Hackers target Russian โ€˜bulletproofโ€™ hosting provider named Proton66

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
.bh__table_cell { padding: 5px; background-color: #FFFFFF; }
.bh__table_cell p { color: #2D2D2D; font-family: ‘Helvetica’,Arial,sans-serif !important; overflow-wrap: break-word; }
.bh__table_header { padding: 5px; background-color:#F1F1F1; }
.bh__table_header p { color: #2A2A2A; font-family:’Trebuchet MS’,’Lucida Grande’,Tahoma,sans-serif !important; overflow-wrap: break-word; }

Gone Phishing Banner

Welcome to Gone Phishing, your weekly cybersecurity newsletter that hooks you up with the latest threats before they reel you in! ๐ŸŽฃ๐Ÿ’ป๐Ÿ›ก๏ธ๐Ÿ›ก๏ธ๐Ÿ›ก๏ธ

Patch of the Week!ย ๐Ÿฉน

First thingโ€™s first, folks. Our weekly segment goes by many names. Patch of the Week, Tweak of the week. Okay, thatโ€™s itโ€ฆ ๐Ÿ˜ณย 

Congrats to Microsoft, the cybercriminals are no matchโ€ฆ for your patch! ๐Ÿฉน

Check out this freshly hatched patch ๐Ÿฃ

The Bill Gates have opened ๐Ÿ™ƒ

๐Ÿšจ Microsoft Fixes 121 Bugs in April Patch Tuesday: One Zero-Day Exploited in the Wild โš ๏ธ

If you haven't patched your Windows systems yet โ€” now's the time. Microsoftโ€™s April 2025 Patch Tuesday squashes 121 vulnerabilities, including 1 actively exploited zero-day (CVE-2025-29824).

๐Ÿ“Œ The Numbers:

๐Ÿงจ 11 Critical

๐Ÿšจ 110 Important

๐Ÿ•ต๏ธโ€โ™‚๏ธ 1 Zero-Day (exploited in the wild)

๐Ÿ”ฅ The Zero-Day:

โ—ย CVE-2025-29824 โ€“ A privilege escalation flaw in the Windows Common Log File System (CLFS) driver

โ—ย Exploited by ransomware tied to Storm-2460 using the PipeMagic malware

โ—ย Marked Important with a CVSS 7.8

๐Ÿ’ก CLFS remains a popular attack vectorโ€”Microsoft has patched more than 20 CLFS flaws in the last two years, with several tied to real-world attacks.

โš ๏ธ Other Notables:

โ—ย RCEs in Remote Desktop Gateway & LDAP (CVSS 8.1, Critical)

โ—ย Privilege Escalation in Active Directory Certificate Services

โ—ย SharePoint RCEs requiring authenticated access

๐Ÿ‘จโ€๐Ÿ’ป Affected components span everything from Azure, Office, and Visual Studio to Windows Kernel, Hyper-V, and even Bluetooth services.

๐Ÿ” Takeaway:

Patch ASAP. One of these is already being used by ransomware groups, and several others are marked as โ€œExploitation More Likely.โ€ Don't wait for the next breach.

Now, on to this weekโ€™s hottest cybersecurity news stories:ย 

  • ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป Hackers target Russian โ€˜bulletproofโ€™ hosting provider named Proton66 โšก

  • ๐Ÿ‡ GRAPELOADER: European diplomats targeted via wine-tasting lures ๐Ÿท

  • ๐Ÿ—ฝ U.S. hit with widespread toll fraud campaign via Chinese smishing kit ๐Ÿ‰

Donโ€™t play Russian Roulette with your online safety ๐ŸŽฒ

๐Ÿšจ Proton66: Russian Bulletproof Host Powers Surge in Global Cyberattacks ๐ŸŒ

Cybersecurity researchers are raising alarms about a wave of mass scanning, brute-force attacks, and exploit attempts traced to Proton66, a Russian bulletproof hosting provider long known to cater to cybercriminal operations.

๐Ÿ•ต๏ธโ€โ™‚๏ธ According to Trustwave SpiderLabs, the campaign has been ongoing since January 8, 2025, and is targeting organizations worldwide with fresh infrastructure and updated exploits.

๐Ÿ” The IP Blocks Behind the Storm

๐Ÿ“ก Key netblocks involved:

โ—ย 45.135.232.0/24

โ—ย 45.140.17.0/24

โ—ย 193.143.1[.]65

Researchers observed new or previously dormant IPs becoming suddenly active, launching:

โ—ย Mass network scans

โ—ย Credential brute-force attacks

โ—ย Exploit attempts targeting recent critical vulnerabilities

๐Ÿ› ๏ธ CVEs Under Fire

From February 2025, attackers have been exploiting top-tier vulnerabilities, including:

โ—ย CVE-2025-0108 โ€“ Auth bypass in Palo Alto PAN-OS

โ—ย CVE-2024-41713 โ€“ Input validation flaw in Mitel MiCollab

โ—ย CVE-2024-10914 โ€“ Command injection in D-Link NAS

โ—ย CVE-2024-55591 & CVE-2025-24472 โ€“ Auth bypass in Fortinet FortiOS

๐ŸŽฏ Exploitation of the Fortinet flaws has been linked to Mora_001, an initial access broker delivering a new ransomware strain named SuperBlack.

๐Ÿงฌ Malware Hosted on Proton66

The infrastructure is doubling as a launchpad for multiple malware campaigns, including:

๐Ÿ’ป XWorm โ€“ Delivered via LNK + PowerShell + obfuscated VBS + Base64-encoded .NET DLL

๐Ÿ“จ StrelaStealer โ€“ Spread via phishing to German users

๐Ÿ’ฅ WeaXor ransomware โ€“ A revamped Mallox variant, C2 hosted at 193.143.1[.]139

๐Ÿ”— In some cases, C2 servers and phishing pages for these strains were hosted directly on Proton66's IPs.

๐Ÿ“ฑ Android Phishing via WordPress Redirects

๐ŸŽฏ A sneaky mobile campaign uses compromised WordPress sites to redirect Android users to fake Google Play Store pages via:

โ—ย Malicious JavaScript hosted on Proton66

โ—ย Geo-targeting: French, Spanish, and Greek-speaking users

โ—ย Conditional logic: redirects only activate for real Android browsers, not bots, proxies, or VPNs

๐Ÿ‘€ Redirection logic checks:

โ—ย IP fingerprinting via ipify.org

โ—ย VPN/proxy detection via ipinfo.io

โ—ย Result? A malicious APK download masquerading as a legitimate app.

๐Ÿค Connections to PROSPERO and Beyond

Proton66 is reportedly tied to a linked AS called PROSPERO, previously spotlighted by Intrinsec for:

โ—ย Operating under the names Securehost and BEARHOST

โ—ย Offering bulletproof services on Russian-language cybercrime forums

๐Ÿงฉ Some Proton66/Prospero traffic was seen routing through infrastructure associated with Kaspersky Lab. Kaspersky has denied involvement, attributing the routing to automated DDoS service prefixes used by telecom partners.

๐Ÿšจ What You Can Do

Recommended defensive actions:

๐Ÿšซ Block all CIDR ranges linked to Proton66 and Chang Way Technologies (likely affiliated HK-based provider)

๐Ÿ” Monitor for:

โ—ย PowerShell + LNK execution chains

โ—ย Suspicious traffic to Proton66 IPs

โ—ย Unexpected APK installs from unknown sources

๐Ÿงฑ Deploy behavior-based endpoint protections to detect lateral movement and C2 activity

๐Ÿ“Œ TL;DR: Bulletproof Hosting, Real-World Threats

Proton66 isn't just a shady hosting provider โ€” it's now a core enabler of malware, phishing, and ransomware activity across multiple regions and threat groups. From Android APK lures to critical infrastructure exploits, the IP ranges tied to Proton66 are a hotbed of cybercrime.

๐Ÿ›ก๏ธ Stay vigilant. Block early. Hunt often.

The question isn't if your business will be targeted, but when.

Take your first step towards a more secure future. Register for FORWARD on June 4th and stack the deck in your favor against cyber adversaries. You'll Gain real-world recovery insights from industry peers

GRAPELOADER: wine not? ๐Ÿท๐Ÿ‘€๐Ÿ’€

๐Ÿšจ APT29 Targets Diplomats with GRAPELOADER & WINELOADER ๐Ÿท

Russian state-sponsored group APT29 (aka Cozy Bear) is back, this time with a stealthy phishing campaign targeting European diplomatic entities using wine-tasting event lures ๐Ÿ‡๐Ÿท.

๐Ÿ” Check Point uncovered the use of:

๐Ÿ‡ GRAPELOADER โ€“ a new initial-stage loader for fingerprinting, persistence, and payload delivery

๐Ÿท WINELOADER โ€“ an updated modular backdoor for later-stage operations

๐Ÿ“ฉ How the Attack Works

Phishing emails spoofing a European Ministry of Foreign Affairs send out fake wine-tasting invites

The attached wine.zip includes:

โ—ย wine.exe (legit PowerPoint binary)

โ—ย AppvIsvSubsystems64.dll (dependency)

โ—ย ppcore.dll (malicious DLL sideloaded via wine.exe)

GRAPELOADER runs, gains persistence via the Windows Registry, and phones home to drop the main payload โ€” believed to be WINELOADER

๐Ÿ•ต๏ธโ€โ™‚๏ธ Both loaders use code obfuscation, anti-analysis tricks, and modular structures for stealth and flexibility.

๐ŸŒ Target Scope

โ—ย Primary focus: Ministries of Foreign Affairs in Europe

โ—ย Secondary targets: Embassies and diplomatic staff in the Middle East

โ—ย Emails came from: bakenhof[.]com, silry[.]com

๐Ÿ”Ž Bonus Threat: Gamaredonโ€™s USB Worm

Meanwhile, Gamaredon (another Russian threat group) continues pushing its PteroLNK malware, infecting USB drives with sneaky LNK + VBScript combos to spread info-stealers like GammaSteel โ€” with heavy targeting of Ukraine.

๐Ÿ’ก APT29โ€™s campaign shows a pivot to layered loaders and social engineering over raw complexity, signaling a new phase in high-stakes cyber-espionage.

Learn how to make AI work for you

AI wonโ€™t take your job, but a person using AI might. Thatโ€™s why 1,000,000+ professionals read The Rundown AI โ€“ the free newsletter that keeps you updated on the latest AI news and teaches you how to use it in just 5 minutes a day.

Sign up to start learning.

Ah, the old smish and grib, eh? ๐Ÿ’€๐Ÿ’€๐Ÿ’€

๐Ÿšจ U.S. Toll Road Users Targeted in Massive SMS Phishing Campaign ๐Ÿš—

A widespread smishing campaign is hitting toll road users across the U.S., tricking them into handing over personal and financial data under the guise of unpaid toll notices.

๐Ÿ›‘ Active since October 2024, the campaign impersonates systems like E-ZPass, sending SMS and iMessage alerts to users in WA, FL, PA, VA, TX, OH, IL, and KS.

๐Ÿง  The Brains Behind It

โ—ย Smishing kits by Wang Duo Yu, a Chinese student-turned-cybercrime entrepreneur

โ—ย Distributed via Telegram for as little as $20โ€“$50 per kit

โ—ย Linked to the Smishing Triad, known for massive fake delivery scams in over 120+ countries

๐Ÿ“ฒ How the Scam Works

  1. Victims receive a fake toll notice via SMS/iMessage

  2. They're urged to reply "Y" to activate a malicious link

  3. Clicking redirects to a fake E-ZPass site after a fake CAPTCHA

  4. Users enter name, ZIP, and payment details โ€” all stolen instantly

  5. Some attackers use Ghost Tap to enroll cards in mobile wallets for further fraud

๐Ÿšจ The kits even include backdoors, enabling double theft โ€” victims are hit by both the attacker and the kit's creator.

๐Ÿ› ๏ธ Industrialized Smishing

โš ๏ธ 60,000+ domains linked to these toll scams

Powered by bulk SMS services like Oak Tel, offering:

โ—ย Spoofed sender names

โ—ย Victim-targeting tools

โ—ย Campaign dashboards

โ—ย SMS automation APIs

๐ŸŒ Expansion in Progress

The same actor is now pivoting to a new Lighthouse kit, targeting banks in Australia and APAC โ€” with alleged backing of โ€œ300+ front desk staffโ€ handling fraud operations globally.

๐Ÿงช Security firms like Cisco Talos, PRODAFT, and Resecurity are actively tracking the campaign, but the scale and infrastructure make takedown efforts tough.

๐Ÿ’ก Smishing kits have become commercialized cybercrime tools, making phishing campaigns more scalable and accessible than ever.

๐Ÿ—ž๏ธ Extra, Extra! Read all about it! ๐Ÿ—ž๏ธ

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • ๐Ÿ›ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐Ÿ“…

  • ๐Ÿ’ตCrypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐Ÿ†“

  • ๐Ÿ“ˆBitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐Ÿ‘พ

Let us know what you think.

So long and thanks for reading all the phish!

footer graphic cyber security newsletter

ClickFix up look sharp: state-sponsored hackers weaponise ClickFix

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
.bh__table_cell { padding: 5px; background-color: #FFFFFF; }
.bh__table_cell p { color: #2D2D2D; font-family: ‘Helvetica’,Arial,sans-serif !important; overflow-wrap: break-word; }
.bh__table_header { padding: 5px; background-color:#F1F1F1; }
.bh__table_header p { color: #2A2A2A; font-family:’Trebuchet MS’,’Lucida Grande’,Tahoma,sans-serif !important; overflow-wrap: break-word; }

Gone Phishing Banner

Welcome to Gone Phishing, your weekly cybersecurity newsletter that refuses to recognise hackers as biological humans ๐Ÿ‘€๐Ÿ™ˆ๐Ÿคฃ

Patch of the Week!ย ๐Ÿฉน

First thingโ€™s first, folks. Our weekly segment goes by many names. Patch of the Week, Tweak of the week. Okay, thatโ€™s itโ€ฆ ๐Ÿ˜ณ

Congrats to Apple, the cybercriminals are no matchโ€ฆ for your patch! ๐Ÿฉน

Youโ€™re the Apple of my eye ๐ŸŽ๐Ÿ‘๏ธ๐Ÿ™ƒ

๐Ÿšจ Apple Drops Critical Security Patches After Sophisticated Attacks Detected ๐Ÿ๐Ÿ”ฅ

If you're rocking an iPhone, iPad, Mac, Apple TV, or Vision Pro, itโ€™s update oโ€™clock โฐ๐Ÿ”ง Apple just patched two serious zero-day vulnerabilities being actively exploited in the wildโ€”yes, right now.

๐Ÿšจ Hereโ€™s whatโ€™s been fixed:

CVE-2025-31200 (CVSS 7.5)

๐Ÿ’ฅ Core Audio flaw โ€“ Can be triggered by a malicious audio stream (yup, just playing a tainted media file could let an attacker run code) ๐ŸŽต๐Ÿ’€

CVE-2025-31201 (CVSS 6.8)

๐Ÿ› ๏ธ RPAC component bypass โ€“ If an attacker already has read/write access, this bug could help them sneak past Pointer Authentication ๐Ÿšจ๐Ÿ”“

๐Ÿง  Apple says these were used in "extremely sophisticated attacks against specific individuals" โ€” think spyware, nation-state level stuff. Reported in part by Googleโ€™s Threat Analysis Group.

๐Ÿ”ง Fixes include:

โœ… Improved bounds checking (for the audio bug)

โœ… Removed the vulnerable code entirely (for the RPAC bypass)

๐Ÿ“ฆ These updates are now live for:

๐Ÿ“ฑ iOS & iPadOS 18.4.1 โ€“ iPhone XS & newer, various iPads

๐Ÿ’ป macOS Sequoia 15.4.1

๐Ÿ“บ tvOS 18.4.1

๐Ÿ‘“ visionOS 2.4.1

๐Ÿ’ก Reminder: Apple has now patched 5 actively exploited zero-days in 2025โ€”so this isnโ€™t rare, itโ€™s the new normal. Past issues have let bad actors:

Escalate privileges via Core Media

Disable USB lock protections

Escape the Safari/WebKit sandbox

๐Ÿ” What you should do:

โœ… Update nowโ€”even if you think youโ€™re not a target

โœ… Be cautious with suspicious media files or shady links

โœ… Keep auto-updates turned on across all Apple devices

๐Ÿ›ก๏ธ Bottom line: These bugs were being used in the wildโ€”that means real people were targeted. Whether you're a journalist, business exec, or just privacy-conscious, staying updated is the easiest way to block these high-level threats.

Stay sharp, stay patched. ๐Ÿโš”๏ธ

Now, on to this weekโ€™s hottest cybersecurity news stories:ย 

  • ๐Ÿ–ฑ๏ธ ClickFix up look sharp: state-sponsored hackers weaponise ClickFix ๐Ÿ‘พ

  • ๐Ÿค‘ Crypto users targeted w/ Node.js malware via fake Binance, TradingView ๐ŸŒ

  • ๐Ÿ•ต๐Ÿป Agent Tesla (no relation), XLoader deployed via .JSE and PoweShell ๐Ÿš

Jimโ€™ll ClickFix it ๐Ÿ’€๐Ÿ’€๐Ÿ’€

๐Ÿšจ ClickFix Goes Global: Nation-State Hackers Join the Malware Trend ๐ŸŽฏ

Iran, North Korea, and Russia are now deploying a sneaky social engineering trick called ClickFix to infect targets across the globe โ€” and it's working.

๐Ÿ“… Between late 2024 and early 2025, at least four state-sponsored groups used this technique in phishing campaigns targeting think tanks, governments, and defense contractors.

๐Ÿ› ๏ธ What is ClickFix?

ClickFix is a crafty method where hackers trick victims into infecting themselves by copying and pasting "fixes" โ€” actually malicious PowerShell commands โ€” into their systems.

It often pretends to:

โ—ย ย ย ย ย  Fix system errors โš ๏ธ

โ—ย ย ย ย ย  Verify your device โœ…

โ—ย ย ย ย ย  Download legit-looking documents ๐Ÿ“„

๐Ÿ‘ฅ Whoโ€™s Using It?

Proofpoint linked the activity to these groups:

๐Ÿœ TA427 (aka Kimsuky โ€“ North Korea)

๐Ÿช TA450 (aka MuddyWater โ€“ Iran)

๐Ÿป TA422 (aka APT28 โ€“ Russia)

๐Ÿ•ต๏ธ UNK_RemoteRogue (suspected Russian group)

๐Ÿ•ต๏ธโ€โ™‚๏ธ TA427: The Diplomat Trick

๐ŸŽฏ Target: Think tanks focused on Korean affairs

โ—ย Pretended to be a Japanese diplomat ๐Ÿฏ

โ—ย Sent meeting invites & a malicious PDF

โ—ย Led victims to a fake embassy site with โ€œinstructionsโ€

โ—ย ClickFix chain installed Quasar RAT ๐Ÿ€

๐Ÿ”ง TA450: Fake Microsoft Fix

๐ŸŽฏ Target: Sectors in the U.A.E., Saudi Arabia, U.S., Canada, and Europe

โ—ย Emails timed with Patch Tuesday updates ๐Ÿ“…

โ—ย Claimed users needed to fix a Windows vulnerability

โ—ย ClickFix chain installed Level RMM software, giving attackers full remote access ๐Ÿ–ฅ๏ธ

โ—ย ๐Ÿ›ฐ๏ธ UNK_RemoteRogue: Defense Industry Espionage

๐ŸŽฏ Target: Two major defense orgs

โ—ย Phishing from compromised Zimbra servers

โ—ย Fake Microsoft Office file + YouTube tutorial

โ—ย Users were coached to paste PowerShell code

โ—ย Delivered malware using the Empire C2 framework ๐Ÿ”—

โš ๏ธ Why It Matters

โœ”๏ธ Simple for attackers, tricky for users

โœ”๏ธ Bypasses some security software

โœ”๏ธ Trusted by nation-states & cybercriminals alike

Proofpoint warns that more state-backed groups may start experimenting with ClickFix โ€” if they havenโ€™t already.

๐Ÿ” Pro Tip

Never copy and paste code from unsolicited emails or websites โ€” no matter how official they look. If something seems off, it probably is.

Stay sharp. Donโ€™t get ClickFixed. ๐Ÿง ๐Ÿ’ป

Just say Node ๐Ÿ˜

๐Ÿšจ Malvertising Meets Node.js: Microsoft Warns of Evolving Malware Campaign ๐Ÿงช

Microsoft is tracking a dangerous new malvertising campaign that weaponizes Node.js to steal information, exfiltrate data, and sneak past defenses โ€” all under the guise of legitimate crypto trading apps.

๐Ÿ“… First spotted in October 2024, the campaign is still active and growing.

๐ŸŽฏ The Lure: Crypto Tools That Arenโ€™t What They Seem

Victims are being tricked into downloading fake installers pretending to be from:

๐Ÿ’ฐ Binance

๐Ÿ“ˆ TradingView

These downloads are hosted on fraudulent sites designed to mimic the real thing.

Once executed, the installer drops a malicious DLL named CustomActions.dll.

๐Ÿ› ๏ธ Behind the Scenes: What the Malware Does

Hereโ€™s how the infection unfolds:

๐Ÿ“‹ Info Harvesting: The DLL collects system data using WMI (Windows Management Instrumentation).

๐Ÿ•’ Persistence: A scheduled task is created to maintain long-term access.

๐Ÿ’จ Smoke & Mirrors: The malware opens a real crypto trading site in a browser window via msedge_proxy.exe to look legit.

Meanwhile, PowerShell scripts are quietly running in the background to:

โ—ย Exclude the malware from Microsoft Defender scans

โ—ย Download more payloads from a remote server

โ—ย Collect extensive data (OS, BIOS, hardware, apps)

โ—ย Send it all to a command-and-control (C2) server via HTTPS

โš™๏ธ Enter Node.js: Malware Masquerading as Web Code

The malwareโ€™s next act involves:

๐Ÿ“ฆ Downloading a ZIP archive from the C2 server

๐Ÿงช Deploying the Node.js runtime and a compiled JavaScript file (.JSC)

๐Ÿ•ธ๏ธ Using Node.js to make network connections and steal browser data

๐Ÿ“Œ Why Node.js? Itโ€™s open-source, widely used by devs, and runs JavaScript outside the browser โ€” making it a perfect disguise for malware.

๐Ÿงฏ What You Can Do

โŒ Never download software from unofficial sources โ€” especially via ads

๐Ÿ›ก๏ธ Use endpoint protection that detects script-based malware

๐Ÿง  Be suspicious of "fix-it" instructions involving terminal commands

๐Ÿ” Protect credentials and enable strong 2FA methods

Malware is getting smarter โ€” and more deceptive. Stay cautious, stay updated, and don't let your terminal become a trojan horse. ๐Ÿง ๐Ÿ’ป๐Ÿ’ฃ

Tesla just canโ€™t catch a break ๐Ÿ˜‰๐Ÿ˜‚๐Ÿ˜‚

๐Ÿšจ New Multi-Stage Malware Attack Chains: Agent Tesla, Remcos RAT, and XLoader ๐Ÿงฌ

Researchers at Palo Alto Networks Unit 42 are warning about a sophisticated, multi-layered malware campaign delivering a cocktail of info-stealers and remote access trojans โ€” including Agent Tesla, Remcos RAT, and XLoader.

๐Ÿ“Œ This isn't a smash-and-grab. It's a well-orchestrated, multi-stage attack chain designed to evade sandboxes, confuse analysts, and ensure payload delivery.

๐Ÿ“ฅ It All Starts with a Phish

๐Ÿ—“๏ธ First spotted in December 2024, the attack kicks off with a phishing email disguised as an order confirmation. The email claims a payment was made and urges the target to review an attached file โ€” a malicious 7-Zip archive.

Inside the archive:

๐Ÿงพ A .JSE (JavaScript Encoded) file โ€” the ignition for the entire attack chain

Once launched, this file contacts an external server to download a Base64-encoded PowerShell script.

๐Ÿ“ฆ Payload Decoding and Execution

Hereโ€™s what happens next:

๐Ÿ” The PowerShell script decodes the Base64 payload

๐Ÿ’พ Writes the decoded payload to the Windows temp directory

๐Ÿš€ Executes it, launching a new dropper stage

The second-stage dropper can be compiled in .NET or AutoIt, depending on the variant.

โš”๏ธ Diverging Paths: .NET vs AutoIt Droppers

๐Ÿ”ง If .NET:

The malware decrypts and injects Agent Tesla / Snake Keylogger / XLoader into the memory of a legitimate Windows process: RegAsm.exe

๐ŸŽญ If AutoIt:

โ—ย Adds another obfuscation layer

โ—ย The AutoIt script decrypts a payload that injects a .NET file into RegSvcs.exe, delivering Agent Tesla

๐Ÿ’ก Goal: Make analysis harder while ensuring successful execution.

๐Ÿงฑ Layered Simplicity = Resilience

"The attackerโ€™s focus remains on a multi-layered attack chain rather than sophisticated obfuscation,"

โ€“ Saqib Khanzada, Unit 42

By stacking basic techniques, the attackers build a resilient and stealthy infection flow, rather than relying on flashy obfuscation.

๐Ÿ›ก๏ธ Defensive Tips:

โ—ย Avoid opening files from unknown or suspicious emails

โ—ย Monitor for unexpected usage of system processes like PowerShell or RegAsm.exe

โ—ย Invest in behavioral detection and EDR tools

โ—ย Segment high-value assets from user workstations

Attackers arenโ€™t just getting more technical โ€” theyโ€™re getting more strategic. The more layers they add, the harder they are to peel back. ๐Ÿง…๐Ÿ’€

๐Ÿ—ž๏ธ Extra, Extra! Read all about it! ๐Ÿ—ž๏ธ

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • ๐Ÿ›ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐Ÿ“…

  • ๐Ÿ’ตCrypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐Ÿ†“

  • ๐Ÿ“ˆBitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐Ÿ‘พ

Let us know what you think.

