Mar 07 2025
Welcome to Gone Phishing, your weekly cybersecurity newsletter thatβs the DOGE to cybercrimeβs government spending π€Ί
Patch of the Week!Β π©Ή
First thingβs first, folks. Our weekly segment goes by many names. Patch of the Week, Tweak of the week. Okay, thatβs itβ¦ π³Β
Congrats to Elastic, the cybercriminals are no matchβ¦ for your patch! π©Ή
Check out this freshly hatched patch π£
π¨ Critical Kibana Flaw β Patch Now!
Elastic has released an urgent security update for Kibana, fixing a critical prototype pollution vulnerability (CVE-2025-25015, CVSS 9.9) that could allow arbitrary code execution. π¨
β‘ Whatβs the Risk?
βΒ Attackers can manipulate JavaScript objects, leading to remote code execution (RCE), data access, or privilege escalation.
βΒ Exploitable via crafted file uploads & HTTP requests.
π Affected Versions:
βΒ Kibana 8.15.0 β 8.17.3 (Fixed in 8.17.3)
βΒ In 8.15.0 to 8.17.1, only Viewer role users can exploit it.
βΒ In 8.17.1 to 8.17.2, attackers need specific privileges (fleet-all, integrations-all, actions:execute-advanced-connectors).
π§ Immediate Action Required!
β Update to Kibana 8.17.3 ASAP!
β If patching isnβt possible, disable Integration Assistant (xpack.integration_assistant.enabled: false in kibana.yml).
Elastic has patched similar high-severity flaws before β donβt wait! Secure your systems now! πβ¨
Now, on to this weekβs hottest cybersecurity news stories:Β Β
π Chinese βSilk Typhoonβ expands attacks to IT supply chains π
π Google launches AI conversational scam protection for Android π€
πΌ Chinese APT Lotus Panda targets governments w/ new variants πΎ
π¨ Silk Typhoon Targets IT Supply Chains for Cyber Espionage π―
The China-linked hacking group Silk Typhoon (formerly Hafnium) has shifted tactics, now targeting IT supply chains to infiltrate corporate networks. Instead of direct attacks, they compromise remote management tools, cloud apps, and IT service providers to gain broad access to victims.
π― Whoβs at Risk?
πΉ IT service providers, MSPs, cloud management firms
πΉ Government agencies, healthcare, legal, defense, and NGOs
πΉ Energy & higher education sectors
π How They Attack
β οΈ Exploiting stolen API keys & credentials for privilege escalation π
β οΈ Zero-day attacks on Ivanti VPN, Palo Alto firewalls & Citrix NetScaler π
β οΈ Password spraying with leaked credentials π»
β οΈ Deploying web shells for persistence & command execution πͺ
π‘ What They Steal
πΉ Email, OneDrive & SharePoint data via MSGraph API π
πΉ Cloud infrastructure reconnaissance & lateral movement π
πΉ Sensitive corporate & government information π΅οΈ
πΆοΈ Hiding Their Tracks
Silk Typhoon operates through a "CovertNetwork" of compromised routers & appliances from Zyxel, QNAP, and Cyberoam, disguising their real location.
π How to Stay Secure
β Apply security patches ASAP for exploited CVEs π οΈ
β Use multi-factor authentication (MFA) π
β Limit access to critical cloud services & enforce network segmentation π
β Monitor for unusual API key use & privilege escalation π¨
Silk Typhoonβs supply chain attacks are a major cybersecurity threatβproactive defense is crucial! π§
Join over 4 million Americans who start their day with 1440 β your daily digest for unbiased, fact-centric news. From politics to sports, we cover it all by analyzing over 100 sources. Our concise, 5-minute read lands in your inbox each morning at no cost. Experience news without the noise; let 1440 help you make up your own mind. Sign up now and invite your friends and family to be part of the informed.
Google is launching AI-driven scam detection to help Android users avoid conversational scams and spoofed calls that impersonate trusted companies.
π How It Works
β AI models analyze conversation patterns in real-time
β Detects suspicious messages & alerts users π¨
β Runs entirely on-device for privacy π
β Only applies to unknown numbers π΅
Users can dismiss, block, or report scams, with reported details shared with Google & carriers.
π AI Scam Detection for Calls Expands
πΉ Available on Pixel 9+ devices in the U.S.
πΉ Beep alerts notify participants when enabled π’
πΉ Audio is processed ephemerally & not stored
π Where & When?
π First launching in English in the U.S., U.K., & Canada
π More regions to follow
π‘οΈ Safer Browsing with AI
Google also revealed that 1B+ Chrome users now use Enhanced Protection mode, which:
πΉ Detects phishing & scam websites π΅οΈββοΈ
πΉ Flags suspicious downloads π«
Stay Safe!
πΉ Keep scam detection enabled
πΉ Be cautious of unknown senders & callers
πΉ Use Safe Browsing for extra protection
AI-powered tools are making scams easier to spotβbut vigilance is still key! π§
The Chinese state-backed hacking group Lotus Panda (aka Billbug, Thrip, Lotus Blossom) has been targeting government, manufacturing, telecom, and media sectors in the Philippines, Vietnam, Hong Kong, and Taiwan with new variants of the Sagerunex backdoor.
π― Whatβs New?
πΉ Two new "beta" versions of Sagerunex spotted
πΉ Uses Dropbox, X (Twitter), and Zimbra for stealthy C2 communications π‘
πΉ Deploys cookie stealers, proxy tools, and privilege escalation software
πͺ How They Get In
β οΈ Likely through spear-phishing & watering hole attacks π£
β οΈ Backdoor hides in email drafts & trash folders to evade detection π΅οΈββοΈ
β οΈ Steals system data & sends commands via Zimbra webmail
π₯ How They Operate
β Collects system details & encrypts exfiltrated data
β Runs reconnaissance commands (net, tasklist, ipconfig, netstat)
β Uses Venom proxy to bypass internet restrictions
π How to Defend Against Lotus Panda
β Monitor for unusual Dropbox/X/Zimbra activity π
β Restrict unauthorized use of proxy tools π«
β Educate employees on phishing threats π§
β Strengthen email security & endpoint defenses π‘οΈ
Lotus Panda remains a persistent threat, evolving its stealth tactics to bypass security measures. Stay vigilant and proactive! π¨
ποΈ Extra, Extra! Read all about it! ποΈ
Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!
π‘οΈ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday π
π΅Crypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for π
πBitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future πΎ
Let us know what you think.
So long and thanks for reading all the phish!