Latest Stories

Stay up-to-date with everything at Approach

Blog article

Weekly Digest Week 34 – 2023

Publication date

25.08.2023

Featured Story

Critical Remote Code Execution Vulnerability in WinRAR (CVE-2023-40477)

WinRAR versions prior to 6.23 are affected by a critical RCE vulnerability (CVE-2023-40477) caused by improper validation of user-supplied data during recovery volume processing. Exploitation requires user interaction, such as opening a crafted archive file.

SOC Analysis:
WinRAR is commonly used across Windows environments, making this vulnerability a high-priority target. We recommend:
  • Updating to WinRAR version 6.23 immediately
  • Avoiding decompression of files from unknown sources
  • Implementing endpoint protection against archive-based attacks

Our SOC can assist with patch validation and incident response in case of suspicious file activity.


Other Stories

Researchers Release PoC for Ivanti Sentry Flaw (CVE-2023-38035)

A proof-of-concept exploit has been published for a critical Ivanti Sentry vulnerability (CVSS 9.8), enabling unauthenticated access to internal APIs. This flaw impacts Sentry versions 9.18 and earlier and can lead to remote command execution or file modification.

SOC Analysis:
Mitigation steps:
  • Restrict MICS access to internal networks only
  • Patch to the latest version immediately
  • Review logs for suspicious access to port 8443

Our SOC can help with threat hunting and verification.


New Variant of XLoader macOS Malware Masquerades as “OfficeNote” App

A new variant of XLoader malware is targeting macOS users via a fake app named “OfficeNote.dmg.” Though the app fails to open visibly, it secretly installs a Launch Agent for persistence and harvests sensitive browser data from Chrome and Firefox.

SOC Analysis:
Recommendations:
  • Deploy cross-platform endpoint protection
  • Monitor macOS LaunchAgents and startup scripts
  • Limit installation of unsigned apps

Contact us if your organization needs macOS threat detection and response guidance.


Chrome’s First Weekly Security Update Fixes Multiple High-Severity Bugs

Google has released Chrome 116.0.5845.110/.111, addressing five memory safety flaws, including a use-after-free vulnerability (CVE-2023-4430) in Vulkan. Weekly patching aims to shorten exposure windows for n-day attacks.

SOC Analysis:
We encourage all users to:
  • Enable automatic browser updates
  • Update Chrome weekly going forward
  • Validate patch deployment in enterprise environments

Let our SOC assist with patch compliance and browser hardening.


Tech Support Scams Are Back – Pop-Ups Impersonate Microsoft

Safeonweb reports an increase in tech scams involving fake pop-ups claiming the victim’s system is blocked. Users are urged to call fake support numbers and provide remote access or payment information.

SOC Analysis:
Tips to avoid tech scams:

Our SOC is available for phishing awareness and incident triage.


Want to enhance your organization’s cyber awareness or compliance strategy? Contact the Approach Cyber SOC team for tailored support and training programs.

OTHER STORIES

Contact us to learn more about our services and solutions

Our team will help you start your journey towards cyber serenity

Do you prefer to send us an email?