Home / Industry

Probing the DNS Depths of PHALT#BLYX

Securonix recently published their analysis of stealthy campaign PHALT#BLYX, which targeted the European hospitality sector. They used click-fix social engineering, fake CAPTCHAs, and fake BSOD pages to trick users into downloading DCRat so the threat actors could take full remote access to infected systems and drop secondary payloads. The researchers cited 11 original IoCs in their report comprising one URL, seven domains, and three IP addresses.

After extracting an additional domain from the URL, we analyzed 12 IoCs in total—one URL, eight domains, and three IP addresses. Our investigation uncovered these findings:

  • Three domains identified as IoCs were deemed likely to turn malicious 28—177 days before being reported as such
  • 7,099 unique potential victim IP addresses communicated with two IP addresses identified as IoCs
  • 21,638 email-connected domains, four of which turned out to be malicious
  • Six additional IP addresses, five of which turned out to be malicious
  • Six IP-connected domains, three of which turned out to be malicious
  • Seven string-connected domains

A sample of the additional artifacts obtained from our analysis is available for download from our website.

More on the booking[.]com Lure

According to Securonix, the PHALT#BLYX attack started with the threat actors sending phishing emails to mostly European users. The potential victims were tricked into accessing a fake booking[.]com CAPTCHA page. Those who fell for the ruse then saw a fake BSOD page while DCRat was silently dropped onto their systems.

We took a closer look at booking[.]com using Jake AI and discovered that while the domain was legitimate, cyber attackers could be typosquatting on its popularity. In fact, we learned how many of its look-alikes were registered in the past seven, 30, and 90 days, along with some examples.

Jake AI result for the booking[.]com query “Discover domains containing “booking” in reference to booking.com for the past 7, 30, and 90 days.”

Our AI tool also clued us in to the various typosquatting methods that could have been used to mimic the site with examples as well.

Jake AI query result for “What were there different typosquatting tactics used for the sample domains found?”

Additional Information the URL IoC

A sole URL was also identified as an IoC and we dug up more information about it via Jake AI, too. We learned that the site has been associated with malware distribution since 17 December 2025, two days after its creation. The site it led to did not have content as well. Interestingly, the site name 2fa-bns could have been designed to impersonate a legitimate service potentially for a 2FA phishing scam.

New Findings for the Domain IoCs

Our First Watch Malicious Domains Data Feed query results revealed that three domains identified as IoCs were registered with malicious intent. They were classified as malicious 28—177 days before the report’s publication on 6 January 2026.

Next, we queried the eight domains identified as IoCs on WHOIS API and discovered that:

  • They were created between 8 June 2022 and 15 December 2025.
  • They were administered by six different registrars led by NiceNIC.

  • They were registered in five different countries, with a majority in the U.S.

The differences in registrar and registrant country could be a misdirection tactic the threat actors employed to evade the prying eyes of law enforcement agencies as to their actual location, which, according to the researchers, was in Russia (i.e., not even on the list of registrant countries).

Finally, DNS Chronicle API queries for the eight domains identified as IoCs showed that seven recorded 523 historical domain-to-IP resolutions over time. The domain asj88[.]com’s oldest resolution was recorded on 5 February 2017.

DOMAIN IoCNUMBER OF RESOLUTIONSFIRST RESOLUTION DATELAST RESOLUTION DATE
asj88[.]com18602/05/1701/09/26
wmk77[.]com17104/29/1701/07/26
asj99[.]com15411/03/1706/13/24

Given the discrepancies between the WHOIS creation dates (i.e., 2023, 2025, and 2022) and first domain-to-IP resolution dates (i.e., 2017) for the three domains above, we could infer that they may have been reregistered for the campaign’s use. And while one of them stopped actively resolving to an IP address in 2024, two remain active to date.

New Insights into the IP IoCs

Sample network traffic data from the IASC revealed that 7,099 unique potential victim IP addresses under 31 distinct ASNs communicated with two IP addresses identified as IoCs between 9 September 2025 and 16 January 2026.

A Bulk IP Geolocation Lookup query for the three IP addresses identified as IoCs showed that:

  • They were geolocated in three distinct countries. And this time, one of the nations was Russia—the attack’s origin. Note, too, that the U.S. was among both the IP geolocation and registrant countries.
  • While two IP addresses did not have ISPs on record, one was administered by Amazon.

Our DNS Chronicle API query results for the three IP addresses identified as IoCs, meanwhile, revealed that two recorded 1,015 historical IP-to-domain resolutions over time. The IP address 194[.]169[.]163[.]140 recorded its first resolution on 23 January 2021.

The Hunt for New Artifacts Begins

We kicked off our search for new artifacts by querying the eight domains identified as IoCs on WHOIS History API. We discovered that six had 32 unique email addresses in their historical WHOIS records. Of these, 13 were public email addresses.

We then queried 13 email addresses on Reverse WHOIS API and found out that while none of them were present in current WHOIS records, all of them appeared in historical records. After excluding two email addresses that could belong to domainers, we uncovered 21,638 unique email-connected domains after those already identified as IoCs were filtered out.

Threat Intelligence API queries for the email-connected domains showed that four have already been weaponized for various attacks. An example is cp57[.]top, which was used to distribute malware from 9 March 2023 to 14 January 2026.

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign