BusinessCybersecurityNewswireTechnology

Gambling Network Secretly Doubles as Cybercrime Infrastructure

Originally published on: December 4, 2025
▼ Summary

– A vast, 14-year-old network of over 328,000 domains is used for illegal gambling, malware distribution, and providing threat actors with command-and-control services in Indonesia.
– The operation has evolved from simple gambling to include SEO manipulation, mobile malware, website hacking, and the hijacking of government and enterprise subdomains.
– Attackers use hijacked government subdomains to deploy covert reverse proxies, making malicious traffic appear as normal, encrypted visits to legitimate sites.
– The group’s scale, longevity, and estimated annual cost of hundreds of thousands to millions of dollars indicate a mature operation beyond typical cybercrime.
– While classified as an advanced persistent threat, there is no current evidence linking the group to a specific government entity, though it likely has Indonesian-speaking operatives.

A sophisticated and long-running cybercrime operation has been uncovered, revealing a network that masquerades as an illegal online gambling service while secretly functioning as a full-scale infrastructure for malware distribution and command-and-control activities. Security researchers have traced this operation, which primarily targets Indonesian citizens, back over fourteen years, uncovering a vast web of malicious domains and compromised systems.

The infrastructure is both extensive and deeply entrenched. According to the research, it currently encompasses over 328,000 domains. This figure includes a mix of purchased domains, a staggering number of hacked websites, and even hijacked subdomains belonging to legitimate organizations, including government entities. Beyond the domains, the operation is linked to thousands of malicious Android applications, dozens of compromised GitHub accounts hosting attack tools, and hundreds of deceptive domain lookalikes designed to mimic popular brands for future attacks.

This criminal enterprise began around 2011, initially focusing on facilitating gambling. Over more than a decade, it has dramatically evolved and expanded its capabilities. The group now engages in search engine optimization manipulation, distributes mobile malware, systematically hacks websites, and hijacks domains and subdomains to support its goals. A common tactic involves using social media and messaging platforms to advertise gambling sites and lure users into downloading fraudulent Android apps. These applications may show a functional gambling interface, but secretly they can download additional malicious code, access device storage, and communicate with attacker-controlled servers.

A particularly alarming aspect of their method is the weaponization of trusted web properties. The attackers exploit vulnerabilities in common web components, expired cloud resources, and lapsed security certificates to hijack subdomains. On some, they simply host fake content. On more sensitive targets, like government and corporate subdomains, they deploy sophisticated reverse proxies. These proxies make malicious traffic appear as normal, encrypted visits to a legitimate government website, making detection exceptionally difficult for security tools. In some cases, because subdomains share login session cookies, hijacking a single subdomain can grant attackers direct access to active user sessions, completely bypassing passwords and multi-factor authentication.

The scale and sophistication suggest this is no ordinary cybercriminal group. Maintaining such a vast network, involving domain registrations, certificate management, malware development, and ongoing exploitation campaigns, is estimated to cost hundreds of thousands to millions of dollars annually. The illegal gambling likely serves a dual purpose: generating revenue and providing a plausible cover for the broader malicious infrastructure. The covert proxies on hijacked government domains are perfectly positioned to relay command-and-control instructions or exfiltrate stolen data under the guise of legitimate traffic.

While the group displays the hallmarks of an advanced persistent threat due to its longevity, funding, and tradecraft, there is no current evidence linking it to a specific nation-state. Researchers assess that the operators are likely Indonesian or include Indonesian-speaking members, given the clear focus on that demographic. The discovery underscores a dangerous blurring of lines between financially motivated cybercrime and highly organized, state-level cyber operations, presenting a significant and persistent threat to digital security.

(Source: HelpNet Security)

Topics

online gambling 95% domain hijacking 92% cybersecurity threats 91% malware distribution 90% advanced persistent threat 89% command control 88% reverse proxies 87% infrastructure scale 86% website hacking 85% government targeting 83%