Home / Industry

A DNS Exploration of the Latest Educated Manticore Attack

Check Point Research published an in-depth analysis of the recent spearphishing attack launched by Iranian threat group Educated Manticore. The attackers targeted Israeli journalists, high-profile cybersecurity experts, and computer science professors from leading Israeli universities.

The threat actors directed victims who engaged with them to fake Gmail login pages or Google Meet invitations. The credentials the victims entered on phishing pages were sent to the attackers, enabling them to intercept passwords and two-factor authentication (2FA) codes and gain unauthorized access to the victims’ accounts.

The researchers identified 141 indicators of compromise (IoCs) comprising 129 domains and 12 IP addresses in their report “Iranian Educated Manticore Targets Leading Tech Academics.” We analyzed the IoCs in greater depth and uncovered:

  • 1,753 alleged victim IP records obtained from the Internet Abuse Signal Collective (IASC) tied to two Autonomous System (AS) numbers
  • 72 of the domains tagged as IoCs appeared on First Watch Malicious Domains Data Feed upon registration
  • One of the IP addresses tagged as IoCs communicated with one source IP based on ASC data
  • 217 email-connected domains, one of which was malicious
  • One additional IP address that was malicious
  • 460 IP-connected domains, three of which were malicious
  • 1,176 string-connected domains, one of which was malicious

A sample of the additional artifacts obtained from our analysis is available for download from our website.

More on the Educated Manticore Attack IoCs

We began our analysis by looking deeper into the IoCs by querying the 129 domains tagged as IoCs on Bulk WHOIS API. We discovered that 125 of them had current WHOIS records. Further analysis of the 125 domains showed that:

  • They were created between 28 March 2024 and 23 June 2025. Specifically, six domains were created in 2024 while 119 were created in 2025.
  • They were split among four registrars led by Namecheap, which accounted for 111 domains. NameSilo came in second place with 11 domains. Dynadot placed third with two domains. Finally, Communigal Communications accounted for one domain.

  • Only 71 of the 125 domains had registrant countries on record. They were registered in three countries topped by Iceland, which accounted for 57 domains. The U.S. took the second spot with 13 domains. Cyprus placed third with one domain. The remaining 54 domains did not have registrant countries in their current WHOIS records.

A DNS Chronicle API query for the 129 domains tagged as IoCs showed that 123 of them had historical domain-to-IP resolutions. Specifically, the 123 domains recorded 2,630 resolutions over time. The IoC alpha-man[.]info posted the oldest domain-to-IP resolution on 5 February 2017. Take a look at more details for five other domains below.

DOMAIN IoCNUMBER OF DOMAIN-TO-IP RESOLUTIONSFIRST RESOLUTION DATE
conn-ectionor[.]cfd124 June 2025
becker624[.]online116 June 2025
steve-brown[.]info36 April 2025
network-show[.]online14 February 2025
suite-moral[.]info326 April 2025

Using sample DNS traffic data our researchers obtained from the IASC, we further analyzed the 129 domains tagged as IoCs. The sample data revealed that 1,753 unique client IP addresses tied to two unique AS numbers queried 10 distinct domains on 14—24 June 2025 via 2,424 DNS requests.

We then queried the 129 domains on First Watch and found that 72 of them appeared on various feeds 5—454 days before they were reported as attack IoCs on 25 June 2025. Take a look at five examples below.

DOMAIN IoCFIRST WATCH DATE ADDEDNUMBER OF DAYS PRIOR TO REPORTING DATE
world-shop[.]online28 March 2024454
spring-club[.]info9 March 2025108
nsim-ph[.]info10 April 202576
yamal-group[.]online27 April 202559
optio-nalynk[.]online20 June 20255

Next, we queried the 12 IP addresses tagged as IoCs on Bulk IP Geolocation Lookup and found that:

  • They originated from five countries led by the Netherlands, which accounted for five IP addresses. The U.K. took the second spot with four domains. Finally, one IP address each was geolocated in France, Ukraine, and the U.S.
  • While six of them did not have ISPs on record, the other six were administered by four ISPs topped by BlueVPS, which accounted for three IP addresses. Finally, one IP address each was administered by Hostkey, THE Hosting, and Virtual Systems AS30860.

A DNS Chronicle API query for the 12 IP addresses revealed that all of them had historical IP-to-domain resolutions. Specifically, the 12 IoCs recorded 6,860 resolutions over time. The IP address 195[.]66[.]213[.]132 posted the oldest IP-to-domain resolution on 4 February 2017.

IP IoCNUMBER OF IP-TO-DOMAIN RESOLUTIONSFIRST RESOLUTION DATE
146[.]19[.]254[.]2381,0006 April 2025
194[.]11[.]226[.]291,0001 October 2024
194[.]11[.]226[.]51,00010 March 2025
194[.]61[.]120[.]1851,00023 November 2019
45[.]12[.]2[.]15812118 January 2022

We also looked for more information on the 12 IP addresses tagged as IoCs using traffic data we obtained from IASC and discovered that one of them—185[.]130[.]226[.]71—communicated with one source IP.

Expanding the List of Educated Manticore Attack IoCs

We started our in-depth analysis by querying the 129 domains tagged as IoCs on WHOIS History API and discovered that seven of them had email addresses in their historical WHOIS records. In particular, the seven domains had 14 email addresses, six of which were public addresses.

While our Reverse WHOIS API query for the six public email addresses showed they did not appear in any current WHOIS records, all of them did appear in historical records. Specifically, the six addresses were present in the historical WHOIS records of 217 email-connected domains after duplicates and those already tagged as IoCs were filtered out.

A Threat Intelligence API query for the 217 email-connected domains revealed that one of them—top-game[.]online—already figured in malware distribution.

After that, we queried the 129 domains tagged as IoCs on DNS Lookup API and discovered that 54 of them had current IP resolutions. After duplicates and those already identified as IoCs were filtered out, we were left with one additional IP address.

A Threat Intelligence API query for the IP address 198[.]54[.]117[.]242 showed that it has already figured in malware distribution, generic threats, phishing, suspicious activity, and command and control (C&C).

Next, an IP Geolocation API query for the additional IP address revealed that it was geolocated in the U.S. and administered by Namecheap. While it shared one IP IoC’s geolocation country, it did not share any of the IoCs’ ISPs.

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com