Microsoft Links MOVEit Attack to Cl0p as British Airways, BBC Fall

  /     /     /  
Publicated : 23/11/2024   Category : security


Microsoft Links MOVEit Attack to Cl0p as British Airways, BBC Fall


Some billion-dollar organizations have already been identified as victims of the prolific ransomware groups latest exploit, amidst ongoing attacks.



As the names of the first known victims of
the MOVEit zero-day exploitation
started to roll in on June 4, Microsoft linked the campaign to
the Cl0p ransomware outfit
, which it calls Lace Tempest. That makes this merely the latest in a string of very similar cyberattacks against various file-transfer services by the gang.
Ever since June 1, when Progress Software
announced a zero-day vulnerability
in its MOVEit file transfer program, researchers and potentially affected organizations have been trying to pick up the pieces.
Analysis from Mandiant
suggested that hackers had begun exploiting the zero-day as early as the prior Saturday, May 27, while threat intelligence firm Greynoise
reported observing
scanning activity for the login page of MOVEit Transfer located at /human.aspx as early as March 3rd, 2023.
Only in the last 24 hours have some notable victims of this campaign begun coming to light. The government of Nova Scotia is
currently trying to gauge
how much of its citizens data has been stolen, and a breach at Zellis, a UK payroll company, has caused downstream compromises for some of its high-profile clients, including Boots,
the BBC
, and
British Airways
.
Where attribution is concerned, as of June 2, Mandiant had been treating the perpetrators as a potentially novel group, with potential links to
the FIN11 cybercrime gang
, known for its ransomware and extortion campaigns and status as a Clop affiliate. A
tweet published Sunday evening
by Microsoft offered a more definitive conclusion:
Microsoft is attributing attacks exploiting the
CVE-2023-34362
MOVEit Transfer 0-day vulnerability to Lace Tempest, known for ransomware operations & running the Clop extortion site. The threat actor has used similar vulnerabilities in the past to steal data & extort victims, the tweet read.
This threat actor is one that weve been following for years, Microsoft tells Dark Reading. Theyre a well-known group responsible for a significant number of threats over the years. Lace Tempest (overlaps w/ FIN11,
TA505
) is a dominant force in the ransomware and emerging extortion landscape.
For John Hammond, a senior security researcher for Huntress whos been
tracking the vulnerability this past week
, Microsofts attribution raises major concerns for victims. I dont know what will happen next. We havent seen any ransomware demands or extortion or blackmail yet. I dont know if were sitting in waiting, or what will come of it next, he wonders.
On June 2, Progress Software issued
a patch for CVE-2023-34362
. But with evidence to suggest that the attackers were already exploiting it as early as May 27, if not March 3, simply patching is not enough for existing customers to be considered safe.
For one thing, any data already stolen can and may be used in follow-on attacks. As Microsoft points out, there have been two kinds of victims of Lace Tempest. First are victims with an exploited server where a Web shell was dropped (and potentially interacted with to conduct reconnaissance). The second type are victims where Lace Tempest has stolen data. We anticipate their next move will be extortion of victims who have experienced data theft.
As a bare minimum, Hammond advises that customers not only patch, but also go through those logs, see what artifacts are there, see if you can remove any other hooks and claws. Even if you patch, go make sure that Web shell has been removed and deleted. Its a matter of due diligence here.
No amount of MOVEit cleanup will remedy a deeper, underlying problem that seems to be going around lately: Its clear that hacker groups have identified file transfer services as a goldmine for financial cybercrime. 
Just a few months back,
cybercriminals swarmed IBMs Aspera Faspex
. A month before that, Cl0p executed a campaign with striking similarity to last weeks effort, that time
against Fortras GoAnywhere service
. It wasnt even Cl0ps first foray into file transfer breaches —
years prior, they did the same to Accelion
.
Companies that traffic sensitive data with these services will need to find a longer-term solution to whats turning out to be an endemic problem. Exactly what that longer-term solution will be, though, is unclear.
Hammond recommends to try to limit your attack surface. Whatever we can do to reduce software that we either dont need, or applications that could be handled in a better, more modern way. Those, I think, are maybe the best words of advice at the moment other than: patch.

Last News

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Microsoft Links MOVEit Attack to Cl0p as British Airways, BBC Fall