Latest Stories

Stay up-to-date with everything at Approach

Blog article

Weekly Digest Week 20 – 2025

Publication date

16.05.2025

Featured Story

China-Linked APTs Exploit SAP CVE‑2025‑31324 to Breach 581 Critical Systems Worldwide

Chinese-associated APT groups UNC5221, UNC5174, and CL‑STA‑0048 exploited CVE‑2025‑31324—a unauthenticated file upload RCE in SAP NetWeaver—to infiltrate critical infrastructure worldwide. A total of 581 NetWeaver instances were reportedly backdoored with web shells, and 800 domains are suspected for future targeting. During the investigation, a second zero-day (CVE‑2025‑42999) was discovered and patched via SAP Notes 3594142 and 3604119. Urgent patching is strongly recommended.

SOC Analysis: This campaign underscores the critical need for rapid patching of enterprise systems like SAP NetWeaver. With active exploitation by multiple APTs, immediate application of SAP’s April 2025 security notes—as well as segmentation and vigilant monitoring—is imperative. Coordinated threat intel and collaboration remain key for mitigating ongoing risks.

Other Stories

Ivanti EPMM Vulnerabilities Exploited in the Wild (CVE‑2025‑4427, CVE‑2025‑4428)

Threat actors exploited an authentication bypass (CVE‑2025‑4427) and RCE (CVE‑2025‑4428) in on‑prem Ivanti EPMM products. These zero-days affected only a small subset of customers, but CERT‑EU confirmed active exploitation. Patched versions (11.12.0.5, 12.3.0.2, 12.4.0.2, 12.5.0.1) are available.

SOC Analysis: Ivanti EPMM remains vulnerable to high-impact zero-days. Applying patched versions must be prioritized. For environments unable to patch immediately, refer to Ivanti’s official mitigation guidance and implement workarounds as a stop-gap.

Tracking Bugs: European Vulnerability Database Goes Live

ENISA has launched the European Vulnerability Database (EUVD), offering a unified portal for vulnerability info on software and hardware. It aggregates data from vendors, CSIRTs, and the CVE Program—and provides dashboards for critical and exploited vulnerabilities. This follows concerns over CVE Program funding stability.

SOC Analysis: EUVD enhances global vulnerability tracking resilience by adding redundancy to the CVE system. Security teams should assess how EUVD integration can complement their existing vulnerability workflows to ensure more robust monitoring and response.

Beware: Phishing Emails in the Name of Agentschap Wegen & Verkeer

Fake emails impersonating the Flemish Roads and Traffic Agency warn of an alleged road tax bill and include a link to view the document. Clicking the link could lead to fraud. Users are advised to visit the official https://www.burgerprofiel.be/ site directly if unsure.

SOC Analysis: Always avoid clicking links in suspicious emails—even when they claim to contain official communication. Navigate to websites manually. Forward any suspect messages to Safeonweb:
verdacht@safeonweb.be, suspect@safeonweb.be, or suspicious@safeonweb.be. Our SOC team is ready to assist with verifications.

OTHER STORIES

Contact us to learn more about our services and solutions

Our team will help you start your journey towards cyber serenity

Do you prefer to send us an email?