Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Triad Nexus Returns with Advanced Scam Infrastructure

Triad Nexus Returns with Advanced Scam Infrastructure

Posted on April 15, 2026 By CWS

A notorious cybercriminal group linked to the FUNNULL Content Delivery Network, known as Triad Nexus, has resurfaced with a more sophisticated and elusive operation. This group has established a vast network of scam portals using a rotating system of over 175 CNAME domains, targeting victims worldwide.

Triad Nexus’s Criminal Background

Triad Nexus is deeply entrenched in organized crime across Asia, engaging in investment scams, money laundering, and illegal gambling since at least 2022. The group initially used the FUNNULL CDN to efficiently deliver fraudulent websites mimicking reputable global brands. However, U.S. Treasury sanctions in May 2024 forced them to alter their methods.

In response to these sanctions, Triad Nexus adopted a tactic researchers call “infrastructure laundering.” They shifted from relying on low-reputation servers to hijacking legitimate cloud accounts from providers like Amazon, Cloudflare, Google, and Microsoft. This strategy allowed them to disguise malicious traffic through trusted platforms, enhancing the credibility of their fraudulent portals.

Innovative Infrastructure Tactics

Silent Push analysts noted a significant shift in Triad Nexus’s operations. The group abandoned static CNAME domains, opting instead for a rotating pool that connects clusters of fraudulent websites to stolen IP addresses. This method contributes to their estimated one billion dollars in victim losses, with individual losses averaging $47,000.

Triad Nexus primarily conducts “pig butchering” scams, manipulating victims into investing in fake cryptocurrency platforms over extended periods. Their fraudulent portals include clones of luxury brands like Tiffany and Cartier, as well as financial platforms like Western Union and MoneyGram, deceiving users into thinking they are interacting with legitimate services.

Geographic Evasion and Defensive Measures

The group employs multi-layered CNAME chains to obscure the true destination of their traffic. These chains redirect traffic through several intermediate domains before reaching the final IP address hosted on reputable cloud platforms. This complex redirection makes it challenging for security tools to trace the traffic back to its origin.

To further evade detection, Triad Nexus blocks U.S. visitors with a specific error message, while expanding its operations into Spanish, Vietnamese, and Indonesian markets. Organizations are advised to enhance their security measures, including CNAME chain analysis and strict DNS resolution policies, to detect and disrupt these threats effectively.

Stay updated on the latest developments by following us on Google News, LinkedIn, and X. Set CSN as your preferred source in Google for instant updates.

Cyber Security News Tags:cloud services, CNAME domains, Cybercrime, Cybersecurity, DNS security, fraud detection, FUNNULL CDN, global scams, investment scams, security measures, Triad Nexus

Post navigation

Previous Post: Microsoft Patches SharePoint Zero-Day and 168 Security Flaws
Next Post: Fortinet Addresses Critical Vulnerabilities in FortiSandbox

Related Posts

AppSuite PDF Editor Hacked to Execute Arbitrary Commands on The Infected System AppSuite PDF Editor Hacked to Execute Arbitrary Commands on The Infected System Cyber Security News
New MobileGestalt Exploit for iOS 26.0.1 Enables Unauthorized Writes to Protected Data New MobileGestalt Exploit for iOS 26.0.1 Enables Unauthorized Writes to Protected Data Cyber Security News
New Tool Released to Detect Cisco Secure Email Gateway 0-Day Vulnerability Exploited in the Wild New Tool Released to Detect Cisco Secure Email Gateway 0-Day Vulnerability Exploited in the Wild Cyber Security News
Threat Actors Personalize Phishing Attacks With Advanced Tactics for Malware Delivery Threat Actors Personalize Phishing Attacks With Advanced Tactics for Malware Delivery Cyber Security News
NodeBB Vulnerability Let Attackers Inject Boolean-Based Blind and PostgreSQL Error-Based Payloads NodeBB Vulnerability Let Attackers Inject Boolean-Based Blind and PostgreSQL Error-Based Payloads Cyber Security News
North Korean Chollima Actors Added BeaverTail and OtterCookie to Its Arsenal North Korean Chollima Actors Added BeaverTail and OtterCookie to Its Arsenal Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark