Home / Industry

Going DNS Deep Diving Into GhostCall and GhostHire

BlueNorroff struck again last October, this time setting its sights on tech company execs, venture capitalists, and Web3 developers.

The actors zoomed in on tech company execs’ and venture capitalists’ macOS devices via GhostCall. They approached victims on Telegram and similar platforms, luring them with potential investments. Targets were invited to Zoom meetings, and once the call ensued, they were tricked into updating Zoom with a malicious script that downloaded a malicious ZIP file. As a result, the victims lost secret files, including crypto wallet information, keychain data, package managers, and infrastructure setups. They also lost details related to cloud and DevOps platforms, along with their notes, API keys for OpenAI, collaboration application data, and credentials stored in browsers, messengers, and Telegram.

In GhostHire, the attackers went after Web3 developers, tricking them into downloading and executing a GitHub repository containing malware disguised as a skill assessment test for recruitment. It did not matter what OS the targets used, the malware worked regardless. Like GhostCall, GhostHire stole sensitive information, including videos and profile images.

Securelist reported that GhostCall and GhostHire were interrelated in that they shared the same infrastructure and identified 39 domains as IoCs. After checking via the WhoisXML API MCP Server using the prompt “Check the domains using WHOIS API, Website Categorization API, and Threat Intelligence API to determine if any of them are legitimate,” we found out that all of them were suspicious or downright malicious. As such, all of them figured in our analysis that led to these discoveries:

  • 1,345 unique client IP addresses communicated with one of domains identified as IoCs
  • Six domains identified as IoCs were bulk-registered with two look-alike domains each
  • 11 domains identified as IoCs were deemed likely to turn malicious 266—723 days before they were dubbed as such
  • Four email-connected domains, three were found malicious
  • 24 IP addresses, 21 were found malicious
  • 16 IP-connected domains, six were found malicious
  • 993 string-connected domains, 18 were found malicious

A sample of the additional artifacts obtained from our analysis is available for download from our website.

A Closer Look at the IoCs

We began our inquiry into GhostCall and GhostHire by looking more closely at the IoCs. We used both external and internal data to do that.

Data from the IASC

Sample network traffic data from the IASC showed that 1,345 unique client IP addresses under two distinct ASNs communicated with one of the domains identified as IoCs via 11,737 DNS requests made between 13 October and 12 November 2025.

Data from WhoisXML API

To gather more information, we queried the 39 domains identified as IoCs on First Watch Malicious Domains Data Feed and discovered that 11 of them were deemed likely to turn malicious 266—723 days before they were dubbed as such on 28 October 2025. Take a look at the details for five examples below.

DOMAIN IoCFIRST WATCH DATENUMBER OF DAYS PRIOR TO 28 OCTOBER 2025
instant-update[.]online3 November 2023725
urgent-update[.]cloud3 November 2023725
autoupdate[.]online5 November 2023723
security-update[.]xyz5 November 2023723
systemupdate[.]cloud5 November 2023723

We also checked if any of the 39 domains identified as IoCs were bulk-registered with look-alikes via Typosquatting Data Feed and found out that six—system-update[.]xyz, systemupdate[.]cloud, autoupdate[.]online, autoupdate[.]xyz, flashstore[.]sbs, and ms-live[.]us—were part of five typosquatting groups with three domains each. Note that autoupdate[.]online and autoupdate[.]xyz were part of the same group. And they were registered between 22 October 2023 and 6 September 2025. Here are more details.

DOMAIN IoCNUMBER OF LOOK-ALIKESREGISTRATION DATE
system-update[.]xyz222 October 2023
systemupdate[.]cloud26 November 2023
autoupdate[.]online2(including another IoC autoupdate[.]xyz)6 November 2023
autoupdate[.]xyz2(including another IoC autoupdate[.]online)6 November 2023
flashstore[.]sbs228 May 2025
ms-live[.]us26 September 2025

Next, we queried the 39 domains identified as IoCs on WHOIS API and found out that only 28 had current WHOIS records. However, Domain Info API did allow us to fill in the details for the remaining 11 domains. The results showed that:

  • They were created between 31 May 2023 and 19 October 2025. Specifically, 13 domains were created in 2023, eight in 2024, and 18 in 2025.
  • They were administered by five registrars led by Namecheap, which accounted for 35 domains. One domain each fell under the purview of Chengdu West Dimension Digital Technology, Dynadot, Hosting Concepts, and NameSilo.

