MULTI-HOP MALVERTISING

INFRASTRUCTURE EXPOSED:

Fast-Flux TDS & Aeza BPH Attribution

Threat Research Team

1. Executive Summary

Augur Security has identified a sophisticated malvertising campaign that is actively reaching users across multiple organizations, with 708,215 allowed outgoing connections observed to campaign infrastructure. 

The campaign originates from IP 188.40.16[.]220 and delivers obfuscated JavaScript payloads via a multi-hop redirect chain that leverages the MGID native ad network. The fast-flux TDS network spans 18 IPs across six /24 subnets and hosts 300 or more auto-generated compound-word domains rotating continuously. The Energy and Utilities, Banking, and Government sectors have the highest exposure by volume, with a heavy concentration among MENA-region clients (78.4% of connections) compared with North America (21.6% of connections). 

The risk profile extends beyond ad fraud: data analysis of the delivery infrastructure reveals co-occurrence with confirmed infostealer and RAT deployments, including CryptBot, IcedID, NjRAT, and Ryuk, materially elevating the severity assessment for affected clients.

 

Attribution analysis links the campaign operator to developzilla[.]com, a professional software development organization whose infrastructure migrated to Aeza International (AS210644) in January 2026. Aeza is a U.S. Government-sanctioned bulletproof hosting (BPH) provider that was sanctioned on July 1st, 2025, due to its role in facilitating global cybercriminal activity. Those activities include hosting infrastructure for ransomware attacks, malware distribution, and darknet marketplaces targeting U.S. businesses and technology companies. They were also documented by Infoblox in February 2026 as operating a shadow DNS network and HTTP-based TDS capable of router compromise, DNS hijacking, and adversary-in-the-middle operations. The threat actor is assessed as financially motivated and has been operating in the affiliate marketing space since at least mid-2022.

The Augur Advantage

This research was performed using our Augur Black platform. Augur predicted the CIDR 188.40.16.220/32 as a malware-associated host with an importance score of 80 before any client exposure was observed. From that single IP address, Augur's BGP-derived infrastructure intelligence and threat-hunting capabilities enabled our research team to map the full 18-node fast-flux pool, trace the operator's infrastructure to the Aeza bulletproof hosting network, and quantify 708,215 connections across affected organizations. That level of coverage is not achievable through endpoint, DNS, or signature-based detection alone.

2. Campaign Infrastructure Analysis

2.1 Entry Point and Delivery Chain

The malvertising chain initiates from IP 188.40.16[.]220 (Eskimi DSP / MGID inventory), which serves the entry-point HTML payload (SHA256: 9F2D6CA55916107386039941665397006E015BD870 4EFFD8F 19CF941DE474BA9). The payload is an obfuscated page hosted on clipzag[.]com that presents esports video content (Hungrybox vs. Leffen Smash Bros. rivalry) to deceive users and evade manual review.

The page loads invoke.js from agitatechampionship[.]com (resolved to 172.240.108[.]76), a TDS node flagged for Fast Flux DNS activity as of January 6, 2025. URLscan pivot analysis confirms the domain has resolved to at least 10 distinct IPs, confirming active infrastructure rotation. The loader implements window.LieDetector, a browser fingerprinting engine that filters sandboxes, headless browsers, and security crawlers. Only qualifying real-user traffic proceeds through the redirect chain.

Figure 1. This page mimics YouTube's layout, including the video player, view counts, subscriber counts, and sidebar recommendations, to reduce user suspicion.

2.2 Back-Button Hijack and Redirect Chain

Qualifying traffic is subjected to a back-button hijack via Object.defineProperty on window. location, intercepting popstate events to prevent users from navigating away. The redirect chain traverses sourshaped[.]com, skinnycrawlinglax[.]com, and professionaltrafficmonitor[.]com, terminating at the MGID native ad network backend. The campaign publisher token 71b88c4ea340cafbeb941dc395dc3b83 is hardcoded across all payload files and ties all activity to the clipzag[.]com lure placement.

2.3 Payload Analysis: Social Bar Framework

Payload JS files retrieved from skinnycrawlinglax[.]com and sourshaped[.]com implements a full Social Bar ad framework. The framework mounts a fixed-position iframe overlay on the victim page, implements frequency capping via cookies, and performs a back-button hijack using the same UUID cookie key, dom3ic8zudi28v8lr6fgphwffqoz0j6c, observed in invoke.js. Two distinct campaign variants were identified, each with separate placement keys and publisher session IDs (psids).

Figure 2. The Seepto Social Bar overlay is rendered in the top-right corner one minute after the initial page load. The fixed-position iframe overlay presents two native ad units sourced from the campaign's CPM network. The video player displays a media load failure, confirming the video content is a non-functional lure. The "Connecting..." status bar indicator reflects the active back-button-hijack redirect chain running in the background.

The complete set of data collected from each qualifying visitor includes: 

  • Navigator.userAgent (full browser/OS fingerprint)
  • Window.location.href and window.location.hostname (current page URL and domain)
  • Screen dimensions and viewport size (window.innerWidth/innerHeight)
  • Browser type and version (Chrome, Safari, Firefox, Edge, Opera, Yandex, UC Browser)
  • OS (Windows, Android, iOS, Linux, Mac, Windows Phone)
  • Device type (Mobile, Tablet, Desktop)
  • Navigator.maxTouchPoints (touch capability fingerprinting) navigator.userAgentData.getHighEntropyValues() including architecture, bitness, brands, platform, platformVersion, model, and fullVersionList 
  • Timezone offset
  • Persistent UUID via the dom3ic8zudi28v8lr6fgphwffqoz0j6c cookie
  • Document.referrer; ancestorOrigins (iframe chain)
  • Page load and network request timing via performance.getEntriesByType(’resource’)

This data is transmitted to operator-controlled infrastructure across multiple endpoints:

Endpoint Data Sent Purpose
sourshaped[.]com/pixel/impr Impression event + UUID Impression tracking
sourshaped[.]com/pixel/clk Click event + UUID Click tracking
sourshaped[.]com/pixel/sbe Error + status code Error reporting
sourshaped[.]com/pixel/sbs Banner success event Success tracking
sourshaped[.]com/sbar.json?key= Full fingerprint + UUID + UA + referrer + psid + high entropy values Ad serving decision

protrafficinspector[.]com

Traffic analytics data Operator tracking
preferencenail[.]com User preference data Behavioral targeting
sentry.developzilla[.]com/12 JS errors + stack traces + browser/OS/URL Operator error reporting
effectivegatecpm[.]com Placement ID + impression data CPM accounting

No credential theft was observed. The collection constitutes a persistent cross-site behavioral profile of each visitor and likely violates GDPR for affected EU/GCC-regulated organizations.

2.4 Fast-Flux TDS Network

URLscan and VT pivot analysis confirmed a fast-flux IP pool of 18 IPs across six /24 subnets. The primary TDS domains agitatechampionship[.]com, g9qnk89pd5ic[.]com, humpdecompose[.]com, and dissolvedbrevityclog[.]com collectively resolve to these IPs, with each IP hosting 17 to 124 additional compound-word TDS domains.

Passive DNS for 170.23.224[.]167 and 170.23.224[.]169, the two most recently active fast-flux IPs (resolved as of March 27, 2026), reveals a parallel layer of named redirect and delivery domains operating on the same infrastructure today, including realizationnewestfangs[.]com, franzredheadline[.]com, amuletshaped[.]com, boringegotistical[.]com, crownzodiac[.]com, inopportunefable[.]com, and spellingdelicatessenremove[.]com among others, all returning live 200 responses in the March 25 to 27, 2026 window.

The CPM network backend is larger than initially documented and includes highperformancecpmgate[.]com, highrevenuenetwork[.]com, variouscreativeformats[.]com, and topdisplaynetwork[.]com in addition to the previously identified CPM domains. The sbar.json query parameters observed in live URLscan captures expose the publisher placements being abused: manga and anime piracy sites (mangafire[.]to), video streaming platforms, and adult content sites, with campaign key b96781136f41f8fb859b888f711cae45 active across multiple placements. The CPM backend infrastructure was independently confirmed by Infoblox research, which identified effectivegatecpm[.]com as the final ad delivery endpoint in the same redirect chain.

Figure 3. Campaign infrastructure link analysis. Dashed lines indicate attribution relationships rather than traffic flows. Red borders on IP nodes indicate Augur predictions.

3. Attribution: developzilla[.]com and Aeza BPH Network

3.1 Operator Infrastructure Identification

The Sentry DSN is hardcoded across all analyzed payload files (https://18eb246192ea9ed123b97c23c9107596@sentry.developzilla[.]com/12), exposing the operator's error-tracking infrastructure. Passive DNS analysis of developzilla[.]com reveals a professional software development organization with infrastructure dating to 2014, running JetBrains Hub, YouTrack project management, Artifactory build systems, and Sentry. Internal subdomains identify at least four first names used: Ilia (ilia-local.developzilla[.]com, 192.168.118[.]36), Artem (exchange.artem.developzilla[.]com), Kate (kate-local.developzilla[.]com, 93.187.188[.]98), and Kirill (kirill-local.developzilla[.]com, 192.168.118[.]105). The presence of hub.developzilla[.]com (JetBrains Hub), tc.developzilla[.]com (TeamCity at 198.134.112[.]245), repo.developzilla[.]com (Artifactory), and sentry.developzilla[.]com confirms a full professional software development operation. Passive DNS for the operator’s historical IP 209.200.42[.]204 (Webair, 2018) reveals co-hosting with adsterratech[.]com, an Adsterra ad network infrastructure domain, indicating the operator’s involvement in ad tech infrastructure dates back to 2018.

The domain operated on legitimate hosting infrastructure (Servers[.]com, Webair) from 2014 through 2024. On January 7, 2026, the SOA record for developzilla[.]com resolved to 147.45.69[.]3, an IP in the 147.45.69[.]0/24 CIDR flagged by Augur with an importance score of 80 for malware, DNS hijacking, dnschanger, and TDS activity, predicted January 2024 and still valid. The nameserver cluster ns1-4.awsnameservers[.]com (legitimate AWS infrastructure) has served developzilla[.]com since March 2022 and through at least March 2026, and warrants further pivot analysis for additional campaign domains.

3.2 Aeza International BPH Connection

The 147.45.69[.]0/24 CIDR is hosted within Aeza International (AS210644), a bulletproof hosting provider sanctioned by the U.S. Government in July 2025. On February 3, 2026, Infoblox published research documenting Aeza as the host of a shadow DNS network and an HTTP-based TDS, both operational since mid-2022, operated by a financially motivated actor in the affiliate marketing space. The Infoblox report directly identified effectivegatecpm[.]com as a final ad delivery endpoint in the same redirect chain observed in this campaign, providing independent corroboration of the IOC set.

 

The Aeza TDS operates by compromising routers and changing DNS settings to route traffic to shadow resolvers hosted within Aeza's infrastructure. These resolvers selectively alter DNS responses, directing users to malicious content while evading detection via an EDNS0 restriction that causes queries from most security tools to return malformed responses. The system has been documented, altering DNS responses for high-value domains including shopify[.]com and okta[.]com.

3.3 Malware Co-delivery

Analysis of communicating files for sourshaped[.]com and skinnycrawlinglax[.]com reveals that the same infrastructure hosting this campaign’s Social Bar payloads is in active contact with confirmed malware samples. The named families represent CryptBot (credential and cookie stealer), IcedID (banking trojan and loader), NjRAT (remote access trojan), and Ryuk (ransomware). This infrastructure overlap does not confirm that campaign visitors were served these payloads, but it indicates the operator or their infrastructure is shared with actors deploying multi-stage malware. Organizations with high connection volumes to campaign IPs should treat this as an indicator warranting endpoint investigation, rather than solely a network-layer ad-fraud event.

3.4 Potential AiTM Exposure

The organization's exposure data observed by Augur reflects direct browser-initiated connections to the campaign infrastructure, consistent with users visiting lure sites such as clipzag[.]com, which loaded the malicious ad payload in their browsers. This is distinct from the router compromise vector documented by Infoblox in their February 3, 2026, research on the same Aeza-hosted TDS infrastructure.

The Infoblox report documents the same financially motivated operator and the same CPM backend (effectivegatecpm[.]com) as part of a separate but parallel campaign that compromises vulnerable SOHO and SMB routers, changes their DNS settings to Aeza-hosted shadow resolvers, and silently redirects all devices behind that router through the same TDS. That campaign has been active since mid-2022 and has been documented altering DNS responses for high-value domains, including shopify[.]com and okta[.]com.

