Home / Industry

Thumbing Through the DNS Traces of TamperedChef

The Acronis Threat Research Unit (TRU) recently discovered a massive malvertising campaign leveraging apps users commonly install on their computers. Dubbed “TamperedChef,” users were tricked into downloading malicious scripts via clever social engineering ruses. The scripts automatically executed their payloads that resulted in nefarious actions, including establishing and selling remote access for profit, stealing and monetizing sensitive credentials and healthcare data, preparing compromised systems for future ransomware deployment, and engaging in opportunistic espionage by exploiting access to high-value targets.

The researchers identified 58 IoCs comprising URLs and subdomains. We extracted 58 unique domains from the IoCs and weeded out those that were legitimate with the help of the WhoisXML API MCP Server. This step left us with 46 domains for further analysis. Our in-depth investigation led to these discoveries:

  • 28 domains tagged as IoCs deemed likely to turn malicious 155—335 days before being dubbed as such
  • 7,111 unique client IP addresses queried four domains identified as IoCs based on sample IASC network traffic data
  • 97 email-connected domains
  • 24 IP addresses, 10 were malicious
  • 952 IP-connected domains
  • Five string-connected domains

A sample of the additional artifacts obtained from our analysis is available for download from our website.

A Closer Look at the IoCs

We began our foray deep into the DNS by querying the 46 domains identified as IoCs on First Watch Malicious Domains Data Feed. We discovered that 28 of them were deemed likely to turn malicious upon registration, that is, between 155 and 335 days before they were dubbed as IoCs on 19 November 2025. Take a look at more details below.

DOMAIN IoCFIRST WATCH DATENUMBER OF DAYS PRIOR TO REPORT DATE
opfktvbbb0d5pphzlc[.]com19 December 2024335
effortlesspdf[.]com15 January 2025308
k2ioeasm874fnacr9x[.]com24 January 2025299
meg7xqos0m7h9urhr0[.]com24 January 2025299
85etpt40zf7ht4yd1u[.]com27 January 2025296

In addition, sample network traffic data from the IASC revealed that 7,111 unique client IP addresses under 429 distinct ASNs communicated with four of the domains tagged as IoCs. Altogether, they made 34,186 DNS queries between 29 October and 27 November 2025.

Next, we queried the 46 domains identified as IoCs on WHOIS API. We found out that:

  • They were all fairly newly created, between 20 November 2024 and 6 September 2025 to be exact.
  • All of them were administered by Namecheap.
  • All of them were registered in Iceland.

A DNS Chronicle API query, meanwhile, for the 46 domains tagged as IoCs showed that 24 had historical domain-to-IP resolutions. The domains resolved to 438 IP addresses over time. These resolutions were recorded as far back as 5 February 2017 specifically by getallmanuals[.]com.

Interestingly, getallmanuals[.]com was created on 15 January 2025 according to its current WHOIS record but resolved to 184[.]168[.]221[.]38 as early as 15 January 2025. That could mean that getallmanuals[.]com’s domain registration expired and it was picked up again recently potentially by the actors behind TamperedChef. Here are more details about five other domains tagged as IoCs.

DOMAIN IoCNUMBER OF RESOLUTIONSFIRST RESOLUTION DATELAST RESOLUTION DATE
usermanualsonline[.]com2411 December 202430 September 2025
effortlesspdf[.]com2016 January 202520 November 2025
getmanualviewer[.]com1617 January 202528 October 2025
k2ioeasm874fnacr9x[.]com127 January 202527 January 2025
85etpt40zf7ht4yd1u[.]com228 January 202529 January 2025

The Hunt for New Artifacts

We started our search for new artifacts by querying the 46 domains identified as IoCs on WHOIS History API. All of them had email addresses in their historical WHOIS records. Specifically, they had 54 unique email addresses in their records. Further scrutiny revealed that four were public email addresses.

Next, we queried the four public email addresses on Reverse WHOIS API. While none of them appeared in any domain’s current WHOIS records, all did so in historical records. This step led to the discovery of 97 email-connected domains after duplicates and those already tagged as IoCs were filtered out.

Afterward, we queried the 46 domains identified as IoCs on DNS Lookup API, which revealed that 14 of them had active IP resolutions. All in all, the 14 domains resolved to 24 unique IP addresses.

A Threat Intelligence API query for the 24 IP addresses showed that 10 of them have already been weaponized for nefarious campaigns.

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API