Latest Stories

Stay up-to-date with everything at Approach

Blog article

Weekly Digest Week 36 – 2023

Publication date

08.09.2023

Featured Story

Apple Rushes to Patch Zero-Day Flaws Exploited for Pegasus Spyware on iPhones

Apple has issued emergency security updates to fix two zero-day vulnerabilities exploited by NSO Group’s Pegasus spyware. CVE-2023-41061 affects Wallet and allows code execution via malicious attachments, while CVE-2023-41064 targets Image I/O and can be exploited via a malicious image in iMessage.

The flaws were used as part of the “BLASTPASS” exploit chain that enabled zero-click attacks on fully patched iPhones. Updates are now available for iOS 16.6.1, iPadOS 16.6.1, macOS Ventura 13.5.2, and watchOS 9.6.2.

SOC Analysis:
These vulnerabilities were exploited with zero user interaction and bypassed Apple’s BlastDoor framework. We recommend applying all relevant updates immediately across iOS, macOS, and watchOS devices. Our SOC can assist in mobile threat defense and device monitoring.

Other Stories

Malvertising Campaign Spreads Atomic Stealer macOS Malware

Attackers are using fake TradingView websites and Google Ads to trick users into downloading the macOS variant of Atomic Stealer (AMOS). The malware, priced at $1,000/month, is designed to steal files, passwords, and crypto wallets from macOS users.

SOC Analysis:
Using non-Windows systems doesn’t make you immune to malware. We recommend:
  • Only downloading software from verified sources
  • Blocking ads and spoofed domains at the DNS level
  • Deploying macOS endpoint protection

Contact us to launch an employee awareness campaign around malware and phishing.


Researchers Discover Critical Vulnerability in PHPFusion CMS

CVE-2023-2453 and CVE-2023-4480 affect PHPFusion versions 9.10.30 and earlier. The first allows remote code execution via a malicious file upload; the second enables reading or writing arbitrary files. No patches are available as of now.

SOC Analysis:
Exploitation is difficult but not impossible. Until a patch is released:
  • Restrict access to admin accounts
  • Sanitize file uploads and monitor logs
  • Inform users of potential risks

Our SOC can help monitor your CMS platform and secure vulnerable components.


API Vulnerabilities: 74% of Organizations Report Multiple Breaches

Traceable and the Ponemon Institute’s latest API security report shows that 74% of organizations have experienced three or more API-related breaches in the past two years. Major issues include API sprawl, inventory management, and lack of visibility.

SOC Analysis:
APIs are often overlooked in traditional security reviews. We recommend:
  • Testing APIs before public deployment
  • Maintaining accurate API inventories
  • Implementing API gateway security and WAFs

Approach’s SOC can help audit and secure your API infrastructure.


Beware: the “sextortion” scam is back!

Scammers are sending emails claiming to have compromising footage of victims and demanding payment to avoid exposure. These emails are hoaxes designed to prey on fear and shame.

SOC Analysis:
Tips:
  • Never respond to or pay scammers
  • Forward messages to:
    • verdacht@safeonweb.be
    • suspect@safeonweb.be
    • suspicious@safeonweb.be

Our SOC can assist in verifying and handling scam threats.


Want to enhance your organization’s cyber awareness or compliance strategy? Contact the Approach Cyber SOC team for tailored support and training programs.

OTHER STORIES

Contact us to learn more about our services and solutions

Our team will help you start your journey towards cyber serenity

Do you prefer to send us an email?