Unknown AI, unknown risk: How invisible AI use creates new attack paths
AI is now woven into every layer of modern software development, but most security teams can’t see where or how it’s being used.
Read More
There are always new forms of phishing attacks to add to your cybersecurity awareness programmes. They’re the thorn in the side of all internet users; but the emergence of phishing-as-a-service (PhaaS) is pushing the potential dangers of phishing to new levels.
Recently, researchers have discovered a new Morphing Meerkat phishing kit that has been dynamically spoofing the login pages of more than 100 brands. The pages are highly effective, capable of deceiving people who have a solid understanding of the risks of phishing online.
It’s a comprehensive phishing service that enables threat actors to execute targeted attacks very easily. The kit leverages victims’ domain name system (DNS) and mail exchange (MX) records to identify their email service provider and serve a fake login page that looks like the real one.
So the login pages don’t just look authentic – they’re also delivered in a way that feels legitimate to cyber-savvy internet users.
Like many phishing attempts, a Morphing Meerkat attack starts with initial contact; the victim receives a phishing email which contains a link.
When they click that link they’re taken through a series of redirects that exploit vulnerabilities in ad tech infrastructure or compromised domains – effectively evading detection.
The phishing kit queries the MX records of the victim’s email domain, which allows it to identify the email service provider and deliver a customised fake login page.
And then the victim, satisfied that everything looks legitimate, enters their credentials to login to the trusted site. That information is exfiltrated to the threat actors through channels including email, AJAZ requests, or PHP scripts.
Morphing Meerkat then redirects the victim to the brand’s legitimate login page – so they just think they entered their credentials incorrectly, and they don’t realise anything nefarious has happened at all.
Phishing is no new trick. But Morphing Meerkat stands out in a number of ways:
Morphing Meerkat is an alarming example of how sophisticated and convincing phishing attacks can be. And as time goes on, advancements in phishing strategies will continue.
Cybersecurity awareness programs must include education around hard-to-spot PhaaS attacks:
Most importantly, all organisations (and ideally all internet users) need to pay attention to developments in phishing tactics and commit to continuous cybersecurity learning. Malicious strategies are changing all the time, so the only way to stay safe is to stay curious: learn from new research about the latest threats, and understand the methods that might be deployed against you.
Join us at Black Hat MEA 2025 to share your perspective and meet potential partners – and shape the future together.
Join the newsletter to receive the latest updates in your inbox.
AI is now woven into every layer of modern software development, but most security teams can’t see where or how it’s being used.
Read More
New data shows the CISO role is already under strain, and heading into an even tougher year.
Read More
A new survey shows six in ten US job seekers faced fake recruiters, and 40% fell for scams. Red and blue teams can learn vital social engineering lessons from this emerging attack frontier.
Read More