A bunch of people have alerted me to a vulnerability in #MoveIT, a secure file transfer app used heavily in the UK.

I did some digging and it looks like it’s a zero day under active exploitation. Not 100% on threat actor yet but it may be one of the ransomware/extortion groups.

Really serious, impacted orgs should shut down the server. Thread follows. #threatintel

Progress Customer Community

#MoveIT Transfer looks like this, it’s an enterprise MFT solution. It looks like somebody has been stealing stuff.
If it turns out to be a ransomware group again this is will be the second enterprise MFT zero day in a year, cl0p went wild with GoAnywhere recently. Also their third MFT zero day.

I would recommend orgs who run #MoveIT Transfer do three things:

- Remove network connectivity/contain
- Check for newly created or altered .asp* files
- Retain a copy of all IIS logs and network data volume logs.

Webshells have been getting dropped. Microsoft Safety Scanner is a good tool to run. https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/safety-scanner-download

Microsoft Safety Scanner Download

Get the Microsoft Safety Scanner tool to find and remove malware from Windows computers.

🫣
Today is going to be fun. #MoveIT
New MOVEit Transfer zero-day mass-exploited in data theft attacks

Hackers are actively exploiting a zero-day vulnerability in the MOVEit Transfer file transfer software, tracked as CVE-2023-34362, to steal data from organizations.

BleepingComputer

With #MoveIT Transfer, stuff I know so far:

- Huge US footprint, including US government. It's quite expensive, so mostly western enterprises.

- It's definitely a zero day, although vendor doesn't want to say it obvs.

- Every one online is still vulnerable. This includes some big banks etc.

- Webshells started being planted a few weeks ago, multiple incidents running at multiple orgs during that timeframe who detected activity.

Vendor appears pretty responsive and good so far.

One additional update on #MoveIT - I'm reliably told this incident also impacted their SaaS cloud offering of the same product. They may have to wordsmith around this.
Critical Vulnerability in Progress MOVEit Transfer: Technical Analysis and Recommendations - TrustedSec

TrustedSec's blog is an expert source of information on information security trends and best practices for strategic risk management.

TrustedSec

Just been on a quick call with industry peeps looking at what known attacker IPs were interacting with over the weekend - #MoveIT boxes in the US and SaaS.

It vuln itself allows RCE, not just webshells, so I think Mandiant and DART are gonna get some IR hours.

While I’m here - make sure MoveIT Transport is in a real DMZ. Your shit would still have been stolen but it stops them moving internally.

Can’t wait to read all the security vendor blogs saying they fully protect against this threat next week 🤣

It looks like a significant amount of data exfiltration may have happened re #MoveIT. Another problem - it can use cloud bucket storage for data, and storage access keys got taken and need rotating: data access still possible in those situations.

There are conflicting signals re exploitation - while it’s clear a smash and grab happened at weekend, there’s signs exploit was used prior to weekend.

#MoveIT vendor has confirmed cloud SaaS offering was impacted. It’s refreshing to see a product owner really take ownership of a situation. (Obviously, I expect some ongoing wordsmithing for journalists longer term re cloud).
MOVEit Transfer Critical Vulnerability CVE-2023-34362 Rapid Response

Our team is tracking in-the-wild exploitation of a zero-day vulnerability against Progress' MOVEit Transfer web application that allows for escalated privileges and unauthorized access.

#MoveIT Transport zero day issue has a CVE now under review - CVE-2023-34362.
HT @CyberLeech #CVE202334362

https://nvd.nist.gov/vuln/detail/CVE-2023-34362

NVD - CVE-2023-34362

Transparency tweet for defenders: This weekend, I am doing internet scans of #MoveIT Transfer servers for vulnerable versions and planted webshells.
Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft | Mandiant

Mandiant

Microsoft are attributing the #moveIT zero day attacks to cl0p ransomware group.

I’ve been tracking this - there are a double digit number of orgs who had data stolen, that includes multiple US Government and banking orgs.

This is the third time Cl0p ransomware group have used a zero day in webapps for extortion in three years, btw. In all three cases they were products with security in the branding.

In terms of emerging threats, expect more of this while the west appears unable to accept the threat of ransomware groups.

That said, it’s probably a wake up call to the governments.

#moveIT issue is unfolding fast.

