Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Meerkats Shapeshift to Steal Logins
Facebook   X   LinkedIn   Email

Meerkats Shapeshift to Steal Logins

May 4, 2025

Morphing Meerkat is a recently identified phishing-as-a-service (PhaaS) platform that employs advanced techniques to deceive users and steal credentials. Discovered by cybersecurity firm Infoblox, this platform exploits Domain Name System (DNS) mail exchange (MX) records to dynamically generate fake login pages, impersonating over 100 brands, including Gmail, Outlook, AOL, Office 365, and Yahoo.

The attack initiates when a victim clicks on a malicious link embedded in a phishing email. Eventually, the click leads the victim through compromised domains to the final phishing site. Once there, the phishing kit determines the email domain being used. This process determines the victim's email service provider, enabling the kit to present a counterfeit login page that closely resembles the legitimate one, complete with the user's email address pre-filled to enhance authenticity, and simplify it for the user.



Morphing Meerkat's manages to conceal its DNS queries within encrypted HTTPS traffic, making detection challenging for traditional security tools. Additionally, the platform can dynamically translate phishing content into multiple languages, broadening its reach and effectiveness globally. Stolen credentials are distributed through various channels, including email and chat services like Telegram.

The emergence of Morphing Meerkat underscores the evolving sophistication of phishing operations and the necessity for robust cybersecurity measures. Organizations are advised to implement deep DNS logging and analysis, monitor for brand impersonation, deploy zero-trust email and web gateways, provide comprehensive user awareness training, and enforce strict email authentication policies such as DMARC, DKIM, and SPF to mitigate such threats.

For users, always be aware of phishing tactics, such as messages with a sense of urgency or punishment. Misspellings and bad grammar, links or attachments that are not expected or are from unfamiliar sources are still clues to phishing. Always pay close attention to the spellings of URLs, watching closely for the use of numbers in place of letters and other subtle changes.


Phishing Scams Exploit Pricey Auto-Subscription Fears

Scams & Phishing

Phishing Scams Exploit Pricey Auto-Subscription Fears

With email among the top productivity tools in our everyday lives, we know cybercriminals have adopted it for their benefit, too. And now, according to an alert by the National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA), there’s a new and highly lucrative email phishing campaign making the rounds. Both agencies are sounding the alarm about a particular version of this phish, wanting the public to know how it works. READ FULL STORY

Email Identity Crisis! Top Brands For Email Phishing And How To Tell The Difference

Scams & Phishing

Email Identity Crisis! Top Brands For Email Phishing And How To Tell The Difference

Some say impersonation is the greatest form of flattery, but it this case, it’s all about email phishing. Cybercriminals use some companies more than others because they’re well-known globally and have better odds for success. According to APWG’s Phishing Activity Trends Report, the U.S. saw over one million email phishing attacks in the first quarter of this year alone, the highest total on record so far. A look at who these companies are and how to avoid email phishing in their name benefits us all. READ FULL STORY

BOLO for These Most Dangerous Email Attachments

Scams & Phishing

BOLO for These Most Dangerous Email Attachments

Keeping a lookout for suspicious emails has become a daily consequence of our cyber lives. Phishing emails are notorious for having malicious attachments and opening them is a sure way to compromise your device and its data. These attachments are full of malware, ready and waiting to infect your system with a simple click. Make no mistake, any attachment in a questionable email can be dangerous. However, researchers at F-Secure found that some of this year’s biggest email spam campaigns used particular types of malicious attachments more than others. READ FULL STORY

Common Signs Of Phishing To Keep In Mind When Your Inbox Overflows

Scams & Phishing

Common Signs Of Phishing To Keep In Mind When Your Inbox Overflows

With email phishing, deciphering what’s real from what’s fake can be a challenge. Our inboxes are stuffed with emails fighting to get our attention and get us to take some action. But how to ferret-out what’s legitimate takes some cyber-smarts. Research shows email is the primary method of spreading 92% of all malware, and the U.S. is the target of 86% of all email phishing attacks. Whether at home or at work, email phishing is relentless, but being aware of characteristics they have in common can be a powerful tool. READ FULL STORY

When What You See Is Not What You Get

Corporate Security

When What You See Is Not What You Get

Although it may sound strange, bad actors are exploiting what we see – or what we think we see. Always looking for new ways to gain our confidence, cybercriminals are counting on us being human to make this con work. Trust, fear, and concern are some of the emotions being exploited, which is nothing new for hackers. But what is new is taking advantage of our assumption that when we see a trusted website, it’s worthy of our trust…Well, maybe not so much anymore. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...