Latest Stories

Stay up-to-date with everything at Approach

Blog article

Weekly Digest Week 20 – 2023

Publication date

19.05.2023

Featured Story

WordPress Plug-in Used in 1M+ Websites Patched to Close Critical Bug

A critical privilege escalation vulnerability has been patched in the Essential Addons for Elementor plugin, used by over 1 million WordPress websites. CVE-2023-32243 affects versions 5.4.0 through 5.7.1 and allows unauthenticated attackers to escalate privileges up to administrator level.

This is part of a growing trend in which popular WordPress plugins are actively exploited. WordPress’ popularity makes it a prime target for cybercriminals — and security researchers alike.

SOC Analysis:
Security posture must go beyond WordPress core. Add EDR, antivirus, and a Web Application Firewall (WAF) to protect your web assets. Our SOC offers 24/7 threat monitoring and managed WAF to prevent WordPress-based attacks.

Other Stories

New Ransomware Gang RA Group Hits U.S. and South Korean Organizations

The RA Group is the latest to weaponize leaked Babuk ransomware code. Since April 2023, it has attacked victims in manufacturing, insurance, and pharma sectors. Data from victims is being leaked via a secure TOR-based portal.

SOC Analysis:
ESXi hypervisors remain a major target. One ransomware event can bring down dozens of virtual machines. If you manage virtual infrastructure, let us help secure it through hardening, segmentation, and threat detection tooling.

KeePass Vulnerability Imperils Master Passwords

CVE-2023-32784 affects KeePass 2.X and allows attackers to recover the master password in plaintext from a memory dump. The vulnerability exists even after closing the app, and a PoC has been published ahead of the patch release (v2.54).

SOC Analysis:
While KeePass is a solid password manager, no app is secure if the underlying OS is compromised. Physical or remote access is required. Use EDR tools and monitor for memory scraping or unusual process behavior on endpoints.

CISA: Several Old Linux Vulnerabilities Exploited in Attacks

CISA has added multiple Linux-related CVEs to its Known Exploited Vulnerabilities list. Some date back nearly a decade, showing that unpatched legacy systems remain a threat. Notably, the Ruckus flaw is being exploited by AndoryuBot for DDoS attacks.

SOC Analysis:
Organizations must maintain an up-to-date inventory of all software and systems. Patch visibility and lifecycle management are key. Our SOC can help audit patch levels and exposure to known vulnerabilities.

Romance Scam: Be Careful If You Receive This Kind of Message

Safeonweb has received over 2,500 reports of romance scams. Victims are lured into online relationships and coaxed into revealing personal or financial information. Links redirect to fake websites asking for credentials or bank details.

SOC Analysis:
The tips outlined by Safeonweb are fully supported by our SOC. Never click unsolicited links or share sensitive info via text or email. If in doubt, forward messages to:
  • verdacht@safeonweb.be
  • suspect@safeonweb.be
  • suspicious@safeonweb.be

Our analysts can help investigate and validate suspicious communications.


Want to enhance your organization’s cyber awareness or compliance strategy? Contact the Approach Cyber SOC team for tailored support and training programs.

OTHER STORIES

Contact us to learn more about our services and solutions

Our team will help you start your journey towards cyber serenity

Do you prefer to send us an email?