The practical implication for organizations is twofold. First, the browser-delivered malvertising campaign documented here is the confirmed exposure vector for all the affected organizations. Second, organizations operating older router hardware at sites where high connection volumes to campaign IPs were observed should additionally verify their router DNS settings are not configured to use Aeza-hosted resolvers. If DNS resolver IPs in the 147.45.69.0/24 range are found on any edge device, that represents a separate router compromise incident requiring a distinct incident response track, as the threat actor in that scenario can alter DNS resolution for any domain on that network, not just deliver ads.

4. Organization’s Exposure

Augur observed connections to campaign infrastructure across multiple organizations, sectors, and regions, totaling 708,215 allowed outgoing connections across the full fast-flux IP pool. The figures below reflect the complete infrastructure set, including both primary entry-point IPs and the 16-node fast-flux pool. Campaign activity was first recorded in August 2023 and continued through March 27, 2026. The most affected sectors are Energy and Utilities and Banking and Government, while the MENA region accounts for 78.4% of total allowed outgoing connections. 

4.1 Sectors

Sector % Total Allowed Out
Energy and Utilities 55.1%
Banking 17.6%
Government 14.2%

4.2 By Region

Region % Total Allowed Out
MENA 78.4%
Americas 21.6%

5. Indicators of Compromise

5.1 IP Addresses

IP / CIDR Role / Notes Augur Prediction Importance
88.40.16[.]220/32 Entry point / HTML payload server (Eskimi DSP / MGID inventory) Yes (malware) 80
188.40.16[.]0/24 Shared Eskimi DSP subnet, multiple hosts predicted since 2009 Yes (malware) 30-80
172.240.108[.]76

TDS node, Fast Flux flagged

n/a n/a
172.240.108[.]68 Fast flux pool node n/a n/a
172.240.108[.]84 Fast flux pool node n/a n/a
172.240.108[.]92 Fast flux pool node n/a n/a
172.240.127[.]234 Fast flux pool node n/a n/a
172.240.127[.]242 Fast flux pool node n/a n/a
172.240.127[.]243 Fast flux pool node n/a n/a
172.240.127[.]244 Fast flux pool node n/a n/a
172.240.253[.]132 Fast flux pool node n/a n/a
192.243.59[.]12 Fast flux pool node n/a n/a
192.243.59[.]13 Fast flux pool node n/a n/a
192.243.59[.]20 Fast flux pool node n/a n/a

192.243.61[.]225

Fast flux pool node n/a n/a
192.243.61[.]227 Fast flux pool node n/a n/a
170.23.224[.]167 Fast flux pool node, active March 27, 2026 (200+ domains, including g9qnk89pd5ic[.]com cluster) n/a n/a
170.23.224[.]169 Fast flux pool node, active March 27, 2026 No n/a
147.45.69[.]3 Aeza BPH / developzilla[.]com SOA (Jan 7 2026), flagged dns_hijacking, dnschanger, TDS Yes (malware) 80

5.2 TDS Domains

Domain Role
agitatechampionship[.]com Primary TDS / invoke.js host, Fast Flux flagged
g9qnk89pd5ic[.]com Secondary TDS, 9-13/95 VT detections, 5 additional tokens

humpdecompose[.]com

Additional TDS node

dissolvedbrevityclog[.]com

Additional TDS node

gatetotrustednetwork[.]com

Additional TDS node

nlbign[.]com

Additional TDS node

5.3 Delivery and Payload Domains

Domain Role

sourshaped[.]com

Ad content delivery / sbar.json fingerprint endpoint
files.sourshaped[.]com

File delivery subdomain

securegtm.sourshaped[.]com GTM lookalike subdomain, likely used to blend beacon calls into analytics traffic
masawan.sourshaped[.]com Operator-facing or staging subdomain
skinnycrawlinglax[.]com Secondary redirect hop / Social Bar payload host
weirdopt.skinnycrawlinglax[.]com Subdomain on skinnycrawlinglax fast-flux pool
heartilyscales[.]com Delivery domain
directlycascade[.]com Delivery domain
creative-sb1[.]com Ad creative CDN
inexorablefowlsexperimental[.]com Publisher custom dedicated domain and active TDS node hosting invoke.js and Social Bar payloads

beggingload[.]com

Tracker/delivery domain
ljja3ef63g[.]com  Potential additional TDS node observed loading from movcr[.]to (213.196.2.1, Servers.com) 

