Latest Stories

Stay up-to-date with everything at Approach

Blog article

Weekly Digest Week 40 – 2025

Publication date

03.10.2025

Approach Cyber Weekly Digest Cover Image

Featured Story

Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws

Summary

Nearly 50,000 Cisco ASA/FTD instances vulnerable to two bugs that are actively being exploited by “advanced” attackers remain exposed to the internet.

The vulnerabilities in question are CVE-2025-20333 (9.9) and CVE-2025-20362 (6.5), which affect Cisco’s Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) devices.

The successful attacks are highly likely launched by those behind the ArcaneDoor campaign, who previously targeted the same Cisco products in 2024.

The attackers are deploying malware called RayInitiator and Line Viper, with RayInitiator being a bootkit designed to ensure persistent access to devices.

Analysis from our SOC team: This incident serves as a reminder to maintain regular patching cycles for network perimeter devices. Teams should verify their Cisco ASA and FTD inventory against the affected versions and ensure patches are applied according to their standard vulnerability management process. For devices approaching or past end-of-life, this presents a good opportunity to review hardware refresh timelines and prioritize replacement planning where vendor support is no longer available.

Other News

Hackers Exploit Milesight Routers to Send Phishing SMS to European Users

Summary

Unknown threat actors are abusing Milesight industrial cellular routers to send SMS messages as part of a smishing campaign targeting users in European countries since at least February 2022, with campaigns primarily targeting Sweden, Italy, and Belgium using typosquatted URLs that impersonate government platforms like CSAM and eBox, as well as banking, postal, and telecom providers.

Of the 18,000 routers accessible on the public internet, 572 are potentially vulnerable due to exposing inbox/outbox APIs.

The attackers are exploiting CVE-2023-43261, a now-patched information disclosure flaw, and some routers expose SMS-related features without requiring any authentication.

The phishing URLs include JavaScript that checks for mobile devices before serving malicious content urging users to update their banking information.

Analysis from our SOC team: This campaign highlights the importance of security awareness training for end users, particularly regarding SMS-based phishing attacks. Belgian organisations should reinforce messaging to employees about verifying unexpected SMS communications, especially those claiming to be from government agencies like eBox or financial institutions.

China-Linked Hackers Exploit New VMware Zero-Day Since October 2024

Summary

A newly patched security flaw impacting Broadcom VMware Tools and VMware Aria Operations has been exploited in the wild as a zero-day since mid-October 2024 by a China-linked threat actor called UNC5174.

The vulnerability is CVE-2025-41244 (CVSS score: 7.8), a local privilege escalation bug affecting VMware Cloud Foundation, VMware vSphere Foundation, VMware Aria Operations, VMware Tools, and VMware Telco Cloud platforms.

A malicious local actor with non-administrative privileges having access to a VM with VMware Tools installed may exploit this vulnerability to escalate privileges to root on the same VM.

When successful, exploitation results in unprivileged users achieving code execution in privileged contexts.

Analysis from our SOC team: This zero-day exploitation underscores the critical need for timely patch deployment across virtualisation infrastructure. Organisations running affected VMware products should prioritise applying the available patches.

Beware of phishing scams involving your energy bill

Summary

Now that it’s getting colder and we’re turning the heating back on, scammers are seizing their opportunity: they try to attract your attention with supposed discounts on your energy bill, cheap pellets, etc.

A recent example contains many spelling mistakes and was reported almost 2,000 times this week via suspicious@safeonweb.be.

Safeonweb.be advises not to click on links in suspicious messages, not to open attachments and not to download applications if asked to.

If you have clicked on a link, do not complete the fields and terminate any interaction, and never give out personal codes. If you have entered a password that you also use elsewhere, change it immediately.

Analysis from our SOC team: The tips described in the article are what we would like to emphasize as well. Never click on any links and browse to the official website yourself.

Suspicious messages can be forwarded to any of the three email addresses from Safeonweb.

Our SOC is also available to assist in case there are any doubts or suspicions about text or mail messages.

OTHER STORIES

Contact us to learn more about our services and solutions

Our team will help you start your journey towards cyber serenity

Do you prefer to send us an email?