![]() |
||
|
Cisco Talos recently uncovered multiple Lotus Blossom cyber espionage campaigns targeting government, manufacturing, telecommunications, and media organizations. The group used Sagerunex and other hacking tools after compromising target networks.
The researchers believe Lotus Blossom developed new Sagerunex variants that used a combination of traditional command-and-control (C&C) servers and legitimate third-party cloud services like Dropbox, Twitter, and the Zimbra open-source webmail as C&C tunnels.
Cisco Talos identified several indicators of compromise (IoCs), including 10 domains and 28 IP addresses, which WhoisXML API expanded through a DNS deep dive. Our analysis led to the discovery of:
A sample of the additional artifacts obtained from our analysis is available for download from our website.
Before we dive into our IoC list expansion, we sought to find more information about the IoCs.
We began by querying the 10 domains identified as IoCs on Bulk WHOIS API and Domain Age Checker and found that all of them had current WHOIS records.
They were split among three registrars led by Netowl, which administered eight domains. GMO Internet Group and Wild West Domains accounted for one domain each.
They were registered in two countries topped by Japan, which accounted for nine domains. One domain was registered in the U.S.
We also queried the 10 domains identified as IoCs on DNS Chronicle API and found that nine had 127 historical domain-to-IP resolutions. The domain doyourbestyet[.]com had five resolutions since 4 October 2019—the oldest resolution date among the IoCs. Interestingly, though, based on its current WHOIS record, it was created on 28 February 2025, which could mean it was recently reregistered. Take a look at detailed results for three other domains below.
DOMAIN IoC | NUMBER OF RESOLUTIONS | FIRST RESOLUTION DATE |
---|---|---|
acdserv[.]com | 86 | 18 February 2020 |
davoport[.]org | 4 | 28 February 2025 |
sensor-data[.]online | 1 | 8 March 2025 |
Next, we queried the 28 IP addresses identified as IoCs on Bulk IP Geolocation Lookup and found that:
Only 21 of them had ISPs on record. Hong Kong Broadband and Hong Kong Enterprise Solutions topped the list of ISPs with three IP addresses each. Cloudie, Dimension Network, Huawei Cloud, The Constant Company, and Zenlayer administered two IP addresses each. One IP address each was administered by DXTL, EDGENAP, KLAYER, Lucidacloud, and XNNET. Finally, seven IP addresses did not have ISP information.
We also queried the 28 IP addresses identified as IoCs on DNS Chronicle API and found that 16 had 778 historical IP-to-domain resolutions over time. The IP address 160[.]124[.]251[.]105 had 223 resolutions starting on 10 October 2019—the oldest resolution date among the IoCs. Take a look at detailed results for five other IP addresses below.
IP ADDRESS IoC | NUMBER OF DOMAIN RESOLUTIONS | FIRST RESOLUTION DATE |
---|---|---|
103[.]213[.]245[.]95 | 2 | 14 June 2024 |
103[.]74[.]192[.]105 | 16 | 26 November 2019 |
122[.]10[.]91[.]36 | 36 | 22 April 2020 |
43[.]252[.]161[.]22 | 162 | 17 August 2022 |
45[.]32[.]127[.]212 | 25 | 17 September 2021 |
To kick off our expansion analysis, we queried the 10 domains identified as IoCs on WHOIS History API and found that they all had email addresses in their historical WHOIS records. We uncovered 14 email addresses in all. Further scrutiny revealed that six were public email addresses.
We queried the six public email addresses on Reverse WHOIS API and found that while none of them appeared in the current WHOIS records of other domains, all of them appeared in the historical WHOIS records of several. However, one domain could belong to a domainer. In sum, five public email addresses appeared in the current records of 90 domains after duplicates and those already identified as IoCs were filtered out.
Next, we queried the 10 domains identified as IoCs on DNS Lookup API and found that they resolved to four IP addresses after duplicates and those already tagged as IoCs were filtered out.
A Threat Intelligence API query for the four additional IP addresses showed that two have already been tagged as malicious. An example would be 160[.]16[.]200[.]77, which was associated with generic threats and malware distribution.
This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.
Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byRadix