wp-plugin-hostgator
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114ol-scrapes
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114Source:https:\/\/techcrunch.com\/2023\/06\/29\/millions-affected-moveit-mass-hacks\/<\/a><\/br> Hackers have compromised the personal data of more than 15.5 million individuals by exploiting a security vulnerability in the MOVEit file transfer tool, and the number of victim organizations continues to grow.<\/p>\n There are more than 140 known victims of Clop ransomware attacks<\/a> targeting a vulnerability in MOVEit Transfer, an enterprise file transfer tool developed by Progress Software.\u00a0Brett Callow, a ransomware expert and threat analyst at Emsisoft, tells TechCrunch that while only 10 of these victims have so far confirmed the number of people affected, the number already exceeds more than 15.5 million individuals.<\/p>\n This includes approximately 3.5 million<\/a> Oregon driver\u2019s license holders; roughly 6 million <\/a>Louisiana residents; some 770,000 members<\/a> of the California Public Employees\u2019 Retirement System; between 2.5 and 2.7 million<\/a> Genworth Finance clients; approximately 1.5 million customers<\/a> of insurance provider Wilton Reassurance; more than 170,000 beneficiaries of the Tennessee Consolidated Retirement System; and more than half a million<\/a> Talcott Resolution customers.<\/p>\n Callow tells TechCrunch that the mass-hacks include U.S. educational nonprofit National Student Clearinghouse, which could be a \u201cpotentially significant\u201d breach in terms of numbers. The organization, which began notifying schools<\/a> of the data breach, works with 3,600 colleges and universities and 22,000 high schools.<\/p>\n Callow noted that at least seven of the known MOVEit victims are U.S. universities, and 16 are U.S. public sector organizations.<\/p>\n This includes the U.S. Department of Health and Human Services (HHS), according to Bloomberg<\/a>, which reported Wednesday that officials notified Congress of an incident involving the exposure of more than 100,000 individuals. HHS did not respond to TechCrunch\u2019s questions and has not yet been added to Clop\u2019s dark web leak site.<\/p>\n The U.S. Cybersecurity and Infrastructure Security Agency previously told TechCrunch that \u201cseveral\u201d U.S. government agencies had experienced intrusions related to the exploitation of the MOVEit transfer flaw, and a spokesperson for the Department of Energy confirmed that this included two DOE entities.<\/p>\n It\u2019s not just government departments that have been targeted.<\/p>\n Clop, which claimed responsibility for the widespread attacks, has added tens of new victims to its leak site this week alone, including banks, consultancy and legal companies, and energy giants.<\/p>\n Siemens Energy spokesperson Claudia Nehring confirmed to TechCrunch that the company is among the targets of the MOVEit attacks. \u201cBased on the current analysis no critical data has been compromised and our operations have not been affected. We took immediate action when we learned about the incident,\u201d Nehring added.<\/p>\n The University of California\u2013Los Angeles (UCLA), which used MOVEit Transfer to transfer files across campus and to other entities, is also among Clop\u2019s newly listed victims. UCLA spokesperson Margery Grey told TechCrunch that the university \u201cnotified the FBI and worked with external cybersecurity experts to investigate the matter\u201d and has notified those who have been impacted. UCLA declined to say how many individuals have been affected.<\/p>\n None of the other victims listed by Clop have yet responded to TechCrunch\u2019s requests for comment.<\/p>\n The exact number of impacted organizations, and subsequently breached individuals, remains unknown. In a post on its leak site, Clop claims to have compromised \u201chundreds\u201d of organizations, which means that more victims are likely to come to light in the coming days and weeks.<\/p>\n In light of this latest wave of mass attacks, U.S. State Department earlier this month offered a $10 million bounty for information on the Clop ransomware group, a Russia-linked gang that was also responsible for previous mass-attacks exploiting flaws in Fortra\u2019s GoAnywhere file transfer tool<\/a> and Accellion\u2019s file transfer application<\/a>.<\/p>\n Do you work at an organization that\u2019s affected? Do you have more information you can share? You can contact Carly Page securely on Signal at +441536 853968 and by email<\/a>. You can also share tips and documents with TechCrunch via\u00a0SecureDrop<\/a>.<\/em><\/p>\n<\/p><\/div>\n <\/br><\/br><\/br><\/p>\n
\nMillions affected by MOVEit mass-hacks as list of casualties continues to grow<\/br>
\n2023-06-29 21:49:41<\/br><\/p>\n
\n