๐Ÿšจ Massive Web Infections Redirect Users to Chinese Gambling Sites ๐ŸŽฐ

Mar 28 2025

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
.bh__table_cell { padding: 5px; background-color: #FFFFFF; }
.bh__table_cell p { color: #2D2D2D; font-family: ‘Helvetica’,Arial,sans-serif !important; overflow-wrap: break-word; }
.bh__table_header { padding: 5px; background-color:#F1F1F1; }
.bh__table_header p { color: #2A2A2A; font-family:’Trebuchet MS’,’Lucida Grande’,Tahoma,sans-serif !important; overflow-wrap: break-word; }

Gone Phishing Banner

Welcome toย Gone Phishing, your weekly cybersecurity newsletter that wonders whether itโ€™s hackers behind Daylight Savings Hour ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป๐Ÿค”๐Ÿ˜‚ย 

Patch of the Week!ย ๐Ÿฉน

First thingโ€™s first, folks. Our weekly segment goes by many names. Patch of the Week, Tweak of the week. Okay, thatโ€™s itโ€ฆ ๐Ÿ˜ณย 

Congrats to Google, the cybercriminals are no matchโ€ฆ for your patch! ๐Ÿฉน

E.T. phone Chrome ๐Ÿ‘ฝ

๐Ÿšจ Chrome Zero-Day Under Attack! Update Now! ๐Ÿ”ฅ

Google just rushed out an emergency fix for CVE-2025-2783, a high-severity zero-day exploit hitting Windows usersโ€”and it's already being used in attacks! ๐ŸŽฏ

๐Ÿ’ฅ What's happening?

Exploit targets Chrome's Mojo IPC system ๐Ÿ–ฅ๏ธ

Used in sophisticated phishing attacks ๐ŸŽฃโ€”victims got tricked into clicking a malicious link, which instantly infected their devices! ๐Ÿ˜ฑ

Targets?ย Russian media, education, and government organizations ๐Ÿ‡ท๐Ÿ‡บ

Kaspersky is calling it "Operation ForumTroll" ๐Ÿ•ต๏ธโ€โ™‚๏ธ

๐Ÿ”ง Fix? Update Chrome to version 134.0.6998.177/.178 NOW! โณ

๐Ÿ“ข Using Edge, Brave, or Opera? Theyโ€™re based on Chromium, so updates should be coming soonโ€”stay alert! โš ๏ธ

With state-backed hackers on the loose, don't risk itโ€”update immediately! ๐Ÿš€

Now, on to this weekโ€™s hottest cybersecurity news stories:ย 

  • ๐Ÿ’‰ JavaScript injection promoting gambling sites infects 150k sites โ˜ฃ๏ธ

  • โš ๏ธ CISA warning! Active exploits hit Next.js and DrayTek devices ๐Ÿ“ฑ

  • ๐Ÿ‘พ Raspberry Robin malware linked to almost 200 unique C2 domains ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป

Donโ€™t gamble with your online safety ๐ŸŽฒ

๐Ÿšจ Massive Web Infections Redirect Users to Chinese Gambling Sites ๐ŸŽฐ

A massive JavaScript injection campaign has compromised 150,000+ websites, redirecting visitors to Chinese-language gambling platforms.

๐Ÿ”ฅ How the Attack Works

๐Ÿ”น Malicious JavaScript injected into legitimate sites ๐Ÿ“œ

๐Ÿ”น Hijacks browsers, replacing content with a gambling page

๐Ÿ”น Uses iframe overlays to mimic real betting sites (e.g., Bet365) ๐ŸŽญ

๐Ÿ”น Obfuscates code to evade detection ๐Ÿ•ต๏ธโ€โ™‚๏ธ

๐Ÿšจ Scale & Evolution

โœ… 135,800+ sites still actively infected

โœ… Redirects via five domains (e.g., "zuizhongyj[.]com")

โœ… Constantly updated with new tactics

๐ŸŒŽ Tied to Larger Cybercrime Networks

๐Ÿ”น Similar tactics used by DollyWay malware, which has compromised 20,000+ WordPress sites since 2016

๐Ÿ”น Uses Traffic Direction Systems (TDS) to funnel visitors to scam sites

๐Ÿ”น Monetized through networks like VexTrio & LosPollos

๐Ÿ›ก๏ธ How to Stay Safe

โœ… Website admins: Regularly scan for unauthorized JavaScript injections

โœ… Keep WordPress & plugins updated to prevent exploitation

โœ… Users: Avoid unfamiliar gambling pop-ups & redirectsย 

With thousands of sites compromised and millions exposed, this attack highlights the growing risk of web-based threatsโ€”stay cautious and proactive! ๐Ÿšง

Hereโ€™s Why Over 4 Million Professionals Read Morning Brew

  • Business news explained in plain English

  • Straight facts, zero fluff, & plenty of puns

  • 100% free

See for yourself

Motherf**kers act like they forgot about DrayTek ๐ŸŽค

๐Ÿšจ CISA Adds Exploited Sitecore CMS Flaws to KEV List ๐Ÿ“

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two six-year-old vulnerabilities in Sitecore CMS and Experience Platform (XP) to its Known Exploited Vulnerabilities (KEV) list, citing active exploitation.

