 of them remain accessible as of this writing. Seventeen of the string-connected domain names led to what looked like news feeds, which could be abused for spreading propaganda.

Signs of Other News-Related Domains

Earlier, we mentioned three generic news-related text strings that appeared most among the IoCs and connected domains—daily, post, and diario. But since post could also figure in domains related to postal services, we only focused on daily and diario, which are more likely to point to sites bearing similarities to those identified as PAPERWALL IoCs.

Domains & Subdomains Discovery unveiled 5,277 domain names containing the string daily created since 1 January 2024. Threat Intelligence API queries showed that five of them were malicious. Four, in particular, were associated with phishing while one with a malware attack.

Our search for other diario-containing domains created since 1 January 2024, meanwhile, found 289 such web properties.


Our closer look at the 132 IoCs related to the ongoing propaganda campaign led to the discovery of 876 potentially related web properties—681 email-connected domains, one additional IP address, one IP-connected domain, and 193 string-connected domains. While only one of them, string-connected domain updatenews[.]me, is already considered malicious to date, the other possibly related web properties could also be abused to spread misinformation.

We also noted the presence of thousands of domains that could play host to similar malicious activities using only two of many possible text strings in the DNS.

If you wish to perform a similar investigation or learn more about the products used in this research, please don’t hesitate to contact us.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

NordVPN Promotion