Home / Industry

Into the Deep DNS Sea with the JSCEAL Campaign

Check Point Research (CPR) recently discovered the JSCEAL campaign targeting crypto app users. According to “Sealed Chain of Deception: Actors Leveraging Node.JS to Launch JSCEAL,” the threat actors used malicious ads to lure victims to install fake versions of close to 50 of the most popular cryptocurrency trading apps. In the first half of 2025 alone, the actors released around 35,000 malicious ads that have been viewed at least a few million times in the European Union (EU) alone. The apps the users downloaded were, of course, masked variants of JSCEAL.

CPR identified 94 domains as indicators of compromise (IoCs). We analyzed them in great depth and uncovered these discoveries:

  • 75,172 unique client IPs under 3,271 unique Autonomous System numbers (ASNs) communicated with two unique IoCs via 1,048,575 DNS requests made on 15—19 July 2025
  • 56 of the 94 domains were deemed likely to turn malicious upon registration, 63—509 days prior to being reported as IoCs
  • One domain IoC appeared in one typosquatting group comprising three domains (i.e., one IoC and two look-alikes) the same date the IoC was created
  • 31 registrant-connected domains
  • 280 email-connected domains, one was malicious
  • 71 IP addresses, 70 were malicious
  • 33 IP-connected domains
  • 1,326 string-connected domains, three were malicious

A sample of the additional artifacts obtained from our analysis is available for download from our website.

A Closer Look at the JSCEAL IoCs

We began our analysis by looking more closely at the 94 domains identified as IoCs. First, we queried them on Bulk WHOIS API and got these results:

  • Only 92 domains had current WHOIS records.
  • Of the 92 domains, 12 had public registrant names.
  • The 92 domains were created between 13 February 2011 and 27 May 2025. A majority of them, 70 to be exact, were created in 2025; 19 in 2024; and one each in 2011, 2019, and 2020.
  • The 92 domains were administered by eight different registrars led by WebCC, which accounted for 43. A total of 22 were managed by Global Domain Group, 10 by Dynadot, eight by PDR, three each by Hostinger Operations and Reg.ru, two by Cloudflare, and one by Sea Wasp.

  • While five of the 92 domains did not have registrant countries on record, the rest were registered in three different countries led by the U.S., which accounted for 50. A total of 34 were registered in Malaysia and three in Russia.

Sample DNS traffic data we obtained from the Internet Abuse Signal Collective (IASC) revealed that 75,172 unique client IPs under 3,271 unique ASNs communicated with two unique IoCs via 1,048,575 DNS requests made on 15-19 July 2025.

First Watch Malicious Domains Data Feed revealed that 56 of the 94 domains identified as IoCs were deemed likely to turn malicious as soon as they were registered, 63—509 days prior to being reported as such on 29 July 2025. The domain ohyoulookstupid[.]win was added to the feed on 7 March 2024, 509 days before it was dubbed an IoC. The domain apps-desktops-download[.]com, meanwhile, was added 63 days prior to being tagged as an IoC. Here are five other examples.

DOMAIN IoC FOUND ON FIRST WATCHDATE ADDED TO FIRST WATCHNUMBER OF DAYS DEEMED LIKELY TO TURN MALICIOUS BEFORE BEING IDENTIFIED AS AN IoC
downloads-app-pc[.]com25 January 2025185
desktop-app-download[.]com24 March 2025127
download-desktops-pc[.]com3 April 2025117
download-apps-desktop[.]com11 April 2025109
apps-downloads-pc[.]com30 April 202590

Next, we queried the 94 domains identified as IoCs on DNS Chronicle API and discovered that 92 had 7,364 domain-to-IP resolutions over time. The domain pc-app[.]com posted the oldest resolution date—6 February 2017. Take a look at the historical DNS data for five other domains below.

DOMAIN IoCNUMBER OF DOMAIN-TO-IP RESOLUTIONSFIRST DOMAIN-TO-IP RESOLUTION DATE
18-22-59[.]com283 April 2025
apps-desktops-downloads[.]com810 April 2025
download-app-pc[.]com157 March 2025
downloads-windows-apps[.]com817 April 2025
pc-apps-download[.]com1059 January 2025

A WhoisXML API MCP Server query through the prompt “which of these domains share the same ip infrastructure” for a sample of the 94 domains identified as IoCs revealed that 18-22-59[.]com, foo-foo[.]bar, dockmilk[.]com, pages[.]dev, and workers[.]dev were hosted on Cloudflare-administered IP ranges.

More specifically, they were hosted on the IP addresses listed below.

DOMAIN IoCCLOUDFLARE-ADMINISTERED IP ADDRESSES
18-22-59[.]com104[.]21[.]12[.]37
172[.]67[.]193[.]164
foo-foo[.]bar104[.]21[.]68[.]242
172[.]67[.]200[.]71
dockmilk[.]com104[.]21[.]88[.]53
172[.]67[.]173[.]11
pages[.]devCloudflare Pages service
workers[.]devCloudflare Pages service

The Hunt for IoC Look-Alikes

After finding more information about the IoCs, we sought to determine if other domains shared some of their common text strings. We discovered that several of the 94 domains identified as IoCs shared 14 the text strings listed below. Note that some domains contained more than one string.

TEXT STRINGNUMBER OF DOMAIN IoCs WITH THE TEXT STRING
app-desktop5
app-pc8
apps-desktop7
apps-download5
apps-pc3
desktop-app3
desktops-download6
download-app6
download-desktop7
downloads-app7
downloads-desktop5
downloads-windows2
pc-app7
pc-download12

Searches on Typosquatting Data Feed showed that one domain identified as an IoC—apps-downloads-pc[.]com—appeared in the file for 30 April 2025. Further scrutiny revealed that the group had three domains—one already identified as an IoC and two look-alikes.

Note similarities between the IoC (i.e., highlighted in yellow) and the two look-alike domains in terms of registrant country, registrar, name server (NS) provider, and creation date.

Finally, a comparison of the domain IoC’s current WHOIS record and the typosquatting group’s creation dates revealed they were the same—30 April 2025.

The Search for New Artifacts

After finding look-alike domains and uncovering similarities between them and the IoCs, we sought to discover new artifacts.

A total of 12 of the 94 domains identified as IoCs had 10 unique public registrant names. While none of the registrant names appeared in other domains’ current WHOIS records, two did so in historical WHOIS records based on the results of our Reverse WHOIS Search queries. Specifically, we uncovered 31 registrant-connected domains after duplicates and those already tagged as IoCs were filtered out.

Next, we queried the 94 domains identified as IoCs on WHOIS History API and found out that their historical WHOIS records had 219 unique email addresses. Further scrutiny revealed that 21 were public email addresses.

We then queried the 21 public email addresses on Reverse WHOIS API, which showed that while none of them appeared in other domains’ current WHOIS records, 10 appeared in historical WHOIS records. This step led to the discovery of 280 email-connected domains after duplicates, those already identified as IoCs, and the registrant-connected domains were filtered out.

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API