Home / Industry

Uncovering DNS Details on Operation Celestial Force

Advanced persistent threat (APT) groups will employ any means necessary to compromise the networks of their intended targets. And for Cosmic Leopard, that means using GravityRAT, an Android-based malware, and HeavyLift, a Windows-based malware loader, in their most recent operation Cisco Talos has dubbed “Operation Celestial Force.”

Cisco Talos’s in-depth investigation of Operation Celestial Force published 19 domains identified as indicators of compromise (IoCs). The WhoisXML API research team sought to find out if other threat artifacts could be found in the DNS via an IoC expansion analysis.

Our DNS deep dive led to the discovery of:

  • Three email-connected domains
  • 15 IP addresses, all of which turned out to be malicious
  • 35 string-connected domains
  • 3,927 brand-containing domains, nine of which turned out to be associated with various threats

Note that this post contains only a preview of our findings. The full research, including a sample of the additional artifacts obtained from our analysis are available for download from our website.

Operation Celestial Force IoC Facts

We began our analysis by subjecting the 19 domains identified as IoCs to a bulk WHOIS lookup, which revealed that:

  • Internet Domain Service BS Corp. and Tucows, Inc. topped the list of registrars, accounting for three domain IoCs each. Dynadot LLC took the second spot with two domain IoCs. One IoC each fell under the purview of GoDaddy.com LLC and Namecheap, Inc. Finally, nine domain IoCs did not have registrars in their current WHOIS records.
  • The Cosmic Leopard APT group seems to prefer using somewhat recent or newly registered domains (NRDs) for their Operation Celestial Force campaign. Three domain IoCs were created in 2020, four in 2023, and three in 2024.

  • The Bahamas and Saint Kitts and Nevis tied as the top registrant countries, accounting for three domain IoCs each. The U.S. accounted for two domain IoCs. Finally, 11 domain IoCs do not have registrant countries in their current WHOIS records.

Operation Celestial Force IoC List Expansion Findings

Our search for Operation Celestial Force artifacts started with running WHOIS History API queries for the 19 domains identified as IoCs. We collated 33 email addresses after filtering out duplicates from their historical WHOIS records. Only one of them, however, was a public email address.

A Reverse WHOIS API query for the sole public email address led to the discovery of three email-connected domains after filtering out duplicates and the IoCs.

To uncover more threat artifacts, we performed DNS lookups for the 19 domains identified as IoCs. We found out that they resolved to 15 IP addresses in total after filtering out duplicates. Threat intelligence lookups for them showed that they were all associated with various threats.

To know more about the 15 IP addresses, we performed a bulk IP geolocation lookup.

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

VINTON CERF
Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Related

Topics

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC