HomeCyber BalkansHackers use DNS MX Records to Create Fake Logins for 100+ Brands

Hackers use DNS MX Records to Create Fake Logins for 100+ Brands

Published on

spot_img

Researchers in the cybersecurity field have uncovered a complex phishing platform known as “Morphing Meerkat” that operates as a phishing-as-a-service (PhaaS) tool. This platform is designed to mimic over 100 different well-known brands by leveraging DNS mail exchange (MX) records. These records are used to tailor phishing pages to closely resemble the login pages of various email service providers, enhancing the authenticity of the phishing campaigns.

Since it was first identified in January 2020, Morphing Meerkat has been utilizing advanced tactics to avoid detection and increase the success rate of its phishing attacks. One of the key strategies employed by the platform is its innovative use of DNS MX records. By querying a victim’s email domain through DNS over HTTPS (DoH) services like Cloudflare and Google, Morphing Meerkat can create customized phishing templates that closely match the victim’s email service provider, leading to a more convincing and personalized phishing experience.

With a library of at least 114 unique email brand and login designs, Morphing Meerkat is able to accurately spoof a wide range of email services, allowing for highly targeted phishing campaigns on a large scale. This increases the likelihood of successful credential theft, as unsuspecting users are more likely to fall victim to these tailored phishing attempts.

In addition to its use of DNS MX records, Morphing Meerkat also incorporates multiple evasion techniques to evade threat analysis and bypass phishing protection systems. These techniques include code obfuscation, the inflation of script size with non-functional code, and the exploitation of open redirects on adtech infrastructure. The platform also leverages client-side email libraries and messaging app APIs to extract stolen credentials, making detection more challenging for cybersecurity professionals.

Furthermore, Morphing Meerkat has a global reach, with the capability to dynamically translate phishing content into over a dozen languages depending on the victim’s browser settings. This, coupled with the use of compromised WordPress sites and free web hosting services for distribution, allows the attackers behind Morphing Meerkat to target users worldwide effectively.

The discovery of Morphing Meerkat underscores the increasing sophistication of phishing attacks and emphasizes the importance of implementing strong DNS security measures. Organizations are urged to strengthen their DNS controls, restrict access to non-essential services, and educate users about the dangers of phishing attempts that closely mirror legitimate login pages.

As cybersecurity threats continue to evolve, it is crucial for organizations to stay vigilant and take proactive measures to protect against the ever-changing landscape of cyber attacks. With the prevalence of tools like Morphing Meerkat, it is clear that cybersecurity professionals must remain diligent in their efforts to safeguard sensitive information and prevent falling victim to malicious actors.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...