Rising Cyber Threats: Uncovering the Third MOVEit Transfer Vulnerability and Cl0p Gang’s Extortion Methods

The recent disclosure of a new vulnerability impacting Progress Software’s MOVEit Transfer application has highlighted the critical need for robust security measures and timely patching. The revelation comes at a time when the Clop ransomware gang has been exploiting multiple vulnerabilities in the software to target a wide range of organizations, including US federal agencies.

In this article, we will examine the details of the newly disclosed vulnerability and its potential impact, as well as the previous vulnerabilities exploited by the Clop ransomware gang. Additionally, we will look at statistics on the industry and location of exposed hosts running MOVEit and analyze the prevalence of different types of malware, including ransomware.

Progress Software’s Third Vulnerability Disclosure

Progress Software recently disclosed a third vulnerability impacting its MOVEit Transfer application. This time, the vulnerability is an SQL injection vulnerability that “could lead to escalated privileges and potential unauthorized access to the environment.”

The company has urged customers to disable all HTTP and HTTPS traffic to MOVEit Transfer on ports 80 and 443 to safeguard their environments while a patch is being prepared. The urgency of this recommendation is compounded by the fact that the Clop ransomware gang has already been exploiting vulnerabilities in the software.

Details of the new SQL injection vulnerability and potential impact

The new SQL injection vulnerability could have serious consequences for affected organizations. SQL injection attacks are among the most common and damaging types of attacks. They can lead to data breaches, data loss, and even system takeover.

The vulnerability was discovered by security professionals who were assessing the software for potential weaknesses. They found that it was possible to inject SQL queries into the application’s database, which could lead to privileged access to the environment. If exploited, this vulnerability could allow an attacker to take over the system, access sensitive data, and cause significant damage to the targeted organization.

Previously discovered vulnerabilities were exploited by the Clop ransomware gang

This latest vulnerability follows two previous SQL injection vulnerabilities that were disclosed by Progress Software in July 2021. These vulnerabilities were also exploited by the Clop ransomware gang, who used them to steal data from the customers of the software.

The Clop actors have listed the names of 27 companies that they claim were hacked using the MOVEit Transfer flaw on their darknet leak portal, including multiple US federal agencies. This highlights the critical need for timely patching and robust security measures to protect against such threats.

Statistics on the industry and location of exposed hosts running MOVEit

According to Censys, a web-based search platform for assessing the attack surface of internet-connected devices, nearly 31% of over 1,400 exposed hosts running MOVEit are in the financial services industry. This suggests that attackers are targeting organizations with high-value data and assets.

Additionally, nearly 80% of the servers running MOVEit are based in the US, according to Censys. This further underscores the urgency of taking steps to secure the software against attacks.

Analysis of ransomware attacks compared to other types of malware

According to a recent analysis by Kaspersky, ransomware leads with a 58% share, followed by information stealers (24%), and botnets, loaders, and backdoors (18%). This highlights the growing risk of ransomware attacks and emphasizes the need for organizations to adopt robust security measures to protect against them.

Increased Accessibility of MaaS Schemes for Attackers

One factor that is contributing to the rise of ransomware attacks is the increasing accessibility of malware-as-a-service (MaaS) schemes. MaaS allows less technically proficient attackers to enter the fray, thereby lowering the bar for carrying out such attacks.

The revelation of a new vulnerability in Progress Software’s MOVEit Transfer application underscores the need for timely patching and adoption of robust security measures. With the Clop ransomware gang already exploiting previous vulnerabilities in the software, the risk of data breaches and system takeovers is high. Organizations should disable all HTTP and HTTPs traffic to MOVEit Transfer on ports 80 and 443 and implement additional security measures to protect against possible attacks.

Explore more

Three Core Traits of Highly Effective Modern Leaders

Ling-yi Tsai, a seasoned expert in HR technology and organizational psychology, has spent decades helping global firms navigate the intersection of human behavior and digital transformation. With a deep focus on HR analytics and talent management, she specializes in translating complex psychological principles into actionable leadership strategies that drive measurable results. Her work emphasizes that the most successful organizations are

How Did Zoom Use AI to Boost Customer Satisfaction to 80%?

When the world shifted to a screen-first existence, a simple video call became the lifeline of global commerce, education, and human connection, yet the massive surge in users nearly broke the engines of support that kept it running. While most tech giants watched their customer satisfaction scores plummet under the weight of unprecedented demand, Zoom executed a rare maneuver, lifting

How is Customer Experience Evolving in 2026?

Today, Customer Experience (CX) functions as the definitive business capability that dictates market perception, revenue sustainability, and long-term loyalty. Organizations are no longer evaluated solely on what they sell, but on how they make the customer feel throughout the entire lifecycle of their relationship. This fundamental shift has moved CX from the periphery of customer support to the very core

How HR Teams Can Combat Rising Recruitment Fraud

Modern job seekers are navigating a digital minefield where sophisticated imposters use the prestige of established brands to execute complex financial and identity theft schemes. As hiring surges become more frequent, these deceptive actors exploit the enthusiasm of candidates by offering flexible work and accelerated timelines that seem too good to be true. This phenomenon does not merely threaten individuals;

Trend Analysis: Skills-Based Hiring in Canada

The long-standing reliance on university degrees as a universal proxy for competence is rapidly losing its grip on the Canadian corporate landscape as organizations prioritize what people can actually do over where they studied. This shift signals the definitive end of the degree era, a period where formal credentials served as a convenient but often flawed filter for talent acquisition.