Silk Typhoon bursts the banks ๐ŸŒŠ

In partnership with

Gone Phishing Banner

Welcome to Gone Phishing, your weekly cybersecurity newsletter thatโ€™s the DOGE to cybercrimeโ€™s government spending ๐Ÿคบ

Patch of the Week! ๐Ÿฉน

First thingโ€™s first, folks. Our weekly segment goes by many names. Patch of the Week, Tweak of the week. Okay, thatโ€™s itโ€ฆ ๐Ÿ˜ณ 

Congrats to Elastic, the cybercriminals are no matchโ€ฆ for your patch! ๐Ÿฉน

Check out this freshly hatched patch ๐Ÿฃ

Elastic bounces back ๐Ÿ™ƒ

๐Ÿšจ Critical Kibana Flaw โ€“ Patch Now!

Elastic has released an urgent security update for Kibana, fixing a critical prototype pollution vulnerability (CVE-2025-25015, CVSS 9.9) that could allow arbitrary code execution. ๐Ÿšจ

โšก Whatโ€™s the Risk?

โ— Attackers can manipulate JavaScript objects, leading to remote code execution (RCE), data access, or privilege escalation.

โ— Exploitable via crafted file uploads & HTTP requests.

๐Ÿ›‘ Affected Versions:

โ— Kibana 8.15.0 โ†’ 8.17.3 (Fixed in 8.17.3)

โ— In 8.15.0 to 8.17.1, only Viewer role users can exploit it.

โ— In 8.17.1 to 8.17.2, attackers need specific privileges (fleet-all, integrations-all, actions:execute-advanced-connectors).

๐Ÿ”ง Immediate Action Required!

โœ… Update to Kibana 8.17.3 ASAP!

โœ… If patching isnโ€™t possible, disable Integration Assistant (xpack.integration_assistant.enabled: false in kibana.yml).

Elastic has patched similar high-severity flaws before โ€“ donโ€™t wait! Secure your systems now! ๐Ÿ”’โœจ

Now, on to this weekโ€™s hottest cybersecurity news stories:  

  • ๐ŸŒŠ Chinese โ€˜Silk Typhoonโ€™ expands attacks to IT supply chains ๐ŸŒ

  • ๐Ÿš€ Google launches AI conversational scam protection for Android ๐Ÿค–

  • ๐Ÿผ Chinese APT Lotus Panda targets governments w/ new variants ๐Ÿ‘พ

Silk Typhoon bursts the banks ๐ŸŒŠ

๐Ÿšจ Silk Typhoon Targets IT Supply Chains for Cyber Espionage ๐ŸŽฏ

The China-linked hacking group Silk Typhoon (formerly Hafnium) has shifted tactics, now targeting IT supply chains to infiltrate corporate networks. Instead of direct attacks, they compromise remote management tools, cloud apps, and IT service providers to gain broad access to victims.

๐ŸŽฏ Whoโ€™s at Risk?

๐Ÿ”น IT service providers, MSPs, cloud management firms

๐Ÿ”น Government agencies, healthcare, legal, defense, and NGOs

๐Ÿ”น Energy & higher education sectors

๐Ÿ” How They Attack

โš ๏ธ Exploiting stolen API keys & credentials for privilege escalation ๐Ÿ”‘

โš ๏ธ Zero-day attacks on Ivanti VPN, Palo Alto firewalls & Citrix NetScaler ๐ŸŒ

โš ๏ธ Password spraying with leaked credentials ๐Ÿ’ป

โš ๏ธ Deploying web shells for persistence & command execution ๐Ÿšช

๐Ÿ“ก What They Steal

๐Ÿ”น Email, OneDrive & SharePoint data via MSGraph API ๐Ÿ“

๐Ÿ”น Cloud infrastructure reconnaissance & lateral movement ๐Ÿ”„

๐Ÿ”น Sensitive corporate & government information ๐Ÿ•ต๏ธ

๐Ÿ•ถ๏ธ Hiding Their Tracks

Silk Typhoon operates through a "CovertNetwork" of compromised routers & appliances from Zyxel, QNAP, and Cyberoam, disguising their real location.

๐Ÿ” How to Stay Secure

โœ… Apply security patches ASAP for exploited CVEs ๐Ÿ› ๏ธ

โœ… Use multi-factor authentication (MFA) ๐Ÿ”‘

โœ… Limit access to critical cloud services & enforce network segmentation ๐Ÿ”„

โœ… Monitor for unusual API key use & privilege escalation ๐Ÿšจ

Silk Typhoonโ€™s supply chain attacks are a major cybersecurity threatโ€”proactive defense is crucial! ๐Ÿšง

Looking for unbiased, fact-based news? Join 1440 today.

Join over 4 million Americans who start their day with 1440 โ€“ your daily digest for unbiased, fact-centric news. From politics to sports, we cover it all by analyzing over 100 sources. Our concise, 5-minute read lands in your inbox each morning at no cost. Experience news without the noise; let 1440 help you make up your own mind. Sign up now and invite your friends and family to be part of the informed.

Pays to be a Paranoid Android ๐Ÿค–

๐Ÿšจ Google Rolls Out AI-Powered Scam Detection for Android Users ๐Ÿ“ฑ

Google is launching AI-driven scam detection to help Android users avoid conversational scams and spoofed calls that impersonate trusted companies.

๐Ÿ” How It Works

โœ… AI models analyze conversation patterns in real-time

โœ… Detects suspicious messages & alerts users ๐Ÿšจ

โœ… Runs entirely on-device for privacy ๐Ÿ”’

โœ… Only applies to unknown numbers ๐Ÿ“ต

Users can dismiss, block, or report scams, with reported details shared with Google & carriers.

๐Ÿ“ž AI Scam Detection for Calls Expands

๐Ÿ”น Available on Pixel 9+ devices in the U.S.

๐Ÿ”น Beep alerts notify participants when enabled ๐Ÿ“ข

๐Ÿ”น Audio is processed ephemerally & not stored

๐ŸŒ Where & When?

๐Ÿš€ First launching in English in the U.S., U.K., & Canada

๐Ÿ“† More regions to follow

๐Ÿ›ก๏ธ Safer Browsing with AI

Google also revealed that 1B+ Chrome users now use Enhanced Protection mode, which:

๐Ÿ”น Detects phishing & scam websites ๐Ÿ•ต๏ธโ€โ™‚๏ธ

๐Ÿ”น Flags suspicious downloads ๐Ÿšซ

Stay Safe!

๐Ÿ”น Keep scam detection enabled

๐Ÿ”น Be cautious of unknown senders & callers

๐Ÿ”น Use Safe Browsing for extra protection

AI-powered tools are making scams easier to spotโ€”but vigilance is still key! ๐Ÿšง

Hackers: Lotus cause some Pandamonium ๐Ÿ˜

๐Ÿšจ Lotus Panda Targets Governments & Telecoms with Sagerunex Backdoor ๐Ÿ•ต๏ธ

The Chinese state-backed hacking group Lotus Panda (aka Billbug, Thrip, Lotus Blossom) has been targeting government, manufacturing, telecom, and media sectors in the Philippines, Vietnam, Hong Kong, and Taiwan with new variants of the Sagerunex backdoor.

๐ŸŽฏ Whatโ€™s New?

๐Ÿ”น Two new "beta" versions of Sagerunex spotted

๐Ÿ”น Uses Dropbox, X (Twitter), and Zimbra for stealthy C2 communications ๐Ÿ“ก

๐Ÿ”น Deploys cookie stealers, proxy tools, and privilege escalation software

๐Ÿšช How They Get In

โš ๏ธ Likely through spear-phishing & watering hole attacks ๐ŸŽฃ

โš ๏ธ Backdoor hides in email drafts & trash folders to evade detection ๐Ÿ•ต๏ธโ€โ™‚๏ธ

โš ๏ธ Steals system data & sends commands via Zimbra webmail

๐Ÿ”ฅ How They Operate

โœ… Collects system details & encrypts exfiltrated data

โœ… Runs reconnaissance commands (net, tasklist, ipconfig, netstat)

โœ… Uses Venom proxy to bypass internet restrictions

๐Ÿ” How to Defend Against Lotus Panda

โœ… Monitor for unusual Dropbox/X/Zimbra activity ๐Ÿ“Š

โœ… Restrict unauthorized use of proxy tools ๐Ÿšซ

โœ… Educate employees on phishing threats ๐Ÿ“ง

โœ… Strengthen email security & endpoint defenses ๐Ÿ›ก๏ธ

Lotus Panda remains a persistent threat, evolving its stealth tactics to bypass security measures. Stay vigilant and proactive! ๐Ÿšจ

๐Ÿ—ž๏ธ Extra, Extra! Read all about it! ๐Ÿ—ž๏ธ

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • ๐Ÿ›ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐Ÿ“…

  • ๐Ÿ’ตCrypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐Ÿ†“

  • ๐Ÿ“ˆBitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐Ÿ‘พ

Let us know what you think.

So long and thanks for reading all the phish!

Give us a rating?

Login or Subscribe to participate in polls.

footer graphic cyber security newsletter