Bangkok Post

Hacking feared after breach of file-sharing software

- WILLIAM TURTON

Cybersecur­ity experts are bracing for a potential wave of extortion demands after a vulnerabil­ity was discovered in encrypted file-sharing software, a flaw that hackers have already used to target a string of high-profile victims, including British Airways and the BBC.

Several companies and a Canadian province said on Monday that they were dealing with breaches related to the secure file transfer product MOVEit from Progress Software Corp, according to statements from several of the affected entities. The vulnerabil­ity allowed hackers to steal files that companies had uploaded to MOVEit, according to Progress.

The flaw had prompted security alerts in recent days from the US Department of Homeland Security, the UK National Cyber Security Centre, Microsoft Corp, and Mandiant, a subsidiary of Alphabet Inc’s Google Cloud.

Progress released a patch for the software last week.

“When we discovered the vulnerabil­ity, we promptly launched an investigat­ion, alerted MOVEit customers about the issue and provided immediate mitigation steps,” spokespers­on John Eddy said in a statement.

Microsoft said the hackers responsibl­e for the attacks on MOVEit servers also run the Clop extortion website. Clop is the name of a ransomware variant that has been deployed against companies and organisati­ons around the world, and it also sometimes refers to the hacking gang that uses it. Hackers affiliated with the group also steal data and threaten to publish it on its website if a ransom isn’t paid.

The group has primarily targeted the health care and financial sectors and has existed since February 2019, according to Trend Micro Inc. The same attackers were responsibl­e for previous hacks of two other secure file transfer products developed by Accellion Inc, and Fortra LLC, said Allan Liska, senior intelligen­ce analyst at Recorded Future Inc.

Publicly available data sources show there are thousands of vulnerable MOVEit servers that could have been affected by the software flaw, Liska said. The criminal hackers are expected to begin contacting companies and demanding payment in cryptocurr­ency in exchange for not uploading the company’s stolen data online, he said.

An internet search of publicly visible MOVEit servers performed by Bloomberg News shows that law firms, healthcare organisati­ons and IT firms are among its users.

GANG PROVIDES FEW DETAILS

A representa­tive for the extortion gang said in an email to Bloomberg News that it deleted data stolen from “military, GOV, children’s hospitals, police.” It wasn’t possible to verify the group’s claim.

When asked how many companies were breached, the representa­tive replied, “You all recognise them if they refuse to pay, they will appear on our blog.”

Charles Carmakal, chief technology officer at Mandiant, said the earliest observed exploitati­on of MOVEit occurred on May 27.

“We’re expecting the extortion communicat­ions to start anytime within the next four weeks or so,” he said. “There is a lot of data that the threat actor has to sort through. When the extortion starts, it will probably carry on for a few months.”

British Airways, the pharmacy chain Boots, and the BBC told thousands of staff that personal informatio­n may have been compromise­d by a cyberattac­k on their payroll provider, Zellis.

In a statement, Zellis said a “small number of customers” have been impacted. “Once we became aware of this incident we took immediate action, disconnect­ing the server that utilises MOVEit software and engaging an expert external security incident response team to assist with forensic analysis and ongoing monitoring,” according to a statement. British Airways said in a statement that the incident occurred “because of a new and previously unknown vulnerabil­ity in a widely used MOVEit file transfer tool.”

The government of Nova Scotia said it is investigat­ing the theft of personal informatio­n related to the MOVEit vulnerabil­ity. “Government is working to determine exactly what informatio­n was stolen and how many people have been impacted,” according to a statement.

At British Airways, the hack led to the disclosure of employees’ personal informatio­n, including names, surnames, dates of birth and potentiall­y banking details, according to a spokespers­on for the carrier, which employs around 35,000 people.

Boots, with more than 50,000 workers, said employees’ personal details were affected. The server was disabled and staff have been made aware, said a spokespers­on for Boots, which is owned by Walgreens Boots Alliance Inc.

The BBC confirmed it had been affected by the attack on Zellis. A spokespers­on said it was urgently trying to establish the extent of the data breach.

“This is a typical case of a supply chain attack targeting multiple companies at once that hold extremely sensitive data on employees,” said Jake Moore, a UK-based cybersecur­ity expert and global adviser to the cybersecur­ity firm ESET.

“The security patch on offer is absolutely vital and should have now been installed by all affected companies to remain protected.”

 ?? REUTERS ?? Police officers guard a Boots pharmacy in Britain in 2018. Boots recently notified staff that personal informatio­n may have been compromise­d by a cyberattac­k on its payroll provider, Zellis.
REUTERS Police officers guard a Boots pharmacy in Britain in 2018. Boots recently notified staff that personal informatio­n may have been compromise­d by a cyberattac­k on its payroll provider, Zellis.

Newspapers in English

Newspapers from Thailand