Home / Industry

DNS Spotlight: The Silver Fox in the Henhouse

Wearing a disguise has often worked when it comes to infiltrating well-protected targets. So long as threat actors stay in character, they could succeed with their ruse. And that is how Chinese APT group SilverFox managed to trick victims into thinking they were Russian. The actors used Cyrillic characters in their SEO poisoning campaign lures that deployed ValleyRAT.

Silver Fox abused Microsoft Teams to target Chinese organizations. They used ValleyRAT to conduct state-sponsored espionage for sensitive intelligence and engage in financial fraud and theft to fund their operations.

ReliaQuest originally identified 41 IoCs comprising six domains, 17 subdomains, and 18 IP addresses after analyzing the cyber attack in great depth. We investigated the Silver Fox infrastructure further and unearthed these discoveries:

  • 2,357 unique client IP addresses communicated with one domain identified as an IoC
  • Four domains identified as IoCs were bulk-registered with 3—4 look-alikes each
  • Seven domains identified as IoCs were deemed likely to turn malicious 239—339 days before they were dubbed as such
  • One potential victim IP address communicated with one domain identified as an IoC
  • 45,949 email-connected domains, 51 of which turned out to be malicious
  • Seven additional IP addresses, all of which turned out to be malicious
  • 20 IP-connected domains
  • 30 string-connected domains, one of which turned out to be malicious

A sample of the additional artifacts obtained from our analysis is available for download from our website.

A Closer Look at the Subdomains Identified as IoCs

We started out by looking more closely at the 17 subdomains identified as IoCs using Jake AI. We learned that while none of them were inherently malicious, 16 were either uncategorized or inactive. We also found out that 15 of them, specifically those that started with the text string teams., shared the same IP address.

Jake AI result showing the similarity among the 15 subdomains that started with the string teams.

A More In-Depth Look at the Domains Identified as IoCs

ReliaQuest originally identified six domains and 17 subdomains as IoCs as mentioned earlier. We extracted 17 unique domains from the 17 subdomains. Adding those to the six domains and ensuring none of them were duplicates brought the total number of unique domains to 23. We then checked if any of the 23 domains were owned by legitimate entities using the WhoisXML API MCP Server and took out three, which brought our final total number of domains for further analysis down to 20.

Sample network traffic data from the IASC revealed that 2,357 unique client IP addresses under 20 distinct ASNs communicated with one domain identified as an IoC via 42,400 DNS queries made between 19 November and 18 December 2025.

Data from the Typosquatting Data Feed, meanwhile, showed that four domains identified as IoCs were bulk-registered with 3—4 look-alikes each between 3 and 19 March 2025. A total of four typosquatting groups were found.

The results of our First Watch Malicious Domains Data Feed queries also revealed that seven domains identified as IoCs were deemed likely to turn malicious 239—339 before they were reported as such on 4 December 2025.

DOMAIN IoCFIRST WATCH DATENUMBER OF DAYS BEFORE THE REPORT DATE
kkkgenieyesl[.]cn12/30/24339
teamszv[.]com03/02/25277
fjzwb[.]com03/18/25261
telegramgwxz[.]com03/18/25261
telegramtgxz[.]com03/18/25261

Next, we queried the 20 domains identified as IoCs on WHOIS API and discovered that only 18 had current WHOIS records. We limited our analysis for this section to the 18 domains with current WHOIS records. That said, we learned that:

  • They were created between 23 May 2011 and 9 April 2025. A majority of them, eight to be exact, were created in 2025; four in 2024; two in 2021; and one each in 2011, 2015, 2017, and 2022.
  • They were administered by six registrars led by Gname.com, which accounted for nine domains. InterNetX administered four domains; Hostinger Operations managed two; and Domain Admin, Metaregistrar, and Web Commerce Communications managed one each.

  • While one domain did not have a registrant country on record, the remaining 17 were registered in five countries topped by the U.S., which accounted for eight domains. Four domains were registered in Canada; three in China; and one each in the Netherlands and Vietnam.

A DNS Chronicle API query for the 20 domains identified as IoCs revealed that only 18 had historical domain-to-IP resolutions. They posted a total of 2,729 resolutions over time. The domains baoyingkeji[.]com, fin-tastikantioch[.]com, and hardepc[.]com posted the oldest resolutions on 5 February 2017. Note that five other domains—chetanagarbatti[.]com, cpeakem[.]com, jqsnzp[.]com, kensun4a[.]com, and xclyd[.]com—posted resolutions in a matter of days after the first three did. This similarity could point to ownership by the same entity or, in this case, being part of the same attack infrastructure.

DOMAIN IoCNUMBER OF RESOLUTIONSFIRST RESOLUTION DATELAST RESOLUTION DATE
baoyingkeji[.]com26002/05/1702/10/25
fin-tastikantioch[.]com49202/05/1701/09/24
hardepc[.]com13502/05/1702/02/25
chetanagarbatti[.]com29702/07/1712/15/25
cpeakem[.]com34902/12/1702/22/25

A Deep Dive into the IP Addresses Identified as IoCs

Jake AI queries for the 18 IP addresses identified as IoCs revealed that 17 could be dedicated hosts.

Sample Jake AI result for the IP addresses identified as IoCs

Sample IASC network traffic data for the 17 possibly dedicated IP addresses revealed an interesting finding. We learned that one potential victim IP address communicated with one IP address identified as an IoC on 9 December 2025.

Next, we queried the 18 IP addresses identified as IoCs on Bulk IP Geolocation Lookup and found out that:

  • They were all geolocated in China, which is consistent with Silver Fox’s home base.
  • While 15 of them did not have ISPs on record, the remaining three were all administered by BGP Network.

A DNS Chronicle API query for the 18 IP addresses identified as IoCs showed that all of them had historical IP-to-domain resolutions. Altogether, they posted 6,349 resolutions over time, The IP address 43[.]226[.]125[.]112 recorded the oldest resolution on 25 January 2019.

IP IoCNUMBER OF RESOLUTIONSFIRST RESOLUTION DATELAST RESOLUTION DATE
43[.]226[.]125[.]11260101/25/1912/08/25
137[.]220[.]135[.]8677411/08/1909/04/25
27[.]124[.]43[.]1215011/12/1911/05/23
27[.]124[.]43[.]719112/26/1910/29/25
43[.]226[.]125[.]1251908/31/1902/16/20

The Search for New Artifacts

Our search for new artifacts began with a WHOIS History API query for the 20 domains identified as IoCs. We discovered that 16 of them had email addresses in their historical WHOIS records. We unearthed 60 unique email addresses in all. Closer scrutiny showed that 33 were public email addresses.

A Reverse WHOIS API query for the 33 public email addresses showed that while none of them appeared in any domain’s current WHOIS record, all of them did so in historical WHOIS records. Nine public email addresses could belong to domainers so they were excluded from further analysis. The 24 public email addresses led to the discovery of 45,949 unique email-connected domains after those already identified as IoCs were filtered out.

The results of our Threat Intelligence API query for the 45,949 email-connected domains revealed that 51 have already been weaponized for various attacks.

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS Security

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC