Cybercriminals may have known about the MOVEit Transfer zero-day since mid-2021

Managed file transfer (MFT) software is a crucial tool for organizations to securely transfer large or sensitive files. However, a recently patched zero-day vulnerability in MOVEit Transfer, a popular MFT software, has caused significant concerns among its users.

Widely exploited zero-day

CVE-2023-34362 is a zero-day vulnerability that affected MOVEit Transfer and was widely exploited from May 27, causing alarm bells to ring throughout the cybersecurity community. Although a patch was eventually released, the attackers managed to steal a significant amount of data by exploiting the vulnerability. The scope of the attack remains unclear, but it is believed that multiple organizations have been affected.

Early Exploitation

However, new evidence suggests that the attackers may have known about the vulnerability since at least mid-2021. Security researchers at risk and financial advisory services firm Kroll found significant evidence indicating that exploitation or testing of the vulnerability may have started much earlier than was believed.

Testing for access

Kroll discovered that testing of access to organizations occurred on a few occasions where the attackers appear to have automated the process. Activity consistent with MOVEit Transfer exploitation occurred on April 27th, May 15th-16th, and May 22nd, indicating that the actors were testing access to organizations. It is suspected that the testing was likely automated and involved extracting information from the MOVEit Transfer servers to identify which organizations were vulnerable.

Manual testing

In the attacks that occurred in July 2021, the attackers appeared to be conducting more manual testing based on the length of the activity. However, they seemed to have switched to automated tools in subsequent activity, which lasted only minutes or even seconds.

Cl0p ransomware group involvement

An analysis of the IP addresses involved in the previous attacks pointed to the Cl0p ransomware group as the probable source of the attacks. In a message posted on its website, the ransomware gang claimed to have exploited the MOVEit zero-day to steal files from “hundreds of companies”. The group instructed victims to get in touch by June 14 to prevent their data from being leaked.

Victims come forward

As the news of the zero-day vulnerability exploit spread, more victims have come forward. The Nova Scotia government has confirmed that it was among the affected organizations. In the UK, payroll company Zellis has also confirmed that its client data was stolen.

The significance of the findings

These findings highlight the significant planning and preparation that likely precedes mass exploitation events. Attackers invest time and effort in identifying potentially exploitable vulnerabilities in widely used software such as MOVEit Transfer. Even after the vulnerability has been patched, organizations still need to be vigilant, as attackers may still look for ways to exploit vulnerabilities in legacy systems.

To mitigate risks, organizations can continuously monitor their systems for any unusual activity, update their software regularly, and perform regular vulnerability assessments. It is also important to have incident response and business continuity plans in place in case of a security breach.

The recent MOVEit Transfer zero-day exploit underscores the criticality of vulnerability management and the impact that a single vulnerability can have on an organization. As cybercriminals continue to look for new ways to exploit vulnerabilities, cybersecurity teams must remain vigilant and proactive, regularly updating their systems and practices. By leveraging the correct tools, approaches, and mindset, organizations can create a comprehensive cybersecurity strategy that is effective against the latest cyber threats.

Explore more

Can You Spot a Deepfake During a Job Interview?

The Ghost in the Machine: When Your Top Candidate Is a Digital Mask The screen displays a perfectly polished professional who answers every complex technical question with surgical precision, yet a subtle, unnatural flicker near the jawline suggests something is deeply wrong. This unsettling scenario became reality at Pindrop Security during an interview with a candidate named “Ivan,” whose digital

Data Science vs. Artificial Intelligence: Choosing Your Path

The modern job market operates within a high-stakes environment where digital transformation has accelerated to a point that leaves even seasoned professionals questioning their specialized trajectory. Job boards are currently flooded with titles that seem to shift shape by the hour, creating a confusing landscape for those entering the technology sector. One listing calls for a data scientist with deep

How AI Is Transforming Global Hiring for HR Professionals?

The landscape of international recruitment has undergone a staggering metamorphosis that effectively erased the traditional borders once separating regional labor markets from the global economy. Half a decade ago, establishing a presence in a foreign market required exhaustive legal frameworks, exorbitant capital investment, and months of administrative negotiations. Today, the operational reality is entirely different; even nascent organizations can engage

Who Is Winning the Agentic AI Race in DevOps?

The relentless pressure to deliver software at breakneck speeds has pushed traditional CI/CD pipelines to a breaking point where manual intervention is no longer a sustainable strategy for modern engineering teams. As organizations navigate the complexities of distributed cloud systems, the transition from rigid automation to fluid, autonomous operations has become the defining challenge for the current technological landscape. This

How Email Verification Protects Your Sender Reputation?

Maintaining a flawless digital communication channel requires more than just compelling copy; it demands a rigorous defense against the invisible erosion of subscriber data that threatens every modern marketing department. Verification acts as a critical shield for the digital infrastructure of an organization, ensuring that marketing efforts actually reach the intended recipients instead of vanishing into the ether. This process