Peeking into Back Doors to Abandoned but Live Backdoors | WhoisXML API

Threat Reports

DNS Deep Dive: Peeking into Back Doors to Abandoned but Live Backdoors

Backdoors allow threat actors to bypass a target organization’s normal authentication mechanisms.1 Most of these malware steal sensitive information and send it to command-and-control (C&C) servers—domains under the attackers’ control.

Did you ever wonder what happens to domains that served as C&C servers? Many of them remain operational and can be accessed by other threat actors.2

Security researchers recently identified 34 domains as indicators of compromise (IoCs) for such a threat.3 The WhoisXML API research team expanded that list and uncovered 1,360+ connected artifacts comprising:

  • 498 email-connected domains
  • 10 IP addresses, eight of which turned out to be malicious
  • 192 IP-connected domains
  • 666 string-connected domains

Download a sample of the threat research materials now or contact sales to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

  • [1] https://www.checkpoint.com/cyber-hub/cyber-security/what-is-cyber-attack/what-is-a-backdoor-attack/
  • [2] https://labs.watchtowr.com/more-governments-backdoors-in-your-backdoors/
  • [3] https://otx.alienvault.com/pulse/677fedbe255c99f3fe95d33e
Try our WhoisXML API for free
Get started