  • While three of the domains did not have registrant countries on record, the remaining 36 were split among five countries. Thirty-one domains were registered in Iceland; two in the U.S.; and one each in China, the Netherlands, and Singapore.

A DNS Chronicle API query for the 39 domains identified as IoCs revealed that 36 had 1,034 historical domain-to-IP resolutions over time. The domain writeup[.]live posted the oldest resolution on 17 August 2018. Here are details for five examples.

DOMAIN IoCNUMBER OF RESOLUTIONSFIRST RESOLUTION DATELAST RESOLUTION DATE
web071zoom[.]us17921 April 202530 October 2025
writeup[.]live12617 August 201829 October 2025
real-update[.]xyz11312 April 201913 July 2025
filedrive[.]online10820 October 20197 July 2023
secondshop[.]online661 October 202029 October 20/25

The Hunt for New Artifacts

We began our search for new artifacts by querying the 39 domains identified as IoCs on WHOIS History API and discovered that 25 had email addresses in their historical WHOIS records. In fact, they had 29 unique email addresses, four of which turned out to be public addresses.

While none of the four public email addresses were found in other domains’ current WHOIS records based on the results of a Reverse WHOIS API query, they did show up on the historical WHOIS records of four email-connected domains after duplicates and those already tagged as IoCs were filtered out.

A Threat Intelligence API query for the four email-connected domains revealed that three were already considered malicious. An example would be sidezoom[.]us, which was used to distribute malware.

Next, we queried the 39 domains identified as IoCs on DNS Lookup API and discovered that 21 actively resolved to 24 unique IP addresses.

When queried on Threat Intelligence API, we found out that 21 of the IP addresses have already been weaponized for various attacks. Here are five examples.

IP ADDRESSASSOCIATED THREATDATES SEEN
13[.]248[.]169[.]48Malware distribution
Phishing
Suspicious activity
Spamming
Generic threat
Command and control (C&C)
03/29/23–10/31/25
03/28/23–10/31/25
04/05/23–10/30/25
04/14/23–10/27/25
03/28/23–10/26/25
04/05/23–10/25/25
76[.]223[.]54[.]146Malware distribution
Phishing
Suspicious activity
Spamming
Generic threat
C&C
03/29/23–10/31/25
03/28/23–10/31/25
04/05/23–10/30/25
04/14/23–10/27/25
03/28/23–10/26/25
04/05/23–10/25/25
172[.]236[.]126[.]142Malware distribution
Phishing
Generic threat
Suspicious activity
10/16/25–10/31/25
10/15/25–10/31/25
10/16/25–10/30/25
10/16/25–10/24/25
172[.]236[.]126[.]145Phishing
Malware distribution
Generic threat
Suspicious activity
10/15/25–10/31/25
10/16/25–10/31/25
10/16/25–10/30/25
10/16/25–10/24/25
172[.]236[.]126[.]225Phishing
Malware distribution
Generic threat
Suspicious activity
10/15/25–10/31/25
10/16/25–10/31/25
10/16/25–10/30/25
10/16/25–10/24/25

In a bid to gather more information about the 24 IP addresses, we queried them on Bulk IP Geolocation Lookup. The results showed that:

  • They were split among three geolocation countries led by the U.S., which accounted for 17 IP addresses. And while five IP addresses originated from the Netherlands, two hailed from France.
  • While two IP addresses did not have ISP data on record, the remaining 22 were distributed among four ISPs. Fifteen IP addresses were administered by Hostwinds, four by Linode, two by Amazon, and one by Google Cloud.

Next, we queried the 24 IP addresses on Jake AI to determine which could be dedicated hosts. We used the prompt “How many domains are hosted on 104.168.136.231?” for each IP address and discovered that 17 could be dedicated hosts.

Sample Jake AI query result

Upon closer examination, the 17 possibly dedicated IP addresses hosted 16 IP-connected domains after duplicates, those already tagged as IoCs, and the email-connected domains were filtered out.

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix