Home / Industry

A Look Back at 11 of the Red Report 2026 Featured Threats

Picus Security, in Red Report 2026, identified the top 10 MITRE ATT&CK techniques in 2025 and named some of the groups that employed them. We zoomed in on 11 attacks featured in their report for six of the 10 ATT&CK techniques with their corresponding subtechniques where applicable in hopes of gathering more insights and collating additional artifacts.

MITRE ATT&CK TECHNIQUE/SUBTECHNIQUE ABUSEDTHREAT/ACTORTHREAT/GROUP
T1036 Masquerading
T1036.008 Masquerade File Type
UNC6384 abused file typemasquerading to deliver STATICPLUGIN to diplomatic targets’ systemsSTATICPLUGIN
T1055 Process Injection
T1055.004 Asynchronous Procedure Call
SadBridge Loader used APC injection as a key technique to execute malicious code within a legitimate processSadBridge Loader
T1055 Process Injection
T1055.004 Asynchronous Procedure Call
XLoader 6 and 7 used APC injection to execute their payloads within legitimate processesXLoader 6 and 7
T1055 Process Injection
T1055.003 Thread Execution Hijacking
NoisyBear used execution hijacking in Operation BarrelFire to run its payload under trusted processesOperation BarrelFire
T1055 Process Injection
T1055.002 Portable Executable Injection
ClickFix used PE injection to execute its finalpayload entirely in memoryClickFix
T1059 Command and Scripting Interpreter
T1059.006 Python
APT36 or Transparent Tribe demonstrated a significant evolution in their capabilities with the Python-based ELF malwareAPT36 Python-Based ELF Malware
T1059 Command and Scripting Interpreter
T1059.001 PowerShell
Chihuahua Stealer launched a compact PowerShell command that decoded a Base64 payload, executing it in memoryChihuahua Stealer
T1555 Credentials from Password Stores
T1555.004 Windows Credential Manager
Earth Ammit enumerated credentials saved on compromised systemsEarth Ammit
T1562 Impair Defenses
T1562.004 Disable or Modify System Firewall
Cryptojacking campaign leveraged Docker Swarm and Kubernetes for attackDocker Swarm and Kubernetes Attack
T1562 Impair Defenses
T1562.004 Disable or Modify System Firewall
PlushDaemon used the Ruler system to dynamically modify iptables firewall rules to intercept and manipulate networktraffic on compromised systemsPlushDaemon
T1486 Data Encrypted for ImpactEarth Alux queried the MachineGUID value from the Windows Registry to serve as a persistent, unique identifier for each target hostEarth Alux

We obtained a total of 147 network IoCs from the abovementioned 11 analyses referenced in the report.

THREAT/GROUPIoCs ANALYZED
STATICPLUGINDomain: 1
IPs: 2
SadBridge LoaderSubdomains: 5
Domains: 5
XLoader 6 and 7Domains: 67
Operation BarrelFireDomain: 1
IPs: 2
ClickFixSubdomains: 7
Domains: 16
IPs: 3
APT36 Python-Based ELF MalwareDomain: 1
IP: 1
Chihuahua StealerSubdomains: 2
Domains: 2
Earth AmmitSubdomains: 7
Domains: 7
IPs: 3
Docker Swarm and Kubernetes AttackSubdomain: 1
Domain: 1
IPs: 3
PlushDaemonSubdomains: 2
Domain: 1
IPs: 2
Earth AluxSubdomains: 2
Domains: 2
IP: 1

We analyzed the IoCs further, which led to these discoveries:

  • 616 unique client IP addresses communicated with five domains identified as IoCs
  • 23 domains classified as IoCs were bulk-registered with 2—936 look-alike domains each
  • 28 domains tagged as IoCs deemed likely to turn malicious 46—516 days before they were reported as such
  • Three unique potential victim IP addresses communicated with two IP addresses named as IoCs
  • 7,770 email-connected domains, 25 were confirmed malicious
  • 56 additional IP addresses, 46 were confirmed malicious
  • 186 IP-connected domains, 143 were confirmed malicious
  • 2,106 string-connected domains, two were confirmed malicious

A sample of the additional artifacts obtained from our analysis is available for download from our website.

More DNS Insights on the Subdomain IoCs

We began our analysis by looking for more information about the 26 subdomains identified as IoCs for seven of the 11 attacks via the WhoisXML API MCP Server.

We determined that while many of them were considered either benign or inactive, five have been confirmed as malicious—four related to Earth Ammit and one to Earth Alux.

Additional DNS Facts Related to the Domain IoCs

As our next step, we sought out more details about the 104 domains identified as IoCs for the 11 threats.

Sample network traffic data from the IASC, for one, revealed that 616 unique client IP addresses under a single ASN communicated with five of the domains tagged as IoCs via a total of 4,138 DNS queries made between 21 January and 19 February 2026.

We sought to find out if any of the 104 domains named as IoCs appeared in the Typosquatting Data Feed and discovered that 23 were part of 24 typosquatting domain groups. Each was bulk-registered with 2—936 look-alikes between 4 January 2024 and 20 September 2025.

The results of our First Watch Malicious Domains Data Feed searches, meanwhile, showed that 28 of the domains categorized as IoCs for five threats could have been registered with malicious intent from the get-go. In fact, they were deemed likely to turn malicious 46—516 days before they were reported as IoCs. Take a look at more details for a domain related to each threat below.

THREATDOMAIN IoCFIRST WATCH INCLUSION DATENUMBER OF DAYS BEFORE REPORTING
STATICPLUGINmediareleaseupdates[.]com07/20/24402
XLoader 6 and 7carpmaxxbait[.]online11/24/23430
ClickFixgroupewadesecurity[.]com12/09/24350
Chihuahua Stealercat-watches-site[.]xyz01/25/25164
Earth Ammitsymantecsecuritycloud[.]com12/14/23516

We then queried the 104 domains classified as IoCs on WHOIS API and discovered that:

  • They were created between 1 January 2015 and 9 February 2026, hinting at the threat actors’ possible lack of preference in terms of domain age.
  • They were administered by 29 different registrars.

  • While 20 did not have registrant countries on record, the remaining 84 domains were registered in 15 different countries.

We also queried the 104 domains dubbed as IoCs on DNS Chronicle API and found out that 101 related to 10 threats have recorded 5,823 domain-to-IP resolutions over time. Here are details on a domain related to each threat.

THREATDOMAIN IoCNUMBER OF RESOLUTIONSTIME PERIOD
STATICPLUGINmediareleaseupdates[.]com2007/21/24—02/19/26
SadBridgesecssl[.]com306/27/22—12/14/24
XLoader 6 and 7alace5[.]com51902/05/17—02/06/26
Operation BarrelFirewellfitplan[.]ru804/14/25—02/09/26
ClickFixgalaxyswapper[.]pro6108/08/22—02/14/26
APT36 Python-Based ELF Malwarelionsdenim[.]xyz311/03/25—11/30/25
Chihuahua Stealercat-watches-site[.]xyz2401/28/25—04/28/25
Earth Ammit*uckeveryday[.]life3707/29/23—01/06/26
Docker Swarm and Kubernetes Attacksolscan[.]live7006/15/22—01/17/26
Earth Aluxupload-microsoft[.]com611/20/23—02/19/26

Further DNS Discoveries about the IP IoCs

Next, we scoured the DNS for more information about the 17 IP addresses identified as IoCs for eight threats.

Sample network data from the IASC, for instance, revealed that three unique potential victim IP addresses under three distinct ASNs communicated with two IP addresses tagged as IoCs between 21 January and 19 February 2026.

We then queried them on Bulk IP Geolocation Lookup and discovered that:

  • They were geolocated in 10 countries. Note that five of them—China, France, Germany, Japan, and the U.S.—were also among the list of registrant countries of the domains classified as IoCs.
  • While one did not have an ISP on record, the remaining 16 were administered by 12 ISPs.

DNS Chronicle API queries for the 17 IP addresses named as IoCs showed that 16 IPs related to eight threats recorded 1,842 IP-to-domain resolutions over time. Take a look at more information on an IP address related to each threat below.

THREATIP IoCNUMBER OF RESOLUTIONSTIME PERIOD
STATICPLUGIN166[.]88[.]2[.]908807/09/18—02/11/26
Operation BarrelFire178[.]159[.]94[.]81812/10/17—03/04/18
ClickFix141[.]98[.]80[.]1751210/03/25—02/19/26
APT36 Python-Based ELF Malware185[.]235[.]137[.]903309/01/24—04/09/25
Earth Ammit45[.]121[.]50[.]301903/14/20—01/31/26
Docker Swarm and Kubernetes Attack192[.]155[.]94[.]19976302/06/17—01/21/26
PlushDaemon47[.]242[.]198[.]250607/31/24—08/24/24
Earth Alux8[.]218[.]222[.]216201/23/26—02/15/26

Additional Threat Artifacts Unearthed

After gathering more details about the IoCs, we then scoured the DNS for additional connected artifacts.

First, we queried the 104 domains identified as IoCs on WHOIS History API and found out that 58 had 125 unique email addresses in their historical WHOIS records. Careful scrutiny allowed us to discern that 28 were public email addresses.

Reverse WHOIS API queries for the 28 public email addresses revealed that four could belong to domainers. This step also led to the discovery of 7,770 unique email-connected domains after those already listed as IoCs were filtered out.

According to Threat Intelligence API, 25 email-connected domains have already been weaponized for various threats.

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC