![]() |
||
|
Yahoo! News Japan reported cases where securities accounts were hijacked so cybercriminals could sell stocks without their rightful owners’ permission. More than 3,500 fraudulent transactions have already been recorded from January to April 2025 alone, amounting to stock owner losses of ¥300+ billion.
A report on the tool that could have been used to phish the Japanese stock owners publicized seven domains as indicators of compromise (IoCs). We used this data, among others from various reports on similar phishing campaigns, to identify more connected artifacts and other pertinent information.
Our in-depth analysis using our expansive repositories of domain and DNS intelligence led to the discovery of:
A sample of the additional artifacts obtained from our analysis is available for download from our website.
We began our search for web properties connected to the phishing kit by querying the seven domains earlier identified as IoCs on Bulk WHOIS API, which revealed that:
They were administered by three registrars led by Alibaba and Gname.com, which accounted for three domains each.
While three of them did not have registrant countries on record, the remaining four domains were registered in three countries—two in China and one each in Albania and the U.S.
We then queried the seven domains identified as IoCs on DNS Chronicle API and found that four of them had 198 domain-to-IP resolutions over time. The domain evrryday[.]com posted 166 resolutions since 28 April 2017.
Next, we took a closer look at the current WHOIS records of the seven domains identified as IoCs and discovered that two—uhlkg[.]cn and zjkso[.]cn—had the same registrant name. Using this data point as a search term for Reverse WHOIS API, we uncovered 36 registrant-connected domains after filtering out duplicates and those already tagged as IoCs.
After that, we queried the seven domains identified as IoCs on WHOIS History API, which showed that three had email addresses in their historical WHOIS records. We unearthed 10 email addresses in all and upon further scrutiny determined that six were public email addresses.
We queried the six public email addresses on Reverse WHOIS API and discovered that five appeared in the historical WHOIS records of 7,437 email-connected domains. While the remaining public email address also had connections, it could belong to a domainer since it had more than 10,000 connected domains.
A Threat Intelligence API query for the 7,437 email-connected domains revealed that 267 have already figured in various attacks. Take a look at five examples below.
MALICIOUS EMAIL-CONNECTED DOMAIN | ASSOCIATED THREATS |
---|---|
015441[.]cn | Phishing |
abivh[.]cn | Phishing |
b1wiv[.]cn | Phishing |
c4ujvs0b[.]cn | Phishing |
dcvlp[.]cn | Phishing |
Next, we looked more closely at the seven domains identified as IoCs and determined that they started with seven unique text strings. Only four of the strings, however, appeared in other domains based on our Domains & Subdomains Discovery searches. See the list below.
Specifically, we uncovered seven string-connected domains.
All in all, we unearthed 7,480 connected domains, 267 of which have already been weaponized for attacks.
As the next step of this research, we obtained 10 phishing emails possibly related to the same fraud campaign and identified the following 10 email domains that we then analyzed:
Here is a sample phishing email from an email address with the domain tmjs[.]net we received on 19 May 2025.
We started by querying the 10 email domains on Bulk WHOIS API and found that:
They were administered by five registrars led by GoDaddy, which accounted for three domains. One domain each was administered by DNSPod, Gname.com, PDR, and Register.com. The three remaining domains did not have registrars on record.
They were registered in three countries topped by the U.S., which accounted for five domains. One domain each was registered in China and India, while three did not have registrant countries on record.
We also analyzed various phishing reports from the Council of Anti-Phishing Japan that contained 44 masked phishing URLs that we looked further into. These were:
We used the domains we extracted from the 44 masked URLs above as search terms on First Watch Malicious Domains Data Feed. We discovered 20 domains containing the strings sb-auth****.cloud, sbiisec****.com, and sec-sbi**.com across three groups that could pertain to the actual domains the phishers used. Here are a couple of examples.
sb-auth****.cloud | sbiisec****.com | sec-sbi**.com |
---|---|---|
sb-authline[.]cloud | sbiisec06[.]com | sec-sbiloginn06[.]com |
This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.
Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byRadix
Sponsored byIPv4.Global