๐Ÿ”ฅ The Vulnerabilities

๐Ÿ”น CVE-2019-9874 (CVSS 9.8) โ€“ Allows unauthenticated remote code execution via deserialization attack ๐Ÿ”“

๐Ÿ”น CVE-2019-9875 (CVSS 8.8) โ€“ Allows authenticated remote code execution via deserialization attack

๐Ÿ“… Federal agencies must patch by April 16, 2025 to secure their networks.

โš ๏ธ Other Exploited Vulnerabilities

๐Ÿ”ธ Next.js CVE-2025-29927 (CVSS 9.1) โ€“ Authorization bypass lets attackers bypass middleware security & access sensitive resources ๐Ÿ”‘

๐Ÿ”ธ DrayTek Router Flaws (CVE-2020-8515, CVE-2021-20123, CVE-2021-20124) โ€“ Used for remote code execution & file theft ๐Ÿ“ก

๐ŸŒŽ Attack Hotspots

๐Ÿ”น Sitecore & Next.js flaws actively probed worldwide

๐Ÿ”น DrayTek router exploits detected in Indonesia, U.S., Hong Kong, Lithuania, & Singapore

๐Ÿ›ก๏ธ How to Stay Protectedย 

โœ… Apply patches for all impacted systems ASAP

โœ… Monitor logs for unusual activity & exploit attempts

โœ… Restrict public access to vulnerable applications

With older flaws still being actively exploited, staying updated is critical to prevent cyber intrusions! ๐Ÿšง

The newsletter every professional should be reading

Thereโ€™s a reason Morning Brew is the gold standard of business newsโ€”itโ€™s the easiest and most enjoyable way to stay in the loop on all the headlines impacting your world.

Tech, finance, sales, marketing, and everything in betweenโ€”weโ€™ve got it all. Just the stuff that matters, served up in a fast, fun read.

Lookโ€”over 4 million professionals start their day with Morning Brewโ€™s daily newsletter, and it only takes 5 minutes to read. Sign up for free and see for yourself!

Check it out

Itโ€™s Robin you blind ๐Ÿ’€

๐Ÿšจ Raspberry Robin Malware Expands with 200+ C2 Domains ๐Ÿ‘พ

A new investigation has uncovered nearly 200 command-and-control (C2) domains linked to Raspberry Robin, a fast-evolving malware used by Russian-linked cybercriminals and nation-state hackers for initial access into victim networks.

๐Ÿ”ฅ Key Findings

๐Ÿ”น New C2 domains (180+) discovered via QNAP device relay ๐Ÿ“ก

๐Ÿ”น Uses โ€œfast fluxโ€ to rotate domains & evade takedowns ๐Ÿ”„

๐Ÿ”น Top TLDs: .wf, .pm, .re, .nz, .eu, .tw ๐ŸŒ

๐Ÿ”น C2 infrastructure tied to niche registrars & Bulgarian hosting provider

๐Ÿ•ต๏ธ How Raspberry Robin Spreads

โœ… USB-Based Propagation โ€“ Infects devices via compromised USB drives

โœ… Discord-Based Delivery โ€“ Archives & Windows Script Files spread malware ๐ŸŽญ

โœ… Exploiting One-Day Vulnerabilities โ€“ Gains privilege escalation before public disclosure

๐Ÿดโ€โ˜ ๏ธ Linked to Major Threat Actors

๐Ÿ”ธ Used by Russian APT Cadet Blizzard for initial access ๐Ÿ•ถ๏ธ

๐Ÿ”ธ Distributes malware for LockBit, Dridex, SocGholish, & FIN11

๐Ÿ”ธ Possibly operates as a Pay-Per-Install (PPI) botnet

๐Ÿ›ก๏ธ How to Stay Safeย 

โœ… Disable autorun on USB devices ๐Ÿšซ

โœ… Monitor network traffic for unusual domain activity ๐ŸŒ

โœ… Use endpoint protection to detect malware loaders ๐Ÿ›ก๏ธ

โœ… Restrict access to QNAP & NAS devices from external networks

With Russian threat actors leveraging Raspberry Robin for large-scale intrusions, defensive measures are critical to prevent data breaches and ransomware infections. ๐Ÿšจ

๐Ÿ—ž๏ธ Extra, Extra! Read all about it! ๐Ÿ—ž๏ธ

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • ๐Ÿ›ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐Ÿ“…

  • ๐Ÿ’ตCrypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐Ÿ†“

  • ๐Ÿ“ˆBitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐Ÿ‘พ

Let us know what you think.

So long and thanks for reading all the phish!

footer graphic cyber security newsletter

Recent articles