Home / Industry

Burrowing Into the Beamglea Campaign DNS Infrastructure

The Socket Threat Research Team recently uncovered 175 malicious npm packages threat actors used in the widespread Beamglea phishing campaign. They targeted more than 135 industrial, technology, and energy companies worldwide. As of 9 October 2025, the packages have been downloaded more than 26,000 times.

The researchers identified 16 indicators of compromise (IoCs) comprising four subdomains, three domains, and nine email addresses. After extracting the domains from the subdomains, we had seven domains left, along with nine email addresses, to further analyze. Our DNS deep dive led to these findings:

  • Two of the domains identified as IoCs were dubbed likely to turn malicious 176—219 days before they were reported as such
  • 344 email-connected domains
  • Five IP addresses, three were malicious
  • 18 IP-connected domains
  • Three string-connected domains

A sample of the additional artifacts obtained from our analysis is available for download from our website.

Learning More about the IoCs

While we did not plan to use the four subdomains for our new artifact hunt, we still sought out more information on them. We thus used the WhoisXML API MCP Server to gather said information. The prompt “Get all data for cfn.fejyhy.com, cfn.fenamu.com, cfn.jackpotmastersdanske.com, and cfn.notwinningbutpartici.com” enabled us to determine that:

  • The subdomain cfn[.]jackpotmastersdanske[.]com shared the IP addresses, notably 172[.]239[.]36[.]54 and 104[.]21[.]95[.]129, with multiple gambling sites.
  • The subdomain cfn[.]notwinningbutpartici[.]com, meanwhile, had a Secure Sockets Layer (SSL) certificate mismatch, as its certificate was issued for the domain moonshots4dev[.]org instead. It also shared an IP address with multiple gambling, casino, and adult content sites.

Next, we queried the seven domains identified as IoCs on First Watch Malicious Domains Data Feed and found out that two of them appeared on the feed 176—219 days before being reported as such on 9 October 2025. Take a look at the specifics below.

DOMAIN IoCFIRST WATCH DATENUMBER OF DAYS BEFORE THE REPORTING DATE
notwinningbutpartici[.]com4 March 2025219
fejyhy[.]com16 April 2025176

After that, we queried the seven domains identified as IoCs on WHOIS API and discovered that:

  • While five were created just this year, two were created in 2024.
  • They were split among four registrars led by Namecheap, which accounted for four domains. One domain each was administered by MozDomains, NameSilo, and PDR.

  • While one did not have a registrant country on record, four were registered in Iceland. One domain each, meanwhile, was registered in Peru and the U.S.

We then queried the seven domains identified as IoCs on DNS Chronicle API and found out that all had rich DNS histories. In particular, they had a total of 57 historical domain-to-IP resolutions. The domain villasmbuva[.]co[.]mz posted the oldest resolution date—14 February 2024. Its latest resolution was recorded on 2 October 2025. Here are details for three other domains.

DOMAIN IoCFIRST RESOLUTION DATELAST RESOLUTION DATENUMBER OF DOMAIN-TO-IP RESOLUTIONS
musicboxcr[.]com16 February 202422 August 202512
notwinningbutpartici[.]com6 March 202519 October 20258
jackpotmastersdanske[.]com14 March 20253 September 202512

Finding More Connected Artifacts

To uncover more connected artifacts, we began by querying the seven domains identified as IoCs on WHOIS History API, which revealed that all of them had email addresses in their historical WHOIS records. They had 15 unique email addresses in all, two of which turned out to be public addresses.

Adding the nine email addresses to the two public email addresses we found, we now had 11 addresses for further analysis. We queried them on Reverse WHOIS API and found that while none of them appeared in other domains’ current WHOIS records, three did appear in historical records. This step led to the discovery of 344 email-connected domains after duplicates and those already tagged as IoCs were filtered out.

Using DNS Lookup API with elkendinsc[.]com, fejyhy[.]com, fenamu[.]com, jackpotmastersdanske[.]com, musicboxcr[.]com, notwinningbutpartici[.]com, and villasmbuva[.]co[.]mz as inputs showed that they all actively resolved to various IP addresses. Specifically, they resolved to five unique IP addresses after duplicates were removed.

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign