• Gone Phishing
  • Posts
  • ๐ŸŽฏ Unknown Hackers Target Japanese Organizations via PHP Vulnerability

๐ŸŽฏ Unknown Hackers Target Japanese Organizations via PHP Vulnerability

In partnership with

Gone Phishing Banner

Welcome to Gone Phishing, your weekly cybersecurity newsletter thatโ€™s treating cybercriminals like Trumpโ€™s tariffs are treating the stock market ๐Ÿ“‰๐Ÿ“‰๐Ÿ“‰ 

Patch of the Week! ๐Ÿฉน

First thingโ€™s first, folks. Our weekly segment goes by many names. Patch of the Week, Tweak of the week. Okay, thatโ€™s itโ€ฆ ๐Ÿ˜ณ 

Congrats to Mozilla & Microsoft, the cybercriminals are no matchโ€ฆ for your patch! ๐Ÿฉน

Check out this freshly hatched patches ๐Ÿฃ๐Ÿฃ

All Mozilla, no filler ๐Ÿ˜œ 

๐Ÿšจ Firefox Add-on Trouble Incoming? Update Now! ๐Ÿ”ฅ

Mozilla is urging all Firefox users to update ASAP to avoid issues with add-ons, DRM content, and security features due to an expiring root certificate on March 14, 2025. ๐Ÿ›‘

Whatโ€™s the fix? 

โœ… Update to Firefox 128+ (or ESR 115.13+ for long-term users). 

โœ… Applies to Windows, macOS, Linux, and Android (but not iOS/iPadOS).

โœ… Tor Browser users should update as well.

Without this update, add-ons may disable themselves, security alerts may stop working, and some DRM content wonโ€™t play. Don't risk itโ€”update now! ๐Ÿš€

๐Ÿ›ก๏ธ Microsoft Patch Tuesday: 57 Bugs Squashed, 6 Zero-Days Exploited! ๐Ÿ’€

Microsoft just patched 57 security flaws, including 6 actively exploited zero-days! โš ๏ธ 

Key risks include:

  • Win32 Kernel flaw (CVE-2025-24983) used by malware to gain SYSTEM privileges.

  • NTFS & FAT file system bugs allowing attackers to steal data or execute malicious code.

  • Microsoft Management Console bypass (CVE-2025-26633) helping attackers evade security checks.

The U.S. CISA has added these to its Known Exploited Vulnerabilities (KEV) list, requiring agencies to patch by April 1, 2025. If you haven't updated yet, do it now to stay protected! ๐Ÿ”’

Now, on to this weekโ€™s hottest cybersecurity news stories: 

  • โ›ฉ๏ธ Japan-attack: PHP-CGI RCE flaw exploited in attacks galore ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป

  • ๐ŸŒ Juniper networks beware! Chinese hackers are out en masse ๐Ÿ‘จโ€๐Ÿ‘จโ€๐Ÿ‘งโ€๐Ÿ‘ง

  • ๐ŸŽญ Fake Play Store scam targets global users: PlayPraetor Trojan ๐Ÿด

Donโ€™t Japanic ๐Ÿ˜จ

๐ŸŽฏ Unknown Hackers Target Japanese Organizations via PHP Vulnerability

A mystery hacking group has been exploiting CVE-2024-4577, a remote code execution (RCE) flaw in PHP-CGI on Windows, to infiltrate Japanese companies across tech, telecom, education, e-commerce, and entertainment sectors since January 2025.

๐Ÿ”ฅ How the Attack Works

๐Ÿ”น Exploits PHP-CGI vulnerability for initial access

๐Ÿ”น Deploys Cobalt Strike (TaoWu plugins) via PowerShell for remote control ๐Ÿ“ก

๐Ÿ”น Moves laterally using privilege escalation tools (JuicyPotato, RottenPotato, SweetPotato)

๐Ÿ”น Hides traces by deleting event logs (wevtutil commands)

๐Ÿ”น Steals passwords & NTLM hashes using Mimikatz ๐Ÿ›‘

๐Ÿ› ๏ธ Hacker Toolset (Exposed on Alibaba Cloud)

๐Ÿ”น BeEF โ€“ Executes browser-based attacks ๐Ÿ–

๐Ÿ”น Viper C2 โ€“ Runs remote commands & reverse shell payloads ๐Ÿ

๐Ÿ”น Blue-Lotus โ€“ Web shell framework for XSS, cookie theft & CMS hijacking ๐ŸŒ

๐Ÿ•ต๏ธ Whatโ€™s Their Goal?

Researchers suspect more than just credential theftโ€”the attackers are gaining SYSTEM privileges and setting up persistence, suggesting long-term espionage or future attacks.

๐Ÿ” How to Stay Protected

โœ… Patch PHP-CGI (CVE-2024-4577) immediately ๐Ÿ”„

โœ… Monitor for unusual PowerShell activity & log deletions ๐Ÿ“Š

โœ… Restrict execution of privilege escalation tools ๐Ÿšซ

โœ… Strengthen defenses against Cobalt Strike & web shell attacks ๐Ÿ›ก๏ธ

With sophisticated tactics and stealthy tools, these hackers pose a serious threatโ€”stay alert and secure your systems! ๐Ÿšจ

Learn AI in 5 minutes a day

This is the easiest way for a busy person wanting to learn AI in as little time as possible:

  1. Sign up for The Rundown AI newsletter

  2. They send you 5-minute email updates on the latest AI news and how to use it

  3. You learn how to become 2x more productive by leveraging AI

Heard about the Chinese Hackfather? He sent them some code they couldnโ€™t understand. ๐Ÿ—ฃ๏ธ

๐Ÿšจ China-Linked Hackers Target Juniper Routers with Custom Backdoors ๐Ÿšช

The China-backed hacking group UNC3886 is infiltrating outdated Juniper MX routers, deploying custom TinyShell-based backdoors to spy on networks and evade detection.

๐ŸŽฏ Whoโ€™s Affected?

๐Ÿ”น Defense, telecom, and tech sectors in the U.S. & Asia

๐Ÿ”น Organizations using end-of-life Juniper routers

๐Ÿ”ฅ How the Attack Works

โš ๏ธ Gains privileged access via compromised credentials

โš ๏ธ Injects malware into legitimate Junos OS processes ๐Ÿ› ๏ธ

โš ๏ธ Disables logging before executing commands, then restores logs ๐Ÿ•ต๏ธโ€โ™‚๏ธ

โš ๏ธ Uses rootkits & SSH hijacking tools to maintain persistence

๐Ÿ› ๏ธ Custom Backdoors & Implants

๐Ÿ”น appid, to โ€“ Remote control via SOCKS proxy & command execution

๐Ÿ”น irad โ€“ Stealthy packet sniffer for extracting commands

๐Ÿ”น lmpad โ€“ Memory injection tool to disable logging

๐Ÿ”น jdosd โ€“ UDP-based remote shell for file transfer

๐Ÿ”น oemd โ€“ TCP backdoor for executing commands

๐Ÿ›‘ How to Defend Against UNC3886

โœ… Upgrade Juniper routers to patched versions ๐Ÿ›ก๏ธ

โœ… Monitor for unusual system modifications & log tampering ๐Ÿ“Š

โœ… Restrict administrative access & enforce MFA ๐Ÿ”‘

โœ… Deploy forensic tools to detect passive backdoors ๐Ÿ” 

UNC3886โ€™s stealth tactics & deep system knowledge make these attacks highly persistentโ€”organizations must act fast to secure their networks! ๐Ÿšง

You gotta Play to win ๐Ÿ†

๐Ÿšจ PlayPraetor Trojan: Global Google Play Scam Exposed ๐Ÿง 

Cybercriminals are tricking users with fake Google Play Store pages to distribute PlayPraetor, a powerful malware that steals banking credentials, logs keystrokes, and hijacks cryptocurrency transactions. Over 6,000 fraudulent pages have been uncovered by cybersecurity firm CTM360.

๐ŸŽญ How the Scam Works

๐Ÿ”น Fake Google Play Pages โ€“ Lookalike sites distribute malicious APKs

๐Ÿ”น Trojanized Apps โ€“ Malware disguises as legitimate apps ๐Ÿ•ต๏ธโ€โ™‚๏ธ

๐Ÿ”น Dangerous Permissions โ€“ Gains control via Accessibility Services

๐Ÿ”น Banking Fraud โ€“ Targets banking & crypto apps, intercepting MFA codes ๐Ÿ”‘

๐Ÿ› ๏ธ PlayPraetorโ€™s Attack Strategy

CTM360โ€™s Scam Navigator outlines six key stages:

1๏ธโƒฃ Fake Domains โ€“ Mimic Google Play & government sites

2๏ธโƒฃ Phishing Traps โ€“ Victims lured via ads, SMS, & social media

3๏ธโƒฃ Malware Distribution โ€“ Trojanized apps infect devices

4๏ธโƒฃ Credential Theft โ€“ Keyloggers & clipboard monitoring steal data

5๏ธโƒฃ Monetization โ€“ Stolen accounts sold on the dark web ๐Ÿ’ฐ

6๏ธโƒฃ Botnet Operations โ€“ Infected devices used for ad fraud & cybercrime

๐Ÿ›ก๏ธ How to Protect Yourself

โœ… Download apps ONLY from official stores (Google Play, Apple App Store)

โœ… Verify app developers & read user reviews

โœ… Deny unnecessary permissions, especially Accessibility Services

โœ… Use mobile security software to block malware

โœ… Stay informed on emerging threats

With over 6,000 fraudulent pages detected, PlayPraetor is one of the most widespread mobile scams everโ€”stay vigilant! โš ๏ธ

๐Ÿ—ž๏ธ Extra, Extra! Read all about it! ๐Ÿ—ž๏ธ

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • ๐Ÿ›ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐Ÿ“…

  • ๐Ÿ’ตCrypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐Ÿ†“

  • ๐Ÿ“ˆBitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐Ÿ‘พ

Let us know what you think.

So long and thanks for reading all the phish!

Give us a rating?

Login or Subscribe to participate in polls.

footer graphic cyber security newsletter