|
||
|
||
Koi Security recently published a report on ShadyPanda, which launched a seven-year-long campaign said to have affected the browsers of 4.3 million Chrome and Edge users to date. How has the campaign lasted so long? Some of the actors’ extensions were featured and verified by Google, resulting in instant trust and massive distribution. Over time, they weaponized browser marketplaces by building trust, accumulating users, and pushing malicious silent updates.
Koi identified seven IoCs comprising four domains and three subdomains. After extracting unique domains from the subdomains, we accumulated six domains and three subdomains for further analysis. Note that we queried the six domains on the WhoisXML API MCP Server and discovered that none of them were legitimate, making them worthy of further analysis.
Our in-depth investigation led to these discoveries:
A sample of the additional artifacts obtained from our analysis is available for download from our website.
First, sample network traffic data from the IASC based on a total of 823 DNS queries showed that 105 unique client IP addresses under nine distinct ASNs communicated with four domains identified as IoCs between 11 November and 10 December 2025.

We then queried the six domains identified as IoCs on WHOIS API and discovered that:

They were administered by three registrars—four by GoDaddy and one each by Danesco Trading and West263 International.

They were registered in three countries topped by the U.S., which accounted for four domains. One domain each, meanwhile, was registered in China and Cyprus.

A DNS Chronicle API query for the six domains identified as IoCs showed that all of them had 661 historical domain-to-IP resolutions over time. The domain gotocdn[.]com posted the earliest resolution date—26 May 2017. Take a look at more details for three examples below.
| DOMAIN IoC | NUMBER OF RESOLUTIONS | RESOLUTION DATES |
|---|---|---|
| gotocdn[.]com | 101 | 05/26/17–08/21/22 |
| extensionplay[.]com | 180 | 04/30/21–11/24/25 |
| dergoodting[.]com | 144 | 06/08/22–11/20/25 |
Next, we sought to uncover more insights regarding the three subdomains identified as IoCs and found out that:

While the root domain of s-82923[.]gotocdn[.]com and s-85283[.]gotocdn[.]com has been around for some time, it is privately registered. The two subdomains are now inactive.


We began our search for new artifacts by querying the six domains identified as IoCs on WHOIS History API and discovered that three had email addresses in their historical WHOIS records. They had seven unique email addresses, in fact, and two were public addresses.
While the results of our Reverse WHOIS API query for the two public email addresses revealed that none appeared in current WHOIS records, both did show up in historical records. This step led to the discovery of 735 email-connected domains after those already identified as IoCs were filtered out.
A Threat Intelligence API query for the 735 email-connected domains showed that one has already been weaponized for phishing between 17 July and 2 December 2025 and generic threats between 18 July and 20 September 2025.
Next, we queried the six domains identified as IoCs on DNS Lookup API and found out that four had active IP resolutions. They resolved to seven unique IP addresses, in fact.
A Threat Intelligence API query for the seven IP addresses revealed that six have already figured in malicious campaigns. Take a look at more details for three examples below.
| MALICIOUS IP ADDRESS | ASSOCIATED THREATS | DATES SEEN |
|---|---|---|
| 104[.]21[.]45[.]44 | Malware distributionPhishing Generic threat | 08/25/24–12/01/25 03/28/23–10/26/25 03/29/23–10/06/25 |
| 104[.]21[.]49[.]170 | Phishing Generic threat Malware distribution | 04/10/23–12/02/25 03/30/23–12/01/25 02/12/24–09/30/25 |
| 104[.]21[.]74[.]14 | Malware distribution Phishing Generic threat | 07/12/23–12/01/25 04/04/23–10/27/25 04/03/23–10/04/25 |
This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.
Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byCSC
Sponsored byRadix
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byVerisign