Cybersecurity researchers have found a classy phishing-as-a-service (PhaaS) platform, dubbed “Morphing Meerkat,” that leverages DNS mail alternate (MX) information to dynamically serve tailor-made phishing pages mimicking over 100 manufacturers.
The platform, which has been operational since not less than January 2020, employs a variety of superior methods to evade detection and maximize the effectiveness of its phishing campaigns.
DNS Abuse and Dynamic Content material Supply
On the core of Morphing Meerkat’s operation is its modern use of DNS MX information.
The platform queries the MX file of a sufferer’s e-mail area utilizing DNS over HTTPS (DoH) companies from suppliers like Cloudflare and Google.
It then makes use of this data to dynamically load a phishing template that intently matches the sufferer’s e-mail service supplier, making a extra convincing and personalised phishing expertise.

The PhaaS platform maintains a library of not less than 114 distinctive e-mail model and login designs, permitting it to precisely spoof a variety of e-mail companies.
This system permits the attackers to conduct extremely focused phishing campaigns at scale, growing the chance of profitable credential theft.
Evasion Strategies and International Attain
Morphing Meerkat employs a number of safety evasion options to hinder risk evaluation and bypass phishing safety techniques.


In accordance with the Report, these embrace code obfuscation, inflation of script dimension with non-functional code, and exploitation of open redirects on adtech infrastructure.
The platform additionally makes use of client-side e-mail libraries and messaging app APIs to exfiltrate stolen credentials, making detection tougher.
The PhaaS operation has a world attain, with the flexibility to dynamically translate phishing content material into over a dozen languages based mostly on the sufferer’s browser settings.
This multilingual functionality, mixed with the usage of compromised WordPress websites and free webhosting companies for distribution, permits the attackers to focus on customers worldwide successfully.
The invention of Morphing Meerkat highlights the evolving sophistication of phishing assaults and the necessity for enhanced DNS safety measures.
Organizations are suggested to implement robust DNS controls, restrict entry to non-essential companies, and educate customers in regards to the dangers of phishing makes an attempt that will intently mimic authentic login pages.
Are you from SOC/DFIR Groups? – Analyse Malware, Phishing Incidents & get stay Entry with ANY.RUN -> Begin Now for Free.