www.techrepublic.com Open in urlscan Pro
2a04:4e42:400::347  Public Scan

Submitted URL: https://em.mend.io/NDM5LURGRi03MDQAAAGMWTAE_kisDXvgT2LvXenHNqDVD4E7Wvr9FfyE6Q9BSyE2mIvtpdpm5zvMiB-KoBmB_Uxe5yI=
Effective URL: https://www.techrepublic.com/article/zero-day-moveit-vulnerability/?mkt_tok=NDM5LURGRi03MDQAAAGMWTAE_mXSeWxh_c_YWX0pqN_q1MD8y...
Submission: On June 14 via api from US — Scanned from DE

Form analysis 4 forms found in the DOM

/search/

<form action="/search/" class="search-bar">
  <label id="label-nav-site-search" for="nav-site-search"> Search </label>
  <input type="search" autocomplete="off" name="q" id="nav-site-search" value="" placeholder="What are you looking for?" required="">
  <button type="submit" disabled="disabled">
    <svg role="img" aria-labelledby="label-nav-site-search">
      <use href="#smart-search-icon"></use>
    </svg>
  </button>
  <input type="hidden" name="o" value="1"><!-- Default to search by relevance -->
</form>

POST

<form class="share-email-form" method="post">
  <input type="hidden" name="share-email-title" value="Zero-day MOVEit Transfer vulnerability exploited in the wild, heavily targeting North America">
  <input type="hidden" name="share-email-url" value="https://www.techrepublic.com/article/zero-day-moveit-vulnerability/">
  <input type="email" name="from-email" class="read-write" placeholder="Your Email" required="">
  <input type="email" name="to-email" class="read-write" placeholder="Recipient Email" required="">
  <textarea name="msg" class="readonly">Check out this article I found on TechRepublic.</textarea>
  <input type="submit" value="Submit">
  <p class="response-msg">Your email has been sent</p>
</form>

POST

<form class="share-email-form" method="post">
  <input type="hidden" name="share-email-title" value="Zero-day MOVEit Transfer vulnerability exploited in the wild, heavily targeting North America">
  <input type="hidden" name="share-email-url" value="https://www.techrepublic.com/article/zero-day-moveit-vulnerability/">
  <input type="email" name="from-email" class="read-write" placeholder="Your Email" required="">
  <input type="email" name="to-email" class="read-write" placeholder="Recipient Email" required="">
  <textarea name="msg" class="readonly">Check out this article I found on TechRepublic.</textarea>
  <input type="submit" value="Submit">
  <p class="response-msg">Your email has been sent</p>
</form>

POST

<form class="email-author-form" method="post">
  <input type="hidden" name="author_id" value="37114928">
  <input type="text" name="from-name" class="read-write" placeholder="Your Name" required="">
  <input type="email" name="from-email" class="read-write" placeholder="Your Email" required="">
  <input type="text" name="subject" class="read-write" placeholder="Subject" required="">
  <textarea name="msg" placeholder="Message" required="" class="read-write"></textarea>
  <input type="submit" value="Send Message">
  <p class="response-msg">Your message has been sent</p>
</form>

Text Content

WE VALUE YOUR PRIVACY

We and our partners store and/or access information on a device, such as cookies
and process personal data, such as unique identifiers and standard information
sent by a device for personalised ads and content, ad and content measurement,
and audience insights, as well as to develop and improve products. With your
permission we and our partners may use precise geolocation data and
identification through device scanning. You may click to consent to our and our
partners’ processing as described above. Alternatively you may access more
detailed information and change your preferences before consenting or to refuse
consenting. Please note that some processing of your personal data may not
require your consent, but you have a right to object to such processing. Your
preferences will apply to this website only. You can change your preferences at
any time by returning to this site or visit our privacy policy.
MORE OPTIONSAGREE
Skip to content



TECHREPUBLIC

Search Close
Search
 * Top Products Lists
 * AI
 * Developer
 * Payroll
 * Security
 * Project Management
 * TechRepublic Academy
 * Innovation
 * Cheat Sheets
 * Big Data
 * Tech Jobs

Toggle TechRepublic mobile menu More
 * TechRepublic Premium
 * Top Products Lists
 * AI
 * Developer
 * Payroll
 * Security
 * Project Management
 * TechRepublic Academy
 * Innovation
 * Cheat Sheets
 * Big Data
 * Tech Jobs
 * See All Topics

 * Sponsored
 * Newsletters
 * Forums
 * Resource Library

TechRepublic Premium
Join / Sign In


ACCOUNT INFORMATION

TechRepublic close modal
Shodan search engine results for internet-facing MOVEit instances. Image: Shodan


ZERO-DAY MOVEIT TRANSFER VULNERABILITY EXPLOITED IN THE WILD, HEAVILY TARGETING
NORTH AMERICA

   
 * 
   
 * 
 * 
 * 


 * ACCOUNT INFORMATION
   
   TechRepublic close modal
   
   
   SHARE WITH YOUR FRIENDS
   
   Zero-day MOVEit Transfer vulnerability exploited in the wild, heavily
   targeting North America
   
   Check out this article I found on TechRepublic.
   
   Your email has been sent

by Cedric Pernet in Security
on June 6, 2023, 8:48 AM EDT


ZERO-DAY MOVEIT TRANSFER VULNERABILITY EXPLOITED IN THE WILD, HEAVILY TARGETING
NORTH AMERICA

Read the technical details about this zero-day MoveIT vulnerability, find out
who is at risk, and learn how to detect and protect against this cybersecurity
threat.

Shodan search engine results for internet-facing MOVEit instances. Image: Shodan

The Cybersecurity & Infrastructure Security Agency has issued an alert about the
use of a zero-day vulnerability in MOVEit software. Exploitation of this
zero-day SQL injection vulnerability in the wild has been observed, mainly
targeting North America and including attacks from the ransomware threat actor
Lace Tempest.

MOVEit is managed file transfer software from Progress (formerly Ipswitch), an
application development and digital experience technologies provider. According
to the MOVEit site, the application is being used by thousands of organizations
around the world.

Jump to:

 * What is the zero-day MOVEit Transfer vulnerability?
 * Exploitation in the wild, particularly in North America
 * How to detect threat exploitation
 * How to mitigate this risk
 * Additional security best practices


WHAT IS THE ZERO-DAY MOVEIT TRANSFER VULNERABILITY?

This zero-day MOVEit Transfer vulnerability, as it was known to attackers before
being patched, is a SQL injection vulnerability, CVE-2023-34362. It affects all
versions of MOVEit Transfer according to its development company Progress; it
doesn’t affect MOVEit Automation, MOVEit Client, MOVEit Add-in for Microsoft
Outlook, MOVEit Mobile, WS_FTP Client, WS_FTP Server, MOVEit EZ, MOVEit Gateway,
MOVEit Analytics and MOVEit Freely.

This zero-day vulnerability allows an unauthenticated attacker to get access to
MOVEit Transfer’s database, possibly allowing the attacker to execute SQL
statements altering or deleting the database elements.

SEE: SQL injection attacks: What IT pros need to know (TechRepublic Premium)


EXPLOITATION IN THE WILD, PARTICULARLY IN NORTH AMERICA

A blog post from Rapid7 indicates this cybersecurity company has observed
exploitation of the CVE-2023-34362 zero-day vulnerability in the wild across
multiple customer environments. According to Rapid7, a wide range of
organizations have been affected.

The active exploitation of the vulnerability by cybercriminals started at least
four days prior to the release of the security advisory from Progress.

SEE: Zero-day exploits: What IT pros need to know (TechRepublic)

More than 2,500 MOVEit Transfer instances are exposed to the internet, with more
than 1,800 of those instances being in the U.S., according to the Shodan search
engine (Figure A).

Figure A

Shodan search engine results for internet-facing MOVEit instances. Image: Shodan

Rapid7 observed the same webshell name in multiple customer environments. On
compromised systems, the webshell named human2.aspx is located in the wwwroot
folder of the MOVEit install folder. The name of the file has probably been
chosen to stay unnoticed, as a legitimate file named human.aspx is the native
file used by MOVEit Transfer for its web interface.

The webshell’s access is protected by a password. Attempts to connect to the
webshell without the proper password results in the malicious code providing a
404 Not Found error.

The use of the same name on multiple servers might indicate automated
exploitation, according to Rapid7. It seems the targeting is more opportunist
than highly targeted. The initial compromise might lead to ransomware
exploitation, as file transfer solutions have been popular targets for attackers
including ransomware threat actors.

Microsoft has confirmed the exploitation of this vulnerability via Twitter,
attributing attacks exploiting the CVE-2023-34362 MOVEit Transfer zero-day
vulnerability to Lace Tempest, a threat actor known for ransomware operations
and running the Clop extortion site. This threat actor exploited a vulnerability
in another File Transfer Manager software, GoAnywhere, earlier this year.


HOW TO DETECT THREAT EXPLOITATION

System administrators should check for the presence of a human2.aspx file in the
wwwroot folder of their MOVEit Transfer software.

Log files should also be reviewed from at least a full month earlier. Unexpected
downloads/uploads of files from unknown IP addresses should be carefully
reviewed.


MUST-READ SECURITY COVERAGE

 * Google offers certificate in cybersecurity, no dorm room required
 * The top 6 enterprise VPN solutions to use in 2023
 * EY survey: Tech leaders to invest in AI, 5G, cybersecurity, big data,
   metaverse
 * Electronic data retention policy (TechRepublic Premium)

Web server log files should be checked for any events that would include a GET
request to a human2.aspx file, as well as large numbers of log entries or
entries with large data sizes, which might indicate unexpected file downloads.

If applicable, Azure log files should be reviewed for unauthorized access to
Azure Blob Storage keys.

According to Rapid7, data exfiltration can also be identified. In the case where
administrators of the MOVEit Transfer software enabled logging, a Windows Event
File C:\Windows\System32\winevt\Logs\MOVEit.evtx provides a lot of information,
including file name, file path, file size, IP address and username performing
the download. While logging isn’t enabled by default, it’s common for
administrators to enable it post-installation. Data exfiltration can then be
seen in that event log file.

Audit logs are stored in the MOVEit database and can be queried directly or
through the software’s built-in reporting functionality. Administrators can use
those logs to generate a report of file download actions run via the software,
letting them see potential data exfiltration.


HOW TO MITIGATE THIS RISK

The Progress provider strongly recommends immediately applying the patch it
released.

If not applicable immediately, organizations should disable all HTTP and HTTPS
traffic to the MOVEit Transfer environment to avoid attackers connecting to it.
While legitimate users won’t be able to connect to it anymore, SFTP and FTP
protocols will continue working as usual, and administrators will still be able
to connect to it via Remote Desktop Protocol.

If the human2.aspx file or any suspicious .cmdline script is found, it should be
deleted. Any newly created or unknown file in the MOVEit folder should be
closely analyzed; in addition, .cmdline files in any temporary folder of Windows
should be examined.

Any unauthorized user account should be removed.

Once the patch or the blocking of HTTP and HTTPS is done, administrators should
run detections as mentioned earlier and carefully look for indications of
compromise. If evidence is found, the service account credentials should be
reset.

Continuous monitoring should be applied for any of the Indicators of Compromises
provided by Progress.


ADDITIONAL SECURITY BEST PRACTICES

While not specific to the CVE-2023-34362 vulnerability, Progress indicates that
administrators should allow multifactor authentication on MOVEit Transfer. In
addition, remote access policies should be updated to only allow known and
trusted IP addresses. Finally, user accounts should be carefully checked to only
allow authorized accounts to access the service.

Disclosure: I work for Trend Micro, but the views expressed in this article are
mine.


SUBSCRIBE TO THE CYBERSECURITY INSIDER NEWSLETTER

Strengthen your organization's IT security defenses by keeping abreast of the
latest cybersecurity news, solutions, and best practices.

Delivered Tuesdays and Thursdays
Sign up today
Cedric Pernet
Published:  June 6, 2023, 8:48 AM EDT Modified:  June 12, 2023, 3:23 PM EDT See
more Security


ALSO SEE

 * For credentials, these are the new Seven Commandments for zero trust
   (TechRepublic)
 * The 10 best antivirus products you should consider for your business
   (TechRepublic)
 * How to recruit and hire a Security Analyst (TechRepublic Premium)
 * Zero-Day Danger: A Survey of Zero-Day Attacks and What They Say About the
   Traditional Security Model (FireEye white paper)
 * Cybersecurity and cyberwar: More must-read coverage (TechRepublic on
   Flipboard)

WHITE PAPERS, WEBCASTS, AND DOWNLOADS

MICROSOFT 365 SERVICES USAGE POLICY

Tools & Templates from TechRepublic Premium
View This Now

CLOUD STORAGE MANAGEMENT CHECKLIST

Tools & Templates from TechRepublic Premium
View This Now

LIFETIME LICENSE: MICROSOFT OFFICE PRO FOR WINDOWS

Downloads from TechRepublic Academy
Download Now

LIFETIME LICENSE: MICROSOFT OFFICE HOME & BUSINESS FOR MAC

Tools & Templates from TechRepublic Academy
Learn More

THE 2023 COMPLETE LINUX PROGRAMMING CERTIFICATION BUNDLE

Training from TechRepublic Academy
Get It Today



   
 * 
   
 * 
 * 
 * 


 * ACCOUNT INFORMATION
   
   TechRepublic close modal
   
   
   SHARE WITH YOUR FRIENDS
   
   Zero-day MOVEit Transfer vulnerability exploited in the wild, heavily
   targeting North America
   
   Check out this article I found on TechRepublic.
   
   Your email has been sent

Share: Zero-day MOVEit Transfer vulnerability exploited in the wild, heavily
targeting North America
By Cedric Pernet
Cedric Pernet is a threat expert with a strong focus on cybercrime and
cyberespionage. He currently works at Trend Micro as a senior threat researcher.


 * ACCOUNT INFORMATION
   
   TechRepublic close modal
   
   
   CONTACT CEDRIC PERNET
   
   Your message has been sent

 * |
 * See all of Cedric's content


 * Big Data
 * International
 * Microsoft
 * Security
 * Software


EDITOR'S PICKS

 * Image: Rawpixel/Adobe Stock
   TechRepublic Premium
   
   
   TECHREPUBLIC PREMIUM EDITORIAL CALENDAR: IT POLICIES, CHECKLISTS, TOOLKITS
   AND RESEARCH FOR DOWNLOAD
   
   TechRepublic Premium content helps you solve your toughest IT issues and
   jump-start your career or next project.
   
   TechRepublic Staff
   Published:  June 1, 2023, 4:30 AM EDT Modified:  June 2, 2023, 3:20 AM EDT
   Read More See more TechRepublic Premium
 * Image: irissca/Adobe Stock
   Artificial Intelligence
   
   
   CHATGPT CHEAT SHEET: COMPLETE GUIDE FOR 2023
   
   Get up and running with ChatGPT with this comprehensive cheat sheet. Learn
   everything from how to sign up for free to enterprise use cases, and start
   using ChatGPT quickly and effectively.
   
   Megan Crouse
   Published:  June 13, 2023, 3:15 PM EDT Modified:  June 13, 2023, 4:20 PM EDT
   Read More See more Artificial Intelligence
 * Image: Karolina Grabowska/Pexels
   Payroll
   
   
   THE TOP 8 OPEN SOURCE PAYROLL SOFTWARE CHOICES FOR 2023
   
   Get the most out of your payroll budget with these free, open source payroll
   software options. We've evaluated the top eight options, giving you the
   information you need to make the right choice.
   
   Devin Partida
   Published:  May 1, 2023, 11:53 AM EDT Modified:  May 9, 2023, 3:11 PM EDT
   Read More See more Payroll
 * Source: ArtemisDiana/Adobe Stock
   Developer
   
   
   TOP CERTIFICATIONS FOR DEVOPS ENGINEERS
   
   We highlight some of the best certifications for DevOps engineers. Learn more
   about DevOps certifications.
   
   Enrique Corrales
   Published:  April 28, 2023, 6:30 PM EDT Modified:  May 2, 2023, 1:12 PM EDT
   Read More See more Developer
 * Image: Nuthawut/Adobe Stock
   Software
   
   
   THE 10 BEST PROJECT MANAGEMENT SOFTWARE AND TOOLS FOR 2023
   
   With so many project management software options to choose from, it can seem
   daunting to find the right one for your projects or company. We’ve narrowed
   them down to these ten.
   
   Collins Ayuya
   Published:  April 26, 2023, 3:03 PM EDT Modified:  May 18, 2023, 12:00 PM EDT
   Read More See more Software
 * Lede image created by Mark Kaelin from public domain images.
   Software
   
   
   MICROSOFT POWERTOYS 0.69.0: A BREAKDOWN OF THE NEW REGISTRY PREVIEW APP
   
   This Microsoft PowerToys app simplifies the process of visualizing and
   modifying the contents of the standard Windows Registry file.
   
   Mark W. Kaelin
   Published:  May 1, 2023, 4:42 PM EDT Modified:  May 1, 2023, 4:42 PM EDT Read
   More See more Software




SUBSCRIBE TO THE CYBERSECURITY INSIDER NEWSLETTER

Strengthen your organization's IT security defenses by keeping abreast of the
latest cybersecurity news, solutions, and best practices.

Delivered Tuesdays and Thursdays
Sign up today


TECHREPUBLIC PREMIUM

 * TechRepublic Premium
   
   
   HIRING KIT: MAINFRAME SYSTEMS PROGRAMMER
   
   Recruiting a mainframe systems programmer candidate with the right
   combination of technical and industry experience will require a comprehensive
   screening process. This hiring kit from TechRepublic Premium provides a
   flexible framework your business can use to find the right person for the
   job. From the hiring kit: INTRODUCTION In general, mainframe systems
   programmers take responsibility ...
   
   Downloads
   Published:  June 13, 2023, 4:00 PM EDT Modified:  June 14, 2023, 8:07 AM EDT
   Read More See more TechRepublic Premium
 * TechRepublic Premium
   
   
   HIRING KIT: COMPUTER HARDWARE ENGINEER
   
   Computer hardware engineers design and create the physical components that
   make computers, smartphones, sensors and other digital devices run. Because
   of the meticulous nature of their work, the best candidates must have an
   inherent ability to focus on the task at hand. This hiring kit from
   TechRepublic Premium provides a workable framework you can use ...
   
   Downloads
   Published:  June 13, 2023, 4:00 PM EDT Modified:  June 14, 2023, 8:15 AM EDT
   Read More See more TechRepublic Premium
 * TechRepublic Premium
   
   
   HIRING KIT: CRYPTOGRAPHER
   
   A cryptographer uses their expertise in mathematics and computer science to
   develop algorithms, ciphers and other encryption systems to protect sensitive
   data. It can be a difficult position to fill. This hiring kit from
   TechRepublic Premium provides a workable framework you can use to find the
   best cryptographer candidate for your business. It includes a ...
   
   Downloads
   Published:  June 13, 2023, 4:00 PM EDT Modified:  June 14, 2023, 8:26 AM EDT
   Read More See more TechRepublic Premium
 * TechRepublic Premium
   
   
   EQUIPMENT REASSIGNMENT CHECKLIST
   
   The reassignment of existing equipment takes place when employees leave the
   organization or receive new computers, mobile devices, printers and other
   assets. It is essential to follow strict guidelines for equipment
   reassignment so that company investments, data and privacy are protected. The
   following checklist from TechRepublic Premium will help ensure that all the
   appropriate steps ...
   
   Downloads
   Published:  June 12, 2023, 4:00 PM EDT Modified:  June 13, 2023, 8:45 AM EDT
   Read More See more TechRepublic Premium


SERVICES

 * About Us
 * Newsletters
 * RSS Feeds
 * Site Map
 * Site Help & Feedback
 * FAQ
 * Advertise
 * Do Not Sell My Information
 * Careers


EXPLORE

 * Downloads
 * TechRepublic Forums
 * Meet the Team
 * TechRepublic Academy
 * TechRepublic Premium
 * Resource Library
 * Photos
 * Videos

 * TechRepublic
 * TechRepublic on Twitter
 * TechRepublic on Facebook
 * TechRepublic on LinkedIn
 * TechRepublic on Flipboard

© 2023 TechnologyAdvice. All rights reserved.
 * Privacy Policy
 * Terms of Use
 * Property of TechnologyAdvice