Threat analysis by The RabitaNoor (RBTN) Cyber Research Center
The goals of this document is to provide technical and strategic analysis of a much larger document, audio etc.
The document is a product of the RBTN - CYOI Pulpit
Photo by Yeshi Kangrang
The article discusses a new phishing-as-a-service platform called Morphing Meerkat, which uses DNS MX records to create fake login pages mimicking 114 brands. The threat actor exploits open redirects on adtech infrastructure and uses compromised domains for phishing distribution. Stolen credentials are distributed via Telegram. The phishing kit dynamically translates content into multiple languages and employs anti-analysis measures. Cloudflare R2 is used to host fake login pages, and the phishing messages are distributed using compromised WordPress sites and open redirect vulnerabilities on platforms like DoubleClick.
Timestamp: 2025-03-27
Title: Morphing Meerkat Phishing Kit Exploits DNS MX Records to Mimic 114 Brands
Severity: High
The Morphing Meerkat phishing kit represents a sophisticated adversary leveraging DNS MX records to mimic 114 brands. The capability includes dynamic content translation and anti-analysis measures. The infrastructure involves compromised WordPress sites and Cloudflare R2 for hosting. Victims are targeted globally, with a focus on credential theft.
Adversary: The threat actor behind Morphing Meerkat is sophisticated, leveraging DNS MX records and open redirects for targeted phishing attacks.
Motivation: Credential theft and data exfiltration
Sophistication: High
TTPs:
Capability: The phishing kit can mimic 114 brands and dynamically translate content into multiple languages.
Tools: Phishing kit, Telegram
Evasion: Anti-analysis measures, Obfuscation
Description: The infrastructure includes compromised WordPress sites, Cloudflare R2 for hosting, and Telegram for communication.
Domains: Compromised domains
Hosting Providers: Cloudflare
Communication Protocols: Telegram
Targets: Victims are users of the 114 brands mimicked by the phishing kit, targeted globally.
Industry: Various
Assets: Email credentials
Data at Risk: Email credentials
Impact: High