Latest Stories

Stay up-to-date with everything at Approach

Blog article

Weekly Digest Week 30 – 2023

Publication date

28.07.2023

Featured Story

Ivanti Releases Urgent Patch for EPMM Zero-Day Vulnerability Under Active Exploitation

Ivanti has released a patch for CVE-2023-35078, a remote unauthenticated API access vulnerability in Endpoint Manager Mobile (EPMM, formerly MobileIron Core). It affects versions 11.4 through 11.10 and has a maximum CVSS score of 10.

The flaw is being actively exploited, with the Norwegian National Security Authority confirming attacks on their Government Security and Service Organization. The vulnerability allows remote access to personal data and limited server control without authentication.

SOC Analysis:
Exploitation requires no authentication or user interaction and has high impact on confidentiality, integrity, and availability. Organizations running EPMM must apply Ivanti’s patches immediately. Our SOC can help assess impact and verify patch application.

Other Stories

Apple Patches Another Kernel Flaw Exploited in ‘Operation Triangulation’ Attacks

Apple released updates for iOS and macOS addressing CVE-2023-38606, a kernel vulnerability exploited in the wild. The bug allowed apps to modify sensitive kernel states. It’s part of an exploit chain investigated by Kaspersky.

SOC Analysis:
Update all Apple devices to the following versions:
  • iOS/iPadOS 16.6
  • macOS Ventura 13.5, Monterey 12.6.8, Big Sur 11.7.9
  • watchOS 9.6, tvOS 16.6

Our SOC team can assist with patch validation and endpoint hardening.


New Vulnerability Puts 926,000 MikroTik Routers at Risk! Users Urged to Patch

CVE-2023-30799 allows privilege escalation from admin to super-admin on MikroTik RouterOS via Winbox or HTTP interface. With over 900,000 devices at risk, researchers urge immediate patching and tighter admin controls.

SOC Analysis:
If you use MikroTik:
  • Apply latest RouterOS update
  • Restrict login IPs and disable Winbox
  • Use SSH with key-based authentication only

Our SOC can monitor brute-force attempts and help secure remote interfaces.


Stolen Microsoft Key: The Impact Is Higher Than Expected

Storm-0558, a Chinese threat group, stole a Microsoft consumer signing key, which could generate access tokens across Microsoft services, not just Exchange Online and Outlook. It may have impacted Outlook, SharePoint, OneDrive, and Teams.

SOC Analysis:
While the stolen key was revoked, threat actors could have established persistence beforehand. We recommend reviewing the Wiz impact analysis and scanning for suspicious activity in Microsoft environments. Our SOC can assist with forensics and identity protection.

Beware of False Warning About Unpaid Taxes

A phishing email impersonating FPS Finance claims recipients owe unpaid taxes and offers a 30% discount if paid in Bitcoin. It pressures victims with a fake 2-day deadline to create urgency—a classic phishing tactic.

SOC Analysis:
Always be skeptical of emails requesting urgent payment. Never pay in cryptocurrency for official matters. Forward suspicious emails to:
  • verdacht@safeonweb.be
  • suspect@safeonweb.be
  • suspicious@safeonweb.be

Our SOC can help validate potential fraud attempts and advise on awareness campaigns.


Want to enhance your organization’s cyber awareness or compliance strategy? Contact the Approach Cyber SOC team for tailored support and training programs.

OTHER STORIES

Contact us to learn more about our services and solutions

Our team will help you start your journey towards cyber serenity

Do you prefer to send us an email?