Over 122 organizations have announced a breach due to the new zero day exploit affecting the MOVEit file transfer software, and that number is expected to climb. This is just one recent example illustrating how hackers wreak havoc with zero day exploit attacks. According to a 2023 report, Mandiant identified 55 zero-day vulnerabilities that were exploited in 2022, leaving cybersecurity teams scrambling. Let’s dive into the details of why these attacks are causing so much damage and look at a case study from an attack, and then we’ll share a checklist of prevention and response techniques to help keep your organization safe.
A zero day exploit is when attackers find an unknown software vulnerability and develop an exploit technique to use that vulnerability to attack and gain access to an organization. When a new vulnerability is discovered in software, SaaS apps, or even underlying code libraries (think Log4J), criminals will try to exploit this security gap and attack before you – or the vendor – realize there is a problem. Once criminals know there is a vulnerability, they will quickly use these zero day exploits to gain a foothold in your environment. From there, they can install malware, execute commands, steal data and credentials, and move laterally to expand their reach and privileges. These vulnerabilities are referred to as “zero day” because attacks often happen before the victims, or the manufacturer, know about the security gap far less publish a patch.
Let’s look at a recent zero-day exploit: the MOVEit Transfer vulnerability that is causing a lot of damage. MOVEit is a file transfer system used by large organizations for sensitive data. On May 27th, the Clop hacker gang began exploiting MOVEit servers using a zero day vulnerability that enabled them to steal a tremendous amount of sensitive data. In fact, they stole so much data that they apparently needed additional time to identify and sort the victims! Initially, they told companies that use MOVEit to reach out to them by June 14th to learn whether their data was stolen and what the ransom would be to avoid data exposure. Indicators show Clop had been planning this attack for about a year and picked Memorial Day weekend since IT departments usually have fewer people on staff during holiday weekends.
To get an idea of the extent of this breach, our team did a quick search found over 2,500 potential victims worldwide, with 1848 on premises servers in the US. These numbers do not include MOVEit’s SaaS customers, so the total number of impacted organizations is likely much higher. Zellis, the leading payroll service provider in the UK and Ireland, was affected by the MOVEit attack, and the payroll data for huge organizations such as the BBC, British Airways, and Boots have confirmed attacks resulting from this vulnerability. The casualty list is still growing, with the NYC public schools, PwC, major universities, energy providers, and many more. The list grows almost daily in this major, multi-level supply chain breach.
But this new zero day exploit seems to be part of Clop’s new attack playbook. This attack is very reminiscent of the 2021 Accellion file transfer attack, also by Clop, in which they extorted large companies as well as the customers of those companies who had their data stolen. It is also similar is Clop’s recent GoAnywhere attack from February of 2023, in which they attacked secure file sharing using a zero-day vulnerability to steal data for 130 organizations. These zero-day attacks by Clop, and others, are now falling into a pattern. With the dark web marketplace already overflowing with zero day vulnerabilities that are free or for sale inexpensively (check out the recent screen shot from a dark web market below), zero day attacks will continue to be a favorite attack vector for many cyber criminals.
Figure 1: June 2023 screenshot taken by LMG’s research team showing a dark web market offering zero day exploits.
Zero Day Exploit Prevention and Response Checklist
So, what should you do if you are not sure whether you are impacted by MOVEit or a similar type of zero day exploit? A new report from Beazley shows that in Q4 2022, 97% of extortion incidents included data exfiltration. After any confirmed breach, you should assume that at least some of your data has been stolen and activate your investigation, remediation, and recovery processes. You should also patch immediately, and then continue to check for additional patches for the next month or two. When zero-day exploits are announced, there are always multiple investigations that continue for weeks after the announcement. These investigations often result in the exposure of multiple new vulnerabilities that also need to be patched. Here’s a step-by-step checklist of actions you can take to prevent and respond to zero day exploit attacks:
Don’t Forget to Protect Your Supply Chain
Zero-day attacks don’t just affect you, they may also impact your key suppliers, managed service providers, and customers. Don’t assume that these organizations will proactively contact you. Quickly reach out to any organizations that have access to your sensitive data or network resources. Ask them to confirm, in writing, whether they used an affected version of the software, and whether they are assessing if anyone in THEIR supply chain was impacted by the exploit. For more information, check out our blog on supply chain security best practices.
Blog post courtesy of LMG Security.