Laatste Verhalen

Blijf op de hoogte van alles bij Approach

Blog article

Weekly Digest Week 32 – 2025

Publicatiedatum

08.08.2025

Featured Story

New EDR Killer Tool Used by Eight Different Ransomware Groups

A newly evolved EDR killer tool—successor to EDRKillShifter and attributed to RansomHub—has been adopted by eight ransomware gangs: RansomHub, Blacksuit, Medusa, Qilin, Dragonforce, Crytox, Lynx, and INC. The tool uses obfuscated binaries and masquerades as legitimate drivers such as the CrowdStrike Falcon Sensor Driver to disable AV/EDR tools like Microsoft Defender, SentinelOne, McAfee, and others.

SOC Analysis: This represents a serious shift in threat actor collaboration and capability. Organizations must go beyond endpoint reliance by implementing network-based detection, strict driver signing policies, and application whitelisting to ensure layered defenses.

Other Stories

Android Gets Patches for Qualcomm Flaws Exploited in Attacks

Google’s August 2025 Android update includes patches for six vulnerabilities, with two critical Qualcomm GPU flaws—CVE-2025-21479 and CVE-2025-27038—already being actively exploited. These flaws enable memory corruption and may allow threat actors to escalate privileges on compromised devices.

SOC Analysis: These vulnerabilities pose serious BYOD risks. Personal Android devices often bypass enterprise security policies, making them a prime target. Promote regular updates and awareness campaigns among employees to reduce mobile exposure.

Privilege Escalation in Amazon ECS Allows IAM Hijacking (ECScape)

A newly disclosed vulnerability in Amazon ECS, dubbed ECScape, could allow attackers to hijack IAM roles and access other cloud resources from within the same EC2 instance. Discovered by Naor Haziz, the flaw stems from unsafe internal credential handling between ECS tasks.

SOC Analysis: ECScape highlights cloud isolation weaknesses. Organizations using ECS should enforce strong container-level segmentation and audit all IAM role transitions. Proactive monitoring is key to detecting lateral movement.

Phishing Campaign Targets Proximus Skynet Email Users

A phishing campaign is targeting Proximus customers with Skynet.be email addresses, warning falsely that their email accounts will be deleted within hours. The urgent tone and brand impersonation make this campaign highly convincing, especially to less security-aware users.

SOC Analysis: This attack demonstrates the use of ISP branding to establish trust and create urgency. Users should be reminded never to click on urgent messages without verifying legitimacy. Report suspicious emails to:
  • verdacht@safeonweb.be
  • suspect@safeonweb.be
  • suspicious@safeonweb.be

Our SOC is available to help verify suspicious communications.

ANDERE VERHALEN

Neem contact met ons op voor meer informatie over onze diensten en oplossingen

Ons team helpt je op weg naar cybersereniteit

Stuur je ons liever een e-mail?