Meerkat Mayhem: Phishing-as-a-Service Unleashed

Morphing Meerkat spoofs over 100 brands and steals credentials

DUBAI, UAE, 2nd April, 2025: Infoblox Threat Intel has uncovered a highly sophisticated Phishing-as-a-Service (PhaaS) platform that poses a significant threat to businesses globally.

The threat actor behind these campaigns, dubbed “Morphing Meerkat”, creatively employs DNS mail exchange (MX) records to dynamically serve fake login pages, spoofing over 100 brands, and steal login credentials this way.

When a victim clicks on a phishing link, the phishing kit queries the MX record of the victim’s email domain to determine their email service provider. Based on the MX record, the phishing kit dynamically serves a fake login page that looks similar to the victim’s real email service provider’s login page, making the phishing attempt more convincing.

Morphing Meerkat is a highly effective and dangerous threat actor giving other attackers access to a sophisticated phishing kit that checks a lot of boxes for cyber criminals:

· Credential Theft: Once victims enter their login credentials on the fake page, Morphing Meerkat steals the credentials and sends them to the cybercriminals.

· Redirection: To avoid suspicion, the phishing kit often redirects the victim to the real login page of their email service provider after a couple of failed login attempts.

· Global Reach: The phishing kit can translate the fake login pages into multiple languages, targeting users worldwide.

· Individual bait: The use of MX records to dynamically serve tailored phishing pages makes the phishing attempts more convincing.

· Evasion Techniques: The platform employs various evasion techniques to bypass traditional security systems, such as using open redirects on adtech servers and obfuscating code to hinder analysis.

· Scalability: As a PhaaS platform, it allows even non-technical cybercriminals to launch large-scale phishing campaigns, making it a significant threat.

When cybercriminals get hold of login credentials through a phishing scam like Morphing Meerkat, the impact can be severe, especially for enterprises. With these credentials, they can infiltrate corporate networks, steal sensitive data, and even launch further attacks. This can lead to significant financial losses, reputational damage, and legal liabilities for businesses. Additionally, compromised accounts can be used to send phishing emails to other employees or clients, spreading the attack further and causing widespread disruption.

Visibility and monitoring are essential for effective enterprise security. Morphing Meerkat exemplifies how cybercriminals exploit security blind spots using advanced techniques like DNS cloaking and open redirects. Organizations can protect themselves against these kinds of attacks by adding a strong layer of DNS security to their systems. This involves tightening DNS control so that users cannot communicate with DoH servers or blocking user access to adtech and file sharing infrastructure not critical to the business. If companies can reduce the number of unimportant services in their network, they can reduce their attack surface, giving fewer options to cybercriminals for threat delivery.

Leave a Reply

Your email address will not be published. Required fields are marked *