- Gone Phishing
- Posts
- Silk Typhoon bursts the banks ๐
Silk Typhoon bursts the banks ๐

Welcome to Gone Phishing, your weekly cybersecurity newsletter thatโs the DOGE to cybercrimeโs government spending ๐คบ
Patch of the Week! ๐ฉน
First thingโs first, folks. Our weekly segment goes by many names. Patch of the Week, Tweak of the week. Okay, thatโs itโฆ ๐ณ
Congrats to Elastic, the cybercriminals are no matchโฆ for your patch! ๐ฉน
Check out this freshly hatched patch ๐ฃ

Elastic bounces back ๐
๐จ Critical Kibana Flaw โ Patch Now!
Elastic has released an urgent security update for Kibana, fixing a critical prototype pollution vulnerability (CVE-2025-25015, CVSS 9.9) that could allow arbitrary code execution. ๐จ
โก Whatโs the Risk?
โ Attackers can manipulate JavaScript objects, leading to remote code execution (RCE), data access, or privilege escalation.
โ Exploitable via crafted file uploads & HTTP requests.
๐ Affected Versions:
โ Kibana 8.15.0 โ 8.17.3 (Fixed in 8.17.3)
โ In 8.15.0 to 8.17.1, only Viewer role users can exploit it.
โ In 8.17.1 to 8.17.2, attackers need specific privileges (fleet-all, integrations-all, actions:execute-advanced-connectors).
๐ง Immediate Action Required!
โ Update to Kibana 8.17.3 ASAP!
โ If patching isnโt possible, disable Integration Assistant (xpack.integration_assistant.enabled: false in kibana.yml).
Elastic has patched similar high-severity flaws before โ donโt wait! Secure your systems now! ๐โจ
Now, on to this weekโs hottest cybersecurity news stories:
๐ Chinese โSilk Typhoonโ expands attacks to IT supply chains ๐
๐ Google launches AI conversational scam protection for Android ๐ค
๐ผ Chinese APT Lotus Panda targets governments w/ new variants ๐พ
Silk Typhoon bursts the banks ๐
๐จ Silk Typhoon Targets IT Supply Chains for Cyber Espionage ๐ฏ
The China-linked hacking group Silk Typhoon (formerly Hafnium) has shifted tactics, now targeting IT supply chains to infiltrate corporate networks. Instead of direct attacks, they compromise remote management tools, cloud apps, and IT service providers to gain broad access to victims.
๐ฏ Whoโs at Risk?
๐น IT service providers, MSPs, cloud management firms
๐น Government agencies, healthcare, legal, defense, and NGOs
๐น Energy & higher education sectors
๐ How They Attack
โ ๏ธ Exploiting stolen API keys & credentials for privilege escalation ๐
โ ๏ธ Zero-day attacks on Ivanti VPN, Palo Alto firewalls & Citrix NetScaler ๐
โ ๏ธ Password spraying with leaked credentials ๐ป
โ ๏ธ Deploying web shells for persistence & command execution ๐ช
๐ก What They Steal
๐น Email, OneDrive & SharePoint data via MSGraph API ๐
๐น Cloud infrastructure reconnaissance & lateral movement ๐
๐น Sensitive corporate & government information ๐ต๏ธ
๐ถ๏ธ Hiding Their Tracks
Silk Typhoon operates through a "CovertNetwork" of compromised routers & appliances from Zyxel, QNAP, and Cyberoam, disguising their real location.
๐ How to Stay Secure
โ Apply security patches ASAP for exploited CVEs ๐ ๏ธ
โ Use multi-factor authentication (MFA) ๐
โ Limit access to critical cloud services & enforce network segmentation ๐
โ Monitor for unusual API key use & privilege escalation ๐จ
Silk Typhoonโs supply chain attacks are a major cybersecurity threatโproactive defense is crucial! ๐ง

Looking for unbiased, fact-based news? Join 1440 today.
Join over 4 million Americans who start their day with 1440 โ your daily digest for unbiased, fact-centric news. From politics to sports, we cover it all by analyzing over 100 sources. Our concise, 5-minute read lands in your inbox each morning at no cost. Experience news without the noise; let 1440 help you make up your own mind. Sign up now and invite your friends and family to be part of the informed.

Pays to be a Paranoid Android ๐ค
๐จ Google Rolls Out AI-Powered Scam Detection for Android Users ๐ฑ
Google is launching AI-driven scam detection to help Android users avoid conversational scams and spoofed calls that impersonate trusted companies.
๐ How It Works
โ AI models analyze conversation patterns in real-time
โ Detects suspicious messages & alerts users ๐จ
โ Runs entirely on-device for privacy ๐
โ Only applies to unknown numbers ๐ต
Users can dismiss, block, or report scams, with reported details shared with Google & carriers.
๐ AI Scam Detection for Calls Expands
๐น Available on Pixel 9+ devices in the U.S.
๐น Beep alerts notify participants when enabled ๐ข
๐น Audio is processed ephemerally & not stored
๐ Where & When?
๐ First launching in English in the U.S., U.K., & Canada
๐ More regions to follow
๐ก๏ธ Safer Browsing with AI
Google also revealed that 1B+ Chrome users now use Enhanced Protection mode, which:
๐น Detects phishing & scam websites ๐ต๏ธโโ๏ธ
๐น Flags suspicious downloads ๐ซ
Stay Safe!
๐น Keep scam detection enabled
๐น Be cautious of unknown senders & callers
๐น Use Safe Browsing for extra protection
AI-powered tools are making scams easier to spotโbut vigilance is still key! ๐ง

Hackers: Lotus cause some Pandamonium ๐
๐จ Lotus Panda Targets Governments & Telecoms with Sagerunex Backdoor ๐ต๏ธ
The Chinese state-backed hacking group Lotus Panda (aka Billbug, Thrip, Lotus Blossom) has been targeting government, manufacturing, telecom, and media sectors in the Philippines, Vietnam, Hong Kong, and Taiwan with new variants of the Sagerunex backdoor.
๐ฏ Whatโs New?
๐น Two new "beta" versions of Sagerunex spotted
๐น Uses Dropbox, X (Twitter), and Zimbra for stealthy C2 communications ๐ก
๐น Deploys cookie stealers, proxy tools, and privilege escalation software
๐ช How They Get In
โ ๏ธ Likely through spear-phishing & watering hole attacks ๐ฃ
โ ๏ธ Backdoor hides in email drafts & trash folders to evade detection ๐ต๏ธโโ๏ธ
โ ๏ธ Steals system data & sends commands via Zimbra webmail
๐ฅ How They Operate
โ Collects system details & encrypts exfiltrated data
โ Runs reconnaissance commands (net, tasklist, ipconfig, netstat)
โ Uses Venom proxy to bypass internet restrictions
๐ How to Defend Against Lotus Panda
โ Monitor for unusual Dropbox/X/Zimbra activity ๐
โ Restrict unauthorized use of proxy tools ๐ซ
โ Educate employees on phishing threats ๐ง
โ Strengthen email security & endpoint defenses ๐ก๏ธ
Lotus Panda remains a persistent threat, evolving its stealth tactics to bypass security measures. Stay vigilant and proactive! ๐จ

๐๏ธ Extra, Extra! Read all about it! ๐๏ธ
Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!
๐ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐
๐ตCrypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐
๐Bitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐พ
Let us know what you think.
So long and thanks for reading all the phish!
Give us a rating? |