5.4 Tracker and Analytics Domains

Domain Role

professionaltrafficmonitor[.]com

Impression/click tracking
protrafficinspector[.]com

Traffic analytics

preferencenail[.]com Behavioral targeting/user preference data
vmuid[.]com

User ID tracking

origunix[.]com Tracker
bvtpk[.]com Tracker

5.5 CPM Network Domains

Domain Role

effectivegatecpm[.]com

CPM network/ad delivery endpoint (confirmed by Infoblox)
protrafficinspector[.]com CPM network

revenuecpmgate[.]com

CPM network
cpmrevenuegate[.]com CPM network
effectiveratecpm[.]com CPM network
profitablecpmratenetwork[.]com CPM network
effectivecreativeformats[.]com CPM network
highperformanceformat[.]com CPM network
highperformancecpmgate[.]com CPM network (identified via VT passive DNS, active March 2026)
highrevenuenetwork[.]com  CPM network (identified via VT passive DNS, active March 2026)
variouscreativeformats[.]com CPM network (identified via VT passive DNS, active March 2026) 

topdisplaynetwork[.]com

 CPM network (identified via VT passive DNS, active March 2026)

5.6 Operator Infrastructure

Domain Role

developzilla[.]com

Operator organization domain (active since 2014)
sentry.developzilla[.]com Operator Sentry error tracking endpoint

hub.developzilla[.]com

JetBrains Hub (team identity management)
tc.developzilla[.]com TeamCity server (198.134.112.245)
repo.developzilla[.]com Artifactory build artifact repository
ilia-local.developzilla[.]com (192.168.118.36)
kate-local.developzilla[.]com (93.187.188.98)
kirill-local.developzilla[.]com (192.168.118.105)
adsterratech[.]com Co-hosted on operator IP 209.200.42.204 (Webair, 2018), Adsterra ad network infrastructure
inexorablefowlsexperimental[.]com Publisher custom dedicated domain / active TDS node, hosts invoke.js and Social Bar payloads directly
variouscreativeformats[.]com CPM network (identified via VT passive DNS, active March 2026) 

18eb246192ea9ed123b97c23c9107596

@sentry.developzilla[.]com/12

Operator Sentry DSN (hardcoded in all payload files)

5.7 Publisher Lure Sites

Domain Role

clipzag[.]com

Primary lure/esports content
movcr[.]to Lure site

omgupdate[.]in

Lure site
themezon[.]net Lure site
szchannel[.]org Lure site
leakimedia[.]com Lure site

