• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
china linked 'muddling meerkat' hijacks dns to map internet on global

China-Linked ‘Muddling Meerkat’ Hijacks DNS to Map Internet on Global Scale

You are here: Home / General Cyber Security News / China-Linked ‘Muddling Meerkat’ Hijacks DNS to Map Internet on Global Scale
April 29, 2024

A previously undocumented cyber menace dubbed Muddling Meerkat has been noticed enterprise complex domain name method (DNS) actions in a probably effort to evade security steps and perform reconnaissance of networks across the globe since October 2019.

Cloud security organization Infoblox explained the menace actor as probable affiliated with the People’s Republic of China (PRC) with the skill to management the Excellent Firewall (GFW), which censors entry to overseas internet websites and manipulates internet traffic to and from the nation.

The moniker is reference to the “bewildering” mother nature of their operations and the actor’s abuse of DNS open resolvers – which are DNS servers that settle for recursive queries from all IP addresses – to ship the queries from the Chinese IP area.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“Muddling Meerkat demonstrates a sophisticated comprehension of DNS that is uncommon among danger actors these days – evidently pointing out that DNS is a powerful weapon leveraged by adversaries,” the organization said in a report shared with The Hacker News.

Cybersecurity

A lot more particularly, it involves triggering DNS queries for mail trade (MX) and other report sorts to domains not owned by the actor but which reside under nicely-regarded leading-stage domains this kind of as .com and .org.

Infoblox stated it detected above 20 these domains –

4u[.]com, kb[.]com, oao[.]com, od[.]com, boxi[.]com, zc[.]com, s8[.]com, f4[.]com, b6[.]com, p3z[.]com, ob[.]com, eg[.]com, kok[.]com, gogo[.]com, aoa[.]com, gogo[.]com, zbo6[.]com, id[.]com, mv[.]com, nef[.]com, ntl[.]com, tv[.]com, 7ee[.]com, gb[.]com, tunk[.]org, q29[.]org, ni[.]com, tt[.]com, pr[.]com, dec[.]com

Several of these internet sites are tremendous-aged domains registered prior to 2000, hence enabling the adversary to blend in with other DNS site visitors and fly underneath the radar by evading DNS blocklists.

Hijacks DNS

Also noticed are attempts to use servers in the Chinese IP deal with house to make DNS queries for random subdomains to IP addresses all-around the entire world as portion of

It’s identified that the GFW relies on what is actually identified as DNS spoofing and tampering to inject fake DNS responses containing random authentic IP addresses when a request matches a banned keyword or a blocked area.

In other text, when a consumer tries to search for a blocked search phrase or phrase, the GFW blocks or redirects the web page query in a method that will reduce the person from accessing the asked for facts. This can be reached by way of DNS cache poisoning or IP tackle blocking.

Cybersecurity

This also indicates that if the GFW detects a question to a blocked website, the refined device injects a bogus DNS reply with an invalid IP address, or an IP tackle to a different area, successfully corrupting the cache of recursive DNS servers located in just its borders.

“The most remarkable attribute of Muddling Meerkat is the presence of phony MX report responses from Chinese IP addresses,” Dr. Renée Burton, vice president of danger intelligence for Infoblox, said. “This actions […] differs from the conventional conduct of the GFW.”

“These resolutions are sourced from Chinese IP addresses that do not host DNS companies and consist of fake answers, regular with the GFW. Even so, unlike the recognised habits of the GFW, Muddling Meerkat MX responses include things like not IPv4 addresses but adequately formatted MX useful resource information in its place.”

The exact determination driving the multi-year exercise is unclear, whilst it elevated the chance that it might be undertaken as part of an internet mapping energy or analysis of some form.

Discovered this write-up fascinating? Observe us on Twitter  and LinkedIn to browse more exceptional content material we publish.


Some areas of this posting are sourced from:
thehackernews.com

Previous Post: «navigating the threat landscape: understanding exposure management, pentesting, red teaming Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Next Post: Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023 google prevented 2.28 million malicious apps from reaching play store»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.