Home / Industry

Unearthing DNS Facts about UAT-8099

WhoisXML API expands Cisco Talos’s findings on the new UAT-8099 campaign that has been active since late 2025 to date, identifying additional associated artifacts.

UAT-8099 is a threat actor that has reportedly targeted vulnerable IIS servers across Asia specifically focusing on Thailand and Vietnam. They used web shells and PowerShell to execute scripts and deploy the GotoHTTP tool, granting them remote access to vulnerable IIS servers. They also utilized new BadIIS variants that came hardcoded with their target region, along with customized features for each variant.

Cisco Talos originally identified 17 network IoCs. Upon further scrutiny (i.e., apex domain extraction from subdomains and exclusion of legitimate domains) aided by the WhoisXML API MCP Server, we ended up with and analyzed 27 IoCs comprising 10 domains and 17 subdomains. Our in-depth investigation led to these discoveries:

  • Two unique client IP addresses communicated with two domains tagged as IoCs
  • Three domains named as IoCs were deemed likely to turn malicious 545—569 days prior to being dubbed as such
  • 12,787 email-connected domains, four of which were classified as malicious
  • 13 IP addresses, 12 of which were categorized as malicious
  • 76 string-connected domains

A sample of the additional artifacts obtained from our analysis is available for download from our website.

Findings for the Subdomain IoCs

We began our analysis by querying the 17 subdomains identified as IoCs using the WhoisXML API MCP Server.

We discovered that 13 of them fell under recently registered domains, and several consisted of random characters, which is unusual for legitimate websites. Only one, however, merited complete avoidance since it seemed to be mimicking Google, typical of sites designed for phishing campaigns.

More DNS Infrastructure Details about the Domain IoCs

Sample network traffic data from the IASC showed that two unique client IP addresses under two distinct ASNs communicated with two domains identified as IoCs via 12 DNS queries between 2 and 31 January 2026.

The First Watch Malicious Domains Data Feed revealed that three of the domains tagged as IoCs were deemed likely to turn malicious 545—569 days before they were dubbed as such. An example is the domain gtwql[.]com, which was likely registered with malicious intent 569 days before it was named as an IoC on 29 January 2026.

Next, we queried the 10 domains classified as IoCs on WHOIS API and discovered that:

  • They were created between 13 May 2016 and 21 July 2025, suggesting that UAT-8099 did not have a specific preference with regard to the age of the domains they weaponized for campaigns.
  • They were administered by two registrars.

  • They were registered in three different countries.

DNS Chronicle API queries for the 10 domains categorized as IoCs revealed that seven recorded 566 domain-to-IP resolutions over time. Take a look at more details for three examples below.

DOMAIN IoCNUMBER OF RESOLUTIONSFIRST RESOLUTION DATELAST RESOLUTION DATE
ceye[.]io35402/26/1701/30/26
jmfwy[.]com5804/29/1701/27/26
hunanduodao[.]com3606/13/2201/08/26

A closer look at the historical resolutions of the seven domains revealed as IoCs showed that two first posted resolutions in 2017, one in 2022, and four in 2025.

New Artifacts Found for the UAT-8099 Attack

To unearth new artifacts connected to this UAT-8099 campaign, we queried the 10 domains identified as IoCs on WHOIS History API. We found out that three of them had eight unique email addresses in their historical WHOIS records. Upon further scrutiny, seven were public email addresses.

The results of our Reverse WHOIS API queries for the public email addresses revealed that two could belong to domainers. The remaining five public email addresses, meanwhile, led to the discovery of 12,787 unique email-connected domains after those already named as IoCs were filtered out.

Threat Intelligence API queries for the email-connected domains showed that four have already been weaponized for various attacks. An example is dmnsg[.]com, which has already been associated with malware distribution between 9 March 2023 and 30 January 2026.

Next, we queried the 10 domains named as IoCs on DNS Lookup API and discovered that seven resolved to 13 unique IP addresses.

The results of our Threat Intelligence API queries for the IP addresses revealed that 12 have already figured in various malicious campaigns.

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global