Home / Industry

Thumbing through the DNS Trail of the TAOTH Campaign

Trend Micro analyzed what they dubbed as the “TAOTH Campaign,” which primarily targeted users across Eastern Asia. The attackers used fake software update, cloud storage, and login pages to distribute malware and collect sensitive information. Their victimology and decoy documents revealed a focus on high-value targets, including dissidents, journalists, researchers, and technology/business leaders in China, Taiwan, Hong Kong, Japan, South Korea, and overseas Taiwanese communities.

The report “TAOTH Campaign Exploits End-of-Support Software to Target Traditional Chinese Users and Dissidents” identified two domains, four subdomains, and five IP addresses as indicators of compromise (IoCs).

We further investigated eight IoCs comprising three domains and five IP addresses, which led to these discoveries:

  • 68 unique client IP addresses communicated with one domain IoC based on sample traffic data from the Internet Abuse Signal Collective (IASC)
  • One potential victim IP address communicated with one IP IoC based on sample IASC traffic data
  • One domain IoC was dubbed likely to turn malicious 281 days before being reported as such
  • 303 email-connected domains, one was malicious
  • Two IP-connected domains
  • 13 string-connected domains

A sample of the additional artifacts obtained from our analysis is available for download from our website.

WhoisXML API MCP Server in Action: IoC Verification

Given that some of the domains identified as IoCs did not seem to be inherently malicious (i.e., legitimate but compromised), we sought to verify their ownership details aided by the WhoisXML API MCP Server.

First, we extracted the domains from the list of IoCs. We used the prompt “Use WHOIS API, Website Categorization API, Threat Intelligence API to determine if sogouzhuyin.com, amazonaws.com, auth-web.com, onedrive365-jp.com (i.e., some of which were extracted from subdomains identified as IoCs) are malicious.”

The query results informed us that while only one—auth-web[.]com—was indeed malicious, two others were suspicious at the very least based on their ages (i.e., relatively new), WHOIS details (i.e., privacy protection usage), and naming pattern (i.e., potentially mimicking legitimate domains).

The results thus left us with three domains—sogouzhuyin[.]com, auth-web[.]com, and onedrive365-jp[.]com—for our analysis. Hence, we limited our investigation to only eight of the 11 IoCs Trend Micro identified.

Gathering More Information about the IoCs

Next up, we sought to learn more about the eight IoCs.

IASC Sample Traffic Data Analysis

First, we obtained sample DNS traffic data from IASC regarding the three domains identified as IoCs. We learned that 68 unique client IP addresses under one Autonomous System number (ASN) communicated with one domain IoC—auth-web[.]com—via 89 DNS queries made on 14—27 August 2025.

Next, we sought to uncover more information about the five IP addresses identified as IoCs. The sample IASC DNS traffic data showed that one potential victim IP address communicated with one IP IoC—45[.]32[.]117[.]177. An additional IP Geolocation API query for the victim IP revealed its corresponding ASN—18779, which belonged to Energy Group Networks (ISP).

WhoisXML API Intelligence Findings

Next, we gathered data from our intelligence sources starting with the First Watch Malicious Domains Data Feed. We learned that one of the domains identified as IoCs—onedrive365-jp[.]com—was dubbed likely to turn malicious 281 days (i.e., on 20 November 2024, the day it was created) before it was reported as such on 28 August 2025.

We then queried the three domains identified as IoCs on WHOIS API and found out that they all had current WHOIS records. In addition, we discovered that:

  • They were created between 2024 and 2025. The domain sogouzhuyin[.]com was the oldest domain, created on 17 October 2024, while auth-web[.]com was the newest, created on 17 April 2025.
  • Each domain was administered by a different registrar, namely, DropCatch, GoDaddy, and NameSilo.

  • They were registered in two countries—two in the U.S. and one in China.

A DNS Chronicle API query for the three domains identified as IoCs showed that only two had DNS histories. Altogether, the two domains recorded 88 domain-to-IP resolutions over time starting on 11 August 2017 (i.e., the oldest resolution date). Take a look at the details for each domain below.

DOMAIN IoCNUMBER OF RESOLUTIONSFIRST RESOLUTION DATELAST RESOLUTION DATE
auth-web[.]com7211 August 201727 July 2023
sogouzhuyin[.]com161 August 20235 September 2024

We then queried the five IP addresses on Bulk IP Geolocation Lookup and discovered that:

  • They were geolocated in three countries—three in the U.S. and one each in Russia and Switzerland. Note that the U.S. also appeared as a domain IoC registrant country.
  • They were administered by four ISPs—two by Amazon and one each by ColoCrossing, Global-Data System IT, and IQWeb FZ.

A DNS Chronicle API query for the five IP addresses identified as IoCs revealed that all of them had rich DNS histories. Altogether, they posted 447 IP-to-domain resolutions over time. The IP address 45[.]32[.]117[.]177 recorded 91 resolutions starting on 22 April 2017 (i.e., the oldest resolution date). Here are more details about other IoCs.

IP IoCNUMBER OF RESOLUTIONSFIRST RESOLUTION DATELAST RESOLUTION DATE
45[.]32[.]117[.]1779122 April 20177 May 2023
154[.]90[.]62[.]21023510 January 202014 November 2022
192[.]124[.]176[.]512831 July 20205 August 2025

Unearthing New Artifacts

As the next step, we searched for new artifacts that may be connected to the TAOTH campaign. We began by querying the three domains identified as IoCs on WHOIS History API. Only two of the domains had email addresses in their historical WHOIS records. Specifically, they had 47 unique email addresses. Further scrutiny allowed us to collate five public email addresses from the list.

While none of the five public email addresses appeared in the current WHOIS records of domains, two of them did so in historical WHOIS records according to the results of our Reverse WHOIS API queries. The results led to the discovery of 303 email-connected domains after duplicates and those already identified as IoCs were filtered out.

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com