Article Details
Scrape Timestamp (UTC): 2024-02-28 14:03:00.058
Original Article Text
Click to Toggle View
Savvy Seahorse gang uses DNS CNAME records to power investor scams. A threat actor named Savvy Seahorse is abusing CNAME DNS records Domain Name System to create a traffic distribution system that powers financial scam campaigns. The threat actor targets victims through Facebook ads that direct them to fake investment platforms where they're tricked into depositing funds and entering sensitive personal data. A notable aspect of these campaigns is that they involve chatbots that directly interact with the victims to convince them of high investment returns, automating the scamming process for the attackers. Infoblox researchers who discovered this operation say it has been underway since at least August 2021, manifesting in short attack waves that last between five and ten days. Using DNS CNAME records as a TDS Savvy Seahorse creatively uses Canonical Name (CNAME) records as a Traffic Distribution System (TDS) for its operations, allowing threat actors to easily manage changes, such as performing IP rotation that enhances detection evasion. A CNAME record is a DNS record that maps a domain or subdomain to another domain name instead of directly to an IP address. This causes the CNAME to act as an alias for the target domain, making it easier to manage redirects and ensure that any changes to the target domain's IP address automatically apply to the CNAME as well. Savvy Seahorse registers multiple subdomains for its attack waves that share a common CNAME record linking it to primary/base campaign domain, for example, "b36cname[.]site." This allows all of these CNAME records to have the same IP address inherited from the subdomain on the b36cname[.]site, as illustrated below. This technique makes it possible to rotate to new destinations when security software blocks a particular IP address or to prevent detection without altering the attack domain's DNS settings. Infoblox says this is the first publicly reported case of abusing DNS CNAMEs for TDS, although most likely not the first time it happened, so they decided to name the method 'CNAME TDS.' "Savvy Seahorse is the first publicly reported threat actor abusing DNS CNAMEs as part of a malicious TDS," explains Infoblox. "While it requires more sophistication in DNS on the part of the threat actor, it is not uncommon—just unrecognized up to this point in the security literature." Using domain generation algorithms (DGAs), Savvy Seahorse creates and manages thousands of domains utilized in the CNAME TDS system. The threat actor uses wildcard DNS responses to change the status of these domains from "parked," "in testing," and in "active campaign," making tracking and mapping of its infrastructure harder. Also, unlike most threat actors, Savvy Seahorse spreads its infrastructure across multiple registrars and hosting providers, which helps both evade attribution and achieve operational resilience. Campaign details Savvy Seahorse promotes investment scams with lures written in English, Russian, Polish, Italian, German, French, Spanish, Czech, and Turkish, indicating the threat actor's global targeting scope. The malicious subdomains used in the attacks host registration forms designed to steal the personal information of the tricked victims. Once that data is submitted, a secondary domain validates the victim's location based on their IP address and the legitimacy of the provided info and redirects approved users to a fake trading platform. There, victims can choose to top up their investment balances using credit cards, cryptocurrency, and other payment methods. The following video demonstrates one of these fraudulent platforms in detail: Chatbots impersonating ChatGPT, WhatsApp, and Tesla, among other well-known entities, increase the apparent legitimacy and play a vital role in the social engineering aspect of the attack. Infoblox says the malicious pages also use Meta Pixel trackers for performance tracking, which is likely used to refine tactics. For a complete list of indicators of compromise and domains used in Savvy Seahorse campaigns, check out this GitHub page.
Daily Brief Summary
A cybercriminal group identified as Savvy Seahorse has been utilizing CNAME DNS records to create and power scam campaigns centered around fake investment platforms.
Victims are lured in through deceptive Facebook ads and conned into submitting funds and personal information to the phony platforms.
The operation, active since at least August 2021, employs chatbots to enhance the scams' credibility and automate interactions with potential victims, promising high returns on investments.
Researchers at Infoblox revealed the innovative use of CNAME records as a Traffic Distribution System (TDS), facilitating the rotation of IP addresses to avoid detection.
The scam campaign operates in multiple languages and targets a global audience, with victims directed to fraudulent trading platforms after their data is collected and verified.
Savvy Seahorse deploys domain generation algorithms to manage a vast number of domains, which hampers tracking and adds operational resilience by distributing infrastructure across various registrars and hosts.
Meta Pixel trackers are used on the malicious pages for performance tracking, which likely informs the refinement of the group's scamming strategies.
Detailed indicators of compromise and a list of domains associated with the scam are available on a GitHub page for further reference by security professionals.