So long and thanks for reading all the phish!

footer graphic cyber security newsletter

How did the Oracle not see this coming

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
.bh__table_cell { padding: 5px; background-color: #FFFFFF; }
.bh__table_cell p { color: #2D2D2D; font-family: ‘Helvetica’,Arial,sans-serif !important; overflow-wrap: break-word; }
.bh__table_header { padding: 5px; background-color:#F1F1F1; }
.bh__table_header p { color: #2A2A2A; font-family:’Trebuchet MS’,’Lucida Grande’,Tahoma,sans-serif !important; overflow-wrap: break-word; }

Gone Phishing Banner

Welcome to Gone Phishing, your weekly cybersecurity newsletter that treats cybercriminals like Donald Trump treats the World Economy ๐Ÿ‘€๐Ÿคฏ๐Ÿ’€๐Ÿ’€๐Ÿ’€

Patch of the Week!ย ๐Ÿฉน

First thingโ€™s first, folks. Our weekly segment goes by many names. Patch of the Week, Tweak of the week. Okay, thatโ€™s itโ€ฆ ๐Ÿ˜ณ

Congrats to WhatsApp, the cybercriminals are no matchโ€ฆ for your patch! ๐Ÿฉน

WhatsApp with that? ๐Ÿ™ƒ

โš ๏ธ๐Ÿ’ป WhatsApp for Windows Vulnerability โ€“ Update NOW! ๐Ÿšจ๐Ÿ›

If you're using WhatsApp Desktop on Windows, this is your sign to hit that update button ๐Ÿ”„๐Ÿ“ฅ

๐Ÿงจ A flaw tracked as CVE-2025-30401 allowed sneaky attackers to send malicious files disguised as innocent onesโ€”like a wolf in sheepโ€™s clothing ๐Ÿบ๐Ÿ‘

๐Ÿ” How did it work?

WhatsApp trusted what a file claimed to be (its MIME type โ€“ like โ€œthis is a photo ๐Ÿ“ธโ€)

But when you clicked it inside the app? It looked at the file extension (.exe, .jpg, etc.) instead

That means something called cute-pic.jpg.exe could look like a picture ๐Ÿ–ผ๏ธ but run like a program ๐Ÿ’ปโ€”and boom ๐Ÿ’ฅ malware

๐Ÿ˜ฌ This affected all versions before 2.2450.6โ€”so if you're still on an old version, you're at risk!

๐Ÿ›ก๏ธ What to do:

โœ… Update to WhatsApp Desktop v2.2450.6 or later ASAP

โœ… Be wary of weird or unexpected attachmentsโ€”even if they look normal

โœ… Don't trust file names blindly ๐Ÿ‘€

๐Ÿง  Security pro Nico Chiaraviglio from Zimperium called this a reminder that:

โ€œAttachments are STILL one of the most common ways attackers spread malware.โ€

๐Ÿ’ช He recommends a layered defense:

๐Ÿ” Attachment scanning

๐Ÿ“ˆ Behavioral analysis

๐Ÿง  User education

๐ŸŽฏ Bottom line: Just because it looks like a file you can trust… doesn't mean it is. Donโ€™t open anything sketchy, even if it comes through WhatsApp.

๐Ÿ› ๏ธ And if you havenโ€™t updated yetโ€”go do it now. Seriously. ๐Ÿƒ๐Ÿ’จ

Now, on to this weekโ€™s hottest cybersecurity news stories:ย 

  • ๐Ÿ”ฎ Oracle confirms hack-attack: broken systems, stolen credentials ๐Ÿ”‘

  • ๐Ÿ“ฅ Donโ€™t get crushed by Crush: FTP system infiltrated by ransomware ๐Ÿ’ฐ

  • ๐ŸŒ Popular site SourceForge spreads crypto miner and clipper malware ๐Ÿ‘พ

How did the Oracle not see this coming ๐Ÿ”ฎ๐Ÿ‘€๐Ÿ’€

Heart Attack Zombies GIF by Xbox

Gif by xbox on Giphy

๐Ÿšจ Oracle Confirms Private Data Breach โ€” After Public Denials โ˜๏ธ

๐Ÿ” Oracle has privately admitted that a legacy system was breached, exposing old client login

data โ€” including usernames, encrypted passwords, and passkeys.

๐Ÿ•ต๏ธโ€โ™‚๏ธ What Happened?

Attackers accessed a โ€œlegacy environmentโ€ (rebranded as โ€œOracle Classicโ€)

โ—ย FBI and CrowdStrike are now involved

โ—ย 6 million records across 140,000 tenants allegedly stolen

โ—ย Data includes credentials as recent as 2024

๐ŸŽญ Public Denial, Private Panic

Oracle previously told the public:

โ€œNo breach of Oracle Cloud.โ€

But insiders and security experts say this is semantic wordplay โ€” the breached system was previously part of Oracle Cloud, just rebranded.

๐Ÿง  โ€œTheyโ€™re splitting hairs to dodge admitting a real cloud breach,โ€ said one researcher.

๐Ÿ’ธ Extortion & Lawsuits

Hacker โ€œrose87168โ€ demanded $20M before posting data for sale

Malware targeted Oracleโ€™s Identity Manager (IDM) as early as January 2025

Now facing a class action lawsuit for delaying disclosure

๐Ÿฅ Not the Only Breach

Just last month, Oracle also disclosed a healthcare breach โ€” attackers stole patient data from Cerner servers using compromised credentials.

๐Ÿšจ Why It Matters

Experts say these breaches challenge the core security promises of cloud platforms.

โ€œA single hack shouldnโ€™t affect 140,000 tenants โ€” this breaks the cloud model,โ€ warns security advisor Sunil Varkey.

๐Ÿ”‡ As of now, Oracle still hasnโ€™t made any public statement โ€” sticking to private disclosures only.

Learn AI in 5 minutes a day

This is the easiest way for a busy person wanting to learn AI in as little time as possible:

  1. Sign up for The Rundown AI newsletter

  2. They send you 5-minute email updates on the latest AI news and how to use it

  3. You learn how to become 2x more productive by leveraging AI

Sign up to start learning.

It was only a Crush, it was only a Crush ๐ŸŽ™๏ธ๐ŸŽถ๐Ÿ’€

๐Ÿšจ CISA & Experts Warn: CrushFTP Exploited in Active Attacks ๐Ÿ’ฅ

Hackers are actively exploiting a serious flaw in CrushFTP, a popular file transfer tool used by thousands of organizations to move sensitive data.

๐Ÿž The Vulnerability: CVE-2025-31161

โ—ย Discovered by: Researchers at Outpost24

โ—ย Reported to CrushFTP: March 13

โ—ย Public alert: March 21

Exploit now in the wild โš ๏ธ

The flaw was originally going to be disclosed after customers had time to patch. But other researchers leaked details early โ€” and attackers pounced.

๐Ÿง  "They weaponized the bug before customers had a chance to update,โ€ said CrushFTP.

๐Ÿฆ  Ransomware Gang Claims Stolen Data

The Kill ransomware group now claims itโ€™s using the exploit to steal โ€œsignificant volumesโ€ of sensitive data โ€” and theyโ€™ve begun extorting victims.

๐Ÿ›ก๏ธ CISA has confirmed the attacks and told federal agencies to patch by April 28.

๐Ÿข Whoโ€™s at Risk?

Hundreds of CrushFTP servers are exposed online, according to Shadowserver and Censys.

Recent versions of v10 and v11 are vulnerable.

Incident responders at Huntress report live attacks at companies in:

๐Ÿ›’ Retail

๐Ÿ’ก Marketing

๐Ÿ’ป Semiconductors

โš ๏ธ Patch Now โ€” Or Risk Getting Hit

CrushFTP is sending another urgent alert to customers. While some workarounds exist, patching is strongly advised.

โ€œAnyone unpatched needs to urgently update.โ€ โ€” CrushFTP

๐Ÿ’ฃ CrushFTP is the latest in a string of file transfer tools being targeted, following similar attacks on MOVEit, GoAnywhere, Cleo, and Accellion.

Stay alert. Patch fast. The attackers arenโ€™t waiting.

Trying to strike a chord and itโ€™s probably A (crypto) miner ๐Ÿ’€๐Ÿ’€๐Ÿ’€

๐Ÿšจ Malware Alert: Miners & Clippers Spread via Fake Software on SourceForge ๐Ÿฆ 

Cybercriminals are back at it โ€” this time using SourceForge, a trusted software hub, to push cryptocurrency miners and clipper malware disguised as cracked Microsoft Office apps.

๐ŸŽญ The Bait: Fake "Office Add-ins"

One suspicious listing, called โ€œofficepackageโ€, looks harmless at first glance โ€” it even borrows content from a legit GitHub repo.

But clicking โ€œDownloadโ€ on the site? It redirects you to a shady page on taplink[.]cc.

๐Ÿ‘€ What happens next?

โ—ย Youโ€™re served a ZIP file called vinstaller.zip

โ—ย Inside: another locked archive (installer.zip) and a text file with the password

โ—ย That archive contains a nasty MSI installer ๐Ÿ’ฃ

๐Ÿ’ป What the Malware Does

Kaspersky says the installer kicks off a complex infection chain:

๐Ÿงฉ Uses VB scripts and PowerShell to download more payloads

๐Ÿ“ก Sends your system data via Telegram API

๐Ÿ’ฐ Deploys:

Crypto miner (drains CPU power)

ClipBanker (replaces crypto wallet addresses)

๐Ÿ” Drops ShellExperienceHost.exe to open an encrypted backdoor

๐ŸชExecutes more hidden commands using ErrorHandler.cmd

๐Ÿ“ Who's Being Targeted?

โ—ย Interface is in Russian

โ—ย Targets users searching for Microsoft Office on Yandex

โ—ย 90% of the 4,600+ victims so far are located in Russia

โš ๏ธ Bigger Picture: This Is Just One Campaign

Kaspersky also spotted TookPS malware spreading via fake AI, remote desktop, and 3D modeling software sites โ€” often promoted through malicious Google ads.

๐Ÿ–ฅ๏ธ One tactic: sideloading malware into TeamViewer, giving attackers stealthy remote access.

๐Ÿ’ฌ โ€œAs users seek software outside official sources, attackers offer their own versions โ€” loaded with malware,โ€ said Kaspersky.

๐Ÿ” Takeaway:

Always download software from trusted sources. Crack sites and shady "free" tools are often booby-trapped โ€” and malvertising is making it even easier for attackers to reach you.

Stay smart. Stay safe. ๐Ÿ’ป๐Ÿ›ก๏ธ

๐Ÿ—ž๏ธ Extra, Extra! Read all about it! ๐Ÿ—ž๏ธ

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • ๐Ÿ›ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐Ÿ“…

  • ๐Ÿ’ตCrypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐Ÿ†“

  • ๐Ÿ“ˆBitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐Ÿ‘พ

Let us know what you think.

So long and thanks for reading all the phish!

footer graphic cyber security newsletter

๐Ÿšจ Massive Web Infections Redirect Users to Chinese Gambling Sites ๐ŸŽฐ (1)

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
.bh__table_cell { padding: 5px; background-color: #FFFFFF; }
.bh__table_cell p { color: #2D2D2D; font-family: ‘Helvetica’,Arial,sans-serif !important; overflow-wrap: break-word; }
.bh__table_header { padding: 5px; background-color:#F1F1F1; }
.bh__table_header p { color: #2A2A2A; font-family:’Trebuchet MS’,’Lucida Grande’,Tahoma,sans-serif !important; overflow-wrap: break-word; }

Gone Phishing Banner

Welcome to Gone Phishing, your weekly cybersecurity newsletter that understands this is what happens when you Musk it for a chocolate buskuit ๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚ The world economy left the chat ๐Ÿ’€๐Ÿ’€๐Ÿ’€

Patch of the Week!ย ๐Ÿฉน

First thingโ€™s first, folks. Our weekly segment goes by many names. Patch of the Week, Tweak of the week. Okay, thatโ€™s itโ€ฆ ๐Ÿ˜ณ

Congrats to Google, the cybercriminals are no matchโ€ฆ for your patch! ๐Ÿฉน

Google: IAM legend ๐Ÿ’ช๐Ÿ’ช๐Ÿ’ช

๐Ÿšจโš™๏ธ Google Cloud Run Vulnerability Revealed: โ€œImageRunnerโ€ ๐Ÿ›๐Ÿš€

Cybersecurity researchers just uncovered ImageRunner, a now-patched privilege escalation flaw in Google Cloud Platform's Cloud Run that couldโ€™ve let attackers steal private container images and even inject malware into deployments ๐Ÿ˜จ๐Ÿ

๐Ÿ” What was the issue?

Malicious users with limited permissions (run.services.update + iam.serviceAccounts.actAs) could:

๐Ÿ”ง Edit Cloud Run services

๐Ÿ“ฆ Pull private container images

๐Ÿงฌ Inject malicious code

Target: images stored in Google Artifact Registry or Google Container Registry in the same project ๐Ÿ˜ฌ

๐Ÿ’ฃ Potential impact:

Secrets stolen ๐Ÿ—๏ธ

Sensitive data exfiltrated ๐Ÿ“ค

Reverse shells launched ๐Ÿš

All by tricking Cloud Run into using infected container imagesโ€”like a software supply chain attack from inside the cloud โ˜๏ธ๐Ÿ’ฅ

๐Ÿ›ก๏ธ What did Google do?

๐Ÿ”’ As of January 28, 2025, Google patched the issue. Now, any user or service account must have explicit read access to deploy container images. No more sneaky side-loading ๐Ÿ˜ค

โœ… You now need the Artifact Registry Reader role (roles/artifactregistry.reader) to deploy from private registries.

๐Ÿ“Œ Tenable, who discovered the bug, calls this kind of vulnerability โ€œJengaโ€โ€”because when one cloud service gets wobbly, the rest stacked on top become vulnerable too ๐Ÿงฑ๐Ÿชœ

๐Ÿง  Reminder: Cloud security isnโ€™t just IAM policiesโ€”it's the invisible glue between services that attackers love to exploit.

