Latest Stories

Stay up-to-date with everything at Approach

Blog article

Weekly Digest Week 40 – 2024

Publication date

04.10.2024

Featured Story

Unix Printing Vulnerabilities Enable Easy DDoS Attacks

New vulnerabilities in the Common Unix Printing System (CUPS) allow attackers to launch DDoS attacks at a cost of less than 1 cent. Over 58,000 exposed systems can generate between 1GB and 6GB of traffic toward a target by sending a single malicious packet.

Initially disclosed for RCE potential, researchers from Akamai later demonstrated how CUPS flaws can be repurposed for large-scale denial-of-service attacks. Cloudflare noted a surge in related DDoS activity during the first half of the year.

SOC Analysis:
These CUPS vulnerabilities pose dual risks—remote code execution and DDoS. Patch immediately or disable the printing service on systems that do not need it. Also, block UDP port 631 externally. Our SOC can assist with threat exposure reviews and mitigation steps.

Other Stories

Ivanti Endpoint Manager Flaw Actively Targeted, CISA Warns Agencies to Patch

CVE-2024-29824 (CVSS 9.6) affects Ivanti Endpoint Manager 2022 SU5 and earlier. It allows unauthenticated attackers to execute code via SQL injection. CISA added the vulnerability to its KEV catalog after confirming active exploitation in the wild.

SOC Analysis:
Ivanti has become a popular target. Patch immediately, and if not feasible, enforce strong segmentation and monitor for post-exploitation signs. Horizon3.ai has published PoC code, raising the urgency for remediation.

Fake Job Applications Deliver Dangerous More_eggs Malware to HR Professionals

Spear-phishing campaigns are targeting HR teams with malware disguised as resumes. Victims are tricked into opening malicious LNK files that install the More_eggs backdoor, which can steal credentials and enable full compromise.

SOC Analysis:
HR teams are a high-risk entry point for social engineering. We recommend enhanced email security, awareness training, and accepting job applications only through verified channels. Our SOC can simulate phishing scenarios to test defenses.

WARNING: Four Critical Vulnerabilities Are Affecting PHP

PHP versions below 8.1.30, 8.2.24, and 8.3.12 contain four critical flaws (CVE-2024-8925 through 8927, and 9026). These bugs enable attackers to perform log tampering, file inclusion, and parameter injection, potentially compromising entire environments.

SOC Analysis:
Patch now if you’re running PHP-based web servers. These vulnerabilities are easily exploited and can lead to full system takeover. Our SOC can assist with patch prioritization and host-based threat detection configuration.

Want to enhance your organization’s cyber awareness or compliance strategy?
Contact the Approach Cyber SOC team for tailored support and training programs.

OTHER STORIES

Contact us to learn more about our services and solutions

Our team will help you start your journey towards cyber serenity

Do you prefer to send us an email?