{"id":31887,"date":"2023-07-11T16:43:33","date_gmt":"2023-07-11T14:43:33","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/?p=31887"},"modified":"2023-07-11T16:48:03","modified_gmt":"2023-07-11T14:48:03","slug":"moveit-transfer-attack-protection","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/moveit-transfer-attack-protection\/31887\/","title":{"rendered":"The MOVEit hack and its aftermath"},"content":{"rendered":"<p>If you\u2019re unfamiliar with the corporate file-sharing app MOVEit Transfer, it\u2019s still worth studying how it was hacked \u2013 if only for its sheer scale: hundreds of organizations were affected, including, among many others, Shell, the New York State Education Department, the <a href=\"https:\/\/news.sky.com\/story\/bas-uk-staff-exposed-to-global-data-theft-spree-12896900\" target=\"_blank\" rel=\"nofollow noopener\">BBC<\/a>, Boots, Aer Lingus, British Airways, several large healthcare providers across the globe, the University of Georgia, and Heidelberger Druck. Both ironically and sadly, <a href=\"https:\/\/www.ipswitch.com\/moveit-transfer\" target=\"_blank\" rel=\"nofollow noopener\">MOVEit Transfer<\/a> is touted as \u201cSecure Managed File Transfer Software for the Enterprise\u201d by its creators, Ipswitch (now part of a company named Progress). It\u2019s a managed file transfer (MFT) system that helps employees share large files with contractors via SFTP, SCP and HTTP, offered as a cloud or on-premise solution.<\/p>\n<p>The series of incidents represents a cautionary tale for everyone in charge of information security at an organization.<\/p>\n<h2>How MOVEit Transfer was hacked<\/h2>\n<p>Without going into every twist and turn of MOVEit users\u2019 turbulent one-and-a-half-months, we\u2019ll cover the key events.<\/p>\n<p>Reports about suspicious activity on the networks of many organizations that used MOVEit Transfer started surfacing on May 27, 2023. According to an investigation, malicious actors were taking advantage of an unknown vulnerability to steal data by running SQL queries.<\/p>\n<p>On May 31, Progress released their <a href=\"https:\/\/community.progress.com\/s\/article\/MOVEit-Transfer-Critical-Vulnerability-31May2023\" target=\"_blank\" rel=\"nofollow noopener\">first security bulletin<\/a>, which summarized the fixes that had been released up to that point and recommended remediation steps. The company originally believed the issue was limited to on-premise installations, but it was later found that the <a href=\"https:\/\/cyberplace.social\/%40GossiTheDog\/110469935523717355\" target=\"_blank\" rel=\"nofollow noopener\">cloud version of MOVEit was affected as well<\/a>. <a href=\"https:\/\/community.progress.com\/s\/article\/MOVEit-Cloud-Info-Regarding-Critical-Vulnerability-May-2023\" target=\"_blank\" rel=\"nofollow noopener\">MOVEit Cloud was temporarily shut down<\/a> for patching and investigations. Rapid7 researchers <a href=\"https:\/\/www.rapid7.com\/blog\/post\/2023\/06\/01\/rapid7-observed-exploitation-of-critical-moveit-transfer-vulnerability\/\" target=\"_blank\" rel=\"nofollow noopener\">counted<\/a> a total of 2500 vulnerable on-premise servers.<\/p>\n<p>On June 2, the vulnerability was assigned the identifier <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-34362\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2023-34362<\/a> and a CVSS score of 9.8 (out of 10). Incident researchers <a href=\"https:\/\/twitter.com\/MsftSecIntel\/status\/1665537730946670595\" target=\"_blank\" rel=\"nofollow noopener\">attributed<\/a> the threat to the cl0p ransomware group. Researchers at Kroll reported on June 9 that the MOVEit exploit likely had been <a href=\"https:\/\/www.kroll.com\/en\/insights\/publications\/cyber\/clop-ransomware-moveit-transfer-vulnerability-cve-2023-34362\" target=\"_blank\" rel=\"nofollow noopener\">in testing since 2021<\/a>. Investigations made it apparent that the cyberattack chain did not necessarily end in an SQL injection and that it could include code execution.<\/p>\n<p>To their credit, Progress went beyond patching the software. The company initiated a code audit, making it possible for the Huntress company to both reproduce the entire exploit chain and discover another vulnerability, which would be fixed on June 9 as announced in the <a href=\"https:\/\/community.progress.com\/s\/article\/MOVEit-Transfer-Critical-Vulnerability-CVE-Pending-Reserve-Status-June-9-2023\" target=\"_blank\" rel=\"nofollow noopener\">next bulletin<\/a> and designated as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-35036\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2023-35036<\/a>. Before many admins got the chance to install that patch, Progress itself discovered another issue \u2013 <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-35708\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2023-35708<\/a> \u2013 and announced it in its <a href=\"https:\/\/community.progress.com\/s\/article\/MOVEit-Transfer-Critical-Vulnerability-15June2023\" target=\"_blank\" rel=\"nofollow noopener\">June 15 bulletin<\/a>. MOVEit Cloud was <a href=\"https:\/\/status.moveitcloud.com\/\" target=\"_blank\" rel=\"nofollow noopener\">shut down again for ten hours<\/a> for the fixes to be applied.<\/p>\n<p>June 15 was also notable for the hackers publishing the details of some of the victims and <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/clop-ransomware-gang-starts-extorting-moveit-data-theft-victims\/\" target=\"_blank\" rel=\"nofollow noopener\">starting ransom negotiations<\/a>. Two days later, the U.S. government promised <a href=\"https:\/\/twitter.com\/RFJ_USA\/status\/1669740545403437056\" target=\"_blank\" rel=\"nofollow noopener\">up to $10 million<\/a> for information about the group.<\/p>\n<p>On June 26, Progress announced that it would shut down MOVEit Cloud for three hours on July 2 to beef up server security.<\/p>\n<p>On July 6 developers published another update, which fixed three more vulnerabilities \u2013 one of them being critical (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-36934\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2023-36934<\/a>,\u00a0<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-36932\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2023-36932<\/a> and\u00a0<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-36933\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2023-36933<\/a>).<\/p>\n<h2>File sharing services as a convenient attack vector<\/h2>\n<p>May\u2019s MOVEit Transfer attack is not the first of its kind. A similar series of attacks targeting <a href=\"https:\/\/duo.com\/decipher\/fortra-patches-actively-exploited-zero-day-in-goanywhere-mft\" target=\"_blank\" rel=\"nofollow noopener\">Fortra GoAnywhere MFT<\/a> was launched in January, and late 2020 saw massive exploitation of a vulnerability in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/global-accellion-data-breaches-linked-to-clop-ransomware-gang\/\" target=\"_blank\" rel=\"nofollow noopener\">Accellion FTA<\/a>.<\/p>\n<p>Many attacks aim to get privileged access to servers or run arbitrary code, which happened in this case too, but hackers\u2019 objective has often been to execute a quick, low-risk attack to gain access to the databases of a file-sharing service. This helps snatch files without penetrating deep into the system so as to remain under the radar. After all, downloading files that are meant to be downloaded isn\u2019t that suspicious.<\/p>\n<p>Meanwhile, file-sharing databases tend to collect lots of truly important information: thus, a MOVEit Transfer attack victim admitted that the leak contained <a href=\"https:\/\/www.schools.nyc.gov\/alerts\/alert-regarding-data-incident\" target=\"_blank\" rel=\"nofollow noopener\">the data of 45 000 college and school students<\/a>.<\/p>\n<p>What this means for security teams is that apps like these and their configuration require special attention: steps to take here include limiting administrative access as well as taking additional security measures with regard to database management and network protection. Organizations should promote cyberhygiene among employees by teaching them to delete files from the file exchange system as soon as they cease to need them, and share with only a bare minimum of users.<\/p>\n<h2>Focus on servers<\/h2>\n<p>For cyberattackers looking to steal data, servers are an easy target since they\u2019re not too closely monitored and contain a lot of data. Unsurprisingly, in addition to massively exploiting popular server-side apps with attacks like <a href=\"https:\/\/securelist.com\/cve-2022-41040-and-cve-2022-41082-zero-days-in-ms-exchange\/108364\/\" target=\"_blank\" rel=\"nofollow noopener\">ProxyShell or ProxyNotShell<\/a>, hackers take paths less traveled by mastering encryption of <a href=\"https:\/\/www.kaspersky.com\/blog\/linux-vmware-esxi-ransomware-attacks\/47988\/\" target=\"_blank\" rel=\"nofollow noopener\">ESXi farms<\/a> and <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/clop-ransomware-flaw-allowed-linux-victims-to-recover-files-for-months\/\" target=\"_blank\" rel=\"nofollow noopener\">Oracle databases<\/a>, or trying services like MOVEit Transfer, which are popular in the corporate world but less known to the general public. This is why security teams need to put the focus on servers:<\/p>\n<ul>\n<li>prioritize server patching<\/li>\n<li>use an <a href=\"https:\/\/www.kaspersky.co.za\/enterprise-security\/endpoint-detection-response-edr?icid=en-za_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">EDR solution<\/a><\/li>\n<li>limit privilege access<\/li>\n<li>secure containers, <a href=\"https:\/\/www.kaspersky.co.za\/enterprise-security\/cloud-security?icid=en-za_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">virtual machines<\/a> and so on<\/li>\n<\/ul>\n<h2>If an app seems to have few vulnerabilities, it means no one\u2019s looked for them<\/h2>\n<p>The question of priorities always comes up when an organization starts discussing patches. Vulnerabilities number in the hundreds, and they\u2019re impossible to fix everywhere and all at once, in all applications, and on all computers. So, system admins have to focus on the most dangerous vulnerabilities \u2013 or the ones that are the most widespread due to affecting popular software. The MOVEit story teaches us that this landscape is dynamic: if you\u2019ve spent the last year fixing holes in Exchange or other Microsoft products, it doesn\u2019t mean you need to stay focused mostly on those. It\u2019s critical to follow <a href=\"https:\/\/www.kaspersky.co.za\/enterprise-security\/threat-intelligence?icid=en-za_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Threat Intelligence<\/a> trends, and not just eliminate specific new threats but also predict their possible impact on your organization.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"mdr\" value=\"30710\">\n","protected":false},"excerpt":{"rendered":"<p>What the MOVEit Transfer hack can teach non-users. <\/p>\n","protected":false},"author":2722,"featured_media":31888,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3020],"tags":[3628,562,3653,420,131,3455],"class_list":{"0":"post-31887","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-esxi","10":"tag-linux","11":"tag-mft","12":"tag-ransomware","13":"tag-tips","14":"tag-vmware"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/moveit-transfer-attack-protection\/31887\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/moveit-transfer-attack-protection\/25895\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/moveit-transfer-attack-protection\/21334\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/moveit-transfer-attack-protection\/28593\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/moveit-transfer-attack-protection\/26233\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/moveit-transfer-attack-protection\/26526\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/moveit-transfer-attack-protection\/29004\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/moveit-transfer-attack-protection\/35705\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/moveit-transfer-attack-protection\/48598\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/moveit-transfer-attack-protection\/20842\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/moveit-transfer-attack-protection\/21544\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/moveit-transfer-attack-protection\/30327\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/moveit-transfer-attack-protection\/26499\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/moveit-transfer-attack-protection\/32203\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/ransomware\/","name":"Ransomware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/31887","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=31887"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/31887\/revisions"}],"predecessor-version":[{"id":31890,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/31887\/revisions\/31890"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/31888"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=31887"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=31887"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=31887"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}