Progress Software has issued a warning to its customers about critical SQL injection vulnerabilities discovered in its MOVEit Transfer managed file transfer solution. These vulnerabilities, identified with the assistance of cybersecurity firm Huntress, enable attackers to exploit Internet-exposed servers and steal or modify customer information.
Furthermore, Progress has released a patch to address the vulnerabilities and urges all MOVEit Transfer users to apply it immediately. While no evidence of exploitation has been found thus far, the Clop ransomware gang has claimed responsibility for targeting the previously exploited flaw and conducting data theft attacks affecting multiple companies.
The Clop ransomware group has admitted to targeting the CVE-2023-34362 MOVEit Transfer zero-day vulnerability, leading to data theft attacks against numerous organizations. This admission aligns with Microsoft’s findings, linking the campaign to the hacking group it tracks as Lace Tempest, which has connections to TA505 and FIN11 activity.
At the same time, Kroll security experts have also discovered evidence of Clop’s attempts to exploit the MOVEit zero-day since 2021, as well as methods to extract data from compromised MOVEit servers since at least April 2022.
Clop has a history of orchestrating data theft campaigns and exploiting vulnerabilities in various managed file transfer platforms. Prior exploits include the Accellion FTA server breach in December 2020, the SolarWinds Serv-U Managed File Transfer attacks in 2021, and the widespread exploitation of a GoAnywhere MFT zero-day in January 2023.
Affected organizations are gradually revealing data breaches and security incidents following the disclosure of Clop’s MOVEit data theft attacks. Zellis, a UK-based provider of payroll and HR solutions, confirmed being impacted by these attacks, which may have consequences for its customers, including British Airways, Aer Lingus, and the Minnesota Department of Education.
Clop has intensified the situation by threatening affected organizations and urging them to engage in ransom negotiations to prevent the public release of their data.
Progress Software advises all MOVEit Transfer customers to apply the new patch released on June 9, 2023, and states that all MOVEit Cloud clusters have already been patched to safeguard against potential attacks. The investigation into these vulnerabilities is ongoing, and there are currently no indications of exploitation.