Latest Stories

Stay up-to-date with everything at Approach

Blog article

Weekly Digest Week 43 – 2025

Publication date

24.10.2025

Approach Cyber Weekly Digest Cover Image

Featured Story

High-severity Windows SMB flaw now exploited in attacks

Summary

The Cybersecurity and Infrastructure Security Agency (CISA) says threat actors are now actively exploiting a high-severity Windows SMB privilege escalation vulnerability that can let them gain SYSTEM privileges on unpatched systems.

Tracked as CVE-2025-33073, this security flaw impacts all Windows Server and Windows 10 versions, as well as Windows 11 systems up to Windows 11 24H2.

Microsoft patched the vulnerability during the June 2025 Patch Tuesday.

Analysis from our SOC team: This SMB vulnerability is critical due to its ease of exploitation and potential for lateral movement. Attackers with domain access can trivially achieve SYSTEM privileges on machines not enforcing SMB signing. Organizations should immediately verify June 2025 patches are deployed across all Windows endpoints and servers.

Other News

AWS outage crashes Amazon, Prime Video, Fortnite, Perplexity and more

Summary

An AWS outage took down millions of websites, including Amazon.com, Prime Video, Perplexity AI, and Canva, affecting consumers globally across the United States and Europe.

According to the AWS Health dashboard, Amazon confirmed increased error rates and latencies for multiple AWS services in the US-EAST-1 Region. The issue also affected Case Creation via the AWS Support Center and API.

Amazon stated they are actively working to mitigate the issue and identify the root cause.

Analysis from our SOC team: This AWS outage highlights critical cloud infrastructure dependency risks. When US-EAST-1 fails, cascading impacts affect organizations globally. Organizations should review disaster recovery plans to account for cloud provider failures and implement multi-region failover mechanisms.

Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch

Summary

Threat actors with ties to China exploited the ToolShell vulnerability in Microsoft SharePoint to breach a telecommunications company in the Middle East, weeks after it was patched in July 2025.

Also targeted were government departments in Africa and South America, a university in the U.S., a state technology agency, and a European finance company.

The attacks exploited CVE-2025-53770, a now-patched flaw in on-premise SharePoint servers that could bypass authentication and achieve remote code execution.

Analysis from our SOC team: This campaign demonstrates the persistent targeting of unpatched SharePoint servers by Chinese APT groups even after public disclosure and patch availability. The exploitation window between July patch release and these October attacks highlights a critical patching gap. Organizations must verify all on-premise SharePoint servers are patched for CVE-2025-53770 and related bypasses.

Be wary of phishing emails sent in the name of Partenamut

Summary

Numerous reports have been received of phishing emails impersonating Partenamut, a Belgian health insurance company. The sender claims a supposed refund of €180 has been credited to the recipient’s affiliate account and requests verification via a fraudulent link.

The phishing campaign uses fake banking update links and legitimate branding to appear trustworthy. Users are advised not to click on links in suspicious messages, not to open attachments, and to forward suspicious emails to suspicious@safeonweb.be for processing.

Analysis from our SOC team: The tips described in the article are what we would like to emphasize as well. Never click on any links — always navigate to the official website yourself.

Suspicious messages can be forwarded to any of the three email addresses from Safeonweb:

Our SOC is also available to assist if there are any doubts or suspicions about text or email messages.

OTHER STORIES

Contact us to learn more about our services and solutions

Our team will help you start your journey towards cyber serenity

Do you prefer to send us an email?