๐Ÿ”ง If you're using GCP Cloud Run, make sure:

Your IAM roles are tight ๐ŸŽฏ

Your image permissions are reviewed ๐Ÿ”

You stay up-to-date on patches! ๐Ÿ”

๐Ÿ’ก Defenders, stay alert: the cloud can be a blessing or a backdoorโ€”depending on how well you secure it ๐Ÿ›ก๏ธ๐Ÿ’ป

Now, on to this weekโ€™s hottest cybersecurity news stories:ย 

  • ๐Ÿ’ธ Tax doesnโ€™t need to be taxing!! Microsoft says otherwise โš ๏ธ

  • ๐ŸงŸ Lazarus rises from the deadโ€ฆ AGAIN! Change the record ๐Ÿ’ฟ

  • ๐Ÿ“ฒ 2,600+ Android phones infected w/ Triada malwareโ€ฆ Beware โ˜ ๏ธ

QR ya??? ๐Ÿ™ƒ

Donald Trump GIF by Election 2020

Gif by election2020 on Giphy

๐Ÿšจ Microsoft Warns of Tax-Themed Phishing Surge Targeting U.S. Organizations ๐Ÿ“ฌ

Microsoft has issued a high-alert warning about multiple phishing campaigns weaponizing tax season as a lure to steal credentials and drop malware. The campaigns are part of a broader phishing-as-a-service (PhaaS) ecosystem dubbed RaccoonO365, enabling threat actors to bypass traditional detection methods and launch highly targeted attacks.

๐Ÿงจ Key Threats & Techniques

๐Ÿ”น Themes Used: Fake tax docs, Microsoft 365 login pages, and Docusign requests

๐Ÿ”น Delivery Methods:

โ€ƒโœ”๏ธ PDF attachments with URL shorteners (Rebrandly)

โ€ƒโœ”๏ธ PDFs with QR codes

โ€ƒโœ”๏ธ Spoofed emails using legit file-sharing & collaboration services

๐Ÿ”น Redirect Chains: Link > URL shortener > fake login/malware page

๐Ÿ”น Phishing kits powered by RaccoonO365 PhaaS

๐Ÿ•ต๏ธโ€โ™‚๏ธ Notable Payloads Delivered

โ—ย Malware / Toolย Function

โ—ย BruteRatel C4 (BRc4)ย Red-teaming post-exploitation

โ—ย Latrodectusย Malware loader (evolved in Feb 2025)

โ—ย AHKBotย Credential theft & screenshot exfiltration

โ—ย GuLoaderย Payload delivery platform

โ—ย Remcos RATย Full remote control

โš ๏ธ BRc4 & Latrodectus were dropped via tax-themed PDFs that evaluated a user's IP/system to decide whether to send malware or a harmless file.

๐ŸŽฏ Campaigns & Targets

๐Ÿ“… February 2025 Campaigns:

โ—ย Targeted 2,300+ U.S. organizations (engineering, IT, consulting sectors)

โ—ย Emails had empty bodies but malicious PDFs with QR codes

โ—ย Redirected to fake Microsoft 365 login pages via RaccoonO365

๐Ÿ“… Another campaign used Facebook ads to lure victims to a fake Windows 11 Pro download site, dropping the Latrodectus loader via BruteRatel.

๐Ÿ›ก๏ธ Advanced Obfuscation Tactics

๐Ÿ’  Fake file types (e.g., .lnk files made to look like tax docs)

๐Ÿ’  QR codes used to bypass secure email gateways (SEGs)

๐Ÿ’  Browser-in-the-browser (BitB) attacks mimicking login popups

๐Ÿ’  Abuse of legit services: DocuSign, Adobe, Dropbox, Canva, Zoho

๐Ÿ’  Use of open redirects & URL shorteners to hide phishing links

๐Ÿงฐ How to Stay Protected

โœ… Block macros & disable autorun

โœ… Use phishing-resistant MFA (e.g., hardware tokens, passkeys)

โœ… Educate users about tax-season phishing scams

โœ… Implement network protection to block outbound connections to known malicious domains

โœ… Leverage modern browsers with phishing protection built-in

Microsoftโ€™s findings show a sophisticated evolution of phishing, where attackers are blending social engineering with stealthy malware loaders and legitimate-looking infrastructure. With tax season being a peak period for these attacks, organizations must remain hyper-vigilant. ๐Ÿงพ๐Ÿ’ฃ

Cryptoโ€™s Most Influential Event

Consensus is the worldโ€™s longest-running gathering of the global crypto, blockchain, and AI communities.

Celebrated as โ€˜The Super Bowl of Blockchainโ€™, Consensus will welcome 20,000 attendees shaping the decentralized digital economy to Toronto this May 14-16.

Ready to invest in your future?

Attending is your best bet.

Register & Save 20% with BEEHIIV

ClickFix up look sharp!!! ๐ŸŽ™๏ธ

๐Ÿšจ North Korean Hackers Target Job Seekers in Crypto Sector with Fake Interviews ๐ŸŽ™๏ธ

A new North Korean hacking campaign is using fake job interviews and the ClickFix technique to infect job seekers in the cryptocurrency sector with a newly discovered Go-based backdoor called GolangGhost. The attack, tracked as ClickFake Interview, is a continuation of the Contagious Interview campaign linked to the Lazarus Group, a hacking unit tied to North Koreaโ€™s Reconnaissance General Bureau (RGB).

๐ŸŽฏ Key Targets & Attack Methodology

๐Ÿ”น Targets:

โœ”๏ธ Centralized finance (CeFi) companies (Coinbase, Kraken, KuCoin, Tether, etc.)

โœ”๏ธ Job seekers in business development, asset management, and DeFi

๐Ÿ”น Attack Flow:

1๏ธโƒฃ Hackers pose as recruiters on LinkedIn/X and invite targets to a video interview.

2๏ธโƒฃ Victims are directed to a fake video interview platform (e.g., "Willo").

3๏ธโƒฃ The platform presents a fake error message requiring a โ€œcamera driverโ€ download.

4๏ธโƒฃ Victims are instructed to execute a malicious script via Command Prompt (Windows) or Terminal (macOS).

5๏ธโƒฃ The script drops FROSTYFERRET (a stealer) and GolangGhost (a backdoor).

๐Ÿ”น Key Malware Used

โ—ย Malwareย Function

โ—ย GolangGhostย Backdoor for data theft & remote control

โ—ย FROSTYFERRETย Stealer disguised as a Chrome camera permission prompt

โ—ย FERRETย Initial malware loader

๐Ÿ•ต๏ธ Advanced Social Engineering via ClickFix

๐Ÿ’  Uses fake job postings to lure victims

๐Ÿ’  Mimics real video interview platforms

๐Ÿ’  ClickFix method tricks users into manually running malicious scripts

๐Ÿ’  Exploits victim trust in the interview process

๐Ÿ›‘ MacOS users are tricked into entering their system password, likely for iCloud Keychain theft.

๐Ÿ’ผ North Koreaโ€™s Expanding IT Worker Scheme in Europe

๐Ÿ“ข Google Threat Intelligence Group (GTIG) reports a global expansion of North Koreaโ€™s fraudulent IT worker operations into Europe.

๐Ÿ”น Key Trends:

โœ”๏ธ North Koreans posing as remote IT workers to infiltrate Western firms

โœ”๏ธ Fake identities claiming to be from Italy, Japan, Vietnam, and the U.S.

โœ”๏ธ Work in web development, blockchain, bot development

โœ”๏ธ Use of GitHub to build fake portfolios

๐Ÿ”น Recent Tactics:

โœ”๏ธ Targeting companies with BYOD (Bring Your Own Device) policies

โœ”๏ธ Extortion โ€“ demanding ransom from employers to prevent data leaks

๐Ÿšจ "Europe needs to wake up fast. North Koreaโ€™s cyber threats are not just a U.S. problem." โ€“ Google Threat Intelligence Group

๐Ÿ›ก๏ธ How to Stay Protected

โœ…ย Verify job offers โ€“ Donโ€™t download software for interviews

โœ… Use endpoint security โ€“ Block unauthorized script execution

โœ… Be wary of LinkedIn/X job offers from unknown recruiters

โœ… Adopt strong authentication โ€“ Enable phishing-resistant MFA

โœ… Monitor for fake employee identities in remote hiring processes

North Korea continues to innovate in cybercrime, blending social engineering, supply chain infiltration, and IT worker fraud to fund its regime. As cryptocurrency remains a prime target, businesses and job seekers must stay vigilant against evolving tactics. ๐Ÿ›ก๏ธ

Daily News for Curious Minds

Be the smartest person in the room by reading 1440! Dive into 1440, where 4 million Americans find their daily, fact-based news fix. We navigate through 100+ sources to deliver a comprehensive roundup from every corner of the internet โ€“ politics, global events, business, and culture, all in a quick, 5-minute newsletter. It's completely free and devoid of bias or political influence, ensuring you get the facts straight. Subscribe to 1440 today.

Sign up now!

Triada mateโ€ฆ Try harder. Get it? Iโ€™m here all week ๐Ÿ˜‚

๐Ÿšจ Fake Android Phones Preloaded with Malware Targeting Users Worldwide ๐ŸŒ

Counterfeit smartphones are being sold at reduced prices, but they come preloaded with a dangerous Android malware called Triada. The latest version of this malware gives attackers full control over infected devices, allowing them to steal sensitive data, hijack cryptocurrency transactions, and spread malware via messaging apps.

๐Ÿ›‘ Affected Users: More than 2,600 devices worldwide, majority in Russia

๐Ÿ“… Attack Window: March 13 – 27, 2025

๐Ÿ”Ž Malware: Triada RAT (Remote Access Trojan)

๐Ÿ“Œ What is Triada?

Triada is a modular Android malware first discovered in 2016 that has evolved into a sophisticated backdoor. It can:

๐Ÿ”น Steal user credentials from Telegram, TikTok, and other social apps

๐Ÿ”น Send and delete WhatsApp and Telegram messages without the userโ€™s knowledge

๐Ÿ”น Replace cryptocurrency wallet addresses in clipboard (clipper attack)

๐Ÿ”น Monitor web browser activity and manipulate links

๐Ÿ”น Replace phone numbers during calls

๐Ÿ”น Intercept SMS messages and subscribe victims to premium SMS services

๐Ÿ”น Download additional malware

๐Ÿ”น Block network connections to avoid detection

๐Ÿ”ฅ How is Triada Spread?

๐Ÿšจ Preloaded in Counterfeit Android Devices

โœ”๏ธ Triada is embedded in the system firmware during manufacturing

โœ”๏ธ Users cannot remove it without flashing a clean system image

โœ”๏ธ Sold through third-party marketplaces and supply chain compromises

๐Ÿ“ก Previously Spread via Malicious Apps

โœ”๏ธ Fake WhatsApp mods (FMWhatsApp, YoWhatsApp)

โœ”๏ธ Fake Android framework backdoors (BADBOX campaign)

๐Ÿ’ก Googleโ€™s 2019 investigation found a third-party vendor called Yehuo/Blazefire was responsible for infecting system images with Triada.

๐Ÿ›‘ Why is This Dangerous?

1๏ธโƒฃ Difficult to Remove โ€“ It's embedded in the system framework of the phone.

2๏ธโƒฃ Spreads via Messaging Apps โ€“ Can send malware-laden messages from your WhatsApp/Telegram.

3๏ธโƒฃ Steals Crypto Funds โ€“ Can hijack and replace wallet addresses.

4๏ธโƒฃ Intercepts Calls & Messages โ€“ Perfect for espionage and fraud.

5๏ธโƒฃ Generates Massive Revenue for Hackers โ€“ Triada authors have transferred $270,000+ in cryptocurrency in just nine months.

๐Ÿ›ก๏ธ How to Protect Yourself

โœ… Avoid buying off-brand or counterfeit Android devices

โœ… Purchase from reputable retailers and official brand stores

โœ… Check for unusual permissions & network activity

โœ… Use security apps that can detect system malware

โœ… Keep your device updated and avoid sideloading apps

โœ… Be cautious of WhatsApp mods & unofficial APKs

๐Ÿšจ Triada remains one of the most complex and dangerous Android threats.

Hackers continue to compromise supply chains to pre-install malware on devices before they even reach consumers.

๐Ÿ”ฅ More Android Threats Emerging

๐Ÿ”ด Crocodilus & TsarBot โ€“ Android banking trojans targeting 750+ financial apps

๐Ÿ”ด Salvador Stealer โ€“ Masquerades as an Indian banking app to steal sensitive user data

๐Ÿ”ด Cosiloon โ€“ Another malware pre-installed on low-end Android phones

As hackers refine their tactics, users must be extra vigilant when purchasing Android devices and installing apps. ๐Ÿ“ฒ๐Ÿ”’

๐Ÿ—ž๏ธ Extra, Extra! Read all about it! ๐Ÿ—ž๏ธ

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • ๐Ÿ›ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐Ÿ“…

  • ๐Ÿ’ตCrypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐Ÿ†“

  • ๐Ÿ“ˆBitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐Ÿ‘พ

Let us know what you think.

