Home / Industry

Scouring the DNS for Traces of the Hiddengh0st and Winos SEO Poisoning Campaign

Fortinet discovered a search engine optimization (SEO) poisoning campaign targeting Chinese-speaking users in August 2025. They investigated the threat and found out that the attackers manipulated search rankings with SEO plug-ins and registered look-alike domains that closely mimicked legitimate software sites. Victims ended up installing Hiddengh0st and Winos variants into their computers.

The researchers identified 13 indicators of compromise (IoCs)—five domains, four subdomains, and four IP addresses—in “SEO Poisoning Attack Targets Chinese-Speaking Users with Fake Software Sites.”

After further scrutiny (i.e., extracting the domains from the subdomains), we excluded the legitimate web properties from the original IoC list and ended up with nine IoCs—five domains and four IP addresses—for our DNS footprint investigation. Our analysis led to these discoveries:

  • 7,741 email-connected domains
  • Eight additional IP addresses, seven were malicious
  • 36 string-connected domains

A sample of the additional artifacts obtained from our analysis is available for download from our website.

Learning More about the IoCs

More on the Subdomains We Excluded as IoCs

Before uncovering more information about the nine IoCs using our intelligence sources, we sought to learn more about the IoCs, specifically the two subdomains—bucket00716[.]s3[.]ap-southeast-2[.]amazonaws[.]com and znrce3z[.]oss-ap-southeast-1[.]aliyuncs[.]com—we excluded from our main analysis since their domains were legitimate and probably abused. According to Virus Total, both were indeed malicious.

Our search for all the information our homegrown tools can find about bucket00716[.]s3[.]ap-southeast-2[.]amazonaws[.]com via the WhoisXML API MCP Server not only confirmed the subdomain’s malicious nature but also revealed that it was active between 17—30 September 2025.

The WhoisXML API MCP Server told us that znrce3z[.]oss-ap-southeast-1[.]aliyuncs[.]com was also indeed malicious, has been active since 17 September 2025 to date, and has a short time-to-live (TTL) value—60 seconds.

More on the IoCs on Our List

We began by querying the five domains identified as IoCs via the WhoisXML API MCP Server using the prompt “Get the createdDate, registrarName, registrant_country of aisizhushou.com, c4p11.shop, deepl-fanyi.com, telegramni.com, wps1.com using WHOIS API.”

We discovered that:

  • They were a mix of aged and newly registered domains (NRDs), created between 22 January 2004 and 11 April 2025.
  • They were administered by three registrars—one by Alibaba Cloud Computing, three by GKG.net, and one by P.A. Vietnam.

  • While one domain did not have a registrant country on record, the remaining four were registered in three countries—one in China, two in the U.S., and one in Vietnam.

A DNS Chronicle API query for the five domains identified as IoCs revealed that only four had DNS histories. They had 494 historical domain-to-IP resolutions. The domain aisizhushou[.]com posted the oldest resolution on 5 February 2017. Take a look at more information below.

DOMAIN IoCNUMBER OF RESOLUTIONSFIRST RESOLUTION DATELAST RESOLUTION DATE
aisizhushou[.]com1615 February 201726 September 2025
wps1[.]com2727 February 201727 August 2025
telegramni[.]com4617 April 20231 September 2025

Next, we queried the four IP addresses identified as IoCs on Bulk IP Geolocation Lookup and discovered that:

  • They were all geolocated in China.
  • While two IP addresses did not have ISPs on record, one each was administered by BGP Network and China Unicom Beijing Province Network.

A DNS Chronicle API query for the four IP addresses identified as IoCs revealed that only three had DNS histories. They had 1,593 historical IP-to-domain resolutions over time. The IP address 137[.]220[.]152[.]99 posted the oldest resolution on 4 December 2019. Take a look at more information for each IP address below.

IP IoCNUMBER OF RESOLUTIONSFIRST RESOLUTION DATELAST RESOLUTION DATE
137[.]220[.]152[.]994184 December 201922 November 2020
202[.]95[.]8[.]471,00022 August 202019 January 2023
27[.]124[.]13[.]3252522 August 202027 October 2021
Expanding the List of IoCs

To uncover more connected artifacts, we began by querying the five domains identified as IoCs on WHOIS History API. They had 17 unique email addresses in their historical WHOIS records, six of which were public.

A Reverse WHOIS API query for the six public email addresses revealed none of them appeared in current WHOIS records although all did so in historical records. It is worth noting, however, that two could belong to domainers so we excluded their connections from our findings. This query led to the discovery of 7,741 email-connected domains after duplicates and those already identified as IoCs were filtered out.

Next, we queried the five domains identified as IoCs on DNS Lookup API. We found out that they actively resolved to eight unique IP addresses, none of which were on the IoC list.

A Threat Intelligence API query for the eight additional IP addresses showed that seven were malicious.

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

DNS Security

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix