Home / Industry

RomCom and TransferLoader IoCs in the Spotlight

Proofpoint released “10 Things I Hate about Attribution: RomCom vs. TransferLoader” detailing connections between RomCom and TransferLoader. While the researchers said the backdoors were typically used by different groups—RomCom by TA829 and TransferLoader by UNK_GreenSec, they did see similarities between the threat actors’ campaigns.

WhoisXML API further analyzed the campaign infrastructures, specifically the domains used in the attacks, to spot even more similarities and uncover new artifacts. Our analysis comprises two parts.

The first part covered our search for typosquatting domains and unraveling similarities between them and the 109 domains identified as indicators of compromise (IoCs)—20 for RomCom and 89 for TransferLoader. Our search led to these findings:

  • Four domain IoCs appeared in five typosquatting groups
  • Each typosquatting group had 3—8 domains, including one IoC
  • Typosquatting domain groups were spotted between 650 days before and one day after their current WHOIS record creation dates

The second part, meanwhile, covered our search for more insights on the 109 domains identified as IoCs along with new connected artifacts. Our investigation led to these discoveries:

  • 19 domain IoCs were deemed likely to turn malicious upon registration 77-271 days prior to reporting date
  • 3,051 email-connected domains, 28 were malicious
  • 28 IP addresses, 27 were malicious
  • 17 IP-connected domains
  • 1,682 string-connected domains, 24 were malicious

A sample of the additional artifacts obtained from our analysis is available for download from our website.

Part 1: Uncovering Typosquatting Domains

We began our analysis by looking for domains that not only looked similar to those tagged as IoCs but were also registered in bulk along with the IoCs on Typosquatting Data Feed. We discovered that four domains tagged as IoCs, all tied to TransferLoader, were part of five typosquatting groups. They were included in feed files from June 2023 to April 2025.

DOMAIN IoCMALWARETYPOSQUATTING DATA FEED FILE DATE
1day[.]liveTransferLoader23 June 2023
1day[.]liveTransferLoader29 September 2023
1drive[.]expertTransferLoader14 February 2025
dr365[.]liveTransferLoader21 February 2025
livestorage[.]clickTransferLoader15 April 2025

Upon closer scrutiny, we discovered that each group of domains had 3-8 domains each with one being an IoC. Take a look at a sample typosquatting group below with the IoC 1day[.]live.

Note similarities between the IoC (i.e., highlighted in yellow) and the seven look-alike domains in terms of registrant country, registrar, and NS provider. All eight domains in the group also shared two IP addresses.

An even deeper dive into the typosquatting results showed a number of similarities between the 28 domains (i.e., four IoCs and 24 look-alikes). Note that the IoC 1day[.]live was mentioned twice because it was bulk-registered with two groups—one on 23 June 2023 and the other on 29 September that same year.

CREATION DATEREGISTRARREGISTRANT COUNTRY
23 June 2023GoogleCanada
29 September 2023GoDaddyU.S.

We summed up details for the four domains tagged as IoCs and the five typosquatting groups they belonged to below.

  • 1day[.]live appeared in two groups. The first group comprising three domains was created on 23 June 2023 in Canada under Google. All of their NSs were also provided by Google. The second group, meanwhile, comprised eight domains created on 29 September 2023 in the U.S. under GoDaddy. All of their NSs were provided by Domain Control. Interestingly, the domains in the second group also shared two IP addresses—3[.]33[.]130[.]190 and 15[.]197[.]148[.]33—for around 13 months (i.e., September 2023—October 2024) based on the results of an additional DNS history lookup.
  • 1drive[.]expert appeared in a group comprising six domains created on 14 February 2025. While one domain did not have a registrant country on record, the remaining five were split into two countries. Three were registered in the U.S. and one in China. The six domains were also administered by three registrars—three under Tucows, two under Alibaba, and one under Shanghai Fuhu Information Technology. Lastly, they were split across three NS providers—three under System DNS, two under HiChina, and one under DNS.com. Note that two other look-alike domains shared the IoC’s registrant country, registrar, and NS providers. Also, two look-alike domains shared the IoC’s IP address—52[.]72[.]49[.]79—for around five months (i.e., May—October 2021) according to an additional historical DNS lookup.
  • Dr365[.]live appeared in a group with four domains created on 21 February 2025. While one domain did not have a registrant country on record, the remaining three domains were split among three countries. One each was registered in China, Iceland, and the U.S. The four domains were administered by three registrars—two by Spaceship and one each by Tucows and Snapnames 94. They were split across three NS providers—two under Cloudflare and one each under Juming and System DNS.
  • Livestorage[.]click appeared in a group comprising seven domains created on 15 April 2025 in three countries. Four were registered in Japan, two in the U.S., and one in China. The seven domains were administered by four registrars—four by GMO Internet Group and one each by DNSPod, Tucows, and Wix. They were split across five NS providers—three under Onamae and one each under AfterNIC, DNSPod, System DNS, and Wix.

It is also worth noting that three typosquatting groups related to the IoCs 1drive[.]expert, dr365[.]live, and livestorage[.]click shared the U.S. as registrant country, Tucows as registrar, and System DNS as NS provider, hinting at a shared infrastructure.

Finally, we obtained the current WHOIS records of the four domains tagged as IoCs that appeared in typosquatting data feed files via Bulk WHOIS API and found out that three of them—1drive[.]expert, dr365[.]live, and livestorage[.]click—appeared on the feed a day after their current WHOIS record creation date. 1day[.]live, meanwhile, appeared 650 and 552 days before its current creation date.

DOMAIN IoCTYPOSQUATTING DATECURRENT WHOIS RECORD DATE
1day[.]live23 June 20233 April 2025
1day[.]live29 September 20233 April 2025
1drive[.]expert14 February 202513 February 2025
dr365[.]live21 February 202520 February 2025
livestorage[.]click15 April 202514 April 2025

Part 2: Discovering Connected Artifacts

We started our search for connected artifacts by querying the 109 domains tagged as IoCs on Bulk WHOIS API and found out that they all had current WHOIS records. Upon closer examination, we discovered that they were likely fairly newly registered when they figured in attacks. Specifically, all of the 20 RomCom domains were created in 2025, specifically between 20 January and 11 June 2025. The 89 TransferLoader domains, meanwhile, were created between 2024 and 2025, particularly between 2 October 2024 and 14 April 2025.

The 20 RomCom domains tagged as IoCs were split across two registrars—13 under Tucows and seven under Web Commerce Communications. The 89 TransferLoader IoCs, meanwhile, were administered by five registrars—79 by Tucows, four by Web Commerce Communications, three by Hello Internet, two by Eranet International, and one by Mat Bao.

While one RomCom IoC did not have a registrant country on record, the remaining 19 were registered in three countries—14 in the U.S., three in Malaysia, and two in Germany. Fifteen TransferLoader IoCs did not have registrant countries on record as well. The remaining 74 were registered in three countries—72 in the U.S. and one each in Hungary and Ukraine.

We then checked if any of the 109 domains tagged as IoCs appeared on First Watch Malicious Domains Data Feed. We discovered that 27 domains—24 for TransferLoader and three for RomCom—were deemed likely to turn malicious upon registration. Specifically, they appeared on the feeds 77—271 days prior to being reported as IoCs on 30 June 2025.

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API