Scouring the DNS for Traces of the Hiddengh0st and Winos SEO Poisoning Campaign

The recent Hiddengh0st and Winos search engine optimization (SEO) poisoning campaign targeted Chinese-speaking users. The attackers manipulated search rankings with SEO plug-ins and registered look-alike domains that closely mimicked legitimate software sites.

Fortinet identified 13 indicators of compromise (IoCs).1 We analyzed eight IoCs—five domains and four IP addresses, and discovered:

  • 7,741 email-connected domains
  • Eight additional IP addresses, seven were malicious
  • 36 string-connected domains

Download a sample of the threat research materials now or contact sales to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

  • [1] https://www.fortinet.com/blog/threat-research/seo-poisoning-attack-targets-chinese-speaking-users-with-fake-software-sites
Try our WhoisXML API for free
Get started