5.8 File Hashes and Campaign Tokens

Type Value Notes
SHA256

9F2D6CA55916107386039941665397006E015BD8704

EFFD8F19CF941DE474BA9

Entry-point HTML payload
SHA256

5116018E21E4FC026E67B3620CC8F54F33FC3D07B

9C32008093D693313442E49

Secondary payload
MD5

a7c83fd5ab1383539270c151c2ccc5ae

Payload file

MD5

1ee3363d3f6736b5616821dca2afa5c7

sourshaped.com back-button JS
MD5 a2bf352f91ca51d1335bf2e255c3898a humpdecompose.com payload JS
MD5  a286902791a7f4c98bcb1e812322cd78  Payload file
 MD5  a032b4d33c8aea68a4f9b84235614bff  Payload file
 MD5  2200540f09f939738419313a1a090c32  Payload file
 MD5  fe4931208422d05ac05401d4e2a57880  Payload file
 MD5  df956acf7504e2a2062bd048ba4a06be  Payload file
 MD5  4dd57aa2d59953cff475a25a08e2bf3d  Payload file
 MD5  0749a3fcd934f59c2532ab19ea1ef9d2  Payload file
 Token  71b88c4ea340cafbeb941dc395dc3b83 MGID campaign publisher token (primary, clipzag[.]com placement)
 Token  a215683d2d0ce8fecd54e01b99606d75  g9qnk89pd5ic[.]com token
 Token  2275853edac3d8798b7991d5ddc2ba3f  g9qnk89pd5ic[.]com token
 Token  d806a29510790b78494135fdf25571b4  Secondary TDS token
 Token 5ddf19d5f22f7d089406a77f683e4977  Secondary TDS token
 Token  99bde3bc309be827fb01bdc5fe4d7069  Secondary TDS token
 Token  556603b488fef6f3ad9f8ae5d0bab1e9  humpdecompose[.]com token
 Token  af370454ef79526fb772bb377344d5dd  Secondary TDS token
 Token  b648a205580b76be42b5b5f563c4f705  dissolvedbrevityclog[.]com token
 Token  94f80bc750e2f7ff25b1787c91c5a09e  invoke.js token on inexorablefowlsexperimental[.]com
 Token  eebd3061cf0577a2fdafa2f9030cae3b  Second invoke.js token on inexorablefowlsexperimental[.]com
 Token  b96781136f41f8fb859b888f711cae45  Active campaign key observed in live sbar.json calls, March 2026
 psid 6cae5fa1b1d66cfb59ee214d48d2c126  Publisher session ID, variant 1
 psid  6286110dd28b09ee205d70fa100d2ec0  Publisher session ID, variant 2
 Placement  pl22317432.effectivegatecpm[.]com  CPM placement ID, variant 1
 Placement  4dbee55e59fc95ea4356dbb197f2132c  Placement key, variant 2
 Sentry DSN

18eb246192ea9ed123b97c23c9107596

@sentry.developzilla[.]com/12

Operator Sentry DSN (hardcoded in all payload files) 

5.9 Observed URLs

URL (defanged) Category
hxxp://agitatechampionship[.]com/ Domain root
hxxp://agitatechampionship[.]com/09b53caab8f4c5bc0f4ae366797e07bd/invoke[.]js invoke.js payload delivery
hxxp://agitatechampionship[.]com/1a920669578a8aaa03443537658654fc/invoke[.]js invoke.js payload delivery
hxxp://agitatechampionship[.]com/4b5fdd79c5050ac97cf266416a9d3a44/invoke[.]js invoke.js payload delivery
hxxp://agitatechampionship[.]com/5f/90/8c/5f908c96c15c81ceb4ff8c24b330c3f4[.]js Payload JS
hxxp://agitatechampionship[.]com/6f4b73101d4dbc507705f10f9c543753/invoke[.]js invoke.js payload delivery

hxxp://agitatechampionship[.]com/73b2810c7f1341c580ee45b9d5a893f0/invoke[.]js

invoke.js payload delivery
hxxp://agitatechampionship[.]com/9268754bba8c42a2fd7ddd7670e55011/invoke[.]js invoke.js payload delivery
hxxp://agitatechampionship[.]com/98/5a/c5/985ac55e9a1caa73c9e07b29d93b791f[.]js Payload JS
hxxp://agitatechampionship[.]com/db/33/68/db33684d1a0a109929a23a46217e6ef3[.]js Payload JS
hxxp://agitatechampionship[.]com/dc6648cdcd908c45ea4b20d1f9a4a442/invoke[.]js invoke.js payload delivery
hxxp://agitatechampionship[.]com/f0/0b/78/f00b7851b6f0c58b94644f7f368df268[.]js Payload JS
hxxp://beggingload[.]com/

Domain root

hxxp://clipzag[.]com/

Domain root

hxxp://cpmrevenuegate[.]com/

Domain root

hxxp://creative-sb1[.]com/

Domain root

hxxp://effectivecreativeformats[.]com/

Domain root

hxxp://effectivegatecpm[.]com/

Domain root

hxxp://effectiveratecpm[.]com/

Domain root

hxxp://g9qnk89pd5ic[.]com/

Domain root

hxxp://gatetotrustednetwork[.]com/

Domain root

hxxp://heartilyscales[.]com/

Domain root

hxxp://heartilyscales[.]com/a2/86/90/a286902791a7f4c98bcb1e812322cd78[.]js Payload JS
hxxp://highperformancecpmgate[.]com/

