5 December, 2025
indonesia-s-gambling-ecosystem-may-conceal-state-sponsored-cyber-threats

Recent research from the cybersecurity firm Malanta has revealed a sophisticated cyber operation linked to Indonesia’s extensive gambling ecosystem. This operation, which has been active since at least 2011, may not only be a hub for routine cybercrime but could also serve as a front for state-sponsored activities. Malanta’s findings suggest that the scale and complexity of this operation surpass typical gambling scams, indicating potential links to advanced persistent threat (APT) actors.

According to Kobi Ben Naim, CEO of Malanta, the operation’s longevity, cost, and sophistication align with characteristics commonly associated with state-sponsored cyber activities. “This combination — longevity, scale, cost, and sophistication — goes well beyond a typical ‘quick-hit’ gambling scam or financially motivated crew,” he stated. While Ben Naim refrained from directly linking the operation to any specific government entity, the implications raise concerns about national security.

Infrastructure of a Major Cyber Operation

Malanta’s research outlines a unified cyber infrastructure that includes over 328,000 domains and 236,000 gambling sites. The operation features more than 1,400 hijacked subdomains and thousands of malicious Android applications. This extensive ecosystem rivals established APT groups in both size and operational maturity. The infrastructure allows for large-scale operations, indicating a capability to stage attacks silently over many years.

The analysis revealed that the operation incorporates stolen credentials, reverse proxies embedded within both government and corporate environments, and over 500 impersonation domains mimicking well-known brands. The reach of this operation into Western government systems and cloud environments has significant implications for national security and the integrity of supply chains.

Malanta’s investigation highlights how this cyber operation employs a mix of domain hijacking, cloud resource staging, mobile malware distribution, and credential trafficking. Attackers utilize hijacked subdomains, including those linked to Western government entities, for session-cookie theft and covert command-and-control (C2) tunneling. These methods create stealth pathways that blend malicious traffic with legitimate enterprise activities, complicating detection efforts.

Defensive Measures Against Evolving Threats

In light of these findings, cybersecurity experts emphasize the need for organizations to strengthen their defenses against such sophisticated threats. Traditional perimeter defenses are inadequate against the evolving tactics employed by cyber adversaries. A layered security approach is essential to enhance visibility, harden configurations, and improve detection capabilities.

Organizations are advised to conduct comprehensive audits of their DNS records, cloud assets, and subdomains to eliminate potential takeover paths. Implementing robust web protections, such as Content Security Policy (CSP), Subresource Integrity (SRI), and Secure/HttpOnly cookies, is crucial. Continuous monitoring for unauthorized domain activity will further bolster defenses.

Strengthening cloud governance through Infrastructure as Code (IaC) scanning, enforcing least-privilege controls, and utilizing short-lived credentials can significantly reduce vulnerabilities. Monitoring network and application traffic for anomalies, such as suspicious POST requests and brand impersonation domains, is also vital.

Companies should adopt zero-trust segmentation to limit lateral movement within their networks and improve detection of abnormal authentication events. Expanding threat intelligence and Security Operations Center (SOC) capabilities will enhance organizations’ ability to identify hijacked subdomains and misuse of cloud infrastructure.

As cyber threats evolve, so must the strategies to combat them. The convergence of criminal and state-sponsored tactics necessitates a proactive approach to cybersecurity. Identifying and dismantling malicious assets before they can be weaponized will be key to maintaining security in an increasingly complex digital landscape.

In conclusion, the revelations surrounding Indonesia’s gambling ecosystem serve as a wake-up call for organizations worldwide. The potential for state-sponsored cyber activity hidden within seemingly benign operations underscores the importance of vigilance and comprehensive security measures in the face of evolving threats.