๐Ÿšจ Snake Keylogger Strikes Again! New Variant Targeting Windows Users ๐Ÿ

Feb 22 2025

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
.bh__table_cell { padding: 5px; background-color: #FFFFFF; }
.bh__table_cell p { color: #2D2D2D; font-family: ‘Helvetica’,Arial,sans-serif !important; overflow-wrap: break-word; }
.bh__table_header { padding: 5px; background-color:#F1F1F1; }
.bh__table_header p { color: #2A2A2A; font-family:’Trebuchet MS’,’Lucida Grande’,Tahoma,sans-serif !important; overflow-wrap: break-word; }

Gone Phishing Banner

Welcome toย Gone Phishing, your weekly cybersecurity newsletter that dictates the latest on cybersecurity just like Zelenskyy dictates when elections are held. Hahaha kidding Earth 2025 just got interesting ๐Ÿฟย ๐ŸŽฅ๐Ÿ“บ๐ŸŽž๏ธ๐ŸŽฌ

Patch of the Week!ย ๐Ÿฉน

First thingโ€™s first, folks. Our weekly segment goes by many names. Patch of the Week, Tweak of the week. Okay, thatโ€™s itโ€ฆ ๐Ÿ˜ณย 

Congrats to Juniper, the cybercriminals are no matchโ€ฆ for your patch! ๐Ÿฉน

Check out this freshly hatched patch ๐Ÿฃ

Juniper see what you were up to ๐Ÿ™ƒ

๐Ÿšจ Juniper Networks Critical Flaw โ€“ Patch Now! ๐Ÿ”ง

Juniper Networks has issued urgent security updates for Session Smart Router, Session Smart Conductor, and WAN Assurance Routers to fix a critical authentication bypass flaw (CVE-2025-21589, CVSS 9.8). ๐Ÿšจ

โšก Whatโ€™s the Risk?

Network-based attackers can bypass authentication and take full admin control of affected devices.

๐Ÿ›‘ Affected Versions:

Session Smart Router: 5.6.7 โ†’ before 5.6.17, 6.1 โ†’ before 6.1.12-lts, 6.2 โ†’ before 6.2.8-lts, 6.3 โ†’ before 6.3.3-r2

Session Smart Conductor: Same as above.

WAN Assurance Managed Routers: Same as above.

๐Ÿ”ง Immediate Action Required!

โœ… Update to patched versions ASAP:

SSR-5.6.17, SSR-6.1.12-lts, SSR-6.2.8-lts, SSR-6.3.3-r2

Mist Cloud-managed WAN Assurance devices already patched automatically, but manual updates are still recommended.

๐Ÿ” No known exploits yet, but donโ€™t wait! Stay secure! ๐Ÿ›ก๏ธ

Now, on to this weekโ€™s hottest cybersecurity news stories:ย 

  • ๐Ÿ New Snake Keylogger variant uses AutoIt scripting to dodge detection ๐Ÿ”Ž

  • โš”๏ธ StaryDobry attack: Trojanized game installers deploy cryptocurrency miner โ›๏ธ

  • โ›ฉ๏ธ Chinese exploit MAVInject.exe to dodge detection in targeted cyber attacks ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป

AutoIt you something was up ๐Ÿ˜

damon wayans fox GIF by Lethal Weapon

Gif by lethalweaponfox on Giphy

๐Ÿšจ Snake Keylogger Strikes Again! New Variant Targeting Windows Users ๐Ÿ

A new version of the Snake Keylogger malware is actively targeting Windows users in China, Turkey, Indonesia, Taiwan, and Spain, with over 280 million blocked infection attempts in 2025 alone! ๐Ÿ˜ฑ

๐ŸŽฏ How It Spreads

๐Ÿ”น Delivered via phishing emails with malicious attachments or links ๐Ÿ“ง

๐Ÿ”น Uses AutoIt scripting to evade traditional detection ๐Ÿ›‘

๐Ÿ”น Hides itself as "ageless.exe" and ensures persistence through VBS scripts ๐Ÿ“‚

๐Ÿ•ต๏ธโ€โ™‚๏ธ What It Steals

โœ… Keystrokes (including banking & login credentials) ๐Ÿ’ณ

โœ… Browser data from Chrome, Edge, and Firefox ๐Ÿ”

โœ… Clipboard contents (potential crypto wallet theft!) ๐Ÿ”ฅ

โœ… Victim's IP address & geolocation ๐ŸŒ

๐Ÿ› ๏ธ How It Works

โš ๏ธ Injects itself into legitimate Windows processes (e.g., regsvcs.exe)

โš ๏ธ Uses SetWindowsHookEx API to capture keystrokes stealthily

โš ๏ธ Exfiltrates data via SMTP & Telegram bots

๐Ÿšซ Stay Safe!

๐Ÿ”น Never open unexpected email attachments ๐Ÿ“Ž

๐Ÿ”น Disable macros & scripts in email attachments โŒ

๐Ÿ”น Use endpoint security with behavioral analysis ๐Ÿ›ก๏ธ

๐Ÿ”น Monitor outbound connections to detect C2 traffic ๐Ÿ“ก

This highly evasive malware is designed to steal your most sensitive dataโ€”stay alert and secure your systems! ๐Ÿšจ

Be Prepared – Join the Cyber Resilience Summit on March 5

This exclusive event will feature expert speakers and current Rubrik customers speaking on the topics of Cloud and SaaS data protection, as well as data security.

Plus, 5 attendees have the chance of winning an iPad Mini.

What are you waiting for? Be Resilient.

