wp-plugin-hostgator
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114ol-scrapes
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114Source:https:\/\/techcrunch.com\/2023\/06\/02\/hackers-launch-another-wave-of-mass-hacks-targeting-company-file-transfer-tools\/<\/a><\/br> Security researchers are sounding the alarm after hackers were caught exploiting a newly discovered vulnerability in a popular file transfer tool used by thousands of organizations to launch a new wave of mass data exfiltration attacks.<\/span><\/p>\n The vulnerability affects the MOVEit Transfer managed file transfer (MFT) software developed by Ipswitch, a subsidiary of U.S.-based Progress Software, which allows organizations to share large files and datasets over the internet. Progress confirmed<\/a> on Wednesday that it had discovered a vulnerability in MOVEit Transfer that \u201ccould lead to escalated privileges and potential unauthorized access to the environment,\u201d and urged users to disable internet traffic to their MOVEit Transfer environment.\u00a0<\/span><\/p>\n Patches are available and Progress is urging all customers to apply it urgently<\/a>. <\/span><\/p>\n U.S. cybersecurity agency CISA is also urging<\/a> U.S. organizations to follow Progress\u2019 mitigation steps, apply the necessary updates and hunt for any malicious activity.<\/span><\/p>\n Corporate file-transfer tools have become an increasingly attractive target for hackers, as finding a vulnerability in a popular enterprise system can allow the theft of data from multiple victims.<\/p>\n Jocelyn VerVelde, a spokesperson for Progress via an outside public relations agency, declined to say how many organizations use the affected file transfer tool, though the company\u2019s website states that the software is used by \u201cthousands of organizations around the world.\u201d <\/span>Shodan, \u200b\u200ba search engine for publicly exposed devices and databases, reveals more than 2,500 MOVEit Transfer servers discoverable on the internet, most of which are located in the United States, as well as the <\/span>U.K., Germany, the Netherlands and Canada.\u00a0<\/span><\/p>\n The vulnerability also impacts customers who rely on the MOVEit Transfer cloud platform, <\/span>according to security researcher Kevin Beaumont<\/a>. <\/span>At least one exposed instance is connected to the U.S. Department of Homeland Security and several \u201cbig banks\u201d are also believed to be MOVEIt customers also to be affected, according to Beaumont.<\/span><\/p>\n Several security companies say they have already observed evidence of exploitation.<\/p>\n Mandiant said it is investigating \u201cseveral intrusions\u201d related to the exploitation of the MOVEit vulnerability. Mandiant chief technology officer Charles Carmakal confirmed that Mandiant had \u201cseen evidence of data exfiltration at multiple victims.\u201d<\/span><\/p>\n Cybersecurity startup Huntress said in a blog post<\/a> that one of its customers has seen \u201ca full attack chain and all the matching indicators of compromise.\u201d<\/p>\n Security research firm Rapid7, meanwhile, confirmed it had observed signs of exploitation and data theft from \u201cat least four separate incidents.\u201d <\/span>Caitlin Condon, senior manager of security research at Rapid7, said that the company has seen evidence that attackers may have begun automating exploitation.<\/span><\/p>\n While it\u2019s unclear exactly when exploitation began, threat intelligence startup GreyNoise said<\/a> it has observed scanning activity as early as March 3 and urges users to review systems for any indicators of unauthorized access that may have occurred within the past 90 days.<\/span><\/p>\n It\u2019s not known who is yet responsible for the mass exploitation of MOVEit servers.<\/p>\n Rapid7\u2019s Condon told TechCrunch that the attacker\u2019s behavior appears to be \u201copportunistic rather than targeted,\u201d adding that this \u201ccould be the work of a single threat actor throwing one exploit indiscriminately at exposed targets.\u201d<\/span><\/p>\n It\u2019s the latest effort by hackers and extortion groups to target enterprise file transfer systems in recent years.<\/p>\n In January, the Russia-linked Clop ransomware gang claimed responsibility for the mass exploitation of a vulnerability in Fortra\u2019s GoAnywhere managed file transfer software. More than 130 organizations using GoAnywhere were targeted, including Florida-based healthcare company <\/span>NationBenefits<\/span><\/a>, virtual therapy provider <\/span>Brightline<\/span><\/a>\u00a0and the City of Toronto<\/a>.<\/span><\/p>\n Clop was also behind another widespread attack on another popular file transfer tool in 2021. The gang breached Accellion\u2019s file-sharing tool to launch attacks against a number of organizations, including <\/span>Morgan Stanley<\/span><\/a>, the University of California, grocery giant Kroger and law firm Jones Day.<\/span><\/p>\n<\/p><\/div>\n <\/br><\/br><\/br><\/p>\n
\nHackers launch another wave of mass-hacks targeting company file transfer tools<\/br>
\n2023-06-02 21:57:15<\/br><\/p>\n