CARVIEW |
- Home
-
Topics
-
Blogs
-
News
-
Community
-
Industry
Home / Industry
Framing the AkiraBot Framework Under the DNS Lens
![]() |
By WhoisXML API (Sponsored Post) A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider | |
|
SentinelLABS recently dug deep into AkiraBot, a framework made to spam website chats and contact forms to promote a low-quality search engine optimization (SEO) service. So far, the bot has targeted 400K+ websites and spammed 80K+ websites since September 2024. According to the report, it uses OpenAI to generate custom outreach messages matching the target sites’ purpose. Compared with typical spamming tools, it employs multiple CAPTCHA bypass mechanisms and network detection evasion techniques.
The researchers identified 34 domains as AkiraBot indicators of compromise (IoCs), which WhoisXML API expanded through a DNS deep dive that led to the discovery of:
- 16 email-connected domains
- 22 IP addresses, 10 of which turned out to be malicious
- 17 string-connected domains
A sample of the additional artifacts obtained from our analysis is available for download from our website.
More on the AkiraBot IoCs
We began our information gathering by querying the 34 domains identified as IoCs on Bulk WHOIS API. We found that only 33 of the domains had current WHOIS records and:
- They were created between 2023 and 2024 before they were weaponized for the September 2024 attacks.
They were split between two registrars led by Namecheap, which accounted for 32 domains. Tucows administered one domain.
Only 29 of the 33 domains with current WHOIS records had registrant countries. Specifically, 28 were registered in Iceland and one in the U.K.
We also queried the 34 domains identified as IoCs on DNS Chronicle API and discovered that all of them had historical domain-to-IP resolutions. In fact, they recorded 359 resolutions over time. The domain letsgetcustomers[.]com posted the oldest resolution date, that is, to IP address 198[.]57[.]247[.]157 on 12 February 2017. Take a look at five other examples below.
DOMAIN IoC | NUMBER OF IP RESOLUTIONS | FIRST IP RESOLUTION DATE |
---|---|---|
akirateam[.]com | 19 | 6 June 2022 |
goservicewrap[.]com | 30 | 4 April 2023 |
searchengineboosters[.]com | 66 | 26 March 2023 |
servicewrap-go[.]com | 17 | 12 September 2023 |
servicewrapgo[.]com | 25 | 7 June 2023 |
Expanding the Current List of AkiraBot IoCs
To uncover artifacts possibly connected to the AkiraBot framework, we started by querying the 34 domains identified as IoCs on WHOIS History API. A total of 20 of the domains had 32 email addresses in their historical WHOIS records after duplicates were filtered out. Further scrutiny of the results unveiled three public email addresses.
We queried the three public email addresses on Reverse WHOIS API afterward. While none of them appeared in the current WHOIS records of other domains, they were, however, present in the historical records of 16 email-connected domains after duplicates and those already identified as IoCs were filtered out.
A Screenshot API query for the 16 email-connected domains showed that five continued to host live content. Possibly coincidentally, an example with the same theme as the IoCs—SEO services—is localseochimp[.]com.

Next, we queried the 34 domains identified as IoCs on DNS Lookup API and found that 33 of them actively resolved to IP addresses. In particular, the 33 domains resolved to 22 IP addresses after duplicates were filtered out.
A Threat Intelligence API query for the 22 IP addresses revealed that 10 have already figured in various cyber attacks.
This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.
Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.
Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.
Visit PageFiled Under
Comments
More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.
Related
Breaking Ground: Historic Launch of UN Global Mechanism for Cyberspace Governance
- Joanna Kulesza
- Jul 12, 2025 2:02 PM PDT
- Views: 1,396
Down the DNS Funnel and into the Funnull Infrastructure
- WhoisXML API
- Jul 11, 2025 7:24 PM PDT
- Views: 973
Global Domain Name Market Reaches 372 Million Domains, 1.5% Growth in 2024
- CircleID Reporter
- Jul 10, 2025 6:50 PM PDT
- Views: 1,919
An Internet Infrastructure Perspective on AI Service Provision
- Charles Mok
- Jul 09, 2025 4:12 PM PDT
- Views: 2,937
Shining the DNS Spotlight on Lumma Stealer
- WhoisXML API
- Jul 07, 2025 11:44 AM PDT
- Views: 1,689
IS3C Report: Socio-Political and Technical Impacts of Post Quantum Cryptography Policies
- Wout de Natris
- Jun 30, 2025 3:50 PM PDT
- Views: 7,599
A DNS Examination of the Phishing Campaign Targeting Japanese Brokerage Firms
- WhoisXML API
- Jun 30, 2025 3:36 PM PDT
- Views: 3,994
.PARIS : Can the Backend Registry Help Sales?
- Jean Guillon
- Jun 28, 2025 12:20 PM PDT
- Views: 15,832
ICANN Warns of Possible Sanctions Over AFRINIC Election Irregularities
- CircleID Reporter
- Jun 25, 2025 8:13 AM PDT
- Views: 15,258
A DNS Deep Dive into the LabHost PhaaS Infrastructure
- WhoisXML API
- Jun 19, 2025 11:18 AM PDT
- Views: 7,229
Topics
New TLDs
Sponsored byRadix
IPv4 Markets
Sponsored byIPv4.Global
Brand Protection
Sponsored byCSC

DNS
Sponsored byDNIB.com
Domain Names
Sponsored byVerisign
Cybersecurity
Sponsored byVerisign

DNS Security
Sponsored byWhoisXML API
SECTIONS: Home | Topics | Featured Blogs | News Briefs | Industry Updates | Community
TERMS OF USE: Codes of Conduct | Privacy Policy | Terms of Use
Copyright © 2002-2025 CircleID. All rights reserved unless where otherwise noted.
Local Time: Monday, July 14, 2025 10:21 AM PDT – Page Load: 0.7140 Sec.