U.S. and British cybersecurity officials warned Wednesday that a Russian cyber-extortion gang's hack of a file-transfer program popular with corporations could have widespread global impact. Initial data-theft victims include the BBC, British Airways and Nova Scotia's government.

“This is potentially one of the most significant breaches of recent years,” said Brett Callow, an analyst at the cybersecurity firm Emsisoft. “We’ll have a better sense of how significant it is as more details emerge about the number and type of organizations impacted.”

The Cl0p ransomware syndicate announced on its dark web site late Tuesday that its victims — who it suggests number in the hundreds — had until June 14 to get in touch to negotiate a ransom or risk having sensitive stolen data dumped online.

The exploited program, MOVEit, is widely used by businesses to securely share files. The parent company of its U.S. maker, Progress Software, alerted customers to the breach on May 31 and issued a patch. But cybersecurity researchers say scores if not hundreds of companies may by then have had sensitive data quietly exfiltrated.

“There are undoutedly organizations who don't even know yet that they're affected,” said Caitlin Condon, senior manager of security research at the cybersecurity firm Rapid7, noting that MOVEit is particularly popular in North America.

“We've seen a wide range of organizations affected by this attack across health care, financial services, technology, manufacturing, insurance, government, and more,” Condon said via email, adding that more businesses can be expected to disclose data theft, particularly “as regulatory reporting requirements come into play.”

Asked to confirm the identity of several reported victims, a Cl0p spokesperson responding to an email query said, “We have not yet examined company files as you can see on our site, we have given the opportunity to companies to decide their privacy before our actions.”

Zellis, a leading payroll services provider in the U.K. that serves British Airways, the BBC and hundreds of others, was among impacted users. Zellis said Monday a “small number” of its customers were affected by what cybersecurity professionals call a supply-chain breach because the compromise a single software provider can have such profound impact.

“We have notified those colleagues whose personal information has been compromised to provide support and advice,” British Airways said in a statement.

The BBC, which employs about 22,000 people worldwide, said it was working with Zellis as it sought to establish the extent of the breach. The broadcaster said in an email sent Monday to all U.K. staff and freelancers that data including birthdates, national insurance numbers and home addresses was disclosed. But it said bank account details had apparently not been compromised, and there was “no evidence that the data is being exploited.”

The U.K. drugstore chain Boots, which employs more than 50,000 people, also said it had made staff aware of the hack.

Nova Scotia's government confirmed Sunday that it was among fictims, saying some residents' data was exposed. The Canadian province's health authority uses MOVEit to share sensitive an confidential information.

The University of Rochester issued a statement last Friday suggesting it was among victims but a spokesperson, Sara Miller, would not confirm that it used MOVEit or discuss what data was stolen.

“What's disconcerting about MOVEit is that it's almost exclusively used by enterprise organizations to share extremely sensitive data with each other,” said Jared Smith, threat analyst with the cybersecurity firm SecurityScorecard. Essentially, companies that don’t trust Dropbox or Google Drive to be secure enough for their business.

And that specifically means the kind of sensitive data that "adds more fuel to the fire of the already existing identity theft ecosystem,” said Alex Heid, chief research officer at Security Scorecard.

The firm detected 2,500 vulnerable MOVEit servers across 790 organizations, including 200 government agencies. Smith said it wasn't possible to break down those agencies by country. It was not known how many vulnerable MOVEit servers were hacked.

The hackers were actively scanning for targets, penetrating them and stealing data at least as far back as March 29, said Smith.

Cl0p is among the world's most prolific cybercrime syndicates and this is not the first time it has breached a file-transfer program to gain access to data it could then use to extort companies. Other instances include GoAnywhere servers in early 2023 and Accellion File Transfer Application defices in 2020 and 2021

In a joint advisory issued Wednesday, the U.S. Cybersecurity and Infrastructure Security Agency and FBI said Cl0p "is estimated to have “compromised more than 3,000 U.S.-based organizations and 8,000 global organizations.”

“Due to the speed and ease (with which it) has exploited this vulnerability, and based on their past campaigns, FBI and CISA expect to see widespread exploitation of unpatched software services in both private and public networks.”

Cl0p claims it does not extort governments, cities or police agencies, but cybersecurity experts say that’s likely a tactic to try to avoid direct conflict with law enforcement and that the financially motivated gang can’t be trusted to keep its promise to erase data stolen from those targets.

Share:
More In Technology
Terra Collapse Leaves Questions About Impact on Broader Crypto Market
The crypto industry is still reeling from Terra's recent crash. The company's blockchain was temporarily halted earlier this month after the collapse of its cryptocurrency Luna (LUNA) and its stablecoin TerraUSD (UST), which led to almost $45 billion being wiped from the tokens' market caps within a week. Now, many are left wondering what Terra's struggles mean for the broader crypto market. Reeve Collins, CEO of the NFT platform BLOCKv, joins Cheddar News' Closing Bell from Davos 2022 to discuss.
Didi Shareholders Vote to Delist From NYSE Amid China's Tech Crackdown
China's largest ride-hailing company will no longer be listed on the world's largest stock exchange. Didi shareholders voted on Monday to delist from the New York Stock Exchange, less than a year after launching a $4.4 billion IPO with the most significant U.S. share offering by a Chinese company since Alibaba debuted in 2014. Since going public in June of last year, around $70 billion has been wiped from Didi's market value and shares of the company have dropped nearly 90%. Now, Didi is expected to begin preparations to list in Hong Kong. Kevin T. Carter, founder and Chief Investment Officer of EMQQ Global, joins Cheddar News' Closing Bell to discuss.
Doctors Join Forces to Urge Investors to Hold Meta Responsible for Misinformation
Ahead of the Meta shareholder meeting, more than five hundred doctors have jointly sent a letter to investors to hold the Facebook parent accountable for the risks its platforms have posed to the public and mental health. Dr. Rob Davidson, a West Michigan ER physician and executive director of the Committee to Protect Health Care, joined Cheddar News to discuss how medical professionals are coming together to highlight the social media giant's spread of misinformation, especially during the pandemic. "We've seen the direct impacts of misinformation and disinformation that spreads like wildfire on the social media platforms," he said. "Our goal with this letter is to try to get the shareholders of Meta to convince leadership that they need to do a better job."
Snap Warning Sends Other Stocks Spiraling
Snap downgraded its earnings and revenue expectations for the second quarter, saying the "macroeconomic environment" has deteriorated faster than the company anticipated. The warning sent shockwaves through the digital ad industry, dragging down a handful of other tech stocks, including Pinterest, Meta, and Twitter. Daniel Cobb, CEO and Chief Strategy Officer of Daniel Brian Advertising, joined Cheddar to discuss the reason behind this warning, and why it's bringing so many social media stocks down.
Load More