The threat actor behind these campaigns has been dubbed ‘Morphing Meerkat’. As part of its tactics, techniques and procedures (TTP), it employs DNS email exchange (MX) records to serve fake logging ...
A threat actor tracked as Morphing Meerkat abuses DNS mail exchange (MX) records to deliver spoofed login pages. A phishing-as-a-service (PhaaS) platform has been observed generating phishing kits ...
DNS intelligence firm Infoblox is tracking the actor behind the PhaaS, the phishing kit, and the related activity under the moniker Morphing Meerkat. "The threat actor behind the campaigns often ...