Phishing Kits & PhaaS

What Is Morphing Meerkat?

Morphing Meerkat is a phishing-as-a-service (PhaaS) platform that uses DNS mail exchange (MX) record queries to dynamically generate customized phishing pages mimicking victims' actual email service providers.

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

Morphing Meerkat is a phishing-as-a-service (PhaaS) platform that uses DNS mail exchange (MX) record queries to dynamically generate customized phishing pages mimicking victims' actual email service providers. Active for at least five years since 2020, according to Infoblox's analysis from 2024, the platform evolved significantly in July 2023 when developers added DNS-over-HTTPS (DoH) capabilities to dynamically load HTML based on querying victims' email domain MX records. The platform supports over 114 different email provider templates and includes advanced evasion techniques including multi-language support, IP blocking, user-agent filtering, and real-time evidence deletion, according to The Hacker News reporting from March 2025.

How Does Morphing Meerkat work?

When a victim clicks a phishing link distributed through email campaigns, the Morphing Meerkat platform queries the victim's email domain's DNS MX record using DNS-over-HTTPS (DoH) routed through Cloudflare or Google resolvers. According to Infoblox's technical analysis, this query determines which mail servers handle email for the victim's domain, revealing the email service provider (Gmail, Outlook, Office 365, Yahoo, ProtonMail, or others). Based on the MX record response, the kit determines the appropriate email provider and serves a legitimate-looking login page specifically designed for that provider.

The dynamic page generation occurs in real-time for each victim, with the email address pre-populated in the login form to create credibility and the appearance that "your email is already verified," according to Phishing Tackle's analysis from 2025. This adaptive rendering requires no advance knowledge by the attacker of which email provider each victim uses—the platform automatically serves the correct template based on DNS data.

The platform's template library expanded significantly from the static phase (2020-July 2023) when it supported only five email brands (Gmail, Outlook, AOL, Office 365, Yahoo) to the dynamic phase (July 2023-present) supporting 114+ email provider templates. According to Infoblox, coverage includes major global providers like Gmail, Outlook, ProtonMail, and Yahoo as well as regional providers including Yandex and Mail.ru. Each template mimics the legitimate provider's login user interface and user experience with high fidelity, copying visual styling, branding, and interaction patterns.

Multiple evasion techniques protect the platform's infrastructure and operations from detection. According to Security Affairs reporting from 2024, IP blocking filters out security research IP addresses, requiring victim-like IP addresses for the phishing page to render. User-agent filtering blocks automated scanning tools and security researcher browsers. Time-limited URLs expire after first access or a predetermined time window, preventing repeated analysis. The JavaScript translation module dynamically translates phishing content into 12+ languages including English, Korean, Spanish, Russian, German, Chinese, and Japanese, according to Infoblox's analysis.

Credential exfiltration employs multiple methods to evade detection. According to Phishing Tackle, the platform uses PHP backend collection for traditional server-side capture, AJAX-based submission which is harder to detect through static analysis, and Telegram direct message delivery providing real-time operator notification of stolen credentials. Real-time evidence deletion removes phishing evidence after data collection, according to SC Media's March 2025 reporting, suggesting operational concern about forensic recovery and law enforcement investigation.

The platform's infrastructure leverages multiple hosting approaches. According to Infoblox, campaigns use Cloudflare R2 storage, compromised WordPress sites, open redirects through legitimate sites' redirect capabilities, and distributed mail servers. Primary infrastructure sources include iomart (United Kingdom) and HostPapa (United States) ISP mail servers, from which thousands of spam messages originate in centralized campaigns.

Campaign tactics emphasize social engineering through fake shared document links with messages like "Your document is ready: [link]," email impersonation spoofing corporate sender addresses, urgency and authority framing (account verification, security alerts, administrative requests), and redirect chains routing through legitimate domains to open redirects to Morphing Meerkat phishing pages, according to Security Affairs.

How Does Morphing Meerkat differ from other phishing platforms?

