Cybersecurity researchers have found a classy phishing-as-a-service (PhaaS) platform, dubbed “Morphing Meerkat,” that leverages DNS mail trade (MX) data to dynamically serve tailor-made phishing pages mimicking over 100 manufacturers.
The platform, which has been operational since a minimum of January 2020, employs a variety of superior strategies to evade detection and maximize the effectiveness of its phishing campaigns.
DNS Abuse and Dynamic Content material Supply
On the core of Morphing Meerkat’s operation is its modern use of DNS MX data.
The platform queries the MX report of a sufferer’s electronic mail area utilizing DNS over HTTPS (DoH) providers from suppliers like Cloudflare and Google.
It then makes use of this info to dynamically load a phishing template that intently matches the sufferer’s electronic mail service supplier, making a extra convincing and customized phishing expertise.


The PhaaS platform maintains a library of a minimum of 114 distinctive electronic mail model and login designs, permitting it to precisely spoof a variety of electronic mail providers.
This system allows the attackers to conduct extremely focused phishing campaigns at scale, rising the chance of profitable credential theft.
Evasion Methods and World Attain
Morphing Meerkat employs a number of safety evasion options to hinder menace evaluation and bypass phishing safety programs.


In line with the Report, these embrace code obfuscation, inflation of script measurement with non-functional code, and exploitation of open redirects on adtech infrastructure.
The platform additionally makes use of client-side electronic mail libraries and messaging app APIs to exfiltrate stolen credentials, making detection tougher.
The PhaaS operation has a worldwide attain, with the flexibility to dynamically translate phishing content material into over a dozen languages primarily based on the sufferer’s browser settings.
This multilingual functionality, mixed with the usage of compromised WordPress websites and free hosting providers for distribution, permits the attackers to focus on customers worldwide successfully.
The invention of Morphing Meerkat highlights the evolving sophistication of phishing assaults and the necessity for enhanced DNS safety measures.
Organizations are suggested to implement sturdy DNS controls, restrict entry to non-essential providers, and educate customers concerning the dangers of phishing makes an attempt that will intently mimic reputable login pages.
Are you from SOC/DFIR Groups? – Analyse Malware, Phishing Incidents & get dwell Entry with ANY.RUN -> Begin Now for Free.