Domain root

hxxp://highperformanceformat[.]com/

Domain root

hxxp://highrevenuenetwork[.]com/

Domain root

hxxp://humpdecompose[.]com/

Domain root

hxxp://preferencenail[.]com/

Domain root

hxxp://skinnycrawlinglax[.]com/

Domain root

hxxp://skinnycrawlinglax[.]com/favicon[.]ico

Domain asset

hxxp://skinnycrawlinglax[.]com/watch[.]557607277313[.]jskey=ae48f0b770d203555914

2c08aecd80d3&kw=%5B%5D&refer=hxxps%3A%2F%2Ffilecrypt[.]cc%2FContainer%2

FF27237D471[.]html&tz=9&dev=r&res=14[.]31&uuid=7a92b0e8-03ba-4555-b64e-

9c5528b0b91f%3A3%3A1

Redirect / tracking
hxxp://skinnycrawlinglax[.]com:443/ Domain root

hxxp://sourshaped[.]com/a33eebc5uyzgyiy=76&refer=hxxps%3A%2F%2

Fleakimedia[.]com&key=649d303fa27fbd50ddb3d5ae05822ca6&psid=leakimedia

[.]com&sub3=invoke_layer&dev=r

Redirect / tracking

hxxp://sourshaped[.]com/wwu5uwf8z1?jzo=21&refer=hxxps%3A%2F%2Fvideo

[.]bestjavporn[.]com&key=66b24b3ddfdfb70ca07badf9a8b997d1&dev=r

Redirect / tracking
hxxp://topdisplaynetwork[.]com/ Domain root
hxxp://topdisplaynetwork[.]com/dd/3a/e2/dd3ae270a2667560cc75296c2fa89c27[.]js Payload JS
hxxp://variouscreativeformats[.]com/ Domain root
hxxp://variouscreativeformats[.]com/101b11fdb16214056b5a03ff198997e3/invoke[.]js

invoke.js payload delivery

hxxp://variouscreativeformats[.]com/164f9f696263b2a3323c32a52e797abb/invoke[.]js

invoke.js payload delivery

hxxp://variouscreativeformats[.]com/1d9bdbe764489c88b94a85b4691704c4/invoke[.]js

invoke.js payload delivery

hxxp://variouscreativeformats[.]com/523590023dd10db13e959a9ca82e1d97/invoke[.]js

invoke.js payload delivery

hxxp://variouscreativeformats[.]com/809ac2cf0dc55b7f8d798ff0c48400c7/invoke[.]js

invoke.js payload delivery

hxxp://variouscreativeformats[.]com/d292a10de9a4f30c21f5daa3509d77f9/invoke[.]js

invoke.js payload delivery

hxxps://agitatechampionship[.]com/ Domain root
hxxps://agitatechampionship[.]com/796049a0de135b31db20f3be98163138/invoke[.]js invoke.js payload delivery
hxxps://bvtpk[.]com/tag[.]min[.]js Ad tag script
hxxps://clipzag[.]com/watch?v=mBxMj2CkOnI TDS watch endpoint
hxxps://cpmrevenuegate[.]com/ Domain root
hxxps://creative-sb1[.]com/ Domain root
hxxps://effectivegatecpm[.]com/ Domain root

hxxps://effectiveratecpm[.]com/ebn0ydzkbr? key=989241c5734f5cbc6a9ce1ec572f1789&psid=worker

Redirect / tracking
hxxps://g9qnk89pd5ic[.]com/  Domain root

hxxps://heartilyscales[.]com/

 Domain root
 hxxps://highperformanceformat[.]com/  Domain root
 hxxps://highrevenuenetwork[.]com/  Domain root
 hxxps://preferencenail[.]com/  Domain root
 hxxps://professionaltrafficmonitor[.]com/  Domain root
 hxxps://profitableratecpm[.]com/  Domain root
 hxxps://revenuecpmgate[.]com/  Domain root
 hxxps://skinnycrawlinglax[.]com/  Domain root
hxxps://skinnycrawlinglax[.]com/api/users?token=LzZhN2E2MjI1P2tleT0yMDF

mYzIzYzdlY2EwOWQ1Y2FkOWNiYjQ2N2E2YTk0MiZzdWJtZXJpYz1OTNEzMTA0

 TDS API
hxxps://skinnycrawlinglax[.]com/dnn2hkn8?key=305101d66cd36c4a78b3655b260865ae&psid=2cf5a53fc28e1abef91b5d7221bf0ccc Redirect / tracking
 hxxps://skinnycrawlinglax[.]com/pixel/puclc  Pixel tracking
hxxps://skinnycrawlinglax[.]com/pixel/purst  Pixel tracking

hxxps://skinnycrawlinglax[.]com/watch[.]1650103253336?key=477d8f0155fbf9

ce390a0435553c48ac&refer=hxxps%3A%2F%2Fmovieswatch[.]store&tz=-3&dev=r

Redirect / tracking
hxxps://sourshaped[.]com/pg8yrgkr74?xkjbxld=29&refer=hxxps%3A%2F%2Ftododescar[.]

