- Gone Phishing
- Posts
- ๐ฏ Unknown Hackers Target Japanese Organizations via PHP Vulnerability
๐ฏ Unknown Hackers Target Japanese Organizations via PHP Vulnerability

Welcome to Gone Phishing, your weekly cybersecurity newsletter thatโs treating cybercriminals like Trumpโs tariffs are treating the stock market ๐๐๐
Patch of the Week! ๐ฉน
First thingโs first, folks. Our weekly segment goes by many names. Patch of the Week, Tweak of the week. Okay, thatโs itโฆ ๐ณ
Congrats to Mozilla & Microsoft, the cybercriminals are no matchโฆ for your patch! ๐ฉน
Check out this freshly hatched patches ๐ฃ๐ฃ

All Mozilla, no filler ๐
๐จ Firefox Add-on Trouble Incoming? Update Now! ๐ฅ
Mozilla is urging all Firefox users to update ASAP to avoid issues with add-ons, DRM content, and security features due to an expiring root certificate on March 14, 2025. ๐
Whatโs the fix?
โ Update to Firefox 128+ (or ESR 115.13+ for long-term users).
โ Applies to Windows, macOS, Linux, and Android (but not iOS/iPadOS).
โ Tor Browser users should update as well.
Without this update, add-ons may disable themselves, security alerts may stop working, and some DRM content wonโt play. Don't risk itโupdate now! ๐
๐ก๏ธ Microsoft Patch Tuesday: 57 Bugs Squashed, 6 Zero-Days Exploited! ๐
Microsoft just patched 57 security flaws, including 6 actively exploited zero-days! โ ๏ธ
Key risks include:
Win32 Kernel flaw (CVE-2025-24983) used by malware to gain SYSTEM privileges.
NTFS & FAT file system bugs allowing attackers to steal data or execute malicious code.
Microsoft Management Console bypass (CVE-2025-26633) helping attackers evade security checks.
The U.S. CISA has added these to its Known Exploited Vulnerabilities (KEV) list, requiring agencies to patch by April 1, 2025. If you haven't updated yet, do it now to stay protected! ๐
Now, on to this weekโs hottest cybersecurity news stories:
โฉ๏ธ Japan-attack: PHP-CGI RCE flaw exploited in attacks galore ๐จ๐ปโ๐ป
๐ Juniper networks beware! Chinese hackers are out en masse ๐จโ๐จโ๐งโ๐ง
๐ญ Fake Play Store scam targets global users: PlayPraetor Trojan ๐ด
Donโt Japanic ๐จ
๐ฏ Unknown Hackers Target Japanese Organizations via PHP Vulnerability
A mystery hacking group has been exploiting CVE-2024-4577, a remote code execution (RCE) flaw in PHP-CGI on Windows, to infiltrate Japanese companies across tech, telecom, education, e-commerce, and entertainment sectors since January 2025.
๐ฅ How the Attack Works
๐น Exploits PHP-CGI vulnerability for initial access
๐น Deploys Cobalt Strike (TaoWu plugins) via PowerShell for remote control ๐ก
๐น Moves laterally using privilege escalation tools (JuicyPotato, RottenPotato, SweetPotato)
๐น Hides traces by deleting event logs (wevtutil commands)
๐น Steals passwords & NTLM hashes using Mimikatz ๐
๐ ๏ธ Hacker Toolset (Exposed on Alibaba Cloud)
๐น BeEF โ Executes browser-based attacks ๐
๐น Viper C2 โ Runs remote commands & reverse shell payloads ๐
๐น Blue-Lotus โ Web shell framework for XSS, cookie theft & CMS hijacking ๐
๐ต๏ธ Whatโs Their Goal?
Researchers suspect more than just credential theftโthe attackers are gaining SYSTEM privileges and setting up persistence, suggesting long-term espionage or future attacks.
๐ How to Stay Protected
โ Patch PHP-CGI (CVE-2024-4577) immediately ๐
โ Monitor for unusual PowerShell activity & log deletions ๐
โ Restrict execution of privilege escalation tools ๐ซ
โ Strengthen defenses against Cobalt Strike & web shell attacks ๐ก๏ธ
With sophisticated tactics and stealthy tools, these hackers pose a serious threatโstay alert and secure your systems! ๐จ

Learn AI in 5 minutes a day
This is the easiest way for a busy person wanting to learn AI in as little time as possible:
Sign up for The Rundown AI newsletter
They send you 5-minute email updates on the latest AI news and how to use it
You learn how to become 2x more productive by leveraging AI

Heard about the Chinese Hackfather? He sent them some code they couldnโt understand. ๐ฃ๏ธ
๐จ China-Linked Hackers Target Juniper Routers with Custom Backdoors ๐ช
The China-backed hacking group UNC3886 is infiltrating outdated Juniper MX routers, deploying custom TinyShell-based backdoors to spy on networks and evade detection.
๐ฏ Whoโs Affected?
๐น Defense, telecom, and tech sectors in the U.S. & Asia
๐น Organizations using end-of-life Juniper routers
๐ฅ How the Attack Works
โ ๏ธ Gains privileged access via compromised credentials
โ ๏ธ Injects malware into legitimate Junos OS processes ๐ ๏ธ
โ ๏ธ Disables logging before executing commands, then restores logs ๐ต๏ธโโ๏ธ
โ ๏ธ Uses rootkits & SSH hijacking tools to maintain persistence
๐ ๏ธ Custom Backdoors & Implants
๐น appid, to โ Remote control via SOCKS proxy & command execution
๐น irad โ Stealthy packet sniffer for extracting commands
๐น lmpad โ Memory injection tool to disable logging
๐น jdosd โ UDP-based remote shell for file transfer
๐น oemd โ TCP backdoor for executing commands
๐ How to Defend Against UNC3886
โ Upgrade Juniper routers to patched versions ๐ก๏ธ
โ Monitor for unusual system modifications & log tampering ๐
โ Restrict administrative access & enforce MFA ๐
โ Deploy forensic tools to detect passive backdoors ๐
UNC3886โs stealth tactics & deep system knowledge make these attacks highly persistentโorganizations must act fast to secure their networks! ๐ง

You gotta Play to win ๐
๐จ PlayPraetor Trojan: Global Google Play Scam Exposed ๐ง
Cybercriminals are tricking users with fake Google Play Store pages to distribute PlayPraetor, a powerful malware that steals banking credentials, logs keystrokes, and hijacks cryptocurrency transactions. Over 6,000 fraudulent pages have been uncovered by cybersecurity firm CTM360.
๐ญ How the Scam Works
๐น Fake Google Play Pages โ Lookalike sites distribute malicious APKs
๐น Trojanized Apps โ Malware disguises as legitimate apps ๐ต๏ธโโ๏ธ
๐น Dangerous Permissions โ Gains control via Accessibility Services
๐น Banking Fraud โ Targets banking & crypto apps, intercepting MFA codes ๐
๐ ๏ธ PlayPraetorโs Attack Strategy
CTM360โs Scam Navigator outlines six key stages:
1๏ธโฃ Fake Domains โ Mimic Google Play & government sites
2๏ธโฃ Phishing Traps โ Victims lured via ads, SMS, & social media
3๏ธโฃ Malware Distribution โ Trojanized apps infect devices
4๏ธโฃ Credential Theft โ Keyloggers & clipboard monitoring steal data
5๏ธโฃ Monetization โ Stolen accounts sold on the dark web ๐ฐ
6๏ธโฃ Botnet Operations โ Infected devices used for ad fraud & cybercrime
๐ก๏ธ How to Protect Yourself
โ Download apps ONLY from official stores (Google Play, Apple App Store)
โ Verify app developers & read user reviews
โ Deny unnecessary permissions, especially Accessibility Services
โ Use mobile security software to block malware
โ Stay informed on emerging threats
With over 6,000 fraudulent pages detected, PlayPraetor is one of the most widespread mobile scams everโstay vigilant! โ ๏ธ

๐๏ธ Extra, Extra! Read all about it! ๐๏ธ
Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!
๐ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐
๐ตCrypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐
๐Bitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐พ
Let us know what you think.
So long and thanks for reading all the phish!
Give us a rating? |



