Latest Stories

Stay up-to-date with everything at Approach

Blog article

Weekly Digest Week 41 – 2025

Publication date

10.10.2025

Approach Cyber Weekly Digest Cover Image

Featured Story

Emotet malware attacks return after three-month break

Summary

On September 18, 2025, Fortra published a security advisory regarding a critical deserialization vulnerability in GoAnywhere MFT’s License Servlet, tracked as CVE-2025-10035 with a CVSS score of 10.0.

The vulnerability could allow a threat actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection and potential remote code execution.

A cybercriminal group tracked as Storm-1175, known for deploying Medusa ransomware, was observed exploiting the vulnerability on September 11, 2025.

The threat actor abused RMM tools specifically SimpleHelp and MeshAgent for persistence, and successfully deployed Medusa ransomware in at least one compromised environment.

Analysis from our SOC team: Organizations must immediately patch to version 7.8.4+, hunt for SimpleHelp and MeshAgent RMM tools in their environment, and review GoAnywhere logs for suspicious activity. The perfect 10.0 CVSS score and confirmed ransomware deployments make this a priority-one response.

Other News

Oracle patches EBS zero-day exploited in Clop data theft attacks

Summary

Oracle is warning about a critical E-Business Suite zero-day vulnerability tracked as CVE-2025-61882 that allows attackers to perform unauthenticated remote code execution, with the flaw actively exploited in Clop data theft attacks. :contentReference[oaicite:0]{index=0}

Analysis from our SOC team: This represents a significant threat to organizations running Oracle EBS. The Clop gang exploited this zero-day for nearly two months before disclosure, providing ample time for data exfiltration across multiple victims. Organizations must immediately identify all Oracle EBS instances in their environment and prioritise emergency patching.

WhatsApp investment groups try to trap internet users

Summary

Scammers are creating fake WhatsApp “investment groups” promoted through ads on Facebook, Instagram, and TikTok.

They promise exclusive financial advice and quick profits but aim to steal victims’ money or personal information. These groups often use the logos of legitimate banks or media outlets to appear trustworthy.

Once users join, fake “experts” share charts and encourage members to invest or download malicious trading apps.

Analysis from our SOC team: The tips described in the article are what we would like to emphasise as well. Never click on any links and browse to the official website yourself or open your banking app. Suspicious messages can be forwarded to any of the three email addresses from Safeonweb:

Our SOC is also available to assist in case there are any doubts or suspicions about text or mail messages.

OTHER STORIES

Contact us to learn more about our services and solutions

Our team will help you start your journey towards cyber serenity

Do you prefer to send us an email?