Latest Stories

Stay up-to-date with everything at Approach

Blog article

Weekly Digest Week 30 – 2025

Publication date

25.07.2025

Featured Story

Microsoft SharePoint Zero-Day Disrupts Servers Worldwide

Several serious zero-day vulnerabilities have been discovered and actively exploited in self-hosted Microsoft SharePoint environments, impacting hundreds of organizations worldwide. Victims include critical infrastructure, government agencies, and a U.S. nuclear weapons agency.

Attackers, reportedly China-nexus state-sponsored groups, are exploiting the flaws to gain access to SharePoint servers, extract sensitive documents, and in some cases, deploy ransomware. A malicious tool known as “Toolshell” is being used to automate parts of the attack. Microsoft has issued urgent patches, and CISA has added the flaws to its Known Exploited Vulnerabilities list.

SOC Analysis: If your organization uses on-premises SharePoint, apply Microsoft’s security updates immediately. This campaign emphasizes the danger of state-sponsored actors and the risk of delaying critical patches. Approach Cyber is available to support rapid patching, breach assessment, and forensic investigation.

Other Stories

NPM Package ‘is’ with 2.8M Weekly Downloads Infected Devs with Malware

The widely used NPM package ‘is’ was compromised in a supply chain attack. Malicious actors hijacked maintainer accounts and injected malware that granted attackers full access to affected devices. The package, used in countless JavaScript projects, was downloaded millions of times before the breach was identified.

SOC Analysis: This incident is a stark reminder that even popular open-source libraries are not immune to compromise. Implement supply chain security controls such as dependency locking, integrity checking, and automated alerts for unusual package updates.

Compromised Amazon Q Extension Told AI to Delete Everything – And It Shipped

The official Amazon Q extension for VS Code was briefly compromised, containing a prompt designed to wipe users’ home directories and delete all AWS resources. While the attack appears intended more as a demonstration than to cause harm, it exposed dangerous blind spots in how AI-based tools are validated and distributed.

SOC Analysis: Blind trust in AI tools can lead to irreversible damage. Security teams must evaluate how AI is integrated into developer environments and introduce policies for AI-related extensions, prompts, and output monitoring.

Russia-Backed Actor Uses LLM-Powered LAMEHUG Malware to Target Defense Sector

Russian APT group UAC-0001 (APT28) has launched a new campaign targeting the defense and security sector using a novel malware strain, LAMEHUG, powered by large language model (LLM) technology. CERT-UA reports that this malware is capable of enhanced obfuscation and autonomous payload generation.

SOC Analysis: The weaponization of LLMs by attackers represents a paradigm shift. Cybersecurity teams must evolve their defenses with AI-enhanced detection tools and train analysts to detect subtle, intelligent attack behaviors that may bypass traditional rulesets.

Watch Out for E-Mails Pretending to Be from the Police

A recurring phishing campaign is resurfacing, impersonating the Federal Police and Europol. These messages falsely accuse recipients of sexual offenses and attempt to extort money under coercion. The tone is threatening and manipulative, aiming to scare victims into compliance.

SOC Analysis: Despite its age, this scam still works. Users should always verify suspicious claims and report fake police messages to:
  • verdacht@safeonweb.be
  • suspect@safeonweb.be
  • suspicious@safeonweb.be

Approach Cyber’s SOC team is available for advice and guidance on verifying such messages.

OTHER STORIES

Contact us to learn more about our services and solutions

Our team will help you start your journey towards cyber serenity

Do you prefer to send us an email?