Mastodon

A recent article by Trend Micro (trendmicro.com/fr_fr/research/26/a/watering-hole-attack-targets-emeditor-users.html, published at Jan 22, 2026) about the EmEditor (emeditor.com) supply chain attack caught our attention, as watering hole attacks are rather rare.

Stormshield's CTI Team investigated the shared indicators and found enough material to extend Trend Micro's article.

Investigation

The following table is a reminder of the indicators provided in the Trend Micro's report. Since we started following these addresses, we noticed some changes on Friday, 6th of February, 2026 (highlighted in blue):

Domains with similar names
Previous IP addresses
Current IP addresses
emeditorjp[.]com
5[.]101.82.159
5[.]101.82.118
emeditorgb[.]com
5[.]101.82.159
5[.]101.82.159
emeditorde[.]com
46[.]28.70.245
46[.]28.70.245

Looking at passive DNS resolution, we found the following additional resolutions matching these IPs:

Previous IP addresses
Current IP addresses
Other domains with similar names
5[.]101.82.159
5[.]101.82.118
emeditorjapan[.]com
5[.]101.82.159
5[.]101.82.118
emedorg[.]com
5[.]101.82.159
5[.]101.82.159
emeditorltd[.]com
46[.]28.70.245
46[.]28.70.245
emedjp[.]com

All domains show the same pattern:

  • A domain name starting with emed characters, masquerading as a domain related to EmEditor
  • A .com TLD (Top Level Domain)
  • Registration through NameSilo LLC on 22nd of December, 2025
  • NS records pointing to ns1.dnsowl[.]com, ns2.dnsowl[.]com or ns3.dnsowl[.]com

As we can see, not all IP addresses changed.

Pivoting

Using Validin (validin.com/), we found that the response banner for emeditorde[.]com is particular because some headers are duplicated:

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 23 Dec 2025 22:40:29 GMT
Content-Type: text/plain; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
vary: Accept-Encoding
content-encoding: gzip
Strict-Transport-Security: max-age=63072000
Content-Security-Policy: frame-ancestors 'self';
X-Content-Type-Options: nosniff
Strict-Transport-Security: max-age=63072000
Content-Security-Policy: frame-ancestors 'self';
X-Content-Type-Options: nosniff

Going further with Validin, we found that the domain emeditorde[.]com exposed HTTP headers hashed as b97d5024adab17ceffe134f9ea877bf5 and some other domains also share this behavior:

  • n8n.kraski-event[.]ru (with a known URL https://n8n.kraski-event[.]ru:443/gate/start/e805d522): b97d5024adab17ceffe134f9ea877bf5
  • keyactivate[.]cc (with a known URL https://keyactivate[.]cc:443/gate/start/e805d522): b97d5024adab17ceffe134f9ea877bf5

At the time of the investigation, both domains resolved to the same IP: 64[.]188.83.146. Unfortunately, both domains gave a 1-byte answer, so we could not go further.

We expanded our research on VirusTotal, with a search for URLs similar to the one described in the Trend Micro's report. We could not find anything else related to URL portion "/gate/init" (used by the C2 server cachingdrive[.]com, as mentioned by Trend Micro). However, we found another domain with the query entity:url path:/gate/start/ which pivots onto hxxp://nc7d8p7u8j3n4hgm[.]com/gate/start/efeb550a.

Domain
Resolves to IP address
nc7d8p7u8j3n4hgm[.]com
185[.]82.218.112

This domain was registered on 19th October 2025 through NameCheap and has NS records pointing to dns1.registrar-servers[.]com / dns2.registrar-servers[.]com.

The URL delivers a PowerShell script, just like the infection chain reported by TrendMicro. The script uses the same obfuscation schemes that the ones in the initial report, and the URL is hxxps://nc7d8p7u8j3n4hgm.com/gate/init/efeb550a/{MACHINEGUID}.

We assess with high confidence that this domain is an early stage for the EmEditor campaign, as it shares the same inner workings: a PowerShell script with the hash ceb31976b8040cad5d5db3856466d198d3c0ea5bc904ae05c509b3b6de72e1c8.

Conclusion

Putting all the information together, we finally get this table:

Types
Resolve to IP addresses
Domain names
Hashes
New since Trend Micro's article?
Confidence
Domain
emeditorjp[.]com
5[.]101.82.118
-
No
High
Domain
emeditorjapan[.]com
5[.]101.82.118
-
Yes
High
Domain
emedorg[.]com
5[.]101.82.118
-
Yes
High
Domain
emeditorgb[.]com
5[.]101.82.159
-
No
High
Domain
emeditorltd[.]com
5[.]101.82.159
-
Yes
High
Domain
emeditorde[.]com
46[.]28.70.245
-
No
High
Domain
emedjp[.]com
46[.]28.70.245
-
Yes
High
Domain
n8n.kraski-event[.]ru
64[.]188.83.146
-
Yes
High
Domain
keyactivate[.]cc
64[.]188.83.146
-
Yes
High
Domain
nc7d8p7u8j3n4hgm[.]com
185[.]82.218.112
-
Yes
High
File
-
-
ceb31976b8040cad5d5db3856466d198_
d3c0ea5bc904ae05c509b3b6de72e1c8
Yes
High

All this information proves that the attackers continued their activities even after being exposed by Trend Micro. Every customer using either Stormshield Network Security’s IP reputation or Breach Fighter is already protected from this threat.

Thanks for reading us.

Share on

[juiz_sps buttons="facebook, twitter, linkedin, mail"]
About the author
mm
Stormshield Customer Security Lab