Home / Industry

Divulging the DNS Secrets of DarkSpectre

Koi Security has been monitoring a threat group they have dubbed “DarkSpectre” for more than a year now. The group was behind at least three major malware campaigns leveraging Zoom Stealer, ShadyPanda, and GhostPoster that have affected more than 8.8 million users over the course of their seven-year-long operation.

The researchers uncovered another DarkSpectre campaign that affected 2.2 million users so far. The group reportedly used a new GhostPoster-linked Opera browser extension that has been installed nearly 1 million times as of December 2025.

Koi Security identified 20 IoCs in their report comprising three subdomains, 12 domains, one IP address, and four email addresses.

We extracted unique domains from the subdomains, bringing the total number of domains to 15. We then excluded legitimate domains from our IoC list with the help of Jake AI. The results showed that eight were legitimate domains, leaving us with seven for further analysis. That said, we further investigated 15 IoCs in all comprising three subdomains, seven domains, one IP address, and four email addresses. Our analysis led to these discoveries:

  • 57 unique client IP addresses communicated with one domain identified as an IoC
  • 8,579 email-connected domains, three of which turned out to be malicious
  • Three additional IP addresses, two of which turned out to be malicious
  • Five IP-connected domains, one of which turned out to be malicious
  • 15 string-connected domains
  • 250 string-connected subdomains

A sample of the additional artifacts obtained from our analysis is available for download from our website.

A Further Scrutiny of the Subdomain IoCs

We took a closer look at the three subdomains identified as IoCs aided by Jake AI. We discovered that while two of them were part of legitimate web infrastructures but could have been compromised for attacks, one—policies[.]extfans[.]com—was illegitimate and currently inactive.

Jake AI result for the policies[.]extfans[.]com query

An Examination of the Email IoCs

Next, we investigated the four email addresses identified as IoCs using Jake AI. While three of them were deemed legitimate, one was tagged as invalid.

Jake AI query result for one of the email addresses identified as IoCs

It is also worth noting that one other email address from the four identified as IoCs was used to register domains. We will thus include it in our search for new artifacts later.

A Dissection of the Domain IoCs

We looked more closely at the seven domains identified as IoCs next.

Sample network traffic data from the IASC revealed that 57 unique client IP addresses under 11 distinct ASNs communicated with one domain identified as an IoC via 168 DNS queries made between 15 December 2025 and 13 January 2026.

We also queried the seven domains identified as IoCs on WHOIS API and found out that only six had current WHOIS records.

  • They were created between 28 July 2011 and 24 September 2024, hinting at DarkSpectre’s preference for aged domains in their attacks. One domain each was registered in 2011, 2014, 2018, 2020, 2023, and 2024.
  • They were administered by five different registrars—two by Alibaba Cloud Computing (Beijing) and one each by GoDaddy, Namecheap, NameSilo, and Wild West Domains.

  • They were registered in three different countries—three in the U.S., two in China, and one in Iceland.

DNS Chronicle API queries for the seven domains identified as IoCs showed that only six had historical domain-to-IP resolutions. Altogether, they recorded 1,283 resolutions over time. The domain gmzdaily[.]com posted the oldest resolution on 5 February 2017.

DOMAIN IoCNUMBER OF RESOLUTIONSFIRST RESOLUTION DATELAST RESOLUTION DATE
gmzdaily[.]com39302/05/1712/17/25
infinitynewtab[.]com26102/06/1711/16/22
extfans[.]com20506/11/184/28/23

An Investigation into the IP IoC

An IP Geolocation API query for the sole IP address identified as an IoC revealed that it was geolocated in China under the administration of China Unicom.

Interestingly, though, the IP address is currently not in use nor has not recorded historical IP-to-domain resolutions over time.

The Hunt for New Artifacts

After obtaining more information about the IoCs, we went on to search for new DarkSpectre-connected artifacts.

First, we queried the seven domains identified as IoCs on WHOIS History API and discovered that five of them had email addresses in their historical WHOIS records. We amassed nine email addresses in all and found out that seven were public email addresses. We now had eight public email addresses—seven from our searches and one tagged as an IoC (i.e., from the “An Examination of the Email IoCs” section)—for further analysis.

Reverse WHOIS API queries for the eight email addresses showed that one could belong to a domainer so we excluded the domains connected to it for the next step. The results for the remaining seven email addresses led to the discovery of 8,579 unique email-connected domains after those already identified as IoCs were filtered out.

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign