Latest Stories

Stay up-to-date with everything at Approach

Blog article

Weekly Digest Week 49 – 2024

Publication date

06.12.2024

Featured Story

Hackers Actively Exploiting Zyxel Firewall Flaw To Deploy Ransomware

Cybersecurity experts have uncovered a wave of attacks exploiting vulnerabilities in Zyxel firewalls to deploy the Helldown ransomware. This new ransomware operation, first observed in August 2024, is targeting organizations worldwide through a directory traversal flaw (CVE-2024-11667) in ZLD firmware versions 5.00 through 5.38.

The flaw allows attackers to upload/download files via crafted URLs, leading to unauthorized access and ransomware deployment.

SOC Analysis:
This is a critical vulnerability being actively exploited. Organizations should immediately patch affected Zyxel firewalls and monitor for suspicious activity. These attacks demonstrate how network security appliances can become entry points if not maintained and monitored properly.

Other Stories

Critical Vulnerability Found in Zabbix Network Monitoring Tool

CVE-2024-42327 (CVSS 9.9) affects the Zabbix network monitoring platform. It allows non-admin users with API access to inject arbitrary SQL queries and potentially compromise systems or exfiltrate data.

SOC Analysis:
Zabbix systems are deeply embedded in many IT infrastructures. The fact that this flaw affects default « User » roles increases its severity. Public-facing Zabbix instances are especially at risk. Patch immediately and restrict access to the API and admin interfaces.

WARNING: 2 Vulnerabilities Patched in Veeam Service Provider Console, Patch Immediately!

Two vulnerabilities (CVE-2024-42448, CVE-2024-42449) in Veeam’s Service Provider Console (VSPC) can allow attackers to edit backup configs or delete cloud/on-premise backups. The first carries a CVSS score of 9.9 and poses a critical threat.

SOC Analysis:
Backup systems are essential to cyber resilience, and VSPC’s centralized role makes it a key target. Update to version 8.1.0.21999 immediately and verify that previous backups remain intact. Remember: patching prevents future compromise but does not resolve any past breaches.

Attention: Scams via Physical Letters with QR Codes Spotted in Switzerland

Safeonweb has reported a scam trend in Switzerland involving physical letters containing QR codes. When scanned, these codes can install malware on smartphones. While not yet common in Belgium, the approach is expected to spread due to its simplicity and effectiveness.

SOC Analysis:
This scam shows how attackers combine old-school social engineering (physical mail) with modern tech (QR codes). Stay cautious when scanning unknown QR codes and inform your staff and community. If you receive suspicious messages or mail, forward them to:

verdacht@safeonweb.be
suspect@safeonweb.be
suspicious@safeonweb.be


Want to enhance your organization’s cyber awareness or compliance strategy?
Contact the Approach Cyber SOC team for tailored support and training programs.

OTHER STORIES

Contact us to learn more about our services and solutions

Our team will help you start your journey towards cyber serenity

Do you prefer to send us an email?