So long and thanks for reading all the phish!

footer graphic cyber security newsletter

Tax doesnโ€™t need to be taxing!! Microsoft says otherwise

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
.bh__table_cell { padding: 5px; background-color: #FFFFFF; }
.bh__table_cell p { color: #2D2D2D; font-family: ‘Helvetica’,Arial,sans-serif !important; overflow-wrap: break-word; }
.bh__table_header { padding: 5px; background-color:#F1F1F1; }
.bh__table_header p { color: #2A2A2A; font-family:’Trebuchet MS’,’Lucida Grande’,Tahoma,sans-serif !important; overflow-wrap: break-word; }

Gone Phishing Banner

Welcome to Gone Phishing, your weekly cybersecurity newsletter that understands this is what happens when you Musk it for a chocolate buskuit ๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚ The world economy left the chat ๐Ÿ’€๐Ÿ’€๐Ÿ’€

Patch of the Week!ย ๐Ÿฉน

First thingโ€™s first, folks. Our weekly segment goes by many names. Patch of the Week, Tweak of the week. Okay, thatโ€™s itโ€ฆ ๐Ÿ˜ณ

Congrats to Google, the cybercriminals are no matchโ€ฆ for your patch! ๐Ÿฉน

Google: IAM legend ๐Ÿ’ช๐Ÿ’ช๐Ÿ’ช

๐Ÿšจโš™๏ธ Google Cloud Run Vulnerability Revealed: โ€œImageRunnerโ€ ๐Ÿ›๐Ÿš€

Cybersecurity researchers just uncovered ImageRunner, a now-patched privilege escalation flaw in Google Cloud Platform's Cloud Run that couldโ€™ve let attackers steal private container images and even inject malware into deployments ๐Ÿ˜จ๐Ÿ

๐Ÿ” What was the issue?

Malicious users with limited permissions (run.services.update + iam.serviceAccounts.actAs) could:

๐Ÿ”ง Edit Cloud Run services

๐Ÿ“ฆ Pull private container images

๐Ÿงฌ Inject malicious code

Target: images stored in Google Artifact Registry or Google Container Registry in the same project ๐Ÿ˜ฌ

๐Ÿ’ฃ Potential impact:

Secrets stolen ๐Ÿ—๏ธ

Sensitive data exfiltrated ๐Ÿ“ค

Reverse shells launched ๐Ÿš

All by tricking Cloud Run into using infected container imagesโ€”like a software supply chain attack from inside the cloud โ˜๏ธ๐Ÿ’ฅ

๐Ÿ›ก๏ธ What did Google do?

๐Ÿ”’ As of January 28, 2025, Google patched the issue. Now, any user or service account must have explicit read access to deploy container images. No more sneaky side-loading ๐Ÿ˜ค

โœ… You now need the Artifact Registry Reader role (roles/artifactregistry.reader) to deploy from private registries.

๐Ÿ“Œ Tenable, who discovered the bug, calls this kind of vulnerability โ€œJengaโ€โ€”because when one cloud service gets wobbly, the rest stacked on top become vulnerable too ๐Ÿงฑ๐Ÿชœ

๐Ÿง  Reminder: Cloud security isnโ€™t just IAM policiesโ€”it's the invisible glue between services that attackers love to exploit.

๐Ÿ”ง If you're using GCP Cloud Run, make sure:

Your IAM roles are tight ๐ŸŽฏ

Your image permissions are reviewed ๐Ÿ”

You stay up-to-date on patches! ๐Ÿ”

๐Ÿ’ก Defenders, stay alert: the cloud can be a blessing or a backdoorโ€”depending on how well you secure it ๐Ÿ›ก๏ธ๐Ÿ’ป

Now, on to this weekโ€™s hottest cybersecurity news stories:ย 

  • ๐Ÿ’ธ Tax doesnโ€™t need to be taxing!! Microsoft says otherwise โš ๏ธ

  • ๐ŸงŸ Lazarus rises from the deadโ€ฆ AGAIN! Change the record ๐Ÿ’ฟ

  • ๐Ÿ“ฒ 2,600+ Android phones infected w/ Triada malwareโ€ฆ Beware โ˜ ๏ธ

QR ya??? ๐Ÿ™ƒ

Donald Trump GIF by Election 2020

Gif by election2020 on Giphy

๐Ÿšจ Microsoft Warns of Tax-Themed Phishing Surge Targeting U.S. Organizations ๐Ÿ“ฌ

Microsoft has issued a high-alert warning about multiple phishing campaigns weaponizing tax season as a lure to steal credentials and drop malware. The campaigns are part of a broader phishing-as-a-service (PhaaS) ecosystem dubbed RaccoonO365, enabling threat actors to bypass traditional detection methods and launch highly targeted attacks.

๐Ÿงจ Key Threats & Techniques

๐Ÿ”น Themes Used: Fake tax docs, Microsoft 365 login pages, and Docusign requests

๐Ÿ”น Delivery Methods:

โ€ƒโœ”๏ธ PDF attachments with URL shorteners (Rebrandly)

โ€ƒโœ”๏ธ PDFs with QR codes

โ€ƒโœ”๏ธ Spoofed emails using legit file-sharing & collaboration services

๐Ÿ”น Redirect Chains: Link > URL shortener > fake login/malware page

๐Ÿ”น Phishing kits powered by RaccoonO365 PhaaS

๐Ÿ•ต๏ธโ€โ™‚๏ธ Notable Payloads Delivered

โ—ย Malware / Toolย Function

โ—ย BruteRatel C4 (BRc4)ย Red-teaming post-exploitation

โ—ย Latrodectusย Malware loader (evolved in Feb 2025)

โ—ย AHKBotย Credential theft & screenshot exfiltration

โ—ย GuLoaderย Payload delivery platform

โ—ย Remcos RATย Full remote control

โš ๏ธ BRc4 & Latrodectus were dropped via tax-themed PDFs that evaluated a user's IP/system to decide whether to send malware or a harmless file.

๐ŸŽฏ Campaigns & Targets

๐Ÿ“… February 2025 Campaigns:

โ—ย Targeted 2,300+ U.S. organizations (engineering, IT, consulting sectors)

โ—ย Emails had empty bodies but malicious PDFs with QR codes

โ—ย Redirected to fake Microsoft 365 login pages via RaccoonO365

๐Ÿ“… Another campaign used Facebook ads to lure victims to a fake Windows 11 Pro download site, dropping the Latrodectus loader via BruteRatel.

๐Ÿ›ก๏ธ Advanced Obfuscation Tactics

๐Ÿ’  Fake file types (e.g., .lnk files made to look like tax docs)

๐Ÿ’  QR codes used to bypass secure email gateways (SEGs)

๐Ÿ’  Browser-in-the-browser (BitB) attacks mimicking login popups

๐Ÿ’  Abuse of legit services: DocuSign, Adobe, Dropbox, Canva, Zoho

๐Ÿ’  Use of open redirects & URL shorteners to hide phishing links

๐Ÿงฐ How to Stay Protected

โœ… Block macros & disable autorun

โœ… Use phishing-resistant MFA (e.g., hardware tokens, passkeys)

โœ… Educate users about tax-season phishing scams

โœ… Implement network protection to block outbound connections to known malicious domains

โœ… Leverage modern browsers with phishing protection built-in

Microsoftโ€™s findings show a sophisticated evolution of phishing, where attackers are blending social engineering with stealthy malware loaders and legitimate-looking infrastructure. With tax season being a peak period for these attacks, organizations must remain hyper-vigilant. ๐Ÿงพ๐Ÿ’ฃ

Cryptoโ€™s Most Influential Event

Consensus is the worldโ€™s longest-running gathering of the global crypto, blockchain, and AI communities.

Celebrated as โ€˜The Super Bowl of Blockchainโ€™, Consensus will welcome 20,000 attendees shaping the decentralized digital economy to Toronto this May 14-16.

Ready to invest in your future?

Attending is your best bet.

Register & Save 20% with BEEHIIV

ClickFix up look sharp!!! ๐ŸŽ™๏ธ

๐Ÿšจ North Korean Hackers Target Job Seekers in Crypto Sector with Fake Interviews ๐ŸŽ™๏ธ

A new North Korean hacking campaign is using fake job interviews and the ClickFix technique to infect job seekers in the cryptocurrency sector with a newly discovered Go-based backdoor called GolangGhost. The attack, tracked as ClickFake Interview, is a continuation of the Contagious Interview campaign linked to the Lazarus Group, a hacking unit tied to North Koreaโ€™s Reconnaissance General Bureau (RGB).

๐ŸŽฏ Key Targets & Attack Methodology

๐Ÿ”น Targets:

โœ”๏ธ Centralized finance (CeFi) companies (Coinbase, Kraken, KuCoin, Tether, etc.)

โœ”๏ธ Job seekers in business development, asset management, and DeFi

๐Ÿ”น Attack Flow:

1๏ธโƒฃ Hackers pose as recruiters on LinkedIn/X and invite targets to a video interview.

2๏ธโƒฃ Victims are directed to a fake video interview platform (e.g., "Willo").

3๏ธโƒฃ The platform presents a fake error message requiring a โ€œcamera driverโ€ download.

4๏ธโƒฃ Victims are instructed to execute a malicious script via Command Prompt (Windows) or Terminal (macOS).

5๏ธโƒฃ The script drops FROSTYFERRET (a stealer) and GolangGhost (a backdoor).

๐Ÿ”น Key Malware Used

โ—ย Malwareย Function

โ—ย GolangGhostย Backdoor for data theft & remote control

โ—ย FROSTYFERRETย Stealer disguised as a Chrome camera permission prompt

โ—ย FERRETย Initial malware loader

๐Ÿ•ต๏ธ Advanced Social Engineering via ClickFix

๐Ÿ’  Uses fake job postings to lure victims

๐Ÿ’  Mimics real video interview platforms

๐Ÿ’  ClickFix method tricks users into manually running malicious scripts

๐Ÿ’  Exploits victim trust in the interview process

๐Ÿ›‘ MacOS users are tricked into entering their system password, likely for iCloud Keychain theft.

๐Ÿ’ผ North Koreaโ€™s Expanding IT Worker Scheme in Europe

๐Ÿ“ข Google Threat Intelligence Group (GTIG) reports a global expansion of North Koreaโ€™s fraudulent IT worker operations into Europe.

๐Ÿ”น Key Trends:

โœ”๏ธ North Koreans posing as remote IT workers to infiltrate Western firms

โœ”๏ธ Fake identities claiming to be from Italy, Japan, Vietnam, and the U.S.

โœ”๏ธ Work in web development, blockchain, bot development

โœ”๏ธ Use of GitHub to build fake portfolios

๐Ÿ”น Recent Tactics:

โœ”๏ธ Targeting companies with BYOD (Bring Your Own Device) policies

โœ”๏ธ Extortion โ€“ demanding ransom from employers to prevent data leaks

๐Ÿšจ "Europe needs to wake up fast. North Koreaโ€™s cyber threats are not just a U.S. problem." โ€“ Google Threat Intelligence Group

๐Ÿ›ก๏ธ How to Stay Protected

โœ…ย Verify job offers โ€“ Donโ€™t download software for interviews

โœ… Use endpoint security โ€“ Block unauthorized script execution

โœ… Be wary of LinkedIn/X job offers from unknown recruiters

โœ… Adopt strong authentication โ€“ Enable phishing-resistant MFA

โœ… Monitor for fake employee identities in remote hiring processes

North Korea continues to innovate in cybercrime, blending social engineering, supply chain infiltration, and IT worker fraud to fund its regime. As cryptocurrency remains a prime target, businesses and job seekers must stay vigilant against evolving tactics. ๐Ÿ›ก๏ธ

Daily News for Curious Minds

Be the smartest person in the room by reading 1440! Dive into 1440, where 4 million Americans find their daily, fact-based news fix. We navigate through 100+ sources to deliver a comprehensive roundup from every corner of the internet โ€“ politics, global events, business, and culture, all in a quick, 5-minute newsletter. It's completely free and devoid of bias or political influence, ensuring you get the facts straight. Subscribe to 1440 today.

Sign up now!

Triada mateโ€ฆ Try harder. Get it? Iโ€™m here all week ๐Ÿ˜‚

๐Ÿšจ Fake Android Phones Preloaded with Malware Targeting Users Worldwide ๐ŸŒ

Counterfeit smartphones are being sold at reduced prices, but they come preloaded with a dangerous Android malware called Triada. The latest version of this malware gives attackers full control over infected devices, allowing them to steal sensitive data, hijack cryptocurrency transactions, and spread malware via messaging apps.

๐Ÿ›‘ Affected Users: More than 2,600 devices worldwide, majority in Russia

๐Ÿ“… Attack Window: March 13 – 27, 2025

๐Ÿ”Ž Malware: Triada RAT (Remote Access Trojan)

๐Ÿ“Œ What is Triada?

Triada is a modular Android malware first discovered in 2016 that has evolved into a sophisticated backdoor. It can:

๐Ÿ”น Steal user credentials from Telegram, TikTok, and other social apps

๐Ÿ”น Send and delete WhatsApp and Telegram messages without the userโ€™s knowledge

๐Ÿ”น Replace cryptocurrency wallet addresses in clipboard (clipper attack)

๐Ÿ”น Monitor web browser activity and manipulate links

๐Ÿ”น Replace phone numbers during calls

๐Ÿ”น Intercept SMS messages and subscribe victims to premium SMS services

๐Ÿ”น Download additional malware

๐Ÿ”น Block network connections to avoid detection

๐Ÿ”ฅ How is Triada Spread?

๐Ÿšจ Preloaded in Counterfeit Android Devices

โœ”๏ธ Triada is embedded in the system firmware during manufacturing

โœ”๏ธ Users cannot remove it without flashing a clean system image

โœ”๏ธ Sold through third-party marketplaces and supply chain compromises

๐Ÿ“ก Previously Spread via Malicious Apps

โœ”๏ธ Fake WhatsApp mods (FMWhatsApp, YoWhatsApp)

โœ”๏ธ Fake Android framework backdoors (BADBOX campaign)

๐Ÿ’ก Googleโ€™s 2019 investigation found a third-party vendor called Yehuo/Blazefire was responsible for infecting system images with Triada.

๐Ÿ›‘ Why is This Dangerous?

1๏ธโƒฃ Difficult to Remove โ€“ It's embedded in the system framework of the phone.