Try to strike a chord but itโ€™s probably A minerrrrrrrrrrr โ›๏ธ

๐ŸŽฎ StaryDobry: Gamers Targeted with Trojanized Installers ๐Ÿšจย 

Cybercriminals are tricking gamers into downloading trojanized game installers that deploy XMRig cryptocurrency miners on Windows systems.

๐ŸŽฏ Who's Affected?

๐Ÿ”น Gamers searching for popular simulator & physics games

๐Ÿ”น Targets in Russia, Brazil, Germany, Belarus, and Kazakhstan

๐Ÿ”น High-powered gaming PCs exploited for mining ๐Ÿ–ฅ๏ธ๐Ÿ’ฐ

๐ŸŽญ How the Attack Works

โœ… Fake installers for games like BeamNG.drive, Garryโ€™s Mod, Universe Sandbox uploaded to torrent sites ๐Ÿ“‚

โœ… Installs dropper DLL ("unrar.dll"), which checks for sandboxing/debugging ๐Ÿ•ต๏ธโ€โ™‚๏ธ

โœ… Retrieves victimโ€™s IP & location using online APIs ๐ŸŒ

โœ… Deploys a multi-stage payload to install a modified XMRig miner ๐Ÿ’ปโ›๏ธ

โœ… Avoids detection by terminating if Task Manager or Process Monitor is running โŒ

โš ๏ธ Notable Evasion Tactics

๐Ÿ”น CPU Check: Only runs if the system has 8 or more cores ๐Ÿš€

๐Ÿ”น Stealthy Execution: Uses Windows Shell Extension to mask malicious activity ๐Ÿ•ถ๏ธ

๐Ÿ”น Custom Mining Pool: Attackers host their own mining server instead of using public pools ๐Ÿ”—

๐Ÿšซ How to Stay Safe

๐Ÿ”น Avoid downloading games from unofficial sources (torrent sites) ๐Ÿšง

๐Ÿ”น Use endpoint security software to detect mining activity ๐Ÿ›ก๏ธ

๐Ÿ”น Monitor system performance for unusual CPU spikes ๐Ÿ“ˆ

๐Ÿ”น Check for unknown startup processes in Windows ๐Ÿ”

The StaryDobry campaign is yet another reminder to be cautious when downloading gamesโ€”your gaming rig might be mining crypto for cybercriminals! ๐ŸŽฎ๐Ÿ’ธ

Learn AI in 5 minutes a day

Whatโ€™s the secret to staying ahead of the curve in the world of AI? Information. Luckily, you can join 1,000,000+ early adopters reading The Rundown AI โ€” the free newsletter that makes you smarter on AI with just a 5-minute read per day.

Sign up to start learning.

Did you hear of this Chinese Godfather? He made them an offer they couldnโ€™t understand. ๐Ÿ‘€

๐Ÿ›ก๏ธ Mustang Pandaโ€™s New Evasion Technique Targets ESET Antivirus ๐ŸŽญ

The Chinese APT group Mustang Panda (Earth Preta) has been spotted using a clever evasion tactic to bypass detection and maintain control over infected systems, leveraging legitimate Windows utilities for stealthy malware execution.

๐Ÿšจ Attack Breakdown

๐Ÿ”น Dropper Executable ("IRSetup.exe") initiates the attack ๐Ÿ“ฆ

๐Ÿ”น Sideloads a rogue DLL ("EACore.dll") using a legitimate EA Games application ๐ŸŽฎ

๐Ÿ”น Deploys a decoy PDF to distract victims ๐Ÿ“„

๐Ÿ”น Targets users in Thailand, suggesting a spear-phishing campaign ๐ŸŽฏ

๐Ÿ”น Checks if ESET antivirus ("ekrn.exe" or "egui.exe") is running ๐Ÿ›‘

๐Ÿดโ€โ˜ ๏ธ How the Malware Evades Detection

โœ… Abuses MAVInject.exe, a legitimate Windows tool, to inject malicious payload into an external process (waitfor.exe) ๐Ÿ”

โœ… Uses Setup Factory installer to drop and execute the malware while staying undetected ๐Ÿ“Œ

โœ… Establishes a remote connection to a C2 server (www.militarytc[.]com:443) for reverse shell access and data exfiltration ๐Ÿ“ก

๐Ÿ—ฃ๏ธ ESET Responds

ESET disputes Trend Microโ€™s claim that the malware bypasses their antivirus, stating:

๐Ÿ”น The technique is not new, and their users are already protected ๐Ÿ”’

๐Ÿ”น ESET had prior detection for this malware since January 2025 ๐Ÿ“†

๐Ÿ”น They attribute the attack to China-aligned CeranaKeeper APT ๐ŸŽญ

๐Ÿšซ How to Stay Protectedย 

๐Ÿ”น Be wary of unexpected emails & attachments ๐Ÿ“ง

๐Ÿ”น Ensure security software is updated ๐Ÿ›ก๏ธ

๐Ÿ”น Monitor for suspicious process injections ๐Ÿ•ต๏ธ

๐Ÿ”น Disable unneeded Windows utilities like MAVInject.exe โš™๏ธ

Mustang Panda continues to evolve, leveraging legitimate tools for stealthy intrusionsโ€”but proactive cybersecurity measures can help counter these threats. ๐Ÿš€

๐Ÿ—ž๏ธ Extra, Extra! Read all about it! ๐Ÿ—ž๏ธ

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • ๐Ÿ›ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐Ÿ“…

  • ๐Ÿ’ตCrypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐Ÿ†“

  • ๐Ÿ“ˆBitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐Ÿ‘พ

Let us know what you think.

So long and thanks for reading all the phish!

footer graphic cyber security newsletter

Recent articles