Muddling Meerkat | |
Location | China |
Date of initial activity | 2019 |
Suspected attribution | State-sponsored threat group |
Government Affiliation | People’s Republic of China (PRC) |
Motivation | The motivation for these operations is unclear. Muddling Meerkat might be mapping networks and assessing their DNS security to plan future attacks. Alternatively, their goal could be to generate DNS "noise," which helps conceal more malicious activities and confuses administrators attempting to identify the source of unusual DNS requests. |
Active | Yes |
Overview
Muddling Meerkat is a newly identified cluster, believed to be a People’s Republic of China (PRC) nation-state actor. This group conducts active operations via DNS by generating large volumes of widely distributed queries, which are then propagated through the internet using open DNS resolvers. Their operations are closely linked with two major topics associated with China and Chinese actors: the Chinese Great Firewall (GFW) and Slow Drip, or random prefix, distributed denial-of-service (DDoS) attacks. At first glance, Muddling Meerkat’s activities resemble DNS DDoS attacks; however, it appears unlikely that their immediate goal is to cause a denial of service. Their operations are long-running, reportedly beginning in October 2019, with a notable increase in activity observed in September 2023, and exhibit a high level of expertise in DNS. Every aspect of Muddling Meerkat’s operations reflects sophistication and a profound understanding of DNS. The activities include behaviors not previously reported for the GFW, suggesting a connection to Chinese nation-state actors. While some aspects of their operations resemble Slow Drip attacks, the exact motivation and objectives of Muddling Meerkat remain unclear. Researchers’ major findings regarding Muddling Meerkat’s operations include:- Using servers in Chinese IP space to conduct campaigns by making DNS queries for random subdomains to a wide array of IP addresses, including open resolvers.
- Inducing responses from the GFW that are not observed under normal circumstances.
- Incorporating false MX records from random Chinese IP addresses, a type of deception not previously reported for either the GFW or GC.
- Triggering MX record queries, along with other record types, for short random hostnames of a set of domains outside the actor’s control in the .com and .org top-level domains (TLDs) from devices distributed worldwide, likely using open resolvers.
- Using “super-aged” domains, typically registered before the year 2000, to avoid DNS blocklists and blend in with old malware.
- Selecting domains for abuse based on their length and age rather than their current status and ownership; while many of these domains are abandoned or repurposed for questionable use, others are actively used by legitimate entities.
- Conducting campaigns lasting one to three days, similar to ExploderBot (detailed below), on a fairly continuous basis.
- Avoiding large-scale spoofing of source IP addresses, instead initiating DNS queries from dedicated servers.
- Limiting the size of their operations to avoid detection and service disruptions like those caused by ExploderBot.
- Possibly conducting operations in discrete components, creating different DNS patterns over time.
Common targets
Networks worldwide