Home / Industry

ForceMemo in the DNS Spotlight

StepSecurity recently uncovered and is continuously tracking the ForceMemo campaign targeting developers’ GitHub accounts. The attackers reportedly injected the same malware into hundreds of Python repositories starting 8 March 2026.

The researchers identified several network IoCs related to the threat. We extracted domains from the subdomains tagged as IoCs and weeded out those that belonged to legitimate entities aided by the WhoisXML API MCP Server. In the end, we analyzed 20 IoCs comprising nine subdomains, five domains, and six IP addresses.

Our in-depth investigation of the IoCs led to these discoveries:

  • One domain categorized as an IoC bulk-registered with 11 look-alike domains
  • One domain named as an IoC was likely registered with malicious intent
  • 86 email-connected domains found
  • Nine additional IP addresses uncovered, four already classified as malicious
  • 557 string-connected domains unearthed

A sample of the additional artifacts obtained from our analysis is available for download from our website.

Studying the DNS Footprint of the Subdomain IoCs

We kicked off our analysis by looking for more information about the nine subdomains dubbed as IoCs via the WhoisXML API MCP Server.

We discovered that they all belonged to code repositories, mostly open-source or free services. While none of the domains they fell under have been categorized as malicious, some of the code stored in them could have been injected with the malware as part of the ForceMemo campaign.

Take a look at specific findings for three examples below.

SUBDOMAIN IoCWXA MCP SERVER FINDING
api[.]blockeden[.]xyzBased on data up to August 2025, BlockEden[.]xyz is a blockchain infrastructure and API platform, primarily targeting Web3 developers. It provides RPC/API endpoints for multiple blockchains (Aptos, Sui, Ethereum, Solana, etc.), staking services, and analytics tools for on-chain data. This subdomain is their main developer API gateway.
api[.]mainnet-beta[.]solana[.]comThis is the official public RPC endpoint for the Solana Mainnet Beta network operated by the Solana Foundation. Developers use it to interact with the Solana blockchain (submitting transactions, querying accounts, etc.). It is a heavily used but rate-limited endpoint. Production apps are generally encouraged to use dedicated RPC providers instead.
go[.]getblock[.]usGetBlock (getblock[.]io) is a well-known blockchain node-as-a-service/RPC provider supporting 50+ blockchains including Solana, Ethereum, BNB Chain, Bitcoin, and many others. This subdomain appears to be their U.S.-facing API gateway with the dual-IP, ultra-low TTL setup designed to maximize availability and minimize latency for North American users.

Dissecting the DNS Underbelly of the Domain IoCs

We then went on to gather DNS data on the five domains categorized as IoCs.

We scoured the Typosquatting Data Feed and found out that the domain pocket[.]network was bulk-registered with 11 look-alike domains on 20 April 2022.

Our searches on the First Watch Malicious Domains Data Feed, meanwhile, revealed that the same domain—pocket[.]network—was deemed to have been registered with malicious intent on 23 February 2024, 750 days before being dubbed as an IoC on 14 March 2026.

We then queried the domains on WHOIS API and filled in gaps (i.e., missing details) specifically for blockeden[.]xyz using Domain Info API, which gave us the latest available information from its historical records. We discovered that:

  • They were created between 28 March 2019 and 26 September 2024, which could imply the attackers’ preference for not using NRDs for this campaign.
  • They were administered by four registrars.

  • They were registered in four countries.

DNS Chronicle API queries for the domains showed that four recorded 1,368 historical domain-to-IP resolutions over time. Take a look at more information for two examples below.

DOMAIN IoCNUMBER OF DOMAIN-TO-IP RESOLUTIONSDATES SEEN
pocket[.]network10212/04/17–02/28/26
onfinality[.]io1,00004/24/20–02/17/26

Given the dates when the sample domains above last resolved to IP addresses, we can infer that they continue to be actively used for the campaign.

Investigating the DNS Traces of the IP IoCs

Next, we gathered more information on the six IP addresses identified as IoCs.

A Bulk IP Geolocation Lookup for the IP addresses revealed that:

  • They were all geolocated in France.
  • They were also administered by a single ISP, that is, The Constant Company.

Our DNS Chronicle API queries for the IP addresses showed that five recorded 251 historical IP-to-domain resolutions over time. Below are more details for two examples.

IP IoCNUMBER OF IP-TO-DOMAIN RESOLUTIONSDATES SEEN
45[.]32[.]151[.]1575802/11/17–06/07/21
217[.]69[.]11[.]576104/18/20–05/04/25

Since the dates when the sample IP addresses above last resolved to domains do not extend to 2026, we can infer that the attackers may have opted to use new IPs for the campaign.

Hunting for New ForceMemo Artifacts

As the final step in our investigation, we sought to uncover artifacts that could be connected to the threat.

We began by querying the five domains tagged as IoCs on WHOIS History API. We found out that all of them had seven unique email addresses in their historical records. Further scrutiny revealed that three were public email addresses.

Reverse WHOIS API queries for the public email addresses led to the discovery of 86 unique email-connected domains after those already named as IoCs were filtered out.

We then queried the domains on DNS Lookup API and learned that four actively resolved to nine unique IP addresses that were not in the list of IoCs.

Threat Intelligence API queries for the additional IP addresses revealed that four have already been weaponized for various attacks.

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix