Home / Industry

Analyzing Account Takeover Attacks Leveraging SquarePhish2 and Graphish

Proofpoint tracked several state-sponsored and financially motivated threat clusters that used SquarePhish2 and Graphish, among other phishing tools, to trick users into granting the actors access to their Microsoft 365 accounts by bypassing the OAuth device code authorization process. Successfully compromising the victims’ accounts reportedly led to account takeover, data exfiltration, and other serious consequences. The researchers identified at least 44 IoCs associated with the attacks in their report.

Note that four of the 21 subdomains identified as IoCs can have multiple variations, which could mean a substantially bigger volume. Any number of target organization names can be appended to the subdomain onlinedocuments-[OrganisationName][.]vxhwuulcnfzlfmh[.]live, for example.

After extracting unique domains from the subdomains identified as IoCs, we collated 52 IoCs. Next, we weeded out legitimate domains from the 28 identified as IoCs using Jake AI. Our queries revealed that six of them were legitimate, reducing the number of domains for further analysis to 22. In the end, we analyzed 46 IoCs comprising 21 subdomains (including four with multiple variations), 22 domains, one IP address, and two email addresses.

Using our homegrown tools to investigate the threat, we uncovered these findings:

  • Five domains identified as IoCs were deemed likely to turn malicious 65—93 days before being dubbed as such
  • 91 email-connected domains
  • 23 additional IP addresses, 22 of which turned out to be malicious
  • Two IP-connected domains
  • 15 string-connected domains
  • Two string-connected subdomains

A sample of the additional artifacts obtained from our analysis is available for download from our website.

Scrutinizing the Subdomain IoCs

Our quest to unearth more information about the threat began with Jake AI queries for 17 of the 21 subdomains (excluding the four with multiple variations). We discovered that four of them are worth avoiding as they could well be on their way to becoming phishing pages. One such case is illustrated below.

Sample Jake AI query result for the subdomain onedrive[.]gov-zm[.]workers[.]dev

Examining the Email IoCs

We looked closer into the two email addresses identified as IoCs next via Jake AI as well. One of them could be dangerous to interact with due to its association with a phishing campaign.

Jake AI query result for an email address identified as an IoC

Dissecting the Domain IoCs

First off, we queried the 22 domains identified as IoCs on the First Watch Malicious Domains Data Feed and found out that five of them were deemed likely to turn malicious 65—93 days before they were reported as such on 18 December 2025.

DOMAIN IoCFIRST WATCH DATENUMBER OF DAYS BEFORE REPORT DATE
blitzcapital[.]net09/16/2593
bluecubecapital[.]com09/17/2592
vxhwuulcnfzlfmh[.]live10/06/2573

WHOIS API queries for the 22 domains identified as IoCs revealed that:

  • All of them were created in 2025, specifically between 15 September and 1 December 2025.
  • A majority of them, 14 to be exact, were administered by Dominet (HK). The remaining eight domains were managed by four other registrars—three by NameSilo, two each by NiceNIC and WebNIC, and one by Namecheap.
  • While two of them did not have registrant countries on record, the remaining 20 were registered in four countries—16 in Malaysia, two in Thailand, and one each in Iceland and the U.S.

DNS Chronicle API queries for the 22 domains identified as IoCs showed that 21 of them had historical domain-to-IP resolutions. All in all, the 21 domains posted 823 resolutions over time. The domain bluecubecapital[.]com recorded the oldest first resolution date—5 February 2017.

DOMAIN IoCNUMBER OF RESOLUTIONSFIRST RESOLUTION DATELAST RESOLUTION DATE
bluecubecapital[.]com26102/05/1712/25/25
blitzcapital[.]net17204/28/1706/02/25
magnavite[.]com10106/03/1708/09/19
virtoshare[.]com5611/10/1710/10/25
vaultally[.]com13611/15/1901/03/21

Investigating the IP IoC

An IP Geolocation API query for the sole IP address identified as an IoC showed that while it did not have an ISP on record, it was geolocated in the Netherlands.

Hunting for New Artifacts

After obtaining more information about the IoCs connected to SquarePhish2 and Graphish, we searched for other possibly connected artifacts. We started our hunt with WHOIS History API queries for the 22 domains identified as IoCs. We learned that nine of them had 35 unique email addresses in their historical WHOIS records. Further scrutiny revealed that three of them were public email addresses.

Next, we queried the three public email addresses on Reverse WHOIS API and discovered that while none of them appeared in current WHOIS records, all of them were present in historical WHOIS records. Our search, in fact, turned up 91 unique email-connected domains after those already identified as IoCs were filtered out.

We then queried the 22 domains identified as IoCs on DNS Lookup API and found out that 14 of them actively resolved to 23 unique IP addresses after the sole IoC was filtered out.

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC