Cybercriminals may have known about the MOVEit Transfer zero-day since mid-2021

Managed file transfer (MFT) software is a crucial tool for organizations to securely transfer large or sensitive files. However, a recently patched zero-day vulnerability in MOVEit Transfer, a popular MFT software, has caused significant concerns among its users.

Widely exploited zero-day

CVE-2023-34362 is a zero-day vulnerability that affected MOVEit Transfer and was widely exploited from May 27, causing alarm bells to ring throughout the cybersecurity community. Although a patch was eventually released, the attackers managed to steal a significant amount of data by exploiting the vulnerability. The scope of the attack remains unclear, but it is believed that multiple organizations have been affected.

Early Exploitation

However, new evidence suggests that the attackers may have known about the vulnerability since at least mid-2021. Security researchers at risk and financial advisory services firm Kroll found significant evidence indicating that exploitation or testing of the vulnerability may have started much earlier than was believed.

Testing for access

Kroll discovered that testing of access to organizations occurred on a few occasions where the attackers appear to have automated the process. Activity consistent with MOVEit Transfer exploitation occurred on April 27th, May 15th-16th, and May 22nd, indicating that the actors were testing access to organizations. It is suspected that the testing was likely automated and involved extracting information from the MOVEit Transfer servers to identify which organizations were vulnerable.

Manual testing

In the attacks that occurred in July 2021, the attackers appeared to be conducting more manual testing based on the length of the activity. However, they seemed to have switched to automated tools in subsequent activity, which lasted only minutes or even seconds.

Cl0p ransomware group involvement

An analysis of the IP addresses involved in the previous attacks pointed to the Cl0p ransomware group as the probable source of the attacks. In a message posted on its website, the ransomware gang claimed to have exploited the MOVEit zero-day to steal files from “hundreds of companies”. The group instructed victims to get in touch by June 14 to prevent their data from being leaked.

Victims come forward

As the news of the zero-day vulnerability exploit spread, more victims have come forward. The Nova Scotia government has confirmed that it was among the affected organizations. In the UK, payroll company Zellis has also confirmed that its client data was stolen.

The significance of the findings

These findings highlight the significant planning and preparation that likely precedes mass exploitation events. Attackers invest time and effort in identifying potentially exploitable vulnerabilities in widely used software such as MOVEit Transfer. Even after the vulnerability has been patched, organizations still need to be vigilant, as attackers may still look for ways to exploit vulnerabilities in legacy systems.

To mitigate risks, organizations can continuously monitor their systems for any unusual activity, update their software regularly, and perform regular vulnerability assessments. It is also important to have incident response and business continuity plans in place in case of a security breach.

The recent MOVEit Transfer zero-day exploit underscores the criticality of vulnerability management and the impact that a single vulnerability can have on an organization. As cybercriminals continue to look for new ways to exploit vulnerabilities, cybersecurity teams must remain vigilant and proactive, regularly updating their systems and practices. By leveraging the correct tools, approaches, and mindset, organizations can create a comprehensive cybersecurity strategy that is effective against the latest cyber threats.

Explore more

Encrypted Cloud Storage – Review

The sheer volume of personal data entrusted to third-party cloud services has created a critical inflection point where privacy is no longer a feature but a fundamental necessity for digital security. Encrypted cloud storage represents a significant advancement in this sector, offering users a way to reclaim control over their information. This review will explore the evolution of the technology,

AI and Talent Shifts Will Redefine Work in 2026

The long-predicted future of work is no longer a distant forecast but the immediate reality, where the confluence of intelligent automation and profound shifts in talent dynamics has created an operational landscape unlike any before. The echoes of post-pandemic adjustments have faded, replaced by accelerated structural changes that are now deeply embedded in the modern enterprise. What was once experimental—remote

Trend Analysis: AI-Enhanced Hiring

The rapid proliferation of artificial intelligence has created an unprecedented paradox within talent acquisition, where sophisticated tools designed to find the perfect candidate are simultaneously being used by applicants to become that perfect candidate on paper. The era of “Work 4.0” has arrived, bringing with it a tidal wave of AI-driven tools for both recruiters and job seekers. This has

Can Automation Fix Insurance’s Payment Woes?

The lifeblood of any insurance brokerage flows through its payments, yet for decades, this critical system has been choked by outdated, manual processes that create friction and delay. As the industry grapples with ever-increasing transaction volumes and intricate financial webs, the question is no longer if technology can help, but how quickly it can be adopted to prevent operational collapse.

Trend Analysis: Data Center Energy Crisis

Every tap, swipe, and search query we make contributes to an invisible but colossal energy footprint, powered by a global network of data centers rapidly approaching an infrastructural breaking point. These facilities are the silent, humming backbone of the modern global economy, but their escalating demand for electrical power is creating the conditions for an impending energy crisis. The surge