Connect with us

Hi, what are you looking for?

Hard News Hard Hitting News Source Global Political News

Cyber Security

Ransomware gang exploits critical vulnerability in popular file transfer software

A cybersecurity advisory issued Wednesday said that a major ransomware group had successfully exploited a previously unknown vulnerability in Progress Software’s MOVEit software.

The Cybersecurity and Infrastructure Security Agency and the FBI released a joint cybersecurity advisory warning that one of the largest phishing and malspam distributors worldwide began exploiting a previously unknown vulnerability last month that can potentially impact public and private sector networks.

A ransomware gang called CL0P — otherwise known as TA505 — is exploiting a vulnerability in MOVEit, a popular solution developed by the company Progress Software that provides automated file transfers for sensitive data and enhanced workflow automation capabilities. The exploit is designed to steal data from underlying MOVEit databases, according to the advisory

The ransomware group has previously exploited vulnerabilities in similar campaigns that targeted file transfer software and databases earlier this year, including Accellion’s File Transfer Appliance and Fortra/Linoma’s GoAnywhere managed file transfer servers.

While the extent of the impact from the most recent attack remains unclear, the advisory said that, “due to the speed and ease TA505 has exploited this vulnerability, and based on their past campaigns, FBI and CISA expect to see widespread exploitation of unpatched software services in both private and public networks.”

CISA Executive Director for Cybersecurity Eric Goldstein said that the agency “remains in close contact with Progress Software and our partners at the FBI to understand prevalence within federal agencies and critical infrastructure.” 

According to federal contracting databases, Progress Software products are in use at multiple federal agencies, including the Army, the Navy, the State Department, the Centers for Disease Control, the Bureau of Prisons and other entities.

Progress Software posted about the vulnerability late last month on its website and shut down components of its cloud service product while patching its services. The company has since restored services and said it is unaware of any data breaches associated with the vulnerability, but added that it was “extremely important” for MOVEit Transfer customers to take immediate action. 

The advisory recommends that customers take an inventory of all assets and data to help identify unauthorized devices and software on their networks, regularly patch and update their applications to the latest versions and conduct regular vulnerability assessments. Companies are also encouraged to only grant administrative privileges when necessary. 

TA505 has previously functioned as a major botnet operator that specializes in phishing attacks and financial fraud. Previous ransom notes that the group has sent to victims threatened to publish their stolen data on a public blog and sell the information on the dark web if the impacted companies declined to negotiate.

Mandiant, a cybersecurity firm and Google subsidiary, confirmed in an announcement that the earliest evidence of the exploitation occurred on May 27 and added that victim organizations “could potentially receive ransom emails in the coming days to weeks.”

Copyright 2021 Associated Press. All rights reserved.

Source: https://www.nextgov.com/cybersecurity/2023/06/ransomware-gang-exploits-critical-vulnerability-popular-file-transfer-software/387256/

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Cyber Security

The cyberattack that ultimately led to the breach of several U.S. officials’ email accounts was the result of a China-based threat actor accessing a...

Cyber Security

You might discover hundreds of open doors if you scan your website for security vulnerabilities. Our AppSec research across 1400 websites protected by AppTrana uncovered 33,000...

Cyber Security

According to Cisco Talos, the Lazarus Group, backed by North Korea, is actively attacking the backbone infrastructure of the internet and entities in the...

Cyber Security

The well-known watch manufacturing company Seiko disclosed the data breach notification recently on Aug 2023, targeted by the notorious threat group BlackCat/ALPHV. BlackCat/ALPHV Group has been...

Copyright © 2023 Hard News Herd Hitting in Your Face News Source | World News | Breaking News | US News | Political News Website by Top Search SEO