Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Windows BitLocker 0-Day Allows Vulnerability Enables
May 14, 2026
SOCs & MSSPs Prevent Phishing Missed Incidents Email
May 13, 2026
Fragnesia Linux Vulnerability Let Attackers Gain Root Privileges
May 13, 2026
Home/Threats/FUNNULL Triad Nexus Resurfaces with 1 FUNNULL-Linked Rotating
Threats

FUNNULL Triad Nexus Resurfaces with 1 FUNNULL-Linked Rotating

A cybercriminal group linked to the FUNNULL Content Delivery Network has resurfaced, deploying a significantly more sophisticated and evasive infrastructure. Known as Triad Nexus, the group has...

Jennifer sherman
Jennifer sherman
April 15, 2026 3 Min Read
9 0

A cybercriminal group linked to the FUNNULL Content Delivery Network has resurfaced, deploying a significantly more sophisticated and evasive infrastructure.

Known as Triad Nexus, the group has rebuilt its global fraud operation following U.S. Treasury sanctions, deploying over 175 randomly rotating CNAME domains to power a sprawling network of scam portals that target victims across multiple countries.

Triad Nexus is not a new player in the threat landscape. The group is deeply rooted in organized criminal networks across Asia and has been actively running investment scams, money laundering operations, and illegal gambling platforms since at least 2022.

Its earlier campaigns relied heavily on the FUNNULL CDN as the primary backbone, enabling fast delivery of fraudulent websites designed to look exactly like trusted global brands.

What changed after the U.S. sanctions was not the group’s criminal intent — it was their method of concealment.

Following the May 2024 federal sanctions, the group rapidly pivoted to what researchers describe as “infrastructure laundering.”

Rather than relying solely on low-reputation servers, Triad Nexus began hijacking legitimate enterprise cloud accounts at major providers including Amazon Web Services, Cloudflare, Google, and Microsoft.

By routing malicious traffic through these trusted platforms, the group created an appearance of legitimacy that made its fake portals far harder to detect or block.

Silent Push analysts and researchers identified this tactical shift as a major evolution, noting that the group had abandoned stable CNAME domains in favor of a rotating pool of over 175 randomly generated CNAME domains — each one connecting clusters of fraudulent websites to stolen or illicitly acquired IP addresses.

The scale of the fraud is staggering. Triad Nexus has been linked to over one billion dollars in reported victim losses, with individual losses averaging around $47,000.

The group primarily runs “pig butchering” scams, where victims are manipulated over weeks or months into investing large sums into fake cryptocurrency platforms.

Their catalog of fraudulent portals includes pixel-perfect clones of luxury brands like Tiffany, Cartier, and Chanel, financial platforms like Western Union and MoneyGram, and banking portals falsely tied to Wells Fargo, Goldman Sachs, and Bank of America.

To avoid law enforcement attention after the sanctions, the group also launched a series of “clean” front companies — entities with professional branding and fabricated operating histories designed to manufacture trust among unsuspecting users.

One particularly revealing example is a fake CDN provider operating as cdnbl.com, which falsely claims to have served clients since 2007. Domain registration records confirm it was only created in March 2024, exposing the deception at its core.

Geographic Evasion and the Rotating CNAME Infrastructure

One technically alarming aspect of Triad Nexus’s rebuilt operation is its deliberate use of multi-layered CNAME chains to hide the true destination of its traffic.

A CNAME, or Canonical Name record, is a DNS entry that redirects one domain to another. Standard security tools typically only follow a single step in this chain, meaning the real final endpoint often goes completely undetected.

Triad Nexus actively exploits this blind spot. Its infrastructure routes traffic through multiple intermediate CNAME domains — sometimes three or four layers deep — before landing on a final IP address hosted on a reputable enterprise cloud platform.

CNAME chain between an IP and a client domain cluster (Source - Silent Push)
CNAME chain between an IP and a client domain cluster (Source – Silent Push)

This multi-layered redirection makes it extremely difficult for automated detection tools to trace traffic back to its true origin.

To further avoid oversight, the group has placed a deliberate U.S. block across many of its portals, displaying an error that reads “The region has been denied” to American visitors, while simultaneously expanding its scam operations into Spanish, Vietnamese, and Indonesian markets to keep its fraud profits flowing.

Organizations are strongly advised to move beyond reactive security measures. Security teams should adopt CNAME chain analysis capabilities, monitor for newly registered lookalike domains, enforce strict DNS resolution policies, and maintain deep visibility across all network layers to detect and disrupt threats of this nature before they reach end users.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

ExploitSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Microsoft Defender 0-Day Flaw Allows Privilege Escalation

Next Post

Windows BitLocker Flaw Lets Attackers Vulnerability Allows

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical SandboxJS Escape Vulnerability Allows Host Takeover
May 13, 2026
iOS 26.5 Brings End-to-end Encrypted RCS Messaging Between iPhone
May 13, 2026
Critical Exim BDAT GnuTLS Flaw Vulnerability Enables
May 13, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us