Security Market Segment LS
Friday, 16 June 2023 09:27

Cl0p gang claimed to have hit many US agencies through MOVEit flaw Featured

By
Cl0p gang claimed to have hit many US agencies through MOVEit flaw Image by Memed_Nurrohmad from Pixabay

A number of US Federal Government agencies have been breached through a vulnerability in the secure managed file transfer software MOVEit Transfer, a report claims.

CNN said the US Cybersecurity and Infrastructure Security Agency had informed it that it was providing aid to these agencies.

As iTWire reported on 6 June, the Cl0p ransomware group was claimed to have been carrying out attacks, using this vulnerability to gain access, from 27 May onwards.

The vulnerability was announced by the company that makes the software, Progress Software Corporation, on 31 May, according to a post from the Google-owned Mandiant security firm.

The TV outlet said the US Department of Energy was among those hit but a CISA spokesperson did not offer any comments when asked who was responsible and how many agencies had been affected.

In its latest advisory about mitigating the effects of the vulnerability, Progress said it would be wise to disable all HTTP and HTTPS traffic to the MOVEit Transfer environment. The vulnerability is yet to be given a CVE number.

Elaborating, the company said:

  • "Modify firewall rules to deny HTTP and HTTPs traffic to MOVEit Transfer on ports 80 and 443;
  • "It is important to note that until HTTP and HTTPS traffic is enabled again:
    • "Users will not be able to log on to the MOVEit Transfer web UI;
    • "MOVEit Automation tasks that use the native MOVEit Transfer host will not work;
    • "REST, Java and .NET APIs will not work; and
    • "MOVEit Transfer add-in for Outlook will not work.
  • "SFTP and FTP/s protocols will continue to work as normal."

And the advisory added: "As a workaround, administrators will still be able to access MOVEit Transfer by using a remote desktop to access the Windows machine and then accessing https://localhost/."

Commenting on the attacks, Robert Cattanach, a partner at international law firm Dorsey & Whitney, said: "Alarm bells that started in the UK private sector, then spread to the US, are now going off throughout the Federal Government after Russian cyber criminal group Cl0p boasted online that it had exploited vulnerabilities in MOVEit file transfer software to penetrate numerous organisations, most recently and significantly many agencies in the US Government.

"The hackers continue to add victims to their dark-web list of extortion victims, and as the full scope of the supply chain exposure continues to unfold exponentially, CISA is engaging in full-time damage control.

“The depth and scope of the compromise are already believed to be staggering, and making matters worse, the only thing known for certain is that the extent of the vulnerability still isn’t known.

"While some federal agencies (TSA and the US State Department) were quick to assert that their systems remain secure, it’s a sure bet that those agencies less fortunate are scrambling to assess the full impact of the hack on their systems before they offer any public assessment of the damage.”

“The latest round of revelations follows a now-familiar playbook: cyber criminals uncover a software flaw, exploit it surreptitiously to avoid drawing attention, then pounce quickly on unsuspecting victims to maximize leverage before software fixes are in place. What’s unique about this hack is the apparent ability of the attackers to move laterally among connected systems of different entities, allowing them access to companies that supposedly did not even employ the defective software, meaning that the MOVEit supply chain is only the beginning, rather than the end of the compromise.

While CISA has been increasingly focused on supply chain vulnerabilities in its contingency planning and regulatory initiatives, this latest round of expanding shockwaves is sure to add new impetus to those initiatives, and influence the ongoing debates between software developers and government cyber-policy experts about who should bear the ultimate responsibility for software that proves to be defective.”

Read 2505 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here




EXL AI IN ACTION VIRTUAL EVENT 20 MARCH 2025

Industry leaders are looking to transform their businesses and achieve measurable outcomes with AI.

As organisations across APAC navigate the complexities of AI adoption, this must-attend event brings together industry leaders, real-world demonstrations, and visionary panel discussions to bridge the gap between proof-of-concepts and enterprise-wide AI implementation.

Learn how to overcome common challenges in deploying AI at scale.​

Unlock cost savings, efficiency, and better customer experiences with AI.

Discover how industry expertise and data intelligence enable practical AI deployment.

Register for the event now!

REGISTER!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

BACK TO HOME PAGE
Sam Varghese

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Share News tips for the iTWire Journalists? Your tip will be anonymous

Subscribe to Newsletter

*  Enter the security code shown: img0

WEBINARS & EVENTS

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments