- Gone Phishing
- Posts
- Defense Industry Under Attack
Defense Industry Under Attack

Welcome to Gone Phishing, your weekly cybersecurity newsletter thatโs popping like fresh ๐๐ฅ๐ฅจ๐ฐ๐ง
Patch of the Week! ๐ฉน
First thingโs first, folks. Our weekly segment goes by many names. Patch of the Week, Tweak of the week. Okay, thatโs itโฆ ๐ณ
Congrats to Windows, the cybercriminals are no matchโฆ for your patch! ๐ฉน
Check out this freshly hatched patch ๐ฃ

One door closes, a Window opens ๐ก
๐ก๏ธ Microsoft Patch Tuesday: 57 Bugs Fixed, 6 Zero-Days Under Attack! ๐
Microsoft just dropped 57 security patches, including 6 zero-days being actively exploited! โ ๏ธ
Top risks include:
Win32 Kernel exploit (CVE-2025-24983) lets attackers gain SYSTEM privileges.
File system flaws allowing data theft & remote code execution.
Microsoft Management Console bypass (CVE-2025-26633) to evade security protections.
The U.S. CISA has added these to its Known Exploited Vulnerabilities (KEV) list, giving agencies until April 1, 2025 to patch. If you havenโt updated yet, do it NOW to stay protected! ๐
Now, on to this weekโs hottest cybersecurity news stories:
๐ Dark Crystal targets Ukraine ๐ฏ
๐พ Basta crimes spreads Evel Knievel ๐๏ธ
๐ ClearFake it before you make it nigga โ ๏ธ
CERTified loverboy, certified pedophile ๐
๐ฏ Dark Crystal RAT Campaign Targets Ukrainian Defense Sector
The Computer Emergency Response Team of Ukraine (CERT-UA) warns of a new cyber espionage campaign deploying Dark Crystal RAT (DCRat) against defense industry employees and military personnel.
๐จ How the Attack Works
๐น Malicious messages sent via Signal ๐ฒ
๐น Compromised accounts used to increase trust ๐ต๏ธโโ๏ธ
๐น Fake meeting minutes sent as archive files ๐
๐น Contains a decoy PDF + DarkTortilla crypter ๐ญ
๐น Decryption leads to full remote access via DCRat ๐ป
๐ต๏ธ Whoโs Behind It?
CERT-UA attributes the attack to UAC-0200, active since mid-2024.
๐ฅ Why Itโs Dangerous
โ DCRat executes arbitrary commands ๐ ๏ธ
โ Steals sensitive data & credentials ๐
โ Grants attackers remote control over infected systems
๐ Cyber Tensions & Signal Controversy
๐ธ Reports claim Signal is no longer assisting Ukrainian authorities in countering Russian cyber threats
๐ธ Signal denies these claims, stating it does not collaborate with any government
๐ How to Stay Safe
โ Be cautious of unexpected Signal messages ๐ง
โ Verify senders before opening attachments
โ Use endpoint protection & monitor for unauthorized activity ๐
Russian-linked cyber actors are increasingly targeting secure messaging platformsโstay vigilant and protect sensitive data! ๐จ

Optimize global IT operations with our World at Work Guide
Explore this ready-to-go guide to support your IT operations in 130+ countries. Discover how:
Standardizing global IT operations enhances efficiency and reduces overhead
Ensuring compliance with local IT legislation to safeguard your operations
Integrating Deel IT with EOR, global payroll, and contractor management optimizes your tech stack
Leverage Deel IT to manage your global operations with ease.

Basta crimes ๐ค
๐ต๏ธ Leaked Black Basta Chats Reveal Russian Ties & Cybercrime Expansion
A leak of 200,000 internal chat messages from the Black Basta ransomware gang suggests possible links to Russian authorities and major cybercrime operations.
๐จ Key Revelations
๐น Leader Oleg Nefedov (GG/AA) allegedly escaped arrest in Armenia with Russian officialsโ help
๐น Two suspected offices in Moscow ๐ข
๐น Used ChatGPT for fraud, malware development, and debugging ๐ค
๐น Overlaps with other ransomware gangs (Rhysida, CACTUS) ๐ญ
๐น Developed a custom C2 framework (โBreakerโ) for persistence & stealth
๐ฅ Brute-Force Attacks with BRUTED
๐น Custom tool โBRUTEDโ automates credential stuffing ๐
๐น Targets firewalls, VPNs, & edge network devices
๐น Used since 2023 for large-scale password attacks
๐ต๏ธ Whatโs Next for Black Basta?
๐ธ Possible rebrand with new ransomware based on Contiโs code
๐ธ Heavy investment in automated cyberattacks
๐ธ Scaling credential theft & network infiltration
๐ How to Stay Protected
โ Enforce strong, unique passwords & MFA ๐
โ Monitor for unusual login attempts & brute-force attacks ๐
โ Patch firewalls & VPNs to prevent exploitation ๐ฅ
With growing automation & state-level connections, Black Basta remains a top ransomware threatโorganizations must stay ahead! ๐ง

Itโs clearly a ClearFake ๐ญ
๐ญ ClearFake Uses Fake reCAPTCHA to Spread Malware
The ClearFake campaign is tricking users with fake reCAPTCHA and Cloudflare Turnstile verifications, leading them to download Lumma Stealer and Vidar Stealer malware. At least 9,300 websites have been compromised.
๐ฅ How the Attack Works
๐น Users visit a hacked siteโJavaScript loads from Binance Smart Chain (BSC) ๐
๐น Victim is tricked into running malicious PowerShell (ClickFix technique)
๐น Deploys Emmenhtal Loader (PEAKLIGHT) โ Drops Lumma Stealer
๐น New variant encrypts HTML & expands Web3 capabilities ๐ต๏ธโโ๏ธ
โ ๏ธ Why This Is Dangerous
โ Uses blockchain (BSC) for resilience & stealth
โ Compromised over 9,300 sites & exposed 200,000+ users
โ Targets both Windows & macOS users
โ Frequently updated to evade detection
๐ก๏ธ How to Stay Safe
โ Never download "browser updates" from pop-ups ๐ซ
โ Be cautious of CAPTCHA prompts on unfamiliar sites
โ Monitor PowerShell execution & network traffic ๐
โ Keep browsers & security tools updated
With widespread infections & rapid evolution, ClearFake remains a major global threatโstay vigilant! ๐จ

๐๏ธ Extra, Extra! Read all about it! ๐๏ธ
Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!
๐ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐
๐ตCrypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐
๐Bitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐พ
Let us know what you think.
So long and thanks for reading all the phish!
Give us a rating? |



