Tag

Moveit Transfer

All articles tagged with #moveit transfer

cybersecurity2 years ago

Rising Concerns: MOVEit Transfer Software Faces Multiple Critical Flaws and Breaches

Progress Software has patched a critical SQL injection vulnerability, CVE-2023-36934, in its MOVEit Transfer software, which could allow unauthenticated attackers to gain unauthorized access to the database. This vulnerability is particularly dangerous as it can be exploited without valid credentials. Two other high-severity vulnerabilities, CVE-2023-36932 and CVE-2023-36933, have also been addressed in the update. Users are advised to update to the latest version of MOVEit Transfer to mitigate the risks associated with these vulnerabilities.

cybersecurity2 years ago

MOVEit Vulnerabilities Expose Organizations to Ransomware Attacks.

Progress Software has fixed a third SQL injection vulnerability (CVE-2023-35708) in its MOVEit Transfer web application, which could lead to escalated privileges and unauthorized access. The Cl0p cyber extortion gang exploited a previous vulnerability (CVE-2023-34362) to grab enterprise data and has started disclosing the names of victim organizations, including Shell, banks, media companies, and universities. Progress Software has urged customers to update their MOVEit Transfer installations to the latest versions to fix the vulnerability.

cyber-attack-ransomware2 years ago

MOVEit Transfer App Faces Third Flaw Amidst Ransomware Attack and Cyberattacks on US Banks and Universities.

Progress Software has disclosed a third vulnerability in its MOVEit Transfer application, which is yet to be assigned a CVE identifier, that could lead to escalated privileges and potential unauthorized access to the environment. The Cl0p ransomware gang has been deploying extortion tactics against affected companies, and the vulnerability has been exploited in data theft attacks. Progress Software is urging its customers to disable all HTTP and HTTPs traffic to MOVEit Transfer on ports 80 and 443 to safeguard their environments while a patch is being prepared to address the weakness.

cybersecurity2 years ago

Clop ransomware gang identifies initial victims of MOVEit data theft.

The Clop ransomware gang has started extorting companies impacted by the MOVEit data theft attacks by listing their names on a data leak site. The gang exploited a zero-day vulnerability in the MOVEit Transfer secure file transfer platform to steal files stored on the server. If an extortion demand is not paid, the threat actors say they will begin leaking stolen data on June 21st. Thirteen companies have been listed on the data leak site, including Shell, UnitedHealthcare Student Resources, and the University of Georgia. Some companies have confirmed being impacted, while others are still investigating.

cybersecurity2 years ago

MOVEit Transfer Vulnerabilities: Experts Discover New Flaws and Warn of Lingering Impact.

Progress Software has released security updates to fix new SQL injection vulnerabilities in the MOVEit Transfer application that could allow an unauthenticated attacker to gain unauthorized access to the MOVEit Transfer database. All versions of MOVEit Transfer are affected by these vulnerabilities. The vulnerabilities were discovered by researchers from the cybersecurity firm Huntress. The Clop ransomware gang claims to have hacked hundreds of companies by exploiting a previous MOVEit Transfer vulnerability. Progress Software is not aware of attacks in the wild exploiting these new vulnerabilities.

cybersecurity2 years ago

MOVEit Transfer Vulnerabilities Uncovered - Urgent Patch Required.

Progress Software has released patches to address new SQL injection vulnerabilities affecting MOVEit Transfer that could allow an attacker to gain unauthorized access to the database and steal sensitive information. Cybersecurity firm Huntress discovered and reported the vulnerabilities, and the flaws have been addressed in the latest versions of the service. The Cl0p ransomware gang has been exploiting a previously reported vulnerability in MOVEit Transfer to drop web shells on targeted systems and has issued an extortion notice to affected companies.

cybersecurity2 years ago

MOVEit Transfer: Critical Flaws and Patches.

The Clop ransomware gang confirmed that they were behind the recent MOVEit Transfer data-theft attacks, with victims including Zellis, University of Rochester, and the Government of Nova Scotia. The Royal Ransomware gang has begun testing a new BlackSuit encryptor in limited attacks. Other news includes the discovery of new ransomware variants Cyclops and Xollam, and the arrest of an Army corporal for alleged involvement in the Rhysida ransomware attack on the Chilean army. Additionally, the University of Manchester warns that they suffered a cyberattack where data was likely stolen.

cybersecurity2 years ago

MOVEit Transfer faces multiple critical vulnerabilities, urgent patching required.

