Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

DNS Used to Hide Fake Investment Platform Schemes

0
Medium
Published: Thu Feb 19 2026 (02/19/2026, 15:26:29 UTC)
Source: AlienVault OTX General

Description

The Savvy Seahorse threat actor operates a sophisticated DNS-based campaign to lure victims into fake investment platforms via Facebook ads. They leverage DNS CNAME records to create a dynamic traffic distribution system that enables frequent IP address changes and evasion of detection. The campaign targets multiple languages and uses fake ChatGPT and WhatsApp bots to convince victims to create accounts and deposit funds, which are then transferred to Russian banks. The infrastructure includes approximately 4,200 base domains with CNAME records pointing to subdomains of b36cname[. ]site. Campaigns are short-lived, typically lasting 5-10 days per subdomain, complicating detection and takedown efforts. This threat has been active since August 2021 and employs dedicated hosting to maintain operational security. The attack exploits DNS abuse and social engineering to facilitate financial fraud on a global scale.

AI-Powered Analysis

AILast updated: 02/19/2026, 18:16:26 UTC

Technical Analysis

Savvy Seahorse is a financially motivated threat actor that employs advanced DNS abuse techniques to facilitate fake investment platform scams. The actor uses DNS CNAME records to implement a traffic distribution system, which allows them to dynamically update IP addresses associated with their malicious domains. This approach enables rapid infrastructure changes that evade traditional detection and blocking mechanisms. The campaign is propagated primarily through Facebook advertisements targeting users in multiple languages, increasing the scope and reach of the scam. Victims are engaged via fake ChatGPT and WhatsApp bots, which simulate legitimate interactions to build trust and convince users to create accounts and deposit funds. These funds are then funneled to Russian banks, indicating a financial fraud operation with a probable nexus to Russia. The infrastructure supporting these campaigns is extensive, with around 4,200 base domains using CNAME records linked to subdomains of b36cname[.]site. Each subdomain is used for a short duration of 5-10 days, complicating efforts to track and block the entire malicious infrastructure. The actor has been active since August 2021, using dedicated hosting services to maintain operational security and avoid attribution. The campaign leverages DNS abuse, domain generation algorithms, and social engineering tactics, combined with geofencing to target specific regions or language groups. This multi-faceted approach makes detection and mitigation challenging for defenders.

Potential Impact

Organizations and individuals worldwide face financial losses due to fraudulent investment schemes facilitated by this campaign. Financial institutions, especially those in Russia receiving illicit funds, are indirectly impacted by money laundering risks. Social media platforms like Facebook are exploited to distribute malicious ads, undermining user trust and platform integrity. The use of DNS abuse and dynamic infrastructure complicates detection and takedown efforts, increasing the persistence and reach of the scam. Victims suffer direct monetary loss and potential exposure of personal information when creating accounts on fake platforms. The campaign's multi-language targeting broadens its impact across diverse regions, increasing the global scale of financial fraud. Additionally, the frequent IP changes and short-lived domains strain cybersecurity teams' ability to maintain effective blocklists and threat intelligence. This threat also highlights vulnerabilities in DNS infrastructure and social media ad vetting processes, which can be exploited for large-scale scams.

Mitigation Recommendations

Organizations should implement advanced DNS monitoring solutions that can detect unusual CNAME record patterns and rapid IP address changes indicative of traffic distribution systems. Security teams should collaborate with social media platforms to identify and remove fraudulent advertisements promptly. Deploying threat intelligence feeds that track domain generation algorithms and known malicious domains like those linked to b36cname[.]site can improve proactive blocking. User education campaigns should focus on recognizing fake investment platforms and the risks of interacting with unsolicited ads or bots. Financial institutions should enhance transaction monitoring to detect suspicious deposits linked to fraudulent schemes. Implementing multi-factor authentication and transaction verification can reduce the risk of unauthorized fund transfers. Security operations centers (SOCs) should automate detection rules for short-lived domains and integrate DNS abuse indicators into their incident response workflows. Finally, cooperation with law enforcement and international partners is essential to disrupt the financial infrastructure supporting these scams.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.infoblox.com/blog/threat-intelligence/beware-the-shallow-waters-savvy-seahorse-lures-victims-to-fake-investment-platforms-through-facebook-ads"]
Adversary
Savvy Seahorse
Pulse Id
69972ba5880a6314482ad22a
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domainabyss-world-asset.net
domainauproject.xyz
domainb36cname.site
domainbadanie-pl.site
domainblog-vcnews.site
domaincapital-inwest.site
domaincrypto-payer.co
domaindasms.xyz
domainduums.xyz
domainesbopehan.xyz
domainfuttes.site
domaingernik.site
domaingetyourapi.site
domaingroovetonprogramz.xyz
domainkingsman-adv.org
domainlintant.top
domainmakeyourpay.com
domainmipinves.site
domainmixx-today.site
domainnewprogrms.xyz
domainoksitepl.site
domainonlinedietslimm.xyz
domainprostprogr.xyz
domainrslimess.xyz
domainsatin1.xyz
domainsunproflts.site
domainultra-vest.one
domainadin.czproftes.xyz
domainbwn.objectop.xyz
domaingoiin.baltez-offic.xyz
domainhmz.coivalop.xyz
domainland-nutra.b36cname.site
domainnew.xsdelx.top
domainnews.beneffit.top
domainprocessing.betatransfer.io
domainqiwi.bppsa.com
domainsci.pointpayment.net
domainsej.progmedisd.site
domainsun.autotrdes.top
domainvisa.lukzev.xyz
domainymoney.bppsa.com

Threat ID: 69974fe8d7880ec89b065c1d

Added to database: 2/19/2026, 6:01:12 PM

Last enriched: 2/19/2026, 6:16:26 PM

Last updated: 2/20/2026, 2:21:45 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats