By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Notification
Latest News
OpenAI may use Associated Press archive for AI training
July 14, 2023
EU users can hold conversations with Google Bard from training set
July 14, 2023
Aptos, the new default font for Microsoft Office
July 14, 2023
BlackLotus UEFI bootkit sources published on GitHub
July 14, 2023
Hackers from the XDSpy cyber-espionage group attacked Russian organizations on behalf of the Ministry of Emergency Situations
July 14, 2023
Aa
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Reading: 0-day vulnerability in MOVEit Transfer is used to steal data
Share
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Aa
Search
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Follow US
Security Parrot - Cyber Security News, Insights and Reviews > News > 0-day vulnerability in MOVEit Transfer is used to steal data
News

0-day vulnerability in MOVEit Transfer is used to steal data

Last updated: 2023/06/05 at 8:44 AM
Security Parrot Editorial Team Published June 5, 2023
Share
SHARE

Critical Vulnerability CVE-2023-34362 in MOVEit Transfer Widely Used by Hackers to Steal Data

Overview of MOVEit Transfer

MOVEit Transfer is a file transfer solution developed by Ipswitch, a subsidiary of the American Progress Software Corporation. The product allows companies to securely exchange files with partners and customers using SFTP, SCP and HTTP. MOVEit Transfer is offered as a customer-managed on-premises solution and a developer-managed SaaS cloud platform.

Critical Vulnerability CVE-2023-34362

At the end of last week, Progress Software developers warned about the discovery of a critical vulnerability in MOVEit Transfer. According to them, exploitation of this vulnerability could lead to privilege escalation and give third parties unauthorized access to the MOVEit Transfer environment. Vulnerabilities affect all versions of MOVEit Transfer.
As a workaround, all clients are advised to block external traffic on ports 80 and 443 on the MOVEit Transfer server as soon as possible. At the same time, the developers warned that blocking these ports would prohibit external access to the web interface, interfere with some aspects of automation, block the API, and prevent the Outlook MOVEit Transfer plugin from working.
You can use the C:\MOVEit Transfer\wwwroot\ folder as an indicator of compromise, which is worth checking for strange files, including backups or large downloads. This may indicate that the attackers have already stolen the data, or the theft is still taking place. Additionally, MOVEit Transfer admins have reported on Reddit that after being hacked, they find App_Web_.dll files with random names.
It is noted that the SFTP and FTP/s protocols can still be used to transfer files.

Rapid7’s Analysis of the Vulnerability

According to information security specialists from Rapid7, the vulnerability in MOVEit Transfer is a SQL injection that leads to a remote execution coding and received the identifier CVE-2023-34362. Experts write that more than 2500 MOVEit Transfer servers are available on the network, most of which are located in the USA.
Massive attacks on 0-day began on May 27 (and the first scans of the login pages were revealed by GreyNoise analysts on March 3), and now the same web shell human2.asp was found on all hacked servers, located in the public HTML folder c:\MOVEit Transfer\wwwroot\.
It appears to be capable of executing various commands, including:
• getting a list of saved files, the name of the user who uploaded the files, and the paths to the files;
• implement and remove a new MOVEit Transfer user with a random name and Health Check Service login, creating new MySQL sessions;
• Get information about an Azure Blob Storage account, including the AzureBlobStorageAccount, AzureBlobKey, and AzureBlobContainer settings;
• download files from the server.
According to Huntress, the following IP addresses are associated with the attacks:
• 138.197.152[.]201
• 209.97.137[.]33
• 5.252.191[.]0/24
• 148.113.1

Organizations at Risk of Data Theft Due to Critical Vulnerability in MOVEit Transfer

Organizations around the world are at risk of data theft due to a critical vulnerability in the file transfer management product MOVEit Transfer, developed by Progress Software. The vulnerability, identified as CVE-2023-34362, is a SQL injection that leads to a remote execution coding.
At the end of last week, Progress Software developers warned about the discovery of the critical vulnerability in MOVEit Transfer. According to them, exploitation of this vulnerability could lead to privilege escalation and give third parties unauthorized access to the MOVEit Transfer environment. Vulnerabilities affect all versions of MOVEit Transfer.
As a workaround, all clients are advised to block external traffic on ports 80 and 443 on the MOVEit Transfer server as soon as possible. At the same time, the developers warned that blocking these ports would prohibit external access to the web interface, interfere with some aspects of automation, block the API, and prevent the Outlook MOVEit Transfer plugin from working.

Indicators of Compromise

You can use the C:\MOVEit Transfer\wwwroot\ folder as an indicator of compromise, which is worth checking for strange files, including backups or large downloads. This may indicate that the attackers have already stolen the data, or the theft is still taking place. Additionally, MOVEit Transfer admins have reported on Reddit that after being hacked, they find App_Web_.dll files with random names.

IP Addresses Associated with the Attacks

According to Huntress, the following IP addresses are associated with the attacks:
• 138.197.152[.]201
• 209.97.137[.]33
• 5.252.191[.]0/24
• 148.113.1

Conclusion

Organizations around the world are at risk of data theft due to a critical vulnerability in the file transfer management product MOVEit Transfer, developed by Progress Software. The vulnerability, identified as CVE-2023-34362, is a SQL injection that leads to a remote execution coding. As a workaround, all clients are advised to block external traffic on ports 80 and 443 on the MOVEit Transfer server as soon as possible. Additionally, organizations should check the C:\MOVEit Transfer\wwwroot\ folder for strange files, including backups or large downloads, as well as monitor the IP addresses associated with the attacks.

Weekly Updates For Our Loyal Readers!

Security Parrot Editorial Team June 5, 2023
Share this Article
Facebook Twitter Email Copy Link Print

Archives

  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020

You Might Also Like

News

OpenAI may use Associated Press archive for AI training

July 14, 2023
News

EU users can hold conversations with Google Bard from training set

July 14, 2023
News

Aptos, the new default font for Microsoft Office

July 14, 2023
News

BlackLotus UEFI bootkit sources published on GitHub

July 14, 2023

© 2022 Parrot Media Network. All Rights Reserved.

  • Home
  • Parrot Media Group
  • Privacy Policy
  • Terms and Conditions
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Zero spam, Unsubscribe at any time.

Removed from reading list

Undo
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?