Multiple cyber hacking incidents have occurred by exploiting SQL injection vulnerabilities in Progress Software's MOVEit file transfer application, enabling hackers to access the server database. MOVEit is software designed to move sensitive files securely and is popular around the world.
There are likely to have been hundreds of organizations affected worldwide, with about 50 confirming the hack either directly or indirectly. Organizations affected include the BBC, British Airways, U.S.-based financial services firms, global cloud computing provider Extreme Networks, and others. In the coming days, many more MOVEit breach victims are expected to be identified.
According to the FBI and CISA (Cybersecurity and Infrastructure Security Agency) warnings last week, the CL0P ransomware gang, also known as Clop, exploited previously unknown MOVEIt vulnerabilities. A Reuters journalist and Bleeping Computer reporter were reportedly contacted Monday by representatives of the CL0P ransomware gang taking credit for the attacks. CL0P announced on Tuesday that it had exploited the MOVEit flaw to steal information from at least 47 organizations before demanding payment to prevent them from being published online in a rapid hacking spree.
In the past, CL0P has demanded ransoms of up to millions of dollars. However, law enforcement agencies worldwide strongly advise organizations against paying them because it only further encourages criminals. It was reported on Wednesday that CL0P began posting the names of organizations on its darknet website. As of Thursday, there was still no conclusion to the incident as it was revealed that several U.S. government agencies, including the Department of Energy, had been affected. However, CISA has not provided specific information regarding which agencies were compromised.
The situation is still unfolding, and there's much we don't know. This includes which organizations have been affected and if sensitive data will actually be leaked by hackers. It's likely that your organization doesn't yet fully understand if they have been affected directly or indirectly through its vendors. What we do know, however, is that a passive "wait and see" approach is not very wise.
These days, cyber and ransomware attacks are more common than ever. It's always a matter of when, not if your organization will be affected by a cyberattack. In these situations, effective third-party risk management systems and routines can help you minimize fire drills.
For example, comprehensive and up-to-date vendor inventories should include current contact data, as well as product or service information. Having that information at your fingertips will make it much easier to issue urgent communications or requests to your vendors in situations such as the MOVEit breach.
If your vendor due diligence documentation is current and well organized, you can quickly narrow your requests for any additional vendor information that might be needed. This will be incredibly beneficial when you discover a need for off-cycle due diligence due to a cyberattack or another serious issue.
While the MOVEit breach reminds us that there is never any shortage of urgent issues to address, having the right third-party risk management practices in place can help your organization respond to them in an effective and timely way.