Title: MOVEit Transfer Vulnerability Exposes Data to Attackers – Patch Urgently Needed

Patch now!  Attackers leak data via MOVEit transfer vulnerability

Software provider warns of critical vulnerability in MOVEit Transfer

Companies using MOVEit Transfer are being warned to immediately install the latest security updates for their on-premises installations. Attackers are exploiting a security gap and gaining access to internal company data. The vulnerability is classified as “critical” and a CVE number has not yet been assigned.

Immediate action needed

According to the software’s developers, security updates have been released for all versions in support. Companies using unsupported versions should protect their systems by blocking HTTPS/HTTPS traffic on ports 80 and 443 immediately.

Cloud customers affected

The MOVEit Transfer SaaS platform is also affected, and the cloud version is vulnerable. The file transfer software provider has taken immediate steps to protect cloud platform customers.

The vulnerability explained

The developers report that it is a SQL vulnerability, and attackers can gain access to systems and files via a path that is not described in detail. Attackers can copy internal data and use it to blackmail companies. Admins should examine the path c:MOVEit Transferwwwroot for unexpected files like human2.aspx, which attackers use to set up a web shell for remote access. They should also be on the lookout for suspicious accounts.

Security researchers find thousands of exposed instances

Security researchers from Rapid7 have found approximately 2,500 instances that can be accessed via the internet. According to a security researcher, most of the attacks take place in the United States, and government agencies may also be affected.

In conclusion

Companies that use MOVEit Transfer should take the necessary steps to mitigate the risks associated with this vulnerability. Admins should immediately install the latest security updates for on-premises installations and block traffic on ports 80 and 443 for unsupported versions. Cloud customers should contact the software provider to determine their level of exposure and the steps they should take to protect their systems.

Leave a Reply