DNS Deep Diving into Pig Butchering Scams

New kids on the cybercrime block, pig butchering scams, have been making waves lately, and it is not surprising why. Scammers have been earning tons from them by being able to trick users into investing in seemingly legitimate business ventures but losing their hard-earned cash instead.

Trend Micro recently published an in-depth analysis of pig butchering scams and named eight domains as indicators of compromise (IoCs) in the process. These domains supposedly belonged to investment brokers who were really scammers in disguise.

The WhoisXML API research team, in a bid to uncover other unknown threat vectors, expanded the list of pig butchering scam IoCs and found:

  • 27 email-connected domains, one of which turned out to be malicious
  • Two IP addresses
  • 112 string-connected domains

A sample of the additional artifacts obtained from our analysis is available for download from our website.

DNS Findings about the Pig Butchering Scam IoCs

As the usual first step in our analysis, we sought to find more information about the eight domains identified as IoCs. A bulk WHOIS lookup for them led to these findings:

  • They were administered by four different registrars led by Namecheap, Inc., which accounted for three domain IoCs. Cloudflare, Inc. took the second spot with two domain IoCs. Gname.com Pte. Ltd. and NameSilo LLC accounted for one domain IoC each. One domain IoC did not have registrar data in its current WHOIS record.
  • A majority of them, five to be exact, were created in 2023, while two were created in 2022. One domain IoC did not have registrant country information in its current WHOIS record.
  • They were registered in three different countries led by Iceland, which accounted for three domain IoCs. Two domain IoCs were registered in China and one in the U.S. Two domain IoCs did not have registrant country data in their current WHOIS records.

DNS Results from the Pig Butchering Scam IoC List Expansion

To uncover pig butchering scam digital breadcrumbs, we began our expansion analysis with WHOIS History API queries for the eight domains identified as IoCs. They allowed us to gather eight email addresses from the domain IoCs’ historical WHOIS records. One of the email addresses was public.

A Reverse WHOIS API query for the public email address led to the discovery of 27 email-connected domains after duplicates and the IoCs were removed.

Threat Intelligence API queries for the email-connected domains showed that one—designalps[.]com—figured in a phishing campaign.

While designalps[.]com was no longer accessible, Screenshot API revealed that 21 of the email-connected domains continued to resolve to live pages. Twelve of them seemingly led to trading-related sites. Take a look at two examples below.

Screenshot of the page hosted on the email-connected domain attractmilliondollars[.]com
Screenshot of the page hosted on the email-connected domain automoneymakers[.]com

Next, we subjected the eight domains tagged as IoCs to DNS lookups and found that two resolved to one unique IP address each.

IP geolocation lookups for the two IP addresses—172[.]234[.]25[.]151 and 45[.]39[.]148[.]106 showed that:

  • Both were geolocated in the U.S.
  • They were administered by different ISPs – 172[.]234[.]25[.]151 by Akamai Technologies, Inc. and 45[.]39[.]148[.]106 by EGIHosting.

Reverse IP lookups for the two IP addresses revealed that both were shared so we decided not to look for IP-connected domains as they would likely be false positives.

Next, we used Domains & Subdomains Discovery to look for other domains that contained text strings that appeared among the domain IoCs. We found 112 string-connected domains after duplicates, the IoCs, and the email-connected domains were filtered out. They all started with the following strings:

  • crmforexs
  • cronosca
  • trading-ic

Forty-eight of the string-connected domains continued to lead to live sites even if more than half of them, 29 to be exact, were parked or led to error or blank pages.

Signs of Finance Site Abuse in the DNS

To succeed, pig butchering scams need to convince potential victims they are making legitimate investments. That is why scammers typically use domains with related text strings, such as forex, coin, and trading, akin to some of these domains identified as IoCs:

  • crmforexs[.]com
  • filecoinprotocol[.]com
  • gcap-forex[.]net
  • trading-ic[.]com

To cover all the bases, therefore, we scoured the DNS for other domains containing the three strings mentioned above that pig butchering scammers could weaponize in future attacks. We used the strings as Domains & Subdomains Discovery search terms and found 11,409 domains in total.

Threat Intelligence API revealed that 13 of the additional string-connected domains were associated with phishing and generic threats. Here are five examples.

MALICIOUS ADDITIONAL STRING-CONNECTED DOMAIN ASSOCIATED THREAT TYPE
coinbase-coin[.]shop Phishing
coinwavepros[.]site GenericPhishing
coinxiazai[.]com Phishing
hychain[.]trading Phishing
walletlink-coinbase[.]com Phishing

Screenshot lookups showed that five of the malicious additional string-connected domains remained accessible—three of them led to blank, error, or under construction pages, while the remaining two led to live sites as shown below.

Screenshot of the page hosted on the malicious additional string-connected domain coinbase-coin[.]shop
Screenshot of the page hosted on the malicious additional string-connected domain coinxiazai[.]com

It is interesting to note that all of the malicious additional string-connected domains contained the text string coin. That could be due to the popularity of investing in cryptocurrency at the moment.


Our DNS deep dive into pig butchering scams led to the discovery of 141 connected threat artifacts, one of which turned out to be malicious. It also revealed the presence of a number of finance-, cryptocurrency-, and trading-related domains that already figured in or could be weaponized in the future for phishing campaigns, possibly even pig butchering scams.

If you wish to perform a similar investigation or learn more about the products used in this research, please don’t hesitate to contact us.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

Source: Original Post