Progress Software has warned customers of newly discovered critical SQL injection vulnerabilities in its MOVEit Transfer managed file transfer solution that can allow attackers to steal information from customers' databases. The security bugs were discovered with the help of cybersecurity firm Huntress following detailed code reviews initiated by Progress on May 31. The vulnerabilities affect all MOVEit Transfer versions and enable unauthenticated attackers to compromise Internet-exposed servers to alter or extract customer information. Progress has released a patch for the vulnerabilities and urges all customers to apply it immediately. The Clop ransomware gang has claimed responsibility for targeting a MOVEit Transfer zero-day vulnerability, which led to a series of data-theft attacks that have allegedly affected "hundreds of companies."

cybersecurity2 years ago

Clop Ransomware Exploits MOVEit Vulnerability for Years.

The Clop ransomware gang has been testing a zero-day vulnerability in the MOVEit Transfer managed file transfer solution since 2021, according to Kroll security experts. The threat actors were also testing ways to collect and extract sensitive data from compromised MOVEit Transfer servers as far back as April 2022, likely with the help of automated tools. The automated malicious activity picked up on a much larger scale starting on May 15, 2023, right before the zero-day bug mass exploitation began on May 27. Clop has threatened all affected organizations to reach out and negotiate a ransom if they don't want their data leaked online in six days, on June 14.

cybersecurity2 years ago

Ransomware Gang Exploits MOVEit Transfer Vulnerability for Cyberattacks.

The Cl0p Ransomware Gang has been exploiting a critical flaw in Progress Software's MOVEit Transfer application to drop ransomware. The gang has issued an ultimatum to several impacted businesses, urging them to get in touch by June 14, 2023, or risk getting all their stolen data published. The abuse of CVE-2023-34362, an SQL injection flaw in MOVEit Transfer, is a sign of the adversary continuously seeking zero-day exploits in internet-facing applications and using them to their advantage in order to extort victims.

cybersecurity2 years ago

MOVEit Transfer App Breached by Clop Ransomware and Hackers

The Clop ransomware gang has claimed responsibility for the recent data-theft attacks on multiple companies' servers through the exploitation of a zero-day vulnerability in Progress Software's MOVEit Transfer product. The group confirmed that they have not yet begun to extort victims but will display victims on their data leak site if a ransom is not paid. Clop has previously targeted organizations during holidays when staff is at a minimum. Zellis, a UK payroll and HR solutions provider, confirmed that it suffered a data breach due to these attacks, which also impacted some of its customers.

cybersecurity2 years ago

MOVEit Transfer App Exploited by Clop Ransomware Group and Lace Tempest Hackers, Dozens of Organizations Affected.

The Clop ransomware gang is behind a new wave of mass-hacks targeting the MOVEit Transfer file transfer tool, with British Airways, the BBC, and Nova Scotia's government among the confirmed victims. Microsoft security researchers have attributed the attacks to a group it tracks as "Lace Tempest," a known affiliate of the Russia-linked Clop ransomware group. The exploitation of the MOVEit vulnerability is often followed by data exfiltration, and it's likely that many more victims of the breach will come to light over the next few days.

cybersecurity2 years ago

MOVEit Transfer App Exploited by Hackers for Data Theft and Ransomware Attacks, Microsoft and CISA Warn

Microsoft has linked the ongoing exploitation of a critical flaw in the Progress Software MOVEit Transfer application to the Lace Tempest threat actor. The group is known for exploiting different zero-day flaws to siphon data and extort victims. The flaw, CVE-2023-34362, allows attackers to authenticate as any user and gain access to the database and execute arbitrary code. At least 3,000 exposed hosts are believed to be utilizing the MOVEit Transfer service. Users are recommended to apply vendor-provided patches as soon as possible to secure against potential risks.

cybersecurity2 years ago

Zero-day vulnerability in MOVEit Transfer exploited by hackers for data theft

Hackers have stolen data from users of the file transfer tool MOVEit Transfer after a security flaw was discovered in the software. Progress Software, the maker of the software, has made fixes available since it discovered the vulnerability. Cybersecurity firms Rapid7 and Mandiant Consulting have found cases in which the flaw was exploited to steal data. The vulnerability could lead to potential unauthorized access into users' systems. It is not clear which or how many organizations use the software or were impacted by potential breaches.

cybersecurity2 years ago

Zero-day vulnerability in MOVEit Transfer tool exploited in data theft attacks.

Hackers are exploiting a zero-day vulnerability in the MOVEit Transfer file transfer software to steal data from organizations. The flaw is a SQL injection vulnerability that leads to remote code execution and does not currently have a CVE assigned to it. Cybersecurity firm Rapid7 says that the MOVEit Transfer flaw is a SQL injection vulnerability that leads to remote code execution and does not currently have a CVE assigned to it. The attacks started over the long US Memorial Day holiday when fewer staff were monitoring systems.