Banners, Bots and Butchers: An Automated Long Con Targeting Japan, Asia, and Beyond
A hybrid investment scam campaign is targeting users in Asia and globally by combining malvertising with pig butchering tactics. Threat actors use RDGA-generated domains and AI chatbots on popular messaging apps to automate social engineering, impersonate financial experts, and extract funds from victims.
Authors: Infoblox Threat Intel
Source:
Infoblox
- domainaopmbxeqax[[.]]clickRDGA domain hosting a Japanese scam campaign abusing the likeness of Takaaki Mitsuhashi.
- domainfgynfgi[[.]]buzzRDGA domain hosting a Japanese AI investing scam campaign.
- domaingooglenames[.]topLookalike RDGA domain hosting a Japanese AI investing scam campaign.
- domainsafesecurea[[.]]sbsDomain hosting Japanese and Chinese scam campaigns abusing the likeness of Nvidia CEO Jen-hsun Huang.
- domainyoutubefind[[.]]topLure domain hosting scam campaigns abusing the likeness of various individuals.
Key Takeaways
- Campaigns combine malvertising for victim acquisition with pig butchering tactics via messaging apps.
- Threat actors utilize Registered Domain Generation Algorithms (RDGAs) to register over 23,000 domains.
- AI bots are heavily used to automate 24/7 engagement in messaging apps like LINE and WhatsApp.
- Scams impersonate well-known financial experts to build trust and lure victims into fake investments.
- Victims are pressured into making investments and ultimately asked for a fake 'release fee' before scammers vanish.
Affected Systems
- Messaging Applications (LINE, WhatsApp, KakaoTalk)
- Social Media Platforms (Meta, Instagram)
Attack Chain
Victims are initially targeted through malvertising on social media platforms featuring impersonated financial experts. Clicking the ad redirects them to an RDGA-generated lure website, which prompts them to join a messaging app group via a link or QR code. Once in the messaging app, AI bots impersonating experts and other 'students' engage the victim 24/7 to build trust. The victim is convinced to transfer funds for fake investments and is ultimately scammed out of their money, including a final fake 'release fee'.
Detection Availability
- YARA Rules: No
- Sigma Rules: No
- Snort/Suricata Rules: No
- KQL Queries: No
- Splunk SPL Queries: No
- EQL Queries: No
- Other Detection Logic: No
No specific detection rules are provided in the article, but a GitHub repository is mentioned for additional indicators.
Detection Engineering Assessment
EDR Visibility: None — The attack relies entirely on social engineering, web browsing, and legitimate messaging apps (often on personal mobile devices), which EDR does not monitor. Network Visibility: Medium — DNS queries to newly registered RDGA domains can be detected, but the actual chat traffic is encrypted within legitimate messaging apps. Detection Difficulty: Hard — The infrastructure rotates rapidly using RDGAs, and the social engineering occurs on legitimate, encrypted third-party platforms.
Required Log Sources
- DNS Logs
- Web Proxy Logs
Hunting Hypotheses
| Hypothesis | Telemetry | ATT&CK Stage | FP Risk |
|---|---|---|---|
| Look for high volumes of DNS queries to newly registered domains in specific TLDs (.sbs, .icu, .top, .click, .buzz) originating from user endpoints. | DNS Logs | Delivery | Medium |
| Identify web traffic referring from major social media platforms (Meta, Instagram) directly to newly registered, low-reputation domains. | Web Proxy Logs | Delivery | Medium |
Control Gaps
- Endpoint visibility on personal mobile devices
- Inspection of encrypted messaging app traffic
Key Behavioral Indicators
- DNS queries to RDGA-patterned domains
- Unexpected redirects from social media to newly registered domains
False Positive Assessment
- Low
Recommendations
Immediate Mitigation
- Block the provided IOC domains at the DNS and web proxy levels.
Infrastructure Hardening
- Implement DNS filtering to block or sinkhole newly registered domains (NRDs) and suspicious TLDs.
User Protection
- Deploy web filtering to prevent access to known malvertising and scam lure sites.
Security Awareness
- Educate users on the risks of social media investment ads, the use of AI bots in chats, and the mechanics of pig butchering scams.
MITRE ATT&CK Mapping
- T1583.001 - Acquire Infrastructure: Domains
- T1566.002 - Phishing: Spearphishing Link
- T1204.001 - User Execution: Malicious Link
Additional IOCs
- Domains:
7973268[[.]]top- Domain hosted a Korean scam campaign8jz2x[[.]]icu- Domain hosted an English scam campaignbtedsrr[[.]]icu- Domain hosted a Korean scam campaign abusing the likeness of Seunghwan Yeomfhysgth[[.]]sbs- Domain hosted a Japanese scam campaign abusing the likeness of Takaaki Mitsuhashighmfg[[.]]sbs- Domain hosted an English scam campaign abusing the likeness of Andre Iguodalagnlaoprs[[.]]click- Domain hosted a Japanese scam campaign abusing the likeness of Kenichi Ohmaehrdfsetsdf[[.]]sbs- Domain hosted a Japanese AI investing scam campaignkoaliuehudrt[[.]]sbs- Domain hosted a Japanese scam campaign abusing the likeness of Yusaku Maezawakpusnenvcg[[.]]buzz- Domain hosted a Japanese AI investing scam campaignlgsmjhsb[[.]]buzz- Domain hosted a Japanese AI investing scam campaignoiajdng[[.]]click- Domain hosted a Japanese scam campaign abusing the likeness of Ken Hondaoslddjb[[.]]buzz- Domain hosted a Japanese AI investing scam campaignr2th4[[.]]icu- Domain hosted a Japanese AI investing scam campaignstock-analysis06[[.]]buzz- Domain hosted an English scam campaignttrvsgg[[.]]icu- Domain hosted a Korean scam campaign abusing the likeness of a Healing Traveler YouTuberttrvsii[[.]]icu- Domain hosted a Korean scam campaign abusing the likeness of a Healing Traveler YouTuberttrvsrr[[.]]icu- Domain hosted a Korean scam campaign abusing the likeness of a Healing Traveler YouTubervbmuakf[[.]]click- Domain hosted a Japanese scam campaign abusing the likeness of Ken Hondaxhlch[[.]]top- Domain hosted a Japanese AI investing scam campaignxqeha[[.]]icu- Domain hosted a Korean scam campaign abusing the likeness of Seon Dae-in TV YouTuberydfshans[[.]]click- Domain hosted a Japanese scam campaign abusing the likeness of Takaaki Mitsuhashiyhdakgjd[[.]]top- Domain hosted a Japanese scam campaign abusing the likeness of Ken Honda