A recent investigation by cybersecurity firm Malanta suggests that Indonesia’s extensive gambling ecosystem may be a sophisticated front for state-sponsored cyber activity. This decade-long operation has long been misconstrued as mere cybercrime, but new findings indicate a level of scale and complexity typically associated with advanced persistent threat (APT) actors.
According to Kobi Ben Naim, CEO of Malanta, the combination of longevity, scale, cost, and sophistication of this operation surpasses the characteristics of ordinary gambling scams. “That’s why we classify it as an APT and describe it as state-sponsored-level,” he stated, while clarifying that direct evidence linking it to a specific government entity remains unconfirmed.
The Vast Infrastructure Behind the Operation
Malanta’s research reveals a unified cyber infrastructure that has been active since at least 2011. This extensive network encompasses over 328,000 domains, including 236,000 gambling sites, 1,400 hijacked subdomains, and numerous malicious Android applications. Such an ecosystem rivals established APT groups, indicating a threat capable of staging large-scale operations over several years.
Additionally, the operation has leveraged stolen credentials and reverse proxies embedded within government and enterprise environments. Over 500 impersonation domains mimicking major brands have also been identified, further emphasizing the operation’s potential impact on national security and supply chains.
Advanced Threat Techniques
Unlike conventional gambling fraud, this operation employs a mix of domain hijacking, cloud resource staging, mobile malware distribution, and extensive credential trafficking. Threat actors hijack subdomains, including those affiliated with Western government entities, for purposes such as session-cookie theft and covert command-and-control tunneling. This creates stealthy pathways that obscure malicious traffic within legitimate enterprise and governmental frameworks.
Malanta’s analysis of Indicators of Pre-Attack (IoPA) revealed critical insights, including:
– Newly created brand-impersonating domains not yet weaponized
– Misconfigured or abandoned cloud resources staged for future malware delivery
– AI-generated phishing templates in development
– Domain takeover vectors, including dangling DNS and expired certificates
This pre-attack visibility allowed analysts to link thousands of previously unrelated assets into a unified APT-scale campaign. The findings highlight systemic exploitation of cloud misconfigurations and failures in domain hygiene.
Strengthening Cyber Defenses
As modern threat campaigns increasingly target misconfigured domains and cloud assets, organizations are urged to adopt a layered security approach. Traditional perimeter defenses no longer suffice against adversaries who blend commodity infrastructure with hijacked domains and staged cloud resources.
Key recommendations to bolster security posture include:
– Conducting thorough audits of DNS records, cloud assets, and subdomains to eliminate takeover paths.
– Implementing robust web protections such as Content Security Policy (CSP), Subresource Integrity (SRI), and continuous monitoring for unauthorized domain activity.
– Enhancing cloud governance through Infrastructure as Code (IaC) scanning and enforcing least-privilege controls.
– Monitoring network and application traffic for anomalies, including suspicious POST requests and brand impersonation domains.
– Adopting zero-trust segmentation and identity controls to limit lateral movement and detect abnormal authentication events.
These measures can help organizations develop resilience against similar cyber threats.
Changing Landscape of Cyber Threats
The shift toward infrastructure-first attacks is evident as malicious actors distribute assets across cloud platforms and hijacked domains. By blending into trusted services, attackers gain stealth and automation capabilities to regenerate infrastructure quickly. This trend complicates traditional threat intelligence filters, allowing attackers to maintain long-lived infrastructure with minimal resistance.
The merging of criminal and nation-state tactics signals a significant change in attacker behavior. To counter this evolution, defenders must transition from reactive detection to proactive disruption, identifying and dismantling malicious assets before they can be weaponized. Staying ahead of these developing threats necessitates robust threat intelligence feeds capable of detecting emerging attacker infrastructure before it escalates into active campaigns.
As this situation continues to evolve, awareness and adaptive strategies will be critical in safeguarding against the sophisticated cyber landscape emerging from Indonesia’s gambling network.







































