Dr. Renée Burton, VP of Threat Intelligence, Infoblox

Dr Burton: Over the past two years, Infoblox Threat Intel has uncovered Vextrio Viper, Decoy Dog, Loopy Lizard, Prolific Puma, Savvy Seahorse, Muddling Meerkat – and many others that are not published. The interconnected nature of our digital world means these threat actors are not tied to national boundaries, thus posing significant risks to Asia’s cybersecurity landscape as well.

  • Muddling Meerkat is a Chinese actor that is capable of controlling China’s Great Firewall. Most notably, the actor elicits fake DNS MX records from the firewall, a technique not previously reported. Since October 2019, the actor has executed sophisticated operations that have similarities to Slow Drip DDoS attacks, but have mysterious motives. They leverage open DNS resolvers and cleverly use super-aged domains to blend with regular DNS traffic, evading detection and demonstrating a deep nuanced understanding of DNS and security measures.
  • Savvy Seahorse is a DNS threat actor that specializes in investment scams that lure victims into creating accounts on fake investment platforms, making deposits into personal accounts, and then transferring these deposits to a bank in Russia. Savvy Seahorse delivers its campaigns through Facebook advertisements and incorporates fake ChatGPT and WhatsApp bots to urge users to enter personal information. It has spoofed legitimate companies such as Apple, Meta, Mastercard, Visa, and Google for investment opportunities.
  • Prolific Puma is a threat actor that uses algorithmically generated domains to create shortened links for other malicious actors. The short links help bad actors to evade detection while they distribute phishing, scams and malware. Prolific Puma is the first actor to be identified as a malicious link-shortening service. They register hundreds to thousands of new domains daily and notably abuse the .US TLD.
  • Loopy Lizard is a DNS threat actor that creates lookalike domains to financial institutions and government organizations for the purpose of phishing user credentials. They primarily target the United States and Australia but have also targeted Western Europe and Canada. Loopy Lizard was identified through DNS because of an anomalous name server configuration. Loopy Lizard was formerly called Open Tangle.
  • Decoy Dog is a malware toolkit that uses DNS for command and control (C2), allowing compromised clients to communicate with an attacker via DNS queries through a purpose-built DNS name server. Discovered and dissected through DNS query logs, Decoy Dog is used by multiple actors and went undetected for over a year by the industry. It was first used in the Russia-Ukraine war, but as the number of actors has spread, it might be used beyond Eastern Europe.
  • Vextrio Viper is a persistent actor operating a large criminal enterprise that uses a trifecta of traffic distribution systems (TDSs), lookalike domains and registered domain generation algorithms (RDGAs) to deliver malware, scams, and illegal content. Vextrio Viper is very adept at DNS. Their skills have enabled them to create and operate the largest known cybercriminal affiliate program with which they broker traffic for scores of other criminals. VexTrio Viper and their affiliates target users globally through many attack vectors. This is the single most pervasive threat actor that Infoblox has observed in customer networks.