Exploring Epsilon Stealer Traces Aided by DNS Intel | WhoisXML API

Threat Reports

Exploring Epsilon Stealer Traces Aided by DNS Intel

The Epsilon Stealer has been making online game-playing a destructive hobby for players the world over. It has also been putting the targeted games’ creators potential revenue and reputation at great risk.

WhoisXML API threat research team extracted a list of 76 domains from the 133 indicators of compromise (IoCs) identified by security researchers1 and expanded it in a bid to uncover as many connected artifacts as possible. Our DNS deep dive into Epsilon led to the discovery of:

  • 74 email-connected domains
  • 33 IP addresses to which the domains identified as IoCs resolved, 28 of which turned out to be malicious
  • 1,623 string-connected domains, two of which turned out to be malicious

Download a sample of the threat research materials now or contact us to access the complete set of research materials.

  • [1] https://blog.sekoia.io/game-over-gaming-community-at-risk-with-information-stealers/#h-epsilon-stealer
Try our WhoisXML API for free
Get started