How did the Oracle not see this coming

Apr 12 2025

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
.bh__table_cell { padding: 5px; background-color: #FFFFFF; }
.bh__table_cell p { color: #2D2D2D; font-family: ‘Helvetica’,Arial,sans-serif !important; overflow-wrap: break-word; }
.bh__table_header { padding: 5px; background-color:#F1F1F1; }
.bh__table_header p { color: #2A2A2A; font-family:’Trebuchet MS’,’Lucida Grande’,Tahoma,sans-serif !important; overflow-wrap: break-word; }

Gone Phishing Banner

Welcome to Gone Phishing, your weekly cybersecurity newsletter that treats cybercriminals like Donald Trump treats the World Economy 👀🤯💀💀💀

Patch of the Week! 🩹

First thing’s first, folks. Our weekly segment goes by many names. Patch of the Week, Tweak of the week. Okay, that’s it… 😳

Congrats to WhatsApp, the cybercriminals are no match… for your patch! 🩹

WhatsApp with that? 🙃

⚠️💻 WhatsApp for Windows Vulnerability – Update NOW! 🚨🐛

If you're using WhatsApp Desktop on Windows, this is your sign to hit that update button 🔄📥

🧨 A flaw tracked as CVE-2025-30401 allowed sneaky attackers to send malicious files disguised as innocent ones—like a wolf in sheep’s clothing 🐺🐑

🔍 How did it work?

WhatsApp trusted what a file claimed to be (its MIME type – like “this is a photo 📸”)

But when you clicked it inside the app? It looked at the file extension (.exe, .jpg, etc.) instead

That means something called cute-pic.jpg.exe could look like a picture 🖼️ but run like a program 💻—and boom 💥 malware

😬 This affected all versions before 2.2450.6—so if you're still on an old version, you're at risk!

🛡️ What to do:

Update to WhatsApp Desktop v2.2450.6 or later ASAP

Be wary of weird or unexpected attachments—even if they look normal

Don't trust file names blindly 👀

🧠 Security pro Nico Chiaraviglio from Zimperium called this a reminder that:

“Attachments are STILL one of the most common ways attackers spread malware.”

💪 He recommends a layered defense:

🔍 Attachment scanning

📈 Behavioral analysis

🧠 User education

🎯 Bottom line: Just because it looks like a file you can trust… doesn't mean it is. Don’t open anything sketchy, even if it comes through WhatsApp.

🛠️ And if you haven’t updated yet—go do it now. Seriously. 🏃💨

Now, on to this week’s hottest cybersecurity news stories: 

  • 🔮 Oracle confirms hack-attack: broken systems, stolen credentials 🔑

  • 📥 Don’t get crushed by Crush: FTP system infiltrated by ransomware 💰

  • 🌐 Popular site SourceForge spreads crypto miner and clipper malware 👾

How did the Oracle not see this coming 🔮👀💀

Heart Attack Zombies GIF by Xbox

Gif by xbox on Giphy

🚨 Oracle Confirms Private Data Breach — After Public Denials ☁️

🔐 Oracle has privately admitted that a legacy system was breached, exposing old client login

data — including usernames, encrypted passwords, and passkeys.

🕵️‍♂️ What Happened?

Attackers accessed a “legacy environment” (rebranded as “Oracle Classic”)

 FBI and CrowdStrike are now involved

 6 million records across 140,000 tenants allegedly stolen

 Data includes credentials as recent as 2024

🎭 Public Denial, Private Panic

Oracle previously told the public:

“No breach of Oracle Cloud.”

But insiders and security experts say this is semantic wordplay — the breached system was previously part of Oracle Cloud, just rebranded.

🧠 “They’re splitting hairs to dodge admitting a real cloud breach,” said one researcher.

💸 Extortion & Lawsuits

Hacker “rose87168” demanded $20M before posting data for sale

Malware targeted Oracle’s Identity Manager (IDM) as early as January 2025

Now facing a class action lawsuit for delaying disclosure

🏥 Not the Only Breach

Just last month, Oracle also disclosed a healthcare breach — attackers stole patient data from Cerner servers using compromised credentials.

🚨 Why It Matters

Experts say these breaches challenge the core security promises of cloud platforms.

“A single hack shouldn’t affect 140,000 tenants — this breaks the cloud model,” warns security advisor Sunil Varkey.