blogspot[.]com&key=caba729dc45ebacf5fdc338562a3ac0a&sub3=invoke_layer&dev=r

Redirect / tracking
 hxxps://sourshaped[.]com/pixel/sbe?t=1&error=external-error  Pixel tracking

hxxps://sourshaped[.]com/watch[.]361756313306?key=57ee57c2e047d2075f8b6b

3808a144ff&refer=hxxps%3A%2F%2Fafuncan[.]com%2F&tz=8&dev=r

Redirect / tracking
hxxps://sourshaped[.]com/watch[.]443185914779[.]js Redirect / tracking

hxxps://sourshaped[.]com/watch[.]721384025046?key=1fc79af1d69e13e38c5b32a

002b77636&refer=hxxps%3A%2F%2Fww4[.]site%2Fbflix%2F&tz=8&dev=r

Redirect / tracking
   

6. Recommendations

6. 1 Immediate Blocking

  • Block 188.40.16[.]220 and 172.240.108[.]76 at perimeter firewall. Note: 188.40.16[.]220 is part of the shared Eskimi DSP ad tech infrastructure; blocking it may affect legitimate ad network traffic.
  • Block the full fast-flux IP pool at perimeter: 172.240.108[.]68/84/92, 172.240.127[.]234/242/243/244, 172.240.253[.]132, 192.243.59[.]12/13/20, 192.243.61[.]225/227, 170.23.224[.]167/169.
  • Block 147.45.69[.]0/24 (Aeza BPH TDS network, sanctioned entity, confirmed malware/dns_hijacking/tds).
  • Add all IOC domains to DNS blocklists, with priority on: agitatechampionship[.]com, sourshaped[.]com, skinnycrawlinglax[.]com, effectivegatecpm[.]com, developzilla[.]com, sentry.developzilla[.]com. 

6.2 Priority Investigation: Router Compromise

  • For organizations with high connection volumes to campaign IPs, initiate router integrity checks to rule out Aeza-linked DNS hijacking. Verify DNS resolver settings on all edge devices and check for unauthorized resolver IPs in 147.45.69[.]0/24.
  • Query for DNS lookups to the Aeza shadow resolver range from client network logs. Use dig +noedns to test resolvers if a live investigation is required.
  • For any organizations where DNS resolver tampering is confirmed, escalate from ad fraud to AiTM incident response protocol, as the threat actor is documented to alter DNS for okta[.]com, shopify[.]com, and similar critical services.

6.3 Abuse Reporting and CPM Network

  • Report MGID publisher token 71b88c4ea340cafbeb941dc395dc3b83 to MGID Trust and Safety.
  • Report inexorablefowlsexperimental[.]com to registrar for takedown, as this domain functions as a dedicated publisher placement domain for the campaign.

6.4 Ongoing Monitoring

  • Fast-flux TDS infrastructure requires periodic IP blocklist refresh. Recommend monitoring agitatechampionship[.]com, g9qnk89pd5ic[.]com, & sourshaped[.]com for new resolution IPs weekly.
  • Monitor awsnameservers[.]com for additional domains hosted on that nameserver cluster, as it likely serves additional campaign infrastructure beyond developzilla[.]com.
  • Pivot on Sentry DSN project ID 12 at sentry.developzilla[.]com if access to related infrastructure becomes available, as it may reveal additional campaign projects.

For questions or additional analysis, contact: research@augursecurity.com

The Augur Difference. Let Us Prove It To You.

Experience firsthand the benefits of preemptive cyber defense with a quick proof of value (POV). We can have you up and running in less than a day, and after 30 days, get an Augur report detailing:

  • Threats Augur identified
  • Advance warning timelines
  • Data-driven insight on alert reduction and improved SOC efficiency

Click here to talk to an Augur specialist now