{"id":10876,"date":"2025-01-08T09:00:20","date_gmt":"2025-01-08T17:00:20","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=10876"},"modified":"2025-01-08T09:17:38","modified_gmt":"2025-01-08T17:17:38","slug":"muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\/","title":{"rendered":"Muddling Malspam: The Use of Spoofed Domains in Malicious Spam"},"content":{"rendered":"<h3>Lessons from a Malspam Hunt<\/h3>\n<p>&nbsp;<\/p>\n<h3>Spoofed Domains to Bypass Safeguards<\/h3>\n<p>Despite security safeguards, malicious spam still pays off.  To get beyond controls, threat actors fake or spoof an email&#8217;s sender address to make it appear more legitimate.    <\/p>\n<p><a href=\"https:\/\/insights.infoblox.com\/resources-research-report\/infoblox-research-report-muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\" target=\"_blank\"><strong>In recent research<\/strong><\/a>, Infoblox Threat Intel analyzed spam sent from a Chinese actor named Muddling Meerkat, a mysterious actor conducting DNS operations via the Chinese Great Firewall. The exercise discovered multiple malicious spam campaigns and the widespread usage of domain spoofing.<\/p>\n<h3>Hunting ingredients: homegrown telemetry and community feedback<\/h3>\n<p>While questions remained after our initial publication on Muddling Meerkat, we shared what we knew and reached out to the larger community for additional comments. Received feedback included in-depth abuse notification reports caused by large-scale spam distribution, pointing to a Chinese Source IP, and Infoblox owned some of the abused domains. <\/p>\n<p>With this knowledge in mind, Infoblox Threat Intel started a hunt correlating our own DNS authoritative name server logs with data collected from spam traps. By pivoting back and forth between all data, we intended to learn more about the breadth of Muddling Meerkat malspam operations. This led to additional insights into the usage of malspam conducted by related China-linked actors. Here are four key observations obtained:<\/p>\n<p><strong>Catch #1: QR Code Phishing Campaigns<\/strong><\/p>\n<p>The largest group of malspam evolved around phishing campaigns targeting residents of greater China. These campaigns spoof old domains and distribute attachments containing QR codes that lead to phishing sites.  The attackers employ a two-step method where recipients open the email attachment first and then use WhatsApp to scan the QR code. This methodology complicates security measures by moving the interaction to an encrypted chat app, which is out of sight of most security tools. In the second step, the threat actors also used registered domain generation algorithms (RDGAs) to create random domains that are active for only a brief period to further evade detections. <\/p>\n<p><strong>Catch #2: Japanese Phishing Campaigns<\/strong><\/p>\n<p>A sizable percentage of collected spam originated from sources with three-letter hostnames. By grouping these, we discovered a malspam operation targeting Japanese users. This campaign involved emails referencing popular brands like Electronic Toll Collection (ETC), Sumitomo Mitsui Banking Corporation (SMBC), Amazon, and Mastercard. The emails urged users to authenticate due to security concerns, leading them to a traffic distribution system (TDS) and eventually to fake login pages that steal credentials.   <\/p>\n<p>Another campaign targeted Japanese users with spam messages related to MyEtherWallet, a popular crypto wallet. These messages used lookalike domains and sometimes included Japanese text, asking users to log in to their accounts. Although the links appeared legitimate, they led to fake domains created by the threat actors. <\/p>\n<p>The use of fake domains, domain spoofing and TDSs all indicate how these Chinese actors apply multiple tactics to stay out of the threat research spotlight and evade detection.<\/p>\n<p><strong>Catch #3: Familiar Extortion Campaigns<\/strong><\/p>\n<p>We also found campaigns using well-known spam tactics that featured domain spoofing. One common tactic involved extortion emails claiming that a hacker had accessed the user&#8217;s device and recorded embarrassing activities.  These emails spoofed the user&#8217;s email address, making it appear that the user sent the message from their own account. The email demanded payment in Bitcoin to remove the malware, with the amount varying across messages. Despite the surprising nature of these emails, the scam is effective, as some Bitcoin wallets associated with these campaigns contained significant funds. These campaigns, and others using spoofed sender domains, likely originate from lingering spam bots rather than the work of sophisticated actors such as Muddling Meerkat.<\/p>\n<p><strong>Catch #4: Mysterious Malspam<\/strong><\/p>\n<p>The research uncovered a mysterious and active spam campaign using spoofed sender domains and benign Excel spreadsheet attachments with no evident purpose. These emails, which spoof domains like those used by Muddling Meerkat, come from a Chinese freight company. The email addresses vary widely and include synthetic usernames like &#8220;Edward.Evelyn&#8221; and &#8220;Heidi.Gracie.&#8221; The campaigns were observed every two out of three days in 2024, with subject lines indicating new freight rate updates, however, no malicious content was found in these files. <\/p>\n<p>Interestingly, the emails also do not include a call to action and are just a continually updated set of freight rates for a Chinese shipping company. Domain spoofing removes any sense of legitimacy, making it unclear why either a shipping company or a malicious actor would send such emails. <\/p>\n<p>A similar technique was seen in personal spam, where emails provided mutual fund values from an Indian investment company. These messages, flagged by Google Mail as suspicious spam, also contained an innocuous spreadsheet and a PDF file. In this case, the sender&#8217;s username was a former acquaintance, suggesting their email account was hacked for spam operations. However, the value of these messages for the spam actor remains unclear.<\/p>\n<h3>Takeaway: Domain Spoofing is a Widely Used Tactic<\/h3>\n<p>When we first published Muddling Meerkat in March 2024, we identified about 20 related domains but now have confirmed several hundred others discovered in spam traps. Unfortunately, we were not able to correlate them back to our own DNS authoritative name server logs, leaving a mystery about the actor.   <\/p>\n<p>While we were unable to determine what Muddling Meerkat is up to, our investigation was successful in that we learned a great deal about how actors use spoofed domains in malspam, which can inform ways to stop them. For threat researchers like us, that insight is often every bit as important as knowing all the intentions behind them.<\/p>\n<p>Download <a href=\"https:\/\/insights.infoblox.com\/resources-research-report\/infoblox-research-report-muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\" target=\"_blank\"><strong>the latest report<\/strong><\/a> and explore how Infoblox Threat Intel analyzed spam campaigns originating from behind the Great Chinese Firewall.  <\/p>\n<style>\n.code-format {\n\tfont-family: 'Courier New';\n}\n.image-caption {\n    font-size: 12px;\n}\n.list-spacing li{margin-bottom:20px}\nol.list-spacing > li::marker {\n    font-weight: 700;\n}\n<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">Muddling Malspam<\/span>: The Use of Spoofed Domains in Malicious Spam');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lessons from a Malspam Hunt &nbsp; Spoofed Domains to Bypass Safeguards Despite security safeguards, malicious spam still pays off. To get beyond controls, threat actors fake or spoof an email&#8217;s sender address to make it appear more legitimate. In recent research, Infoblox Threat Intel analyzed spam sent from a Chinese actor named Muddling Meerkat, a [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":10878,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[294,1133,1134,1135,307,1136],"class_list":{"0":"post-10876","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-malspam","9":"tag-spam-hunt","10":"tag-domain-spoofing","11":"tag-muddling-meerkat","12":"tag-phishing","13":"tag-extortion-campaign","14":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Domain Spoofing Exposed: Lessons from Infoblox&#039;s Spam Hunt<\/title>\n<meta name=\"description\" content=\"Discover how Infoblox Threat Intel uncovered widespread usage of malicious spam and domain spoofing from Chinese actors. Learn about the tactics and gain insights into how threat actors bypass security safeguards.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Domain Spoofing Exposed: Lessons from Infoblox&#039;s Spam Hunt\" \/>\n<meta property=\"og:description\" content=\"Discover how Infoblox Threat Intel uncovered widespread usage of malicious spam and domain spoofing from Chinese actors. Learn about the tactics and gain insights into how threat actors bypass security safeguards.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-08T17:00:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-08T17:17:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Domain Spoofing Exposed: Lessons from Infoblox&#039;s Spam Hunt\" \/>\n<meta name=\"twitter:description\" content=\"Discover how Infoblox Threat Intel uncovered widespread usage of malicious spam and domain spoofing from Chinese actors. Learn about the tactics and gain insights into how threat actors bypass security safeguards.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam-thumbnail.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Muddling Malspam: The Use of Spoofed Domains in Malicious Spam\",\"datePublished\":\"2025-01-08T17:00:20+00:00\",\"dateModified\":\"2025-01-08T17:17:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\\\/\"},\"wordCount\":932,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam-thumbnail.jpg\",\"keywords\":[\"Malspam\",\"Spam hunt\",\"Domain spoofing\",\"Muddling Meerkat\",\"Phishing\",\"Extortion Campaign\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\\\/\",\"name\":\"Domain Spoofing Exposed: Lessons from Infoblox's Spam Hunt\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam-thumbnail.jpg\",\"datePublished\":\"2025-01-08T17:00:20+00:00\",\"dateModified\":\"2025-01-08T17:17:38+00:00\",\"description\":\"Discover how Infoblox Threat Intel uncovered widespread usage of malicious spam and domain spoofing from Chinese actors. Learn about the tactics and gain insights into how threat actors bypass security safeguards.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam-thumbnail.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Muddling Malspam: The Use of Spoofed Domains in Malicious Spam\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Domain Spoofing Exposed: Lessons from Infoblox's Spam Hunt","description":"Discover how Infoblox Threat Intel uncovered widespread usage of malicious spam and domain spoofing from Chinese actors. Learn about the tactics and gain insights into how threat actors bypass security safeguards.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\/","og_locale":"en_US","og_type":"article","og_title":"Domain Spoofing Exposed: Lessons from Infoblox's Spam Hunt","og_description":"Discover how Infoblox Threat Intel uncovered widespread usage of malicious spam and domain spoofing from Chinese actors. Learn about the tactics and gain insights into how threat actors bypass security safeguards.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\/","og_site_name":"Infoblox Blog","article_published_time":"2025-01-08T17:00:20+00:00","article_modified_time":"2025-01-08T17:17:38+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam-thumbnail.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_title":"Domain Spoofing Exposed: Lessons from Infoblox's Spam Hunt","twitter_description":"Discover how Infoblox Threat Intel uncovered widespread usage of malicious spam and domain spoofing from Chinese actors. Learn about the tactics and gain insights into how threat actors bypass security safeguards.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam-thumbnail.jpg","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Muddling Malspam: The Use of Spoofed Domains in Malicious Spam","datePublished":"2025-01-08T17:00:20+00:00","dateModified":"2025-01-08T17:17:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\/"},"wordCount":932,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam-thumbnail.jpg","keywords":["Malspam","Spam hunt","Domain spoofing","Muddling Meerkat","Phishing","Extortion Campaign"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\/","name":"Domain Spoofing Exposed: Lessons from Infoblox's Spam Hunt","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam-thumbnail.jpg","datePublished":"2025-01-08T17:00:20+00:00","dateModified":"2025-01-08T17:17:38+00:00","description":"Discover how Infoblox Threat Intel uncovered widespread usage of malicious spam and domain spoofing from Chinese actors. Learn about the tactics and gain insights into how threat actors bypass security safeguards.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam-thumbnail.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/muddling-malspam-the-use-of-spoofed-domains-in-malicious-spam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Muddling Malspam: The Use of Spoofed Domains in Malicious Spam"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/10876","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=10876"}],"version-history":[{"count":7,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/10876\/revisions"}],"predecessor-version":[{"id":10887,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/10876\/revisions\/10887"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/10878"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=10876"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=10876"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=10876"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}