British Airways and Boots (retailer) in UK have disclosed they had data breaches via moveIT. https://news.sky.com/story/bas-uk-staff-exposed-to-global-data-theft-spree-12896900

BA's UK staff and Boots hit by cyber security breach with contact and bank details exposed

Sky
The BBC have also been breached via the #moveIT issue, staff data was taken. Payroll provider Zellis had their data stolen.
BBC report on their own breach, also implicate AerLingus (airline). https://www.bbc.co.uk/news/technology-65814104 #MOVEit
MOVEit hack: BBC, BA and Boots among cyber attack victims

Staff at multiple organisations are warned of a payroll data breach after an IT supplier is hacked.

BBC News

Just to be crystal clear on this one - orgs running #MoveIT Transfer should assume compromise, not just patch.

Cl0p did a smash and grab over the last holiday weekend across over a hundred large/prominent orgs.

Check for webshells. It’s not just human2, look for new files in the web root folder.

Cl0p drip feed victims on their portal over months, not days - this is the third time they’ve pulled a zero day heist like this.

Cl0p are saying they will erase data they took from any gov systems. #moveIT HT @razhael
Mass exploitation of critical MOVEit flaw is ransacking orgs big and small

SQL injection attacks on MOVEit file-transfer service likely to get worse.

Ars Technica
I don’t wanna say ransomware and extortion groups are outta control buttt #moveit https://www.bbc.co.uk/news/technology-65829726
BBC, BA and Boots issued with ultimatum by cyber gang Clop

The group warns personal details of 100,000 staff will be published if employers do not get in touch.

BBC News
DHS joint advisory on Cl0p (note I wouldn’t get too hung up on many of the IOCs as they’re unrelated to this #moveIT incident) http://go.dhs.gov/4ut

Somebody asked me an interesting question earlier regarding #moveIT - why aren't US orgs disclosing breaches?

Really simple - they don't have to due to lack of data protection law, or they're trying to cover it up via payment to cl0p.

A majority of the victims, from scanning, are in the US - Europe is actually a small minority.

There’s another vulnerability in #moveIT. No patch yet. Allows remote code execution. I’d recommend closing the web interface until there’s a patch. Update: patch out. https://www.progress.com/security/moveit-transfer-and-moveit-cloud-vulnerability
MOVEit Transfer and MOVEit Cloud Vulnerability

Progress.com
Progress Customer Community

Illinois Department of Innovation & Technology (DoIT) believe information was stolen using #moveIT https://ltgov.illinois.gov/news/press-release.26572.html
Minnesota Department of Education say information stolen using #moveIT https://content.govdelivery.com/accounts/MNMDE/bulletins/35f2559
[RELEASE] MDE Affected by Global Data Breach

Minnesota Department of Education
Members of the public among those affected by massive N.S. cyberattack | CBC News

Thousands of teachers, high school students and short-term accommodation owners among others have been identified as victims of a hacker gang exploiting a weakness in software used by the provincial government.

CBC

EY - auditor Ernst & Young - have started informing clients of data breach with #moveIT. I understand payroll and tax data impacted. #threatintel

(Tooting this again as I accidentally deleted it, UI sucks).

EY and OFCOM (UK gov regulator) have disclosed to the BBC they have been hit by cl0p via #moveIT https://www.bbc.co.uk/news/technology-65877210
MOVEit hack: Media watchdog Ofcom latest victim of mass hack

The regulator says information about firms and employees has been affected by a cyber-attack.

BBC News
Shell oil, Transport for London have confirmed they were impacted by #moveIT zero day. Cl0p have started posting victim names. https://therecord.media/shell-impacted-in-clop-ransomware-attack
Oil and gas giant Shell confirms it was impacted by Clop ransomware attacks

Shell confirmed on Thursday it had been impacted by the Clop ransomware gang’s breach of the MOVEit file transfer tool after the group listed the British oil and gas multinational on its extortion site.

Shell Oil were hit with a ransomware group breach via a zero day in Accellion MFT product in 2021, so they moved to MoveIT: https://www.zdnet.com/article/oil-giant-shell-discloses-data-breach-linked-to-accellion-fta-vulnerability/

In 2023 they’ve been hit with a zero day by a ransomware group in their MoveIT MFT: https://therecord.media/shell-impacted-in-clop-ransomware-attack

Ransomware groups are out of control.

Oil giant Shell discloses data breach linked to Accellion FTA vulnerability

Updated: The information of stakeholders has been compromised.

ZDNET
CNN and Washington Post confirming something in this Mastodon thread from two weeks ago - multiple US gov orgs hit via #MoveIT. https://www.cnn.com/2023/06/15/politics/us-government-hit-cybeattack/index.html
There is another new vulnerability in #moveIT. No patch. Shut them down again. HT @brett https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-15June2023
Progress Customer Community

Several of the orgs in the Ransomware Task Force are impacted by the cl0p incident, as is one of the Joint Ransomware Task Force. (This toot is sponsored by those trying to shut down discussion about it). #moveIT
Yesterday's new #moveIT vulnerability has been allocated CVE-2023-35708. Patch is out now. #CVE202335708
Embattled consulting firm PwC swept up in global cyber breach of file service MOVEit by cybercrime group C10p

Experts expect other Australian businesses and organisations will reveal they have been caught up in the hack on a file sharing service for sensitive documents.

Australian Financial Review
.@brett’s at 84 direct cl0p victims so far via #moveIT
Unpacking the MOVEit Breach: Statistics and Analysis

How many organizations were affected by the MOVEit attack? This post looks at the statistics, and how we may be able to prevent similar attacks in future.

Emsisoft | Cybersecurity Blog
TechCrunch is part of the Yahoo family of brands

One of the guys in the original MoveIT ransom activity is selling the data online (along with data from s3 buckets etc)

Expect breach disclosures from the following orgs:

#moveit #threatintel

@GossiTheDog That 3,295 records from McDonald's and 9,358 records from City National Bank looks like it would probably be employee records or something. Seems like it would be a lot bigger if it were customer related. Still terrible, but perhaps their customers will be spared any headache.
@gerowen @GossiTheDog any source for reference? or is this backchannel?
@liquidpanda @GossiTheDog I myself was just speculating based on the numbers. Mr. Beaumont is the actual PoC for this since it's his post.

@gerowen @liquidpanda @GossiTheDog

From the leaker (Nam3L3ss):

- "I am not a hacker, nor have I ever tried to blackmail anyone."

- "What you have seen so far is less than .001% of data I have"

- "I have 1.000 releases coming never seen before"

Source:

https://www.infostealers.com/article/massive-moveit-vulnerability-breach-hacker-leaks-employee-data-from-amazon-mcdonalds-hsbc-hp-and-potentially-1000-other-companies/

Massive MOVEit Vulnerability Breach: Hacker Leaks Employee Data from Amazon, McDonald's, HSBC, HP, and Potentially 1000+ Other Companies | InfoStealers

The stolen data, which dates back to May 2023, includes employee directories from 25 major organizations. The directories contain detailed employee information, including names, email addresses, phone numbers, cost center codes, and, in some cases, entire organizational structures. Such data could serve as a goldmine for cybercriminals seeking to engage in phishing, identity theft, or even social engineering attacks on a large scale.

InfoStealers
@GossiTheDog 2.8m from Amazon and a leaky S3? Oh poetry.
@GossiTheDog wow. That’s a lotta impact. Surprised the TA can even handle that many negotiations
@GossiTheDog @brett Here's a bit of an interesting twist this morning (via cl0p gang's website)
@GossiTheDog Is there any details? (In particular, whether it is SQLi, command injection, or a buffer overflow, because it seems these "secure" appliances can't be arsed with protecting against the most common exploits)
@GossiTheDog I believe this is the patch to the patch to the patch, right? #WhackAMole

@GossiTheDog @brett someone inside MoveIT is feeling similtaneously quietly smug because they told them so, and put it writing, and anxious / depressed that they may be made a scapegoat, and that their probably pretty good CV has suddenly become toxic the next time they next go job hunting.

There, but for the grace of god...

@GossiTheDog @brett lol it’s like log4j all over again with the patches because everyone and their mother is looking at the software lol.
@GossiTheDog just finding out about the #moveIT situation. my company (no, i won’t say which) uses moveIT, and we were notified at the end of the work day that it would be going offline for the next 12 hours. i’m assuming this is why…
@GossiTheDog I’d love to feel bad for them, but it’s shell and they can burn with the planet
Seems like the "M" in "MFT" is for "monetized", not for "managed".
@GossiTheDog Translation: Shell's CTO's inbox is nothing but cold e-mails from MFT vendors right now.
@GossiTheDog They certainly are out of control. This stuff is depressing. Can you please go back to Starfield News? :)
@GossiTheDog It's always seemed to me that like 90% of ransomware (which is encrypted with a compromised user account, not admin access) could be eliminated if we standardized on auto-snapshotting filesystems and required admin access to delete old snapshots to free up space.
@GossiTheDog
The payoff is too much. Assuming you hit 100 institutions, 10% pay $5M, that is a $50M payday. You can buy every appliance and search for zero days, and it is fish in a barrel when the appliances are vulnerable to SQLi...
@GossiTheDog They are not out of control. They are in control. 😉