Securelist uncovered a new HoneyMyte campaign that uses an updated CoolClient backdoor to deploy browser login stealers and multiple data-theft and reconnaissance scripts. Researchers refined the initial CoolClient network IoCs to six verified indicators (three domains, two subdomains, one IP) and identified additional related artifacts including 57 email-connected domains and two IPs linked to malicious activity. #HoneyMyte #CoolClient
Keypoints
- Threat actor HoneyMyte (aka Mustang Panda / Bronze President) upgraded the CoolClient backdoor in 2025 to deploy multiple browser login-stealing tools and expanded data-theft/recon scripts.
- Initial four CoolClient network IoCs were refined to six confirmed IoCs: three domains, two subdomains, and one IP after extracting subdomain components and removing legitimate entries.
- WHOIS and WHOIS-history queries (with WhoisXML API MCP Server) showed the three IoC domains were not owned by legitimate entities, and historical lookups revealed extensive DNS activity (e.g., lenovoappstore[.]com recorded 131 resolutions from 2020β2025).
- Further analysis uncovered 57 unique email-connected domains, one additional IP later tied to malware distribution, five IP-connected domains (two already classified as malicious), and three string-connected domains.
- The subdomain japan[.]lenovoappstore[.]com impersonates a major brand (Lenovo), lacks a legitimate owner and a live site, and was flagged as suspicious for potential phishing or malicious use.
- Two IPs were identified for further investigation: one geolocated in Malaysia (Extreme Broadband) and an additional malicious IP geolocated in Japan (NTT/OCN) with malware distribution activity observed on 14β15 February 2026.
- A sample of additional artifacts and the full research snapshot are available for download from Securelistβs website; the report cautions that some flagged entities may be reclassified after further investigation.
MITRE Techniques
- [N/A ] No explicit MITRE ATT&CK techniques mentioned β The article does not reference specific ATT&CK technique identifiers or technique names.
Indicators of Compromise
- [Domain ] Confirmed malicious/illegitimate domains identified as CoolClient IoCs β lenovoappstore[.]com, (two other domains identified as IoCs)
- [Subdomain ] Suspicious brand-impersonation subdomains flagged β japan[.]lenovoappstore[.]com, (one other subdomain)
- [IP address ] Malicious and suspicious IPs tied to IoCs and malware distribution β an IP geolocated in Malaysia (Extreme Broadband), an additional IP geolocated in Japan (NTT/OCN) associated with malware activity on 14β15 Feb 2026
- [Email-connected domains ] Domains discovered via Reverse WHOIS for a public WHOIS email β 57 unique email-connected domains (examples filtered out from IoCs)
- [Artifacts / Downloadable samples ] Additional artifacts and investigation samples available from Securelist β downloadable sample set referenced (no hashes provided in article)
Read more: https://circleid.com/posts/a-close-look-under-the-dns-hood-of-coolclient