Feb 22 2025
Welcome toย Gone Phishing, your weekly cybersecurity newsletter that dictates the latest on cybersecurity just like Zelenskyy dictates when elections are held. Hahaha kidding Earth 2025 just got interesting ๐ฟย ๐ฅ๐บ๐๏ธ๐ฌ
Patch of the Week!ย ๐ฉน
First thingโs first, folks. Our weekly segment goes by many names. Patch of the Week, Tweak of the week. Okay, thatโs itโฆ ๐ณย
Congrats to Juniper, the cybercriminals are no matchโฆ for your patch! ๐ฉน
Check out this freshly hatched patch ๐ฃ
๐จ Juniper Networks Critical Flaw โ Patch Now! ๐ง
Juniper Networks has issued urgent security updates for Session Smart Router, Session Smart Conductor, and WAN Assurance Routers to fix a critical authentication bypass flaw (CVE-2025-21589, CVSS 9.8). ๐จ
โก Whatโs the Risk?
Network-based attackers can bypass authentication and take full admin control of affected devices.
๐ Affected Versions:
Session Smart Router: 5.6.7 โ before 5.6.17, 6.1 โ before 6.1.12-lts, 6.2 โ before 6.2.8-lts, 6.3 โ before 6.3.3-r2
Session Smart Conductor: Same as above.
WAN Assurance Managed Routers: Same as above.
๐ง Immediate Action Required!
โ Update to patched versions ASAP:
SSR-5.6.17, SSR-6.1.12-lts, SSR-6.2.8-lts, SSR-6.3.3-r2
Mist Cloud-managed WAN Assurance devices already patched automatically, but manual updates are still recommended.
๐ No known exploits yet, but donโt wait! Stay secure! ๐ก๏ธ
Now, on to this weekโs hottest cybersecurity news stories:ย
๐ New Snake Keylogger variant uses AutoIt scripting to dodge detection ๐
โ๏ธ StaryDobry attack: Trojanized game installers deploy cryptocurrency miner โ๏ธ
โฉ๏ธ Chinese exploit MAVInject.exe to dodge detection in targeted cyber attacks ๐จ๐ปโ๐ป
Gif by lethalweaponfox on Giphy
A new version of the Snake Keylogger malware is actively targeting Windows users in China, Turkey, Indonesia, Taiwan, and Spain, with over 280 million blocked infection attempts in 2025 alone! ๐ฑ
๐ฏ How It Spreads
๐น Delivered via phishing emails with malicious attachments or links ๐ง
๐น Uses AutoIt scripting to evade traditional detection ๐
๐น Hides itself as "ageless.exe" and ensures persistence through VBS scripts ๐
๐ต๏ธโโ๏ธ What It Steals
โ Keystrokes (including banking & login credentials) ๐ณ
โ Browser data from Chrome, Edge, and Firefox ๐
โ Clipboard contents (potential crypto wallet theft!) ๐ฅ
โ Victim's IP address & geolocation ๐
๐ ๏ธ How It Works
โ ๏ธ Injects itself into legitimate Windows processes (e.g., regsvcs.exe)
โ ๏ธ Uses SetWindowsHookEx API to capture keystrokes stealthily
โ ๏ธ Exfiltrates data via SMTP & Telegram bots
๐ซ Stay Safe!
๐น Never open unexpected email attachments ๐
๐น Disable macros & scripts in email attachments โ
๐น Use endpoint security with behavioral analysis ๐ก๏ธ
๐น Monitor outbound connections to detect C2 traffic ๐ก
This highly evasive malware is designed to steal your most sensitive dataโstay alert and secure your systems! ๐จ
This exclusive event will feature expert speakers and current Rubrik customers speaking on the topics of Cloud and SaaS data protection, as well as data security.
Plus, 5 attendees have the chance of winning an iPad Mini.
What are you waiting for? Be Resilient.
Cybercriminals are tricking gamers into downloading trojanized game installers that deploy XMRig cryptocurrency miners on Windows systems.
๐ฏ Who's Affected?
๐น Gamers searching for popular simulator & physics games
๐น Targets in Russia, Brazil, Germany, Belarus, and Kazakhstan
๐น High-powered gaming PCs exploited for mining ๐ฅ๏ธ๐ฐ
๐ญ How the Attack Works
โ Fake installers for games like BeamNG.drive, Garryโs Mod, Universe Sandbox uploaded to torrent sites ๐
โ Installs dropper DLL ("unrar.dll"), which checks for sandboxing/debugging ๐ต๏ธโโ๏ธ
โ Retrieves victimโs IP & location using online APIs ๐
โ Deploys a multi-stage payload to install a modified XMRig miner ๐ปโ๏ธ
โ Avoids detection by terminating if Task Manager or Process Monitor is running โ
โ ๏ธ Notable Evasion Tactics
๐น CPU Check: Only runs if the system has 8 or more cores ๐
๐น Stealthy Execution: Uses Windows Shell Extension to mask malicious activity ๐ถ๏ธ
๐น Custom Mining Pool: Attackers host their own mining server instead of using public pools ๐
๐ซ How to Stay Safe
๐น Avoid downloading games from unofficial sources (torrent sites) ๐ง
๐น Use endpoint security software to detect mining activity ๐ก๏ธ
๐น Monitor system performance for unusual CPU spikes ๐
๐น Check for unknown startup processes in Windows ๐
The StaryDobry campaign is yet another reminder to be cautious when downloading gamesโyour gaming rig might be mining crypto for cybercriminals! ๐ฎ๐ธ
Whatโs the secret to staying ahead of the curve in the world of AI? Information. Luckily, you can join 1,000,000+ early adopters reading The Rundown AI โ the free newsletter that makes you smarter on AI with just a 5-minute read per day.
The Chinese APT group Mustang Panda (Earth Preta) has been spotted using a clever evasion tactic to bypass detection and maintain control over infected systems, leveraging legitimate Windows utilities for stealthy malware execution.
๐จ Attack Breakdown
๐น Dropper Executable ("IRSetup.exe") initiates the attack ๐ฆ
๐น Sideloads a rogue DLL ("EACore.dll") using a legitimate EA Games application ๐ฎ
๐น Deploys a decoy PDF to distract victims ๐
๐น Targets users in Thailand, suggesting a spear-phishing campaign ๐ฏ
๐น Checks if ESET antivirus ("ekrn.exe" or "egui.exe") is running ๐
๐ดโโ ๏ธ How the Malware Evades Detection
โ Abuses MAVInject.exe, a legitimate Windows tool, to inject malicious payload into an external process (waitfor.exe) ๐
โ Uses Setup Factory installer to drop and execute the malware while staying undetected ๐
โ Establishes a remote connection to a C2 server (www.militarytc[.]com:443) for reverse shell access and data exfiltration ๐ก
๐ฃ๏ธ ESET Responds
ESET disputes Trend Microโs claim that the malware bypasses their antivirus, stating:
๐น The technique is not new, and their users are already protected ๐
๐น ESET had prior detection for this malware since January 2025 ๐
๐น They attribute the attack to China-aligned CeranaKeeper APT ๐ญ
๐ซ How to Stay Protectedย
๐น Be wary of unexpected emails & attachments ๐ง
๐น Ensure security software is updated ๐ก๏ธ
๐น Monitor for suspicious process injections ๐ต๏ธ
๐น Disable unneeded Windows utilities like MAVInject.exe โ๏ธ
Mustang Panda continues to evolve, leveraging legitimate tools for stealthy intrusionsโbut proactive cybersecurity measures can help counter these threats. ๐
๐๏ธ Extra, Extra! Read all about it! ๐๏ธ
Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!
๐ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐
๐ตCrypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐
๐Bitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐พ
Let us know what you think.
So long and thanks for reading all the phish!