CISA mixup of IOC domains
Google's Threat Intelligence Group (GTIG) and Mandiant's recent Disrupting the GRIDTIDE Global Cyber Espionage Campaign report is great and it has lots of good Indicators of Compromise (IOC). Many of these IOCs had already been shared by CISA last year as part of their Alert AA25-141A titled "Russian GRU Targeting Western Logistics Entities and Technology Companies". The IOC overlap between these two reports is surprisingly big, provided that the GTIG report covers a Chinese espionage group while the CISA report covers the Russian GRU unit 26165 (aka APT28 / Fancy Bear).
But some of the domain names in CISA's report from last year are strange. For example, the domain name "accesscan[.]org" doesn't seem to ever have been registered. The GTIG report, however, contains the very similar domain "accesscam[.]org". This accesscam domain is registered to the dynamic DNS provider Dynu Systems, whose services are often abused by malicious actors. Is it possible that there are typos in the IOCs published by CISA? I think so.
Another odd domain in CISA's AA25-141A is "glize[.]com", which I suspect is a typo from either "giize[.]com" or "gleeze[.]com". The two latter domains are listed in the GTIG report and both of them also belong to the dynamic DNS provider Dynu Systems. The domain listed in CISA's alert, on the other hand, appears to be a legit website (archived page from 2024) from the marketing company Glize in Malta.
Glize's website seems to have disappeared sometime in 2025.
Update 2026-02-27
The IOC list published by CISA originates from cybersecurity advisory 157019-25 / PP-25-2107, which was created as a joint effort by the following 21 organizations:
- United States National Security Agency (NSA)
- United States Federal Bureau of Investigation (FBI)
- United Kingdom National Cyber Security Centre (NCSC-UK)
- Germany Federal Intelligence Service (BND)
- Germany Federal Office for Information Security (BSI)
- Germany Federal Office for the Protection of the Constitution (BfV)
- Czech Republic Military Intelligence (VZ)
- Czech Republic National Cyber and Information Security Agency (NÚKIB)
- Czech Republic Security Information Service (BIS)
- Poland Internal Security Agency (ABW)
- Poland Military Counterintelligence Service (SKW)
- United States Cybersecurity and Infrastructure Security Agency (CISA)
- United States Department of Defense Cyber Crime Center (DC3)
- United States Cyber Command (USCYBERCOM)
- Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)
- Canadian Centre for Cyber Security (CCCS)
- Danish Defence Intelligence Service (DDIS)
- Estonian Foreign Intelligence Service (EFIS)
- Estonian National Cyber Security Centre (NCSC-EE)
- French Cybersecurity Agency (ANSSI)
- Netherlands Defence Intelligence and Security Service (MIVD)
It is therefore unclear which organization(s) reported the erroneous IOCs as well as who were responsible for verifying them before publication.
In summary, these are the incorrect and correct IOC domains:
- Incorrect IOC:
*.accesscan[.]org(not registered) - Correct IOC: *.accesscam[.]org (registered by Dynu Systems)
- Incorrect IOC:
*.glize[.]com(legitimate website, now closed) - Correct IOC: *.giize[.]com (registered by Dynu Systems)
- Correct IOC: *.gleeze[.]com (registered by Dynu Systems)
Posted by Erik Hjelmvik on Thursday, 26 February 2026 09:35:00 (UTC/GMT)
Tags: #IOC