Rising Cyber Threats: Uncovering the Third MOVEit Transfer Vulnerability and Cl0p Gang’s Extortion Methods

The recent disclosure of a new vulnerability impacting Progress Software’s MOVEit Transfer application has highlighted the critical need for robust security measures and timely patching. The revelation comes at a time when the Clop ransomware gang has been exploiting multiple vulnerabilities in the software to target a wide range of organizations, including US federal agencies.

In this article, we will examine the details of the newly disclosed vulnerability and its potential impact, as well as the previous vulnerabilities exploited by the Clop ransomware gang. Additionally, we will look at statistics on the industry and location of exposed hosts running MOVEit and analyze the prevalence of different types of malware, including ransomware.

Progress Software’s Third Vulnerability Disclosure

Progress Software recently disclosed a third vulnerability impacting its MOVEit Transfer application. This time, the vulnerability is an SQL injection vulnerability that “could lead to escalated privileges and potential unauthorized access to the environment.”

The company has urged customers to disable all HTTP and HTTPS traffic to MOVEit Transfer on ports 80 and 443 to safeguard their environments while a patch is being prepared. The urgency of this recommendation is compounded by the fact that the Clop ransomware gang has already been exploiting vulnerabilities in the software.

Details of the new SQL injection vulnerability and potential impact

The new SQL injection vulnerability could have serious consequences for affected organizations. SQL injection attacks are among the most common and damaging types of attacks. They can lead to data breaches, data loss, and even system takeover.

The vulnerability was discovered by security professionals who were assessing the software for potential weaknesses. They found that it was possible to inject SQL queries into the application’s database, which could lead to privileged access to the environment. If exploited, this vulnerability could allow an attacker to take over the system, access sensitive data, and cause significant damage to the targeted organization.

Previously discovered vulnerabilities were exploited by the Clop ransomware gang

This latest vulnerability follows two previous SQL injection vulnerabilities that were disclosed by Progress Software in July 2021. These vulnerabilities were also exploited by the Clop ransomware gang, who used them to steal data from the customers of the software.

The Clop actors have listed the names of 27 companies that they claim were hacked using the MOVEit Transfer flaw on their darknet leak portal, including multiple US federal agencies. This highlights the critical need for timely patching and robust security measures to protect against such threats.

Statistics on the industry and location of exposed hosts running MOVEit

According to Censys, a web-based search platform for assessing the attack surface of internet-connected devices, nearly 31% of over 1,400 exposed hosts running MOVEit are in the financial services industry. This suggests that attackers are targeting organizations with high-value data and assets.

Additionally, nearly 80% of the servers running MOVEit are based in the US, according to Censys. This further underscores the urgency of taking steps to secure the software against attacks.

Analysis of ransomware attacks compared to other types of malware

According to a recent analysis by Kaspersky, ransomware leads with a 58% share, followed by information stealers (24%), and botnets, loaders, and backdoors (18%). This highlights the growing risk of ransomware attacks and emphasizes the need for organizations to adopt robust security measures to protect against them.

Increased Accessibility of MaaS Schemes for Attackers

One factor that is contributing to the rise of ransomware attacks is the increasing accessibility of malware-as-a-service (MaaS) schemes. MaaS allows less technically proficient attackers to enter the fray, thereby lowering the bar for carrying out such attacks.

The revelation of a new vulnerability in Progress Software’s MOVEit Transfer application underscores the need for timely patching and adoption of robust security measures. With the Clop ransomware gang already exploiting previous vulnerabilities in the software, the risk of data breaches and system takeovers is high. Organizations should disable all HTTP and HTTPs traffic to MOVEit Transfer on ports 80 and 443 and implement additional security measures to protect against possible attacks.

Explore more

Effective Email Automation Strategies Drive Business Growth

The digital landscape is currently witnessing a silent revolution where the most successful marketing teams have stopped competing for attention through volume and started winning through surgical precision. While many organizations continue to struggle with the exhausting cycle of manual campaign creation, a sophisticated subset of the market has mastered the art of “set it and forget it” revenue generation.

How Can Modern Email Marketing Drive Exceptional ROI?

Every second, millions of digital messages flood into global inboxes, yet only a tiny fraction of these communications actually manage to convert a passive reader into a loyal, high-value customer. While the average marketer often points to a return of thirty-six dollars for every dollar spent as a benchmark of success, this figure represents a mere starting point for organizations

Modern Tactics Drive High-Performance Email Marketing

The sheer volume of digital correspondence flooding the modern consumer’s primary inbox has reached a point where generic messaging is no longer merely ignored but actively penalized by sophisticated filtering algorithms. As the global email ecosystem navigates a staggering daily volume of nearly 400 billion messages, the traditional “spray and pray” methodology has transformed from a sub-optimal tactic into a

How Will AI-Native 6G Networks Change Global Connectivity?

Global telecommunications are currently undergoing a profound metamorphosis that transcends simple speed upgrades, aiming instead to weave an intelligent fabric directly into the world’s physical reality. While the transition from 4G to 5G was defined by raw speed and reduced latency, the move toward 6G represents a fundamental departure from traditional telecommunications. The industry is moving toward a reality where

How Is AI Redefining the Future of 6G and Telecom Security?

The sheer velocity of data surging through modern global telecommunications has already pushed traditional human-centric management systems toward a breaking point that demands a complete architectural overhaul. While the industry previously celebrated the arrival of high-speed mobile broadband, the current shift represents a fundamental departure from hardware-heavy engineering toward a software-defined, intelligent ecosystem. This evolution marks a pivotal moment where