Feature

Morphing Meerkat

Darcula

Lucid

CoGUI

Primary Channel

Email + redirect chains

iMessage/RCS

iMessage/RCS

Email

Targeting Innovation

DNS MX records (dynamic)

Postal service templates

Device fingerprinting

Geographic specialization (Japan)

Template Count

114+

600+ (with GenAI)

1,000+ domains

Thousands

Multi-Language Support

12+ languages

GenAI-enabled

Not documented

Not documented

Operational Since

2020 (5 years)

2023

Mid-2023

October 2024

Infrastructure

DoH + Cloudflare R2

Docker/Harbor/React

Device farms + Telegram

Email servers

Real-Time Monitoring

Via Telegram

Character-by-character streaming

Admin panel

Campaign dashboard

Documented Success Rate

Not documented

Not specified

~5%

Not specified

Evidence Handling

Real-time deletion

Not documented

Standard storage

Not documented

Primary Target Type

Email provider credentials

Financial/postal

Multi-sector

Japanese organizations

Morphing Meerkat's DNS MX record exploitation represents a unique innovation in PhaaS platforms. According to Infoblox, the automatic adaptation to victim email providers eliminates the need for attackers to know in advance which provider each target uses, distinguishing it from platforms requiring manual template selection. The five-year operational history indicates sustained viability and suggests successful evasion of law enforcement disruption efforts, according to The Hacker News.

The platform's innovation lies in automation and adaptability rather than volume or sophistication of individual evasion techniques. According to SC Media, while platforms like CoGUI achieve scale through mass email volume (100+ million monthly) and Lucid through device farms, Morphing Meerkat achieves effectiveness through precise targeting—serving exactly the right provider template to each victim automatically based on DNS data.

Why Does Morphing Meerkat matter?

Morphing Meerkat demonstrates the continuous evolution of phishing techniques beyond static templates and manual targeting. The DNS MX record query innovation, according to Infoblox's analysis, represents sophisticated technical creativity that exploits legitimate internet infrastructure (DNS) for malicious purposes. This approach is more elegant than brute-force alternatives like maintaining thousands of templates for manual selection, showing that cybercriminal developers continue innovating to improve operational efficiency and effectiveness.

The five-year operational longevity indicates successful evasion of disruption efforts. According to The Hacker News, platforms like LabHost were taken down through international law enforcement coordination in April 2024 after approximately three years of operation, yet Morphing Meerkat has operated since at least 2020 and remains active as of 2025. This resilience suggests either more effective operational security, more distributed infrastructure that's harder to disrupt, or jurisdictional challenges preventing law enforcement action.

The platform's targeting of global enterprises, financial institutions, and government organizations creates widespread risk. According to Infoblox, campaigns distribute thousands of spam messages from centralized ISP servers, suggesting 24/7 operations with consistent volume. The multi-language localization capability (12+ languages) enables geographic targeting beyond English-speaking markets, expanding the addressable victim population and demonstrating strategic thinking about market expansion.

The July 2023 evolution from static to dynamic MX-based templating shows platforms actively improving over time. According to Infoblox, the initial version (2020-2023) was limited to five major providers, but the DNS-based approach enabled expansion to 114+ providers without proportional increase in operational complexity. This demonstrates that PhaaS platforms invest in research and development to maintain competitive advantages, similar to legitimate software-as-a-service businesses.

The use of DNS-over-HTTPS to mask queries from carrier and ISP-level monitoring highlights the arms race between attackers and defenders. According to SecurityWeek's March 2025 analysis, DoH was designed to improve privacy by encrypting DNS queries, but Morphing Meerkat repurposes this privacy technology to evade security monitoring. This dual-use challenge affects many security technologies—features designed to protect users can be exploited by attackers to evade detection.

What Are Morphing Meerkat's limitations?

DNS Query Signatures Enable Detection

DoH queries to specific domains create detectable patterns in DNS security tools and enterprise DNS monitoring systems. According to Infoblox, the platform's reliance on Cloudflare or Google DoH creates central chokepoints where queries can be logged and analyzed. Enterprises implementing DNS firewalls can monitor for queries attempting MX record enumeration, which is unusual for legitimate user traffic. Security tools can detect JavaScript-based DNS queries originating from email-linked pages, as legitimate email providers do not dynamically query MX records during user authentication. The concentration of DoH traffic routed through Cloudflare and Google means these providers could, if compelled by law enforcement or through internal policy, identify and block Morphing Meerkat query patterns.

Template Fingerprinting Enables Bulk Identification

The 114 email provider templates create CSS, HTML, and JavaScript clustering identifiable by phishing detection engines. According to SANS Institute analysis, security researchers can catalog the visual and code characteristics of each template, creating signatures deployable across email security gateways and web filtering solutions. Static analysis of template code reveals common JavaScript libraries, styling patterns, and DOM structures that cluster together despite serving different provider imitations. Once cataloged, these signatures enable automated detection of Morphing Meerkat phishing pages regardless of which specific provider template is being served.

ISP Infrastructure Dependency Creates Obvious Fingerprint

The platform's reliance on compromised iomart (United Kingdom) and HostPapa (United States) mail servers creates concentrated infrastructure visibility. According to Phishing Tackle, email headers from Morphing Meerkat campaigns reveal these originating servers, enabling email security solutions to flag messages from these sources. The UK and US locations of primary infrastructure mean these ISPs are subject to law enforcement cooperation requests from authorities investigating the platform. Each link in open redirect chains creates forensic trails including HTTP referrer headers, server logs, and access timestamps that can be analyzed to map campaign infrastructure.

Telegram Exfiltration Creates Law Enforcement Access Point

The use of Telegram for credential delivery to operators creates a communication channel accessible to law enforcement. According to Infoblox, Telegram can provide channel data and message metadata when compelled by authorities in supported jurisdictions. Undercover law enforcement or security researchers could potentially infiltrate operator channels to gather intelligence about campaigns, victims, and operational practices. The real-time notification model means operators must maintain active Telegram presence, creating behavioral patterns and timing signatures that might aid attribution.

Aggressive Evidence Deletion Signals Operational Concern

The platform's real-time log deletion after credential capture, according to SC Media, suggests operator concern about forensic recovery and investigation. While this technique removes some evidence, it also indicates defensive operational security measures that may limit the platform's ability to conduct post-campaign analysis, optimize templates, or troubleshoot issues. The deletion process itself may be detectable through network traffic analysis if it generates characteristic patterns of database operations or file system modifications. Additionally, deleted data may be recoverable through forensic techniques if authorities seize infrastructure before permanent overwriting occurs.

How Can organizations defend against Morphing Meerkat-style attacks?

Email Authentication and Security

Organizations should enforce strict email authentication to prevent domain spoofing in initial phishing emails. According to CISA best practices, implement DMARC with policy set to "p=reject" to reject unauthenticated mail impersonating organizational domains. Configure SPF records to limit sending servers to authorized IP addresses only, preventing attackers from sending emails appearing to originate from organizational domains. Implement DKIM to digitally sign all organizational mail, enabling recipients to verify message authenticity. Email filtering systems should block DoH traffic from email gateways to prevent Morphing Meerkat's DNS query technique from functioning through gateway-inspected messages. Detect URL redirect chains by flagging messages containing multiple successive redirects, as legitimate organizational communications rarely route through multiple intermediate sites. Flag emails with document-like phishing lures (e.g., "Your document is ready"), as these match Morphing Meerkat's characteristic social engineering tactics.

Sender verification systems should highlight external mail with visible warnings and flag exact domain matches that might be spoofing attempts. According to Microsoft Security guidance, display the actual sending domain prominently to help users distinguish legitimate from spoofed addresses.

DNS-Level Protection and Monitoring

Organizations should block or log DNS-over-HTTPS queries at network perimeters to maintain visibility into DNS activity. According to SANS guidance, implement DNS query analysis to monitor for unusual MX record queries, as legitimate end-user traffic rarely queries email domain MX records. DNS firewalls should block queries attempting MX enumeration patterns characteristic of Morphing Meerkat reconnaissance. Implement conditional access policies requiring re-authentication when MX query anomalies are detected from user devices or IP addresses.

Enterprise DNS security solutions can detect JavaScript-based DNS queries originating from web pages linked in emails, as this pattern is unusual for legitimate email provider authentication flows. According to Google Workspace Security guidance, organizations can route all DNS traffic through enterprise resolvers rather than allowing direct DoH queries to external providers like Cloudflare or Google.

User Education and URL Verification

Training programs should educate users to inspect links before clicking, particularly links routing through unexpected domains or containing redirect parameters. According to CISA, users should practice exact domain matching only, recognizing that typosquatting domains may differ by subtle character substitutions (e.g., "rn" appearing as "m" in certain fonts). Emphasize redirect skepticism—unknown redirects should prompt users to contact the supposed sending organization directly through known contact methods rather than clicking through.

Users should understand that legitimate email providers will not ask for credentials via email links. According to Trend Micro guidance, proper authentication flows involve users navigating directly to known provider websites or using password managers that verify domains. Fake document and file sharing alerts represent common phishing vectors; users receiving these messages should verify with supposed senders through alternative communication channels before clicking.

Organizational Access Controls and Monitoring

Implement multi-factor authentication to reduce account takeover impact even if credentials are compromised through phishing. According to The Hacker News, hardware security keys using FIDO2/WebAuthn standards verify the authentication domain and prevent credential submission to phishing sites even if they appear identical to legitimate services. Conditional access policies should flag logins from unusual locations, require additional verification for new device logins, and enforce device health requirements before granting access.

Email link rewriting services can sandbox email links, executing them in isolated environments to detect phishing pages before users access them. According to Infoblox, monitor for redirect chains to known Morphing Meerkat infrastructure or patterns matching the platform's operational characteristics. Credential guard technologies and password vault integration can detect re-use of compromised credentials, alerting when credentials appear in known breach databases.

Law Enforcement Cooperation and ISP Reporting

Organizations should report Morphing Meerkat activity to iomart and HostPapa abuse teams, as these ISPs host key infrastructure components. According to Infoblox, file abuse reports with Cloudflare for DoH and R2 storage infrastructure abuse. Share indicators including domains, IP addresses, and email addresses with CISA, the FBI Internet Crime Complaint Center (IC3), and industry information sharing and analysis centers (ISACs). Notify email carriers including Microsoft, Google, and Yahoo of spoofing attacks impersonating their services to enable provider-level countermeasures.

Law enforcement agencies can request Telegram account and channel metadata through appropriate legal processes. According to SecurityWeek, legal frameworks including GDPR and the Computer Fraud and Abuse Act enable ISP and hosting provider cooperation in takedown efforts and investigation support.

FAQs

Why is it called "Morphing Meerkat" and how does it work?

The name "Morphing Meerkat" reflects the platform's ability to morph or change appearance dynamically based on the victim's email provider, which is determined via DNS MX record queries, according to Infoblox's analysis. When you click a phishing link, the site queries your email domain's MX record—DNS data that specifies which mail servers handle email for a domain—to identify your provider (Gmail, Outlook, ProtonMail, etc.). Based on this information, the platform displays a fake login page designed specifically for that provider, customizing logos, colors, layout, and functionality to match exactly. According to The Hacker News, the "meerkat" component is the security researchers' naming choice following conventions for tracking threat actors and malware families with animal or whimsical names. The result is a highly customized phishing page that looks identical to your actual email provider's login screen because the platform automatically determined which provider to imitate based on technical DNS information rather than guessing or requiring the attacker to manually select templates.

What is an MX record and why does Morphing Meerkat use it?

An MX (Mail Exchange) record is DNS data that specifies which mail servers handle email for a domain, according to Infoblox's technical documentation. For example, if someone sends email to user@company.com, the sender's mail server queries company.com's MX records to find which servers accept mail for that domain. Gmail's MX records point to Google's mail servers, Microsoft 365's point to Microsoft servers, and so on. Morphing Meerkat queries these records to identify the victim's email provider, then serves the appropriate fake login page automatically. According to Phishing Tackle's analysis, this approach is sophisticated because it automatically adapts—the attacker doesn't need to know in advance which email provider each victim uses or manually create campaigns for specific providers. The automation means a single phishing link can target users across 114+ different email providers, with each victim seeing the correct provider template based on their MX record data. This technical innovation reduces operational complexity while increasing effectiveness.

How long has Morphing Meerkat been active and is it still a threat?

Morphing Meerkat has been active since at least 2020, making it a five-year operation as of 2025, and remains active according to The Hacker News reporting from March 2025. The platform evolved significantly in July 2023 when developers added DNS-based dynamic templating, according to Infoblox's analysis. The initial version (2020-July 2023) used static templates limited to five major email providers (Gmail, Outlook, AOL, Office 365, Yahoo), but the DNS MX query capability enabled expansion to 114+ provider templates without proportional increase in operational complexity. According to SC Media, the longevity and continued operation suggests the platform is profitable for operators and has evaded significant law enforcement disruption despite public disclosure and security researcher analysis. The five-year operational period is notably longer than some other PhaaS platforms—for comparison, LabHost operated for approximately three years before being taken down in April 2024. Morphing Meerkat's resilience may indicate more effective operational security, distributed infrastructure harder to disrupt, or jurisdictional challenges preventing law enforcement action.

If I received a suspicious email with a link, how do I know if it's Morphing Meerkat?

Suspicious indicators include unexpected "document ready" or file-sharing notifications from unknown senders, urgent language requesting immediate action ("verify your account now," "document expires soon"), links that appear to route through redirects (URLs with multiple slashes, unusual domains, or redirect parameters), and spoofed sender addresses that appear to come from inside your organization but actually originated externally, according to Infoblox's analysis. According to Phishing Tackle, after clicking a Morphing Meerkat link (which you should not do), the phishing page looks exactly like your actual email provider's login screen because the platform queried your domain's MX records to determine which template to serve. The email address field is typically pre-filled with your address to create credibility. If you suspect Morphing Meerkat, do not enter credentials. Instead, report the email to your IT security team, forward it to the FBI Internet Crime Complaint Center (IC3) at ic3.gov, report to your email provider (Gmail, Outlook, etc.) as phishing, and delete the message. If you already entered credentials, immediately change passwords for all critical accounts from a clean device, enable multi-factor authentication using hardware security keys if possible, and monitor accounts for unauthorized activity.

What makes Morphing Meerkat harder to detect than regular phishing?

Morphing Meerkat employs multiple sophisticated techniques that distinguish it from basic phishing. According to Infoblox, dynamic adaptation through MX record queries ensures provider-correct fake pages, meaning each victim sees a perfect replica of their actual email provider rather than a generic or incorrectly matched template. Multi-language content targeting enables the platform to serve localized pages to victims in 12+ languages with appropriate translations. Real-time evidence deletion removes logs after credential capture, hindering forensic investigation and making it harder for security researchers to study campaigns. DNS-over-HTTPS hiding masks DNS queries from ISP and carrier-level monitoring that might otherwise detect unusual MX record lookups. IP and user-agent filtering blocks security researchers from analyzing phishing pages by detecting and refusing to serve content to security tools, emulators, or non-target geographic regions. According to SecurityWeek, these combined tactics make Morphing Meerkat significantly harder to detect and analyze than static phishing kits that use unchanging templates, obvious hosting infrastructure, and no anti-research protections. The platform's five-year operation without disruption suggests these techniques have been effective at evading both automated detection systems and manual law enforcement investigation.

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

Leave Training & Simulated Phishing to us.

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

© 2026 Kinds Security Inc. All rights reserved.

© 2026 Kinds Security Inc. All rights reserved.

© 2026 Kinds Security Inc. All rights reserved.