2๏ธโƒฃ Spreads via Messaging Apps โ€“ Can send malware-laden messages from your WhatsApp/Telegram.

3๏ธโƒฃ Steals Crypto Funds โ€“ Can hijack and replace wallet addresses.

4๏ธโƒฃ Intercepts Calls & Messages โ€“ Perfect for espionage and fraud.

5๏ธโƒฃ Generates Massive Revenue for Hackers โ€“ Triada authors have transferred $270,000+ in cryptocurrency in just nine months.

๐Ÿ›ก๏ธ How to Protect Yourself

โœ… Avoid buying off-brand or counterfeit Android devices

โœ… Purchase from reputable retailers and official brand stores

โœ… Check for unusual permissions & network activity

โœ… Use security apps that can detect system malware

โœ… Keep your device updated and avoid sideloading apps

โœ… Be cautious of WhatsApp mods & unofficial APKs

๐Ÿšจ Triada remains one of the most complex and dangerous Android threats.

Hackers continue to compromise supply chains to pre-install malware on devices before they even reach consumers.

๐Ÿ”ฅ More Android Threats Emerging

๐Ÿ”ด Crocodilus & TsarBot โ€“ Android banking trojans targeting 750+ financial apps

๐Ÿ”ด Salvador Stealer โ€“ Masquerades as an Indian banking app to steal sensitive user data

๐Ÿ”ด Cosiloon โ€“ Another malware pre-installed on low-end Android phones

As hackers refine their tactics, users must be extra vigilant when purchasing Android devices and installing apps. ๐Ÿ“ฒ๐Ÿ”’

๐Ÿ—ž๏ธ Extra, Extra! Read all about it! ๐Ÿ—ž๏ธ

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • ๐Ÿ›ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐Ÿ“…

  • ๐Ÿ’ตCrypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐Ÿ†“

  • ๐Ÿ“ˆBitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐Ÿ‘พ

Let us know what you think.

So long and thanks for reading all the phish!

footer graphic cyber security newsletter

๐Ÿšจ Massive Web Infections Redirect Users to Chinese Gambling Sites ๐ŸŽฐ

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
.bh__table_cell { padding: 5px; background-color: #FFFFFF; }
.bh__table_cell p { color: #2D2D2D; font-family: ‘Helvetica’,Arial,sans-serif !important; overflow-wrap: break-word; }
.bh__table_header { padding: 5px; background-color:#F1F1F1; }
.bh__table_header p { color: #2A2A2A; font-family:’Trebuchet MS’,’Lucida Grande’,Tahoma,sans-serif !important; overflow-wrap: break-word; }

Gone Phishing Banner

Welcome toย Gone Phishing, your weekly cybersecurity newsletter that wonders whether itโ€™s hackers behind Daylight Savings Hour ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป๐Ÿค”๐Ÿ˜‚ย 

Patch of the Week!ย ๐Ÿฉน

First thingโ€™s first, folks. Our weekly segment goes by many names. Patch of the Week, Tweak of the week. Okay, thatโ€™s itโ€ฆ ๐Ÿ˜ณย 

Congrats to Google, the cybercriminals are no matchโ€ฆ for your patch! ๐Ÿฉน

E.T. phone Chrome ๐Ÿ‘ฝ

๐Ÿšจ Chrome Zero-Day Under Attack! Update Now! ๐Ÿ”ฅ

Google just rushed out an emergency fix for CVE-2025-2783, a high-severity zero-day exploit hitting Windows usersโ€”and it's already being used in attacks! ๐ŸŽฏ

๐Ÿ’ฅ What's happening?

Exploit targets Chrome's Mojo IPC system ๐Ÿ–ฅ๏ธ

Used in sophisticated phishing attacks ๐ŸŽฃโ€”victims got tricked into clicking a malicious link, which instantly infected their devices! ๐Ÿ˜ฑ

Targets?ย Russian media, education, and government organizations ๐Ÿ‡ท๐Ÿ‡บ

Kaspersky is calling it "Operation ForumTroll" ๐Ÿ•ต๏ธโ€โ™‚๏ธ

๐Ÿ”ง Fix? Update Chrome to version 134.0.6998.177/.178 NOW! โณ

๐Ÿ“ข Using Edge, Brave, or Opera? Theyโ€™re based on Chromium, so updates should be coming soonโ€”stay alert! โš ๏ธ

With state-backed hackers on the loose, don't risk itโ€”update immediately! ๐Ÿš€

Now, on to this weekโ€™s hottest cybersecurity news stories:ย 

  • ๐Ÿ’‰ JavaScript injection promoting gambling sites infects 150k sites โ˜ฃ๏ธ

  • โš ๏ธ CISA warning! Active exploits hit Next.js and DrayTek devices ๐Ÿ“ฑ

  • ๐Ÿ‘พ Raspberry Robin malware linked to almost 200 unique C2 domains ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป

Donโ€™t gamble with your online safety ๐ŸŽฒ

๐Ÿšจ Massive Web Infections Redirect Users to Chinese Gambling Sites ๐ŸŽฐ

A massive JavaScript injection campaign has compromised 150,000+ websites, redirecting visitors to Chinese-language gambling platforms.

๐Ÿ”ฅ How the Attack Works

๐Ÿ”น Malicious JavaScript injected into legitimate sites ๐Ÿ“œ

๐Ÿ”น Hijacks browsers, replacing content with a gambling page

๐Ÿ”น Uses iframe overlays to mimic real betting sites (e.g., Bet365) ๐ŸŽญ

๐Ÿ”น Obfuscates code to evade detection ๐Ÿ•ต๏ธโ€โ™‚๏ธ

๐Ÿšจ Scale & Evolution

โœ… 135,800+ sites still actively infected

โœ… Redirects via five domains (e.g., "zuizhongyj[.]com")

โœ… Constantly updated with new tactics

๐ŸŒŽ Tied to Larger Cybercrime Networks

๐Ÿ”น Similar tactics used by DollyWay malware, which has compromised 20,000+ WordPress sites since 2016

๐Ÿ”น Uses Traffic Direction Systems (TDS) to funnel visitors to scam sites

๐Ÿ”น Monetized through networks like VexTrio & LosPollos

๐Ÿ›ก๏ธ How to Stay Safe

โœ… Website admins: Regularly scan for unauthorized JavaScript injections

โœ… Keep WordPress & plugins updated to prevent exploitation

โœ… Users: Avoid unfamiliar gambling pop-ups & redirectsย 

With thousands of sites compromised and millions exposed, this attack highlights the growing risk of web-based threatsโ€”stay cautious and proactive! ๐Ÿšง

Hereโ€™s Why Over 4 Million Professionals Read Morning Brew

  • Business news explained in plain English

  • Straight facts, zero fluff, & plenty of puns

  • 100% free

See for yourself

Motherf**kers act like they forgot about DrayTek ๐ŸŽค

๐Ÿšจ CISA Adds Exploited Sitecore CMS Flaws to KEV List ๐Ÿ“

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two six-year-old vulnerabilities in Sitecore CMS and Experience Platform (XP) to its Known Exploited Vulnerabilities (KEV) list, citing active exploitation.

๐Ÿ”ฅ The Vulnerabilities

๐Ÿ”น CVE-2019-9874 (CVSS 9.8) โ€“ Allows unauthenticated remote code execution via deserialization attack ๐Ÿ”“

๐Ÿ”น CVE-2019-9875 (CVSS 8.8) โ€“ Allows authenticated remote code execution via deserialization attack

๐Ÿ“… Federal agencies must patch by April 16, 2025 to secure their networks.

โš ๏ธ Other Exploited Vulnerabilities

๐Ÿ”ธ Next.js CVE-2025-29927 (CVSS 9.1) โ€“ Authorization bypass lets attackers bypass middleware security & access sensitive resources ๐Ÿ”‘

๐Ÿ”ธ DrayTek Router Flaws (CVE-2020-8515, CVE-2021-20123, CVE-2021-20124) โ€“ Used for remote code execution & file theft ๐Ÿ“ก

๐ŸŒŽ Attack Hotspots

๐Ÿ”น Sitecore & Next.js flaws actively probed worldwide

๐Ÿ”น DrayTek router exploits detected in Indonesia, U.S., Hong Kong, Lithuania, & Singapore

๐Ÿ›ก๏ธ How to Stay Protectedย 

โœ… Apply patches for all impacted systems ASAP

โœ… Monitor logs for unusual activity & exploit attempts

โœ… Restrict public access to vulnerable applications

With older flaws still being actively exploited, staying updated is critical to prevent cyber intrusions! ๐Ÿšง

The newsletter every professional should be reading

Thereโ€™s a reason Morning Brew is the gold standard of business newsโ€”itโ€™s the easiest and most enjoyable way to stay in the loop on all the headlines impacting your world.

Tech, finance, sales, marketing, and everything in betweenโ€”weโ€™ve got it all. Just the stuff that matters, served up in a fast, fun read.

Lookโ€”over 4 million professionals start their day with Morning Brewโ€™s daily newsletter, and it only takes 5 minutes to read. Sign up for free and see for yourself!

Check it out

Itโ€™s Robin you blind ๐Ÿ’€

๐Ÿšจ Raspberry Robin Malware Expands with 200+ C2 Domains ๐Ÿ‘พ

A new investigation has uncovered nearly 200 command-and-control (C2) domains linked to Raspberry Robin, a fast-evolving malware used by Russian-linked cybercriminals and nation-state hackers for initial access into victim networks.

๐Ÿ”ฅ Key Findings

๐Ÿ”น New C2 domains (180+) discovered via QNAP device relay ๐Ÿ“ก

๐Ÿ”น Uses โ€œfast fluxโ€ to rotate domains & evade takedowns ๐Ÿ”„

๐Ÿ”น Top TLDs: .wf, .pm, .re, .nz, .eu, .tw ๐ŸŒ

๐Ÿ”น C2 infrastructure tied to niche registrars & Bulgarian hosting provider

๐Ÿ•ต๏ธ How Raspberry Robin Spreads

โœ… USB-Based Propagation โ€“ Infects devices via compromised USB drives

โœ… Discord-Based Delivery โ€“ Archives & Windows Script Files spread malware ๐ŸŽญ

โœ… Exploiting One-Day Vulnerabilities โ€“ Gains privilege escalation before public disclosure

๐Ÿดโ€โ˜ ๏ธ Linked to Major Threat Actors

๐Ÿ”ธ Used by Russian APT Cadet Blizzard for initial access ๐Ÿ•ถ๏ธ

๐Ÿ”ธ Distributes malware for LockBit, Dridex, SocGholish, & FIN11

๐Ÿ”ธ Possibly operates as a Pay-Per-Install (PPI) botnet

๐Ÿ›ก๏ธ How to Stay Safeย 

โœ… Disable autorun on USB devices ๐Ÿšซ

โœ… Monitor network traffic for unusual domain activity ๐ŸŒ

โœ… Use endpoint protection to detect malware loaders ๐Ÿ›ก๏ธ

โœ… Restrict access to QNAP & NAS devices from external networks

With Russian threat actors leveraging Raspberry Robin for large-scale intrusions, defensive measures are critical to prevent data breaches and ransomware infections. ๐Ÿšจ

๐Ÿ—ž๏ธ Extra, Extra! Read all about it! ๐Ÿ—ž๏ธ

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • ๐Ÿ›ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐Ÿ“…

  • ๐Ÿ’ตCrypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐Ÿ†“

  • ๐Ÿ“ˆBitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐Ÿ‘พ

Let us know what you think.

So long and thanks for reading all the phish!

footer graphic cyber security newsletter

Defense Industry Under Attack

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
.bh__table_cell { padding: 5px; background-color: #FFFFFF; }
.bh__table_cell p { color: #2D2D2D; font-family: ‘Helvetica’,Arial,sans-serif !important; overflow-wrap: break-word; }
.bh__table_header { padding: 5px; background-color:#F1F1F1; }
.bh__table_header p { color: #2A2A2A; font-family:’Trebuchet MS’,’Lucida Grande’,Tahoma,sans-serif !important; overflow-wrap: break-word; }

Gone Phishing Banner

Welcome toย Gone Phishing, your weekly cybersecurity newsletter thatโ€™s popping like fresh ๐Ÿž๐Ÿฅ–๐Ÿฅจ๐Ÿฐ๐Ÿง

Patchย of theย Week!ย ๐Ÿฉน

First thingโ€™s first, folks. Our weekly segment goes by many names. Patch of the Week, Tweak of the week. Okay, thatโ€™s itโ€ฆ ๐Ÿ˜ณย 

Congrats to Windows, the cybercriminals are no matchโ€ฆ for your patch! ๐Ÿฉน

Check out this freshly hatched patch ๐Ÿฃ

One door closes, a Window opens ๐Ÿก

๐Ÿ›ก๏ธ Microsoft Patch Tuesday: 57 Bugs Fixed, 6 Zero-Days Under Attack! ๐Ÿ’€

Microsoft just dropped 57 security patches, including 6 zero-days being actively exploited! โš ๏ธ

Topย risksย include:

  • Win32 Kernel exploit (CVE-2025-24983) lets attackers gain SYSTEM privileges.

  • File system flaws allowing data theft & remote code execution.

  • Microsoft Management Console bypass (CVE-2025-26633) to evade security protections.

