In cybersecurity, domain hosting isn’t the only thing we need to look at. When we dig deeper into where domains are accessed from, we can uncover some really interesting stuff. By looking where these domains are coming from, we can start to piece together patterns of malicious activity and even link domains to cybercrime operations.
This post summarizes findings from a recent geolocation analysis of suspicious domains, highlighting overlaps with sanctioned countries, signs of Domain Generation Algorithm (DGA) activity, and potential connections to well-known cyber campaigns such as Operation Triangulation.
DNS Lookup Geolocation: Analyzing Origin Instead of Destination
DNS queries are often the earliest signals of malicious intent, revealing where domains are being accessed from rather than simply where they are hosted. This perspective can be invaluable for identifying:
Let’s dive into the origins of DNS lookups. By doing so, we can uncover patterns that aid in campaign attribution, grasp adversarial movements, and predict potential escalations in cyber activity.
Revealing Patterns: Geographical Clustering of Malicious Domains
The geolocation analysis uncovered some interesting patterns of domain lookups, hinting at possible coordinated campaigns, botnet activity, or sneaky malicious networks. Here’s a breakdown of the most compelling patterns:
Operation Triangulation: A Coordinated Campaign in Russian Sanctioned Regions
A deeper dive into the data revealed a set of domains associated with Operation Triangulation. This operation is linked to domains frequently queried from multiple Russian cities, such as Volgograd, Izhevsk, and even parts of Ukraine. The following domains are implicated in this campaign:
Operation Triangulation appears to be orchestrated through a sophisticated network of command-and-control infrastructure spanning these regions. It utilizes DNS queries to manage botnets, distribute payloads, and coordinate attacks. The convergence of lookup sources within designated regions indicates that this campaign might be more extensive than merely targeting Kaspersky’s organization. While we anticipate infections primarily in Russia and Ukraine, it’s particularly interesting to discover infections attributed to this campaign in New York, USA, and London, GB, suggesting that infected devices have traveled outside the targeted region. While it’s plausible that the campaign is linked to research activities, the clustering of several domains within the same region aligns with the pattern of infected devices in Russia and Ukraine.
DGA Patterns in Expiro Botnet Domains
The analysis also highlighted a collection of [.]biz domains exhibiting patterns consistent with Domain Generation Algorithm (DGA) usage. The Expiro botnet is known to employ DGAs to generate multiple domains for its C2 communication, making it difficult for defenders to preemptively block its operations. The following domains were flagged:
These domains, along with others, show frequent lookup activity from locations in Karaj, Iran, and Moscow, Russia. The ability to automate domain creation using a DGA allows Expiro to evade static defenses and maintain persistence even when C2 domains are discovered and taken down.
Global Reach of Suspicious Domains: Beyond Sanctioned Locations
The analysis also revealed a surprisingly diverse set of regions involved in lookups for these domains, indicating the presence of compromised devices, proxy networks, or malicious infrastructure in various parts of the world. Here are a few notable examples:
Actionable Insights: Using Geolocation Data to Enhance Defense
The geolocation insights from this analysis reveal several strategies that security teams can employ to bolster their defenses:
Conclusion
By analyzing where domains are being looked up from—rather than just where they’re hosted—we gain a new perspective on cyber threats. Geolocation analysis, combined with insights into sanctioned regions and campaigns like Operation Triangulation and the Expiro botnet, helps uncover hidden patterns and highlight potential connections to nation-state actors or criminal organizations. Understanding these patterns empowers security teams to strengthen defenses and proactively respond to emerging threats.
At ThreatSTOP, we integrate geolocation insights into our comprehensive DNS protection services, helping organizations detect and block malicious activity no matter where it originates. To learn more about how we can help your organization stay secure, visit our Threat Intelligence Solutions page.
Connect with Customers, Disconnect from Risks.