🔇 As of now, Oracle still hasn’t made any public statement — sticking to private disclosures only.

Learn AI in 5 minutes a day

This is the easiest way for a busy person wanting to learn AI in as little time as possible:

  1. Sign up for The Rundown AI newsletter

  2. They send you 5-minute email updates on the latest AI news and how to use it

  3. You learn how to become 2x more productive by leveraging AI

Sign up to start learning.

It was only a Crush, it was only a Crush 🎙️🎶💀

🚨 CISA & Experts Warn: CrushFTP Exploited in Active Attacks 💥

Hackers are actively exploiting a serious flaw in CrushFTP, a popular file transfer tool used by thousands of organizations to move sensitive data.

🐞 The Vulnerability: CVE-2025-31161

 Discovered by: Researchers at Outpost24

 Reported to CrushFTP: March 13

 Public alert: March 21

Exploit now in the wild ⚠️

The flaw was originally going to be disclosed after customers had time to patch. But other researchers leaked details early — and attackers pounced.

🧠 "They weaponized the bug before customers had a chance to update,” said CrushFTP.

🦠 Ransomware Gang Claims Stolen Data

The Kill ransomware group now claims it’s using the exploit to steal “significant volumes” of sensitive data — and they’ve begun extorting victims.

🛡️ CISA has confirmed the attacks and told federal agencies to patch by April 28.

🏢 Who’s at Risk?

Hundreds of CrushFTP servers are exposed online, according to Shadowserver and Censys.

Recent versions of v10 and v11 are vulnerable.

Incident responders at Huntress report live attacks at companies in:

🛒 Retail

💡 Marketing

💻 Semiconductors

⚠️ Patch Now — Or Risk Getting Hit

CrushFTP is sending another urgent alert to customers. While some workarounds exist, patching is strongly advised.

“Anyone unpatched needs to urgently update.” — CrushFTP

💣 CrushFTP is the latest in a string of file transfer tools being targeted, following similar attacks on MOVEit, GoAnywhere, Cleo, and Accellion.

Stay alert. Patch fast. The attackers aren’t waiting.

Trying to strike a chord and it’s probably A (crypto) miner 💀💀💀

🚨 Malware Alert: Miners & Clippers Spread via Fake Software on SourceForge 🦠

Cybercriminals are back at it — this time using SourceForge, a trusted software hub, to push cryptocurrency miners and clipper malware disguised as cracked Microsoft Office apps.

🎭 The Bait: Fake "Office Add-ins"

One suspicious listing, called “officepackage”, looks harmless at first glance — it even borrows content from a legit GitHub repo.

But clicking “Download” on the site? It redirects you to a shady page on taplink[.]cc.

👀 What happens next?

 You’re served a ZIP file called vinstaller.zip

 Inside: another locked archive (installer.zip) and a text file with the password

 That archive contains a nasty MSI installer 💣

💻 What the Malware Does

Kaspersky says the installer kicks off a complex infection chain:

🧩 Uses VB scripts and PowerShell to download more payloads

📡 Sends your system data via Telegram API

💰 Deploys:

Crypto miner (drains CPU power)

ClipBanker (replaces crypto wallet addresses)

🔐 Drops ShellExperienceHost.exe to open an encrypted backdoor

🪝Executes more hidden commands using ErrorHandler.cmd

📍 Who's Being Targeted?

 Interface is in Russian

 Targets users searching for Microsoft Office on Yandex

 90% of the 4,600+ victims so far are located in Russia

⚠️ Bigger Picture: This Is Just One Campaign

Kaspersky also spotted TookPS malware spreading via fake AI, remote desktop, and 3D modeling software sites — often promoted through malicious Google ads.

🖥️ One tactic: sideloading malware into TeamViewer, giving attackers stealthy remote access.

💬 “As users seek software outside official sources, attackers offer their own versions — loaded with malware,” said Kaspersky.

🔐 Takeaway:

Always download software from trusted sources. Crack sites and shady "free" tools are often booby-trapped — and malvertising is making it even easier for attackers to reach you.

Stay smart. Stay safe. 💻🛡️

🗞️ Extra, Extra! Read all about it! 🗞️

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • 🛡️ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday 📅

  • 💵Crypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for 🆓

  • 📈Bitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future 👾

Let us know what you think.

So long and thanks for reading all the phish!

footer graphic cyber security newsletter

Recent articles