New Morphing Meerkat Phishing Kit Mimics 114 Brands Using Victims’ DNS Email Records

0
137
New Morphing Meerkat Phishing Kit Mimics 114 Brands Using Victims’ DNS Email Records


Mar 27, 2025Ravie LakshmananEmail Security / Malware

New Morphing Meerkat Phishing Kit Mimics 114 Brands Using Victims’ DNS Email Records

Cybersecurity researchers have make clear a brand new phishing-as-a-service (PhaaS) platform that leverages the Domain Name System (DNS) mail alternate (MX) data to serve pretend login pages that impersonate about 114 manufacturers.

DNS intelligence agency Infoblox is monitoring the actor behind the PhaaS, the phishing equipment, and the associated exercise below the moniker Morphing Meerkat.

“The menace actor behind the campaigns typically exploits open redirects on adtech infrastructure, compromises domains for phishing distribution, and distributes stolen credentials by a number of mechanisms, together with Telegram,” the corporate stated in a report shared with The Hacker News.

Cybersecurity

One such marketing campaign leveraging the PhaaS toolkit was documented by Forcepoint in July 2024, the place phishing emails contained hyperlinks to a purported shared doc that, when clicked, directed the recipient to a pretend login web page hosted on Cloudflare R2 with the tip objective of accumulating and exfiltrating the credentials through Telegram.

Morphing Meerkat is estimated to have delivered 1000’s of spam emails, with the phishing messages utilizing compromised WordPress web sites and open redirect vulnerabilities on promoting platforms like Google-owned DoubleClick to bypass safety filters.

It’s additionally able to translating phishing content material textual content dynamically into over a dozen totally different languages, together with English, Korean, Spanish, Russian, German, Chinese, and Japanese, to focus on customers internationally.

In addition to complicating code readability through obfuscation and inflation, the phishing touchdown pages incorporate anti-analysis measures that prohibit the usage of mouse right-click in addition to keyboard hotkey mixtures Ctrl + S (save the net web page as HTML), Ctrl + U (open the net web page supply code).

Cybersecurity

But what makes the menace actor really stand out is its use of DNS MX data obtained from Cloudflare or Google to establish the sufferer’s electronic mail service supplier (e.g., Gmail, Microsoft Outlook, or Yahoo!) and dynamically serve pretend login pages. In the occasion, that the phishing equipment is unable to acknowledge the MX file, it defaults to a Roundcube login web page.

“This assault methodology is advantageous to dangerous actors as a result of it permits them to hold out focused assaults on victims by displaying internet content material strongly associated to their electronic mail service supplier,” Infoblox stated. “

“The total phishing expertise feels pure as a result of the design of the touchdown web page is in keeping with the spam electronic mail’s message. This method helps the actor trick the sufferer into submitting their electronic mail credentials through the phishing internet type.”

Found this text fascinating? Follow us on Twitter and LinkedIn to learn extra unique content material we put up.

LEAVE A REPLY

Please enter your comment!
Please enter your name here