MOONSHINE and DarkNimbus in the DNS Spotlight | WhoisXML API

Threat Reports

The MOONSHINE Exploit Kit and the DarkNimbus Backdoor in the DNS Spotlight

While it may not be the first time the Earth Minotaur attackers used the MOONSHINE exploit kit to trail after targets, upping its capabilities with the addition of DarkNimbus delivery may be a novel tactic.1

Fellow threat researchers already identified 53 indicators of compromise (IoCs) related to the latest Earth Minotaur attack.2

The WhoisXML API research team dove deep into the threat aided by our comprehensive DNS intelligence and uncovered additional artifacts comprising:

  • 333 email-connected domains
  • Eight additional IP addresses, all of which turned out to be malicious
  • One IP-connected domain
  • 121 string-connected domains

Download a sample of the threat research materials now or contact sales to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

  • [1] https://www.trendmicro.com/en_ph/research/24/l/earth-minotaur.html
  • [2] https://www.trendmicro.com/content/dam/trendmicro/global/en/research/24/l/earth-minotaur/IOCs-EarthMinotaur_v2.txt
Try our WhoisXML API for free
Get started