The U.S. CISA has added these to its Known Exploited Vulnerabilities (KEV) list, giving agencies until April 1, 2025 to patch. If you havenโ€™t updated yet, do it NOW to stay protected! ๐Ÿ”’

Now, on to this weekโ€™s hottest cybersecurity news stories:ย 

  • ๐Ÿ€ Dark Crystal targets Ukraine ๐ŸŽฏ

  • ๐Ÿ‘พ Basta crimes spreads Evel Knievel ๐Ÿ๏ธ

  • ๐Ÿ”Ž ClearFake it before you make it nigga โ˜ ๏ธ

CERTified loverboy, certified pedophile ๐Ÿ“€

๐ŸŽฏ Dark Crystal RAT Campaign Targets Ukrainian Defense Sector

The Computer Emergency Response Team of Ukraine (CERT-UA) warns of a new cyber espionage campaign deploying Dark Crystal RAT (DCRat) against defense industry employees and military personnel.

๐Ÿšจ How the Attack Works

๐Ÿ”น Malicious messages sent via Signal ๐Ÿ“ฒ

๐Ÿ”น Compromised accounts used to increase trust ๐Ÿ•ต๏ธโ€โ™‚๏ธ

๐Ÿ”น Fake meeting minutes sent as archive files ๐Ÿ“

๐Ÿ”น Contains a decoy PDF + DarkTortilla crypter ๐ŸŽญ

๐Ÿ”น Decryption leads to full remote access via DCRat ๐Ÿ’ป

๐Ÿ•ต๏ธ Whoโ€™s Behind It?

CERT-UA attributes the attack to UAC-0200, active since mid-2024.

๐Ÿ”ฅ Why Itโ€™s Dangerous

โœ… DCRat executes arbitrary commands ๐Ÿ› ๏ธ

โœ… Steals sensitive data & credentials ๐Ÿ”‘

โœ… Grants attackers remote control over infected systems

๐ŸŒ Cyber Tensions & Signal Controversy

๐Ÿ”ธ Reports claim Signal is no longer assisting Ukrainian authorities in countering Russian cyber threats

๐Ÿ”ธ Signal denies these claims, stating it does not collaborate with any government

๐Ÿ” How to Stay Safe

โœ… Be cautious of unexpected Signal messages ๐Ÿšง

โœ… Verify senders before opening attachments

โœ… Use endpoint protection & monitor for unauthorized activity ๐Ÿ”

Russian-linked cyber actors are increasingly targeting secure messaging platformsโ€”stay vigilant and protect sensitive data! ๐Ÿšจ

Optimize global IT operations with our World at Work Guide

Explore this ready-to-go guide to support your IT operations in 130+ countries. Discover how:

  • Standardizing global IT operations enhances efficiency and reduces overhead

  • Ensuring compliance with local IT legislation to safeguard your operations

  • Integrating Deel IT with EOR, global payroll, and contractor management optimizes your tech stack

Leverage Deel IT to manage your global operations with ease.

Download free guide

Basta crimes ๐ŸŽค

๐Ÿ•ต๏ธ Leaked Black Basta Chats Reveal Russian Ties & Cybercrime Expansion

A leak of 200,000 internal chat messages from the Black Basta ransomware gang suggests possible links to Russian authorities and major cybercrime operations.

๐Ÿšจ Key Revelations

๐Ÿ”น Leader Oleg Nefedov (GG/AA) allegedly escaped arrest in Armenia with Russian officialsโ€™ help

๐Ÿ”น Two suspected offices in Moscow ๐Ÿข

๐Ÿ”น Used ChatGPT for fraud, malware development, and debugging ๐Ÿค–

๐Ÿ”น Overlaps with other ransomware gangs (Rhysida, CACTUS) ๐ŸŽญ

๐Ÿ”น Developed a custom C2 framework (โ€œBreakerโ€) for persistence & stealth

๐Ÿ”ฅ Brute-Force Attacks with BRUTED

๐Ÿ”น Custom tool โ€œBRUTEDโ€ automates credential stuffing ๐Ÿ”‘

๐Ÿ”น Targets firewalls, VPNs, & edge network devices

๐Ÿ”น Used since 2023 for large-scale password attacks

๐Ÿ•ต๏ธ Whatโ€™s Next for Black Basta?

๐Ÿ”ธ Possible rebrand with new ransomware based on Contiโ€™s code

๐Ÿ”ธ Heavy investment in automated cyberattacks

๐Ÿ”ธ Scaling credential theft & network infiltration

๐Ÿ” How to Stay Protected

โœ… Enforce strong, unique passwords & MFA ๐Ÿ”„

โœ… Monitor for unusual login attempts & brute-force attacks ๐Ÿ”

โœ… Patch firewalls & VPNs to prevent exploitation ๐Ÿ”ฅ

With growing automation & state-level connections, Black Basta remains a top ransomware threatโ€”organizations must stay ahead! ๐Ÿšง

Itโ€™s clearly a ClearFake ๐ŸŽญ

๐ŸŽญ ClearFake Uses Fake reCAPTCHA to Spread Malware

The ClearFake campaign is tricking users with fake reCAPTCHA and Cloudflare Turnstile verifications, leading them to download Lumma Stealer and Vidar Stealer malware. At least 9,300 websites have been compromised.

๐Ÿ”ฅ How the Attack Works

๐Ÿ”น Users visit a hacked siteโ€”JavaScript loads from Binance Smart Chain (BSC) ๐Ÿ“œ

๐Ÿ”น Victim is tricked into running malicious PowerShell (ClickFix technique)

๐Ÿ”น Deploys Emmenhtal Loader (PEAKLIGHT) โ†’ Drops Lumma Stealer

๐Ÿ”น New variant encrypts HTML & expands Web3 capabilities ๐Ÿ•ต๏ธโ€โ™‚๏ธ

โš ๏ธ Why This Is Dangerous

โœ… Uses blockchain (BSC) for resilience & stealth

โœ… Compromised over 9,300 sites & exposed 200,000+ users

โœ… Targets both Windows & macOS users

โœ… Frequently updated to evade detection

๐Ÿ›ก๏ธ How to Stay Safe

โœ… Never download "browser updates" from pop-ups ๐Ÿšซ

โœ… Be cautious of CAPTCHA prompts on unfamiliar sites

โœ… Monitor PowerShell execution & network traffic ๐Ÿ”

โœ… Keep browsers & security tools updated

With widespread infections & rapid evolution, ClearFake remains a major global threatโ€”stay vigilant! ๐Ÿšจ

๐Ÿ—ž๏ธ Extra, Extra! Read all about it! ๐Ÿ—ž๏ธ

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • ๐Ÿ›ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐Ÿ“…

  • ๐Ÿ’ตCrypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐Ÿ†“

  • ๐Ÿ“ˆBitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐Ÿ‘พ

Let us know what you think.

So long and thanks for reading all the phish!

footer graphic cyber security newsletter

[Exclusive Invite] Beyond Backups: How to Elevate Your Cyber Resilience

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
.bh__table_cell { padding: 5px; background-color: #FFFFFF; }
.bh__table_cell p { color: #2D2D2D; font-family: ‘Helvetica’,Arial,sans-serif !important; overflow-wrap: break-word; }
.bh__table_header { padding: 5px; background-color:#F1F1F1; }
.bh__table_header p { color: #2A2A2A; font-family:’Trebuchet MS’,’Lucida Grande’,Tahoma,sans-serif !important; overflow-wrap: break-word; }

Rubrik

Hear from Chief Research Analyst at IT-Harvest
Beyond Backup: Defining Cyber Resilience for IT Professionals

๐ŸŽฏ Unknown Hackers Target Japanese Organizations via PHP Vulnerability

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
.bh__table_cell { padding: 5px; background-color: #FFFFFF; }
.bh__table_cell p { color: #2D2D2D; font-family: ‘Helvetica’,Arial,sans-serif !important; overflow-wrap: break-word; }
.bh__table_header { padding: 5px; background-color:#F1F1F1; }
.bh__table_header p { color: #2A2A2A; font-family:’Trebuchet MS’,’Lucida Grande’,Tahoma,sans-serif !important; overflow-wrap: break-word; }

Gone Phishing Banner

Welcome toย Gone Phishing, your weekly cybersecurity newsletter thatโ€™s treating cybercriminals like Trumpโ€™s tariffs are treating the stock market ๐Ÿ“‰๐Ÿ“‰๐Ÿ“‰ย 

Patch of the Week!ย ๐Ÿฉน

First thingโ€™s first, folks. Our weekly segment goes by many names. Patch of the Week, Tweak of the week. Okay, thatโ€™s itโ€ฆ ๐Ÿ˜ณย 

Congrats to Mozilla & Microsoft,ย the cybercriminals are no matchโ€ฆ for your patch! ๐Ÿฉน

Check out this freshly hatched patches ๐Ÿฃ๐Ÿฃ

All Mozilla, no fillerย ๐Ÿ˜œย 

๐Ÿšจ Firefox Add-on Trouble Incoming? Update Now! ๐Ÿ”ฅ

Mozilla is urging all Firefox users to update ASAP to avoid issues with add-ons, DRM content, and security features due to an expiring root certificate on March 14, 2025. ๐Ÿ›‘

Whatโ€™s the fix?ย 

โœ… Update to Firefox 128+ (or ESR 115.13+ for long-term users).ย 

โœ… Applies to Windows, macOS, Linux, and Android (but not iOS/iPadOS).

โœ… Tor Browser users should update as well.

Without this update, add-ons may disable themselves, security alerts may stop working, and some DRM content wonโ€™t play. Don't risk itโ€”update now! ๐Ÿš€

๐Ÿ›ก๏ธ Microsoft Patch Tuesday: 57 Bugs Squashed, 6 Zero-Days Exploited! ๐Ÿ’€

Microsoft just patched 57 security flaws, including 6 actively exploited zero-days! โš ๏ธย 

Key risks include:

  • Win32 Kernel flaw (CVE-2025-24983) used by malware to gain SYSTEM privileges.

  • NTFS & FAT file system bugs allowing attackers to steal data or execute malicious code.

  • Microsoft Management Console bypass (CVE-2025-26633) helping attackers evade security checks.

The U.S. CISA has added these to its Known Exploited Vulnerabilities (KEV) list, requiring agencies to patch by April 1, 2025. If you haven't updated yet, do it now to stay protected! ๐Ÿ”’

Now, on to this weekโ€™s hottest cybersecurity news stories:ย 

  • โ›ฉ๏ธ Japan-attack: PHP-CGI RCE flaw exploited in attacks galore ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป

  • ๐ŸŒ Juniper networks beware! Chinese hackers are out en masse ๐Ÿ‘จโ€๐Ÿ‘จโ€๐Ÿ‘งโ€๐Ÿ‘ง

  • ๐ŸŽญ Fake Play Store scam targets global users: PlayPraetor Trojan ๐Ÿด

Donโ€™t Japanic ๐Ÿ˜จ

๐ŸŽฏ Unknown Hackers Target Japanese Organizations via PHP Vulnerability

A mystery hacking group has been exploiting CVE-2024-4577, a remote code execution (RCE) flaw in PHP-CGI on Windows, to infiltrate Japanese companies across tech, telecom, education, e-commerce, and entertainment sectors since January 2025.

๐Ÿ”ฅ How the Attack Works

๐Ÿ”น Exploits PHP-CGI vulnerability for initial access

๐Ÿ”น Deploys Cobalt Strike (TaoWu plugins) via PowerShell for remote control ๐Ÿ“ก

๐Ÿ”น Moves laterally using privilege escalation tools (JuicyPotato, RottenPotato, SweetPotato)

๐Ÿ”น Hides traces by deleting event logs (wevtutil commands)

๐Ÿ”น Steals passwords & NTLM hashes using Mimikatz ๐Ÿ›‘

๐Ÿ› ๏ธ Hacker Toolset (Exposed on Alibaba Cloud)

๐Ÿ”น BeEF โ€“ Executes browser-based attacks ๐Ÿ–

๐Ÿ”น Viper C2 โ€“ Runs remote commands & reverse shell payloads ๐Ÿ

๐Ÿ”น Blue-Lotus โ€“ Web shell framework for XSS, cookie theft & CMS hijacking ๐ŸŒ

๐Ÿ•ต๏ธ Whatโ€™s Their Goal?

Researchers suspect more than just credential theftโ€”the attackers are gaining SYSTEM privileges and setting up persistence, suggesting long-term espionage or future attacks.

๐Ÿ” How to Stay Protected

โœ… Patch PHP-CGI (CVE-2024-4577) immediately ๐Ÿ”„

โœ… Monitor for unusual PowerShell activity & log deletions ๐Ÿ“Š

โœ… Restrict execution of privilege escalation tools ๐Ÿšซ

โœ… Strengthen defenses against Cobalt Strike & web shell attacks ๐Ÿ›ก๏ธ

With sophisticated tactics and stealthy tools, these hackers pose a serious threatโ€”stay alert and secure your systems! ๐Ÿšจ

Learn AI in 5 minutes a day

This is the easiest way for a busy person wanting to learn AI in as little time as possible:

  1. Sign up for The Rundown AI newsletter

  2. They send you 5-minute email updates on the latest AI news and how to use it

  3. You learn how to become 2x more productive by leveraging AI

Sign up to start learning.

Heard about the Chinese Hackfather? He sent them some code they couldnโ€™t understand. ๐Ÿ—ฃ๏ธ

๐Ÿšจ China-Linked Hackers Target Juniper Routers with Custom Backdoors ๐Ÿšช

The China-backed hacking group UNC3886 is infiltrating outdated Juniper MX routers, deploying custom TinyShell-based backdoors to spy on networks and evade detection.

๐ŸŽฏ Whoโ€™s Affected?

