Home / Industry

Baring the DNS Traces of the Slow Pisces Attack on Cryptocurrency Developers

Palo Alto Unit 42 reported on the latest Slow Pisces attack that engaged with cryptocurrency developers on LinkedIn. The threat actors posed as potential employers and sent malware disguised as coding challenges. Developers who took on the challenge ended up running a compromised project, infecting their systems with RN Loader and RN Stealer.

The report identified 54 indicators of compromise (IoCs) comprising 27 domains and 27 IP addresses, which WhoisXML API expanded. Our analysis led to the discovery of other potentially connected artifacts, namely:

  • 12 alleged victim IP records obtained from the Internet Abuse Signal Collective (IASC) tied to five Autonomous System numbers (ASNs)
  • 551 email-connected domains
  • One additional IP address that turned out to be malicious
  • 179 IP-connected domains
  • 389 string-connected domains, three of which turned out to be malicious

A sample of the additional artifacts obtained from our analysis is available for download from our website.

A Closer Look at the Slow Pisces IoCs

Our threat investigation began with a deep dive into the 54 IoCs Palo Alto Unit 42 identified.

We started by querying the 27 domains identified as IoCs on Bulk WHOIS API, which revealed that only 26 of them had current WHOIS records. We also found that:

  • The 26 domains with current WHOIS records were created between 2024 and 2025. Specifically, 23 were created in 2024 while three were created in 2025.
  • The 26 domains were all administered by Namecheap.
  • While one of the 26 domains did not have a registrant country on record, the 25 remaining ones were split between two countries. Specifically, 23 domains were registered in Iceland while two were registered in the U.S.

We then queried the 27 domains identified as IoCs on DNS Chronicle API and found that 24 of them had historical domain-to-IP address resolutions. The 24 domains had 239 IP resolutions over time. The domain leaguehub[.]net with 67 resolutions in all, in particular, recorded the oldest resolution date, that is, 6 February 2017. Take a look at more details for five other domains below.

DOMAIN IoCNUMBER OF RESOLUTIONSFIRST IP RESOLUTION DATE
bitzone[.]io306 June 2020
coinhar[.]io127 March 2025
getstockprice[.]info18 January 2025
logoeye[.]net19 October 2024
stocksindex[.]org167 February 2017

Considering that bitzone[.]io was created on 25 April 2024 but first resolved to an IP address on 6 June 2020, it may have been recently reregistered. The same is true for stocksindex[.]org, which was created on 11 September 2024 but first resolved to an IP address on 7 February 2017.

Next, we queried the 27 IP addresses identified as IoCs on Bulk IP Geolocation Lookup and discovered that:

  • They were geolocated in 12 countries led by the Netherlands, which accounted for nine IP addresses. Three IP addresses each originated from France, Poland, and the U.K. Finland accounted for two IP addresses. Finally, one IP address each was geolocated in Canada, the Czech Republic, Germany, Portugal, Romania, Serbia, and the U.S.
  • Only 21 of the 27 IP addresses had ISPs on record. Specifically, four IP addresses were administered by M247. The Constant Company administered three IP addresses while AĆ©za, Hostwinds, IPCONNECT, and Net Solutions administered two each. Finally, one IP address each was administered by ARTNET, Hydra Communications, HZ-NL, IP Volume, OVHcloud, and Psychz Networks.

A DNS Chronicle API query for the 27 IP addresses identified as IoCs revealed that 22 of them had historical IP address-to-domain resolutions. Specifically, the 22 IP addresses recorded 2,011 resolutions over time. The IP address 54[.]39[.]83[.]151 with 239 resolutions had the oldest resolution date, that is, 17 October 2019. Take a look at additional details for five other IP addresses below.

IP ADDRESS IoCNUMBER OF RESOLUTIONSFIRST DOMAIN RESOLUTION DATE
185[.]62[.]58[.]7467818 April 2020
195[.]133[.]26[.]321419 November 2021
5[.]206[.]227[.]5122729 May 2020
91[.]193[.]18[.]2012828 January 2022
91[.]234[.]199[.]9013924 January 2023

In addition, using sample netflow data our researchers obtained from the IASC, we further analyzed three IP addresses. They served as command-and-control (C&C) IP addresses related to the threat. The sample data revealed 12 alleged victim IP records associated with four ISPs operating under five ASNs according to an additional Bulk IP Geolocation Lookup query.

The IP address IoC 91[.]103[.]140[.]191 proved most interesting in that it sent data to a potential victim IP 10 times and received data from that victim IP seven times for almost four weeks. The source IP 91[.]103[.]140[.]191 also most frequently communicated via port 443 (HTTPS) in our data sample.

Expanding the List of Slow Pisces IoCs

We began our IoC list expansion analysis by querying the 27 domains identified as IoCs on WHOIS History API. That enabled us to determine that 11 of them had 44 email addresses in their historical WHOIS records after duplicates were filtered out. Further scrutiny of the 44 email addresses revealed that seven were public email addresses.

Next, we queried the seven public email addresses on Reverse WHOIS API and found that while none of them appeared in any domain’s current WHOIS record, six of them were present in the historical WHOIS records of several domains. Specifically, the six public email addresses led to the discovery of 551 email-connected domains after duplicates and those identified as IoCs were filtered out.

We then queried the 27 domains identified as IoCs on DNS Lookup API and found that eight of them actively resolved to IP addresses. A comparison of the results with the 27 IP addresses identified as IoCs and the removal of duplicates, however, left us with only one additional IP address—199[.]59[.]243[.]228.

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix