Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report

While China-linked Muddling Meerkat’s operations look like DNS DDoS attacks, it seems unlikely that denial of service is their goal, at least in the near term.

A newly uncovered Chinese threat actor has been scanning DNS networks around the world for years, sending vast numbers of queries via open DNS resolvers, according to network security company Infoblox.

Dubbed Muddling Meerkat (PDF) and appearing to be  linked to the Chinese government, the threat actor can control the Great Firewall (GFW) of China, the nation’s system for censoring and manipulating internet traffic entering and exiting the country.

Active since October 2019, Muddling Meerkat’s operation is like Slow Drip (AKA random-prefix) attacks, which are essentially distributed denial-of-service (DDoS) attacks, but the threat actor’s goal does not appear to be DNS DDoSing and its motivation and goal remain unclear.

With the ability to evade network defenses and remain hidden, Muddling Meerkat may be pre-positioning itself for possible disruptive cyberattacks, similar to Volt Typhoon’s apparent intentions that the US warned about earlier this year.

Muddling Meerkat’s operations, Infoblox says, are complex, as the threat actor can manipulate DNS mail server (MX) records using fake responses injected through GFW, and has been observed using Chinese IPs to make DNS queries for random subdomains to IP addresses worldwide.

What makes the threat actor stand out is the use of false MX record responses from Chinese IP addresses, which include properly formatted MX resource records and overall are different from the standard behavior of the GFW.

Advertisement. Scroll to continue reading.

China’s GFW is known for injecting false answers to DNS queries, instead of altering DNS responses directly, to poison the DNS cache of the requester. Furthermore, Beijing is also known for using a system called the Great Cannon (GC) to launch DDoS attacks.

“The MX answer records for Muddling Meerkat are only observable in data collected outside of the normal DNS resolution chain because the source of the response is not a DNS resolver but instead a random Chinese IP address,” Infoblox notes.

The MX records containing random hostnames were first seen in October 2019, but the number of MX resolutions started to increase in September 2023 and into 2024.

In addition to abusing MX records, Muddling Meerkat was seen using domains registered before the year 2000 to avoid DNS blocklists, selecting domains for abuse based on length and age rather than ownership, almost continuously running campaigns of one to three days, initiating DNS queries from dedicated servers, and limiting the size of operations to avoid detection.

“Every detail of Muddling Meerkat operations demonstrates sophistication and deep knowledge of DNS. The activity includes behavior not previously reported for the GFW, the nature of which ties the actor to Chinese nation state actors,” Infoblox notes.

For years, Infoblox tracked MX record responses from Chinese IP addresses on Muddling Meerkat target domains, which suggests a connection between the threat actor and the GFW operators, and discovered that the operations are performed in stages.

Network administrators are advised to identify and eliminate open resolvers in their networks, only use trusted domains for Active Directory or DNS search, implement DNS detection and response (DNSDR), and review the shared indicators of activity (they do not necessarily suggest compromise) and report identified Muddling Meerkat activity.

Related: Chinese Cyberspies Targeting ASEAN Entities

Related: Chinese APT Hacks 48 Government Organizations

Related: KeyTrap DNS Attack Could Disable Large Parts of Internet: Researchers

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Tim Byrd has been appointed Chief Information Security Officer at First Citizens Bank.

IRONSCALES has named Steve McKenzie as Chief Operating Officer.

Silvio Pappalardo has joined AuthMind as Chief Revenue Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.