๐Ÿ”น Defense, telecom, and tech sectors in the U.S. & Asia

๐Ÿ”น Organizations using end-of-life Juniper routers

๐Ÿ”ฅ How the Attack Works

โš ๏ธ Gains privileged access via compromised credentials

โš ๏ธ Injects malware into legitimate Junos OS processes ๐Ÿ› ๏ธ

โš ๏ธ Disables logging before executing commands, then restores logs ๐Ÿ•ต๏ธโ€โ™‚๏ธ

โš ๏ธ Uses rootkits & SSH hijacking tools to maintain persistence

๐Ÿ› ๏ธ Custom Backdoors & Implants

๐Ÿ”น appid, to โ€“ Remote control via SOCKS proxy & command execution

๐Ÿ”น irad โ€“ Stealthy packet sniffer for extracting commands

๐Ÿ”น lmpad โ€“ Memory injection tool to disable logging

๐Ÿ”น jdosd โ€“ UDP-based remote shell for file transfer

๐Ÿ”น oemd โ€“ TCP backdoor for executing commands

๐Ÿ›‘ How to Defend Against UNC3886

โœ… Upgrade Juniper routers to patched versions ๐Ÿ›ก๏ธ

โœ… Monitor for unusual system modifications & log tampering ๐Ÿ“Š

โœ… Restrict administrative access & enforce MFA ๐Ÿ”‘

โœ… Deploy forensic tools to detect passive backdoors ๐Ÿ”ย 

UNC3886โ€™s stealth tactics & deep system knowledge make these attacks highly persistentโ€”organizations must act fast to secure their networks! ๐Ÿšง

You gotta Play to win ๐Ÿ†

๐Ÿšจ PlayPraetor Trojan: Global Google Play Scam Exposed ๐Ÿง 

Cybercriminals are tricking users with fake Google Play Store pages to distribute PlayPraetor, a powerful malware that steals banking credentials, logs keystrokes, and hijacks cryptocurrency transactions. Over 6,000 fraudulent pages have been uncovered by cybersecurity firm CTM360.

๐ŸŽญ How the Scam Works

๐Ÿ”น Fake Google Play Pages โ€“ Lookalike sites distribute malicious APKs

๐Ÿ”น Trojanized Apps โ€“ Malware disguises as legitimate apps ๐Ÿ•ต๏ธโ€โ™‚๏ธ

๐Ÿ”น Dangerous Permissions โ€“ Gains control via Accessibility Services

๐Ÿ”น Banking Fraud โ€“ Targets banking & crypto apps, intercepting MFA codes ๐Ÿ”‘

๐Ÿ› ๏ธ PlayPraetorโ€™s Attack Strategy

CTM360โ€™s Scam Navigator outlines six key stages:

1๏ธโƒฃ Fake Domains โ€“ Mimic Google Play & government sites

2๏ธโƒฃ Phishing Traps โ€“ Victims lured via ads, SMS, & social media

3๏ธโƒฃ Malware Distribution โ€“ Trojanized apps infect devices

4๏ธโƒฃ Credential Theft โ€“ Keyloggers & clipboard monitoring steal data

5๏ธโƒฃ Monetization โ€“ Stolen accounts sold on the dark web ๐Ÿ’ฐ

6๏ธโƒฃ Botnet Operations โ€“ Infected devices used for ad fraud & cybercrime

๐Ÿ›ก๏ธ How to Protect Yourself

โœ… Download apps ONLY from official stores (Google Play, Apple App Store)

โœ… Verify app developers & read user reviews

โœ… Deny unnecessary permissions, especially Accessibility Services

โœ… Use mobile security software to block malware

โœ… Stay informed on emerging threats

With over 6,000 fraudulent pages detected, PlayPraetor is one of the most widespread mobile scams everโ€”stay vigilant! โš ๏ธ

๐Ÿ—ž๏ธ Extra, Extra! Read all about it! ๐Ÿ—ž๏ธ

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • ๐Ÿ›ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐Ÿ“…

  • ๐Ÿ’ตCrypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐Ÿ†“

  • ๐Ÿ“ˆBitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐Ÿ‘พ

Let us know what you think.

So long and thanks for reading all the phish!

footer graphic cyber security newsletter

Silk Typhoon bursts the banks ๐ŸŒŠ

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
.bh__table_cell { padding: 5px; background-color: #FFFFFF; }
.bh__table_cell p { color: #2D2D2D; font-family: ‘Helvetica’,Arial,sans-serif !important; overflow-wrap: break-word; }
.bh__table_header { padding: 5px; background-color:#F1F1F1; }
.bh__table_header p { color: #2A2A2A; font-family:’Trebuchet MS’,’Lucida Grande’,Tahoma,sans-serif !important; overflow-wrap: break-word; }

Gone Phishing Banner

Welcome to Gone Phishing, your weekly cybersecurity newsletter thatโ€™s the DOGE to cybercrimeโ€™s government spending ๐Ÿคบ

Patch of the Week!ย ๐Ÿฉน

First thingโ€™s first, folks. Our weekly segment goes by many names. Patch of the Week, Tweak of the week. Okay, thatโ€™s itโ€ฆ ๐Ÿ˜ณย 

Congrats to Elastic, the cybercriminals are no matchโ€ฆ for your patch! ๐Ÿฉน

Check out this freshly hatched patch ๐Ÿฃ

Elastic bounces back ๐Ÿ™ƒ

๐Ÿšจ Critical Kibana Flaw โ€“ Patch Now!

Elastic has released an urgent security update for Kibana, fixing a critical prototype pollution vulnerability (CVE-2025-25015, CVSS 9.9) that could allow arbitrary code execution. ๐Ÿšจ

โšก Whatโ€™s the Risk?

โ—ย Attackers can manipulate JavaScript objects, leading to remote code execution (RCE), data access, or privilege escalation.

โ—ย Exploitable via crafted file uploads & HTTP requests.

๐Ÿ›‘ Affected Versions:

โ—ย Kibana 8.15.0 โ†’ 8.17.3 (Fixed in 8.17.3)

โ—ย In 8.15.0 to 8.17.1, only Viewer role users can exploit it.

โ—ย In 8.17.1 to 8.17.2, attackers need specific privileges (fleet-all, integrations-all, actions:execute-advanced-connectors).

๐Ÿ”ง Immediate Action Required!

โœ… Update to Kibana 8.17.3 ASAP!

โœ… If patching isnโ€™t possible, disable Integration Assistant (xpack.integration_assistant.enabled: false in kibana.yml).

Elastic has patched similar high-severity flaws before โ€“ donโ€™t wait! Secure your systems now! ๐Ÿ”’โœจ

Now, on to this weekโ€™s hottest cybersecurity news stories:ย ย 

  • ๐ŸŒŠ Chinese โ€˜Silk Typhoonโ€™ expands attacks to IT supply chains ๐ŸŒ

  • ๐Ÿš€ Google launches AI conversational scam protection for Android ๐Ÿค–

  • ๐Ÿผ Chinese APT Lotus Panda targets governments w/ new variants ๐Ÿ‘พ

Silk Typhoon bursts the banks ๐ŸŒŠ

๐Ÿšจ Silk Typhoon Targets IT Supply Chains for Cyber Espionage ๐ŸŽฏ

The China-linked hacking group Silk Typhoon (formerly Hafnium) has shifted tactics, now targeting IT supply chains to infiltrate corporate networks. Instead of direct attacks, they compromise remote management tools, cloud apps, and IT service providers to gain broad access to victims.

๐ŸŽฏ Whoโ€™s at Risk?

๐Ÿ”น IT service providers, MSPs, cloud management firms

๐Ÿ”น Government agencies, healthcare, legal, defense, and NGOs

๐Ÿ”น Energy & higher education sectors

๐Ÿ” How They Attack

โš ๏ธ Exploiting stolen API keys & credentials for privilege escalation ๐Ÿ”‘

โš ๏ธ Zero-day attacks on Ivanti VPN, Palo Alto firewalls & Citrix NetScaler ๐ŸŒ

โš ๏ธ Password spraying with leaked credentials ๐Ÿ’ป

โš ๏ธ Deploying web shells for persistence & command execution ๐Ÿšช

๐Ÿ“ก What They Steal

๐Ÿ”น Email, OneDrive & SharePoint data via MSGraph API ๐Ÿ“

๐Ÿ”น Cloud infrastructure reconnaissance & lateral movement ๐Ÿ”„

๐Ÿ”น Sensitive corporate & government information ๐Ÿ•ต๏ธ

๐Ÿ•ถ๏ธ Hiding Their Tracks

Silk Typhoon operates through a "CovertNetwork" of compromised routers & appliances from Zyxel, QNAP, and Cyberoam, disguising their real location.

๐Ÿ” How to Stay Secure

โœ… Apply security patches ASAP for exploited CVEs ๐Ÿ› ๏ธ

โœ… Use multi-factor authentication (MFA) ๐Ÿ”‘

โœ… Limit access to critical cloud services & enforce network segmentation ๐Ÿ”„

โœ… Monitor for unusual API key use & privilege escalation ๐Ÿšจ

Silk Typhoonโ€™s supply chain attacks are a major cybersecurity threatโ€”proactive defense is crucial! ๐Ÿšง

Looking for unbiased, fact-based news? Join 1440 today.

Join over 4 million Americans who start their day with 1440 โ€“ your daily digest for unbiased, fact-centric news. From politics to sports, we cover it all by analyzing over 100 sources. Our concise, 5-minute read lands in your inbox each morning at no cost. Experience news without the noise; let 1440 help you make up your own mind. Sign up now and invite your friends and family to be part of the informed.

Subscribe to 1440 today.

Pays to be a Paranoid Android ๐Ÿค–

๐Ÿšจ Google Rolls Out AI-Powered Scam Detection for Android Users ๐Ÿ“ฑ

Google is launching AI-driven scam detection to help Android users avoid conversational scams and spoofed calls that impersonate trusted companies.

๐Ÿ” How It Works

โœ… AI models analyze conversation patterns in real-time

โœ… Detects suspicious messages & alerts users ๐Ÿšจ

โœ… Runs entirely on-device for privacy ๐Ÿ”’

โœ… Only applies to unknown numbers ๐Ÿ“ต

Users can dismiss, block, or report scams, with reported details shared with Google & carriers.

๐Ÿ“ž AI Scam Detection for Calls Expands

๐Ÿ”น Available on Pixel 9+ devices in the U.S.

๐Ÿ”น Beep alerts notify participants when enabled ๐Ÿ“ข

๐Ÿ”น Audio is processed ephemerally & not stored

๐ŸŒ Where & When?

๐Ÿš€ First launching in English in the U.S., U.K., & Canada

๐Ÿ“† More regions to follow

๐Ÿ›ก๏ธ Safer Browsing with AI

Google also revealed that 1B+ Chrome users now use Enhanced Protection mode, which:

๐Ÿ”น Detects phishing & scam websites ๐Ÿ•ต๏ธโ€โ™‚๏ธ

๐Ÿ”น Flags suspicious downloads ๐Ÿšซ

Stay Safe!

๐Ÿ”น Keep scam detection enabled

๐Ÿ”น Be cautious of unknown senders & callers

๐Ÿ”น Use Safe Browsing for extra protection

AI-powered tools are making scams easier to spotโ€”but vigilance is still key! ๐Ÿšง

Hackers: Lotus cause some Pandamonium ๐Ÿ˜

๐Ÿšจ Lotus Panda Targets Governments & Telecoms with Sagerunex Backdoor ๐Ÿ•ต๏ธ

The Chinese state-backed hacking group Lotus Panda (aka Billbug, Thrip, Lotus Blossom) has been targeting government, manufacturing, telecom, and media sectors in the Philippines, Vietnam, Hong Kong, and Taiwan with new variants of the Sagerunex backdoor.

๐ŸŽฏ Whatโ€™s New?

๐Ÿ”น Two new "beta" versions of Sagerunex spotted

๐Ÿ”น Uses Dropbox, X (Twitter), and Zimbra for stealthy C2 communications ๐Ÿ“ก

๐Ÿ”น Deploys cookie stealers, proxy tools, and privilege escalation software

๐Ÿšช How They Get In

โš ๏ธ Likely through spear-phishing & watering hole attacks ๐ŸŽฃ

โš ๏ธ Backdoor hides in email drafts & trash folders to evade detection ๐Ÿ•ต๏ธโ€โ™‚๏ธ

โš ๏ธ Steals system data & sends commands via Zimbra webmail

๐Ÿ”ฅ How They Operate

โœ… Collects system details & encrypts exfiltrated data

โœ… Runs reconnaissance commands (net, tasklist, ipconfig, netstat)

โœ… Uses Venom proxy to bypass internet restrictions

๐Ÿ” How to Defend Against Lotus Panda

โœ… Monitor for unusual Dropbox/X/Zimbra activity ๐Ÿ“Š

โœ… Restrict unauthorized use of proxy tools ๐Ÿšซ

โœ… Educate employees on phishing threats ๐Ÿ“ง

โœ… Strengthen email security & endpoint defenses ๐Ÿ›ก๏ธ

Lotus Panda remains a persistent threat, evolving its stealth tactics to bypass security measures. Stay vigilant and proactive! ๐Ÿšจ

๐Ÿ—ž๏ธ Extra, Extra! Read all about it! ๐Ÿ—ž๏ธ

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • ๐Ÿ›ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐Ÿ“…

  • ๐Ÿ’ตCrypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐Ÿ†“

  • ๐Ÿ“ˆBitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐Ÿ‘พ

Let us know what you think.

So long and thanks for reading all the phish!

footer graphic cyber security newsletter