Home / Industry

COLDRIVER’s MAYBEROBOT in the DNS Spotlight

The Google Threat Intelligence Group (GTIG) recently discovered that Russia-affiliated threat group COLDRIVER seems to have just retooled yet again. Their homegrown backdoor NOROBOT, redesigned into YESROBOT and now, MAYBEROBOT.

The redesigned tool MAYBEROBOT figured in the group’s latest attack going after the same targets—high-profile individuals in nongovernment organizations (NGOs), policy advisors, and dissidents. Based on the GTIG analysis, while the group typically took the phishing route to distribute NOROBOT and YESROBOT, MAYBEROBOT may be meant for more specific targets.

GTIG publicized 14 indicators of compromise (IoCs) comprising 13 domains and one IP address in their report. WhoisXML API dove deeper into the IoCs and uncovered these findings:

  • Four of the domain IoCs were deemed likely to turn malicious 127—182 days before they were reported as such
  • One email-connected domain
  • Four additional IP addresses, all were malicious
  • Five IP-connected domains, two were malicious

A sample of the additional artifacts obtained from our analysis is available for download from our website.

More Information about the IoCs

We queried the 13 domains identified as IoCs on First Watch Malicious Domains Data Feed and discovered that four of them were deemed likely to turn malicious 127—182 days before they were reported as such on 21 October 2025. Here are more details for two of them.

DOMAIN IoCFIRST WATCH DATENUMBER OF DAYS SPOTTED BEFORE THE REPORTING DATE
documentsec[.]online22 April 2025182
system-healthadv[.]com9 May 2025165

Then, we queried the 13 domains identified as IoCs on WHOIS API and found out that:

  • They were all relatively new, created between 2 April and 2 July 2025.
  • They were split across three registrars led by Namecheap, which accounted for nine domains. PDR took the second spot with three domains. GMO Internet completed the roster with one domain.
  • They were registered in three countries topped by Iceland, which accounted for nine domains. Two domains each, meanwhile, were registered in Germany and the U.S.

Next, we queried the 13 domains identified as IoCs on DNS Chronicle API, which revealed that they had 57 historical domain-to-IP resolutions in all. The domain inspectguarantee[.]org posted the oldest resolution on 4 April 2025. It had six resolutions until 29 September 2025. Take a look at more details for five other domains below.

DOMAIN IoCNUMBER OF RESOLUTIONSFIRST RESOLUTION DATELAST RESOLUTION DATE
southprovesolutions[.]com75 April 20252 October 2025
documentsec[.]online423 April 20252 May 2025
oxwoocat[.]org124 April 202524 April 2025
documentsec[.]com529 April 202529 August 2025
system-healthadv[.]com610 May 202525 September 2025

After that, we queried the sole IP address identified as an IoC on IP Geolocation API and found out that it was geolocated in the U.S. and administered by TimeWeb.

A DNS Chronicle API query for the sole IP address as an IoC showed that it had 79 IP-to-domain resolutions from 6 February 2020 to 5 September 2025.

The Hunt for New Artifacts

After knowing more about the IoCs, we then hunted for more connected artifacts starting with a WHOIS History API query for the 13 domains identified as IoCs. We found out that 10 of them had email addresses in their historical WHOIS records. We uncovered nine unique email addresses and one of them was a public address.

A Reverse WHOIS API query for the sole public email address led to the discovery of a single email-connected domain after duplicates and those already identified as IoCs were filtered out.

Then, we queried the 13 domains identified as IoCs on DNS Lookup API, which showed that six of them had active IP resolutions. They resolved to four unique additional IP addresses.

A Threat Intelligence API query via the WhoisXML API MCP Server for the four additional IP addresses revealed that all of them have been weaponized for malware distribution. We used the prompt “Check 185.28.119.41, 192.99.241.162, 194.213.18.25, and 37.139.52.50 on Threat Intelligence API.”

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS Security

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign