{"id":78915,"date":"2023-06-13T10:00:13","date_gmt":"2023-06-13T17:00:13","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?p=78915"},"modified":"2024-04-23T08:36:12","modified_gmt":"2024-04-23T15:36:12","slug":"mass-exploitation-of-moveit-transfer-critical-vulnerability","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/","title":{"rendered":"Mass Exploitation of MOVEit Transfer Critical Vulnerability \u2013 Recommended Mitigations and How Forescout Can Help"},"content":{"rendered":"<p>On May 31, Forescout Research &#8211; Vedere Labs uncovered a significant incident where threat actors exploited a critical <a href=\"https:\/\/community.progress.com\/s\/article\/MOVEit-Transfer-Critical-Vulnerability-31May2023\" target=\"_blank\" rel=\"noopener\">zero-day vulnerability in the MOVEit Transfer software<\/a>, which resulted in unauthorized access to and exfiltration of private data, as well as privilege escalation.<\/p>\n<p><a href=\"\/resources\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/\" target=\"_blank\" rel=\"noopener\">MOVEit Transfer<\/a> is a widely adopted managed file transfer (MFT) solution that enables organizations to securely exchange files with their business partners and customers. The exploited vulnerability has been assigned the identifier <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-34362\" target=\"_blank\" rel=\"noopener\">CVE-2023-34362<\/a>.<\/p>\n<p>CVE-2023-34362 is currently <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-moveit-transfer-zero-day-mass-exploited-in-data-theft-attacks\/\" target=\"_blank\" rel=\"noopener\">being mass exploited<\/a>, with hundreds of organizations hit simultaneously. Although we could not attribute this particular incident to a specific threat actor with certainty, ongoing exploitation of CVE-2023-34362 has been attributed by <a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa23-158a\" target=\"_blank\" rel=\"noopener\">CISA, the FBI and other organizations<\/a> to the <a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.clop\" target=\"_blank\" rel=\"noopener\">Cl0p ransomware group<\/a> since May 27. The criminal group itself has claimed responsibility for the attacks with an <a href=\"https:\/\/therecord.media\/clop-extortion-hundreds-organizations-moveit-vulnerability\" target=\"_blank\" rel=\"noopener\">extortion note<\/a> on their website.<\/p>\n<p>Cl0p is one of the most active ransomware groups and was behind <a href=\"https:\/\/www.forescout.com\/blog\/analysis-of-clops-attack-on-south-staffordshire-water-uk\/\" target=\"_blank\" rel=\"noopener\">last year\u2019s attack on a UK water utility<\/a>, among many other critical incidents. The group also exploited another vulnerability in a similar MFT tool in January, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/clop-ransomware-claims-it-breached-130-orgs-using-goanywhere-zero-day\/\" target=\"_blank\" rel=\"noopener\">claiming 130 victims at that time<\/a>. Researchers <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/cl0p-gang-exploit-moveit-flaw-2-years\" target=\"_blank\" rel=\"noopener\">found evidence<\/a> that the group knew about the MOVEit Transfer vulnerability for almost two years but chose to wait for the right moment to use it in a mass attack.<\/p>\n<p>CVE-2023-34362 is an SQL injection affecting MOVEit Transfer versions prior to 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5) and 2023.0.1 (15.0.1). The vulnerability allows attackers to manipulate the underlying database and potentially gain unauthorized access. Exploitation of unpatched systems can occur over both HTTP and HTTPS, making all vulnerable instances susceptible to attack.<\/p>\n<p>Fortunately, the software vendor, Progress, promptly addressed this vulnerability and released a patch to mitigate the risk. On June 9, the vendor also released a patch for a second SQL injection vulnerability (CVE is pending) to address concerns of exploit staging. There is no evidence that the second vulnerability has been exploited in the wild.<\/p>\n<p>There are currently <a href=\"https:\/\/www.shodan.io\/search?query=http.favicon.hash%3A989289239\" target=\"_blank\" rel=\"noopener\">more than 2,500 exposed servers<\/a> running MOVEit Transfer. Seventy-three percent of those are in the U.S., 5% in the UK and 4.5% in Germany, with the remaining 17.5% spread across over 80 other countries. Sixty-eight percent of the servers have a similar configuration, running over HTTPS on port 443 on top of the Microsoft IIS web server. These servers are most often observed in organizations in the healthcare, financial services and government sectors.<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/resources\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/\" target=\"_blank\" rel=\"noopener\">Read our full report<\/a> for further technical details about the webshell used in the attack.<\/p>\n<h2>The incident exploiting CVE-2023-34362<\/h2>\n<p>The figure below summarizes the incident that we have detected and analyze in the full report. First, the threat actor exploited CVE-2023-34362 on an Internet-facing host running a vulnerable version of MOVEit Transfer. Second, the attacker deployed a webshell named <em>human2.aspx<\/em> that allowed them to execute commands on the target. Third, the attacker leveraged the webshell to exfiltrate data to a C2 server.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-78917\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/CVE-2023-34362.png\" alt=\"\" width=\"792\" height=\"442\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/CVE-2023-34362.png 792w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/CVE-2023-34362-300x167.png 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/CVE-2023-34362-768x429.png 768w\" sizes=\"auto, (max-width: 792px) 100vw, 792px\" \/><\/p>\n<h2>Recommended mitigations<\/h2>\n<p>Progress, the MOVEit Transfer vendor, has released immediate mitigation measures to assist in preventing the exploitation of CVE-2023-34362. The table below shows the security patch for each supported version of MOVEit Transfer. Customers on unsupported versions should upgrade to one of the supported fixed versions below.<\/p>\n<p><!-- [table] --><\/p>\n<div class=\"c-responsive-table td-min-width-0 padding-slim th-no-wrap\">\n<table>\n<tbody>\n<tr>\n<th><strong>Affected Version<\/strong><\/th>\n<th><strong>Fixed Version<\/strong><\/th>\n<\/tr>\n<tr>\n<td>MOVEit Transfer 2023.0.0 (15.0)<\/td>\n<td><a href=\"https:\/\/cdn.ipswitch.com\/ft\/MOVEit\/Transfer\/2023\/2023.0.1\/MOVEit-Transfer-2023.0.1-FullInstall.exe\" target=\"_blank\" rel=\"noopener\">MOVEit Transfer 2023.0.1<\/a><\/td>\n<\/tr>\n<tr>\n<td>MOVEit Transfer 2022.1.x (14.1)<\/td>\n<td><a href=\"https:\/\/cdn.ipswitch.com\/ft\/MOVEit\/Transfer\/2022\/2022.1.5\/MOVEit-Transfer-2022.1.5-FullInstall.exe\" target=\"_blank\" rel=\"noopener\">MOVEit Transfer 2022.1.5<\/a><\/td>\n<\/tr>\n<tr>\n<td>MOVEit Transfer 2022.0.x (14.0)<\/td>\n<td><a href=\"https:\/\/cdn.ipswitch.com\/ft\/MOVEit\/Transfer\/2022\/2022.0.4\/MOVEit-Transfer-2022.0.4-FullInstall.exe\" target=\"_blank\" rel=\"noopener\">MOVEit Transfer 2022.0.4<\/a><\/td>\n<\/tr>\n<tr>\n<td>MOVEit Transfer 2021.1.x (13.1)<\/td>\n<td><a href=\"https:\/\/cdn.ipswitch.com\/ft\/MOVEit\/Transfer\/2021\/2021.1.4\/MOVEit-Transfer-2021.1.4-FullInstall.exe\" target=\"_blank\" rel=\"noopener\">MOVEit Transfer 2021.1.4<\/a><\/td>\n<\/tr>\n<tr>\n<td>MOVEit Transfer 2021.0.x (13.0)<\/td>\n<td><a href=\"https:\/\/cdn.ipswitch.com\/ft\/MOVEit\/Transfer\/2021\/2021.0.6\/MOVEit-Transfer-2021.0.6-FullInstall.exe\" target=\"_blank\" rel=\"noopener\">MOVEit Transfer 2021.0.6<\/a><\/td>\n<\/tr>\n<tr>\n<td>MOVEit Transfer 2020.1.x (12.1)<\/td>\n<td>Special patch available<\/td>\n<\/tr>\n<tr>\n<td>MOVEit Transfer 2020.0.x (12.0) or older<\/td>\n<td>Must upgrade to a supported version<\/td>\n<\/tr>\n<tr>\n<td>MOVEit Cloud<\/td>\n<td>Prod:14.1.4.94 or 14.0.3.42\n<p>Test: 15.0.1.37<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p><!-- --><\/p>\n<p><strong>Additional recommended mitigation includes:<\/strong><\/p>\n<ul>\n<li>Disable all HTTP and HTTPs traffic to your MOVEit Transfer environment. For instance, modify firewall rules to deny HTTP and HTTPS traffic towards affected products on port 80 and 443.<\/li>\n<li>Review logs for unexpected downloads of files from unknown IPs or large numbers of files downloaded. Give special attention to GET requests with the cs_uri_stem=\/download parameter. These requests may indicate attempts at file exfiltration, where unauthorized individuals or threat actors are attempting to retrieve sensitive data from the system.<\/li>\n<li>Delete unauthorized files (such as <em>aspx<\/em>) and user accounts (such as <em>\u201cHealth Check Service\u201d<\/em>) found on a system.<\/li>\n<\/ul>\n<h2>How Forescout can help<\/h2>\n<p>CISA\u2019s first recommended action to mitigate CVE-2023-34362 is to <em>\u201ctake an inventory of assets and data, identifying authorized and unauthorized devices and software.\u201d<\/em> The Forescout Platform can provide such an <a href=\"\/solutions\/asset-inventory\/\">automatic inventory<\/a> across all assets on the network.<\/p>\n<p>Beyond building a comprehensive inventory, Forescout\u2019s extended detection and response solution can also help to directly detect and respond to this threat. <a href=\"\/solutions\/threat-detection-and-response\/\">Forescout Threat Detection &#038; Response<\/a> can detect the human2.aspx webshell from both EDR and network security logs. The following rules have been added to Forescout Threat Detection &#038; Response to provide holistic detection for this threat:<\/p>\n<ul>\n<li>CY-IR-1822- Emerging Threats: Potential MOVEit Transfer Web Shell Detected<\/li>\n<li>CY-IR-1135- PanOS: Suspicious Web Request Detected<\/li>\n<li>CY-IR-1130- PanOS: Web Vulnerability Scanning Detection<\/li>\n<\/ul>\n<p>The figures below show a description of the \u201cSuspicious Web Request Detected\u201d or &#8220;Web Vulnerability Scanning Detection,\u201d which is triggered when the webshell is detected in the monitored environment.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-78920\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/Web-Vulnerability-Scanning-Detection.png\" alt=\"\" width=\"876\" height=\"364\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/Web-Vulnerability-Scanning-Detection.png 876w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/Web-Vulnerability-Scanning-Detection-300x125.png 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/Web-Vulnerability-Scanning-Detection-768x319.png 768w\" sizes=\"auto, (max-width: 876px) 100vw, 876px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-78919\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/Suspicious-Web-Request-Detected.png\" alt=\"\" width=\"912\" height=\"446\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/Suspicious-Web-Request-Detected.png 912w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/Suspicious-Web-Request-Detected-300x147.png 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/Suspicious-Web-Request-Detected-768x376.png 768w\" sizes=\"auto, (max-width: 912px) 100vw, 912px\" \/><\/p>\n<h2>IOCs<\/h2>\n<p>The following IOCs have been observed either as part of the incident we analyzed or from external public sources.<\/p>\n<p><!-- [table] --><\/p>\n<div class=\"c-responsive-table td-min-width-0 padding-slim th-no-wrap\">\n<table>\n<tbody>\n<tr>\n<th><strong>Type<\/strong><\/th>\n<th><strong>Indicators<\/strong><\/th>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong>IP address<\/strong><\/td>\n<td>92.118.36.112<br \/>\n92.51.2.10<br \/>\n3.132.217.53<br \/>\n186.211.1.7<br \/>\n5.252.189.191<br \/>\n5.252.190.129<br \/>\n5.252.190.56<br \/>\n5.252.190.186<br \/>\n5.252.190.32<br \/>\n5.252.190.34<br \/>\n45.148.120.161<br \/>\n45.148.120.113<br \/>\n4.227.193.241<br \/>\n27.115.124.45<br \/>\n197.231.197.11<br \/>\n185.7.33.149<br \/>\n185.213.175.253<br \/>\n180.163.220.66<br \/>\n102.129.143.22<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong>SHA256<\/strong><\/td>\n<td>0ea05169d111415903a1098110c34cdbbd390c23016cd4e179dd9ef507104495<br \/>\n2413b5d0750c23b07999ec33a5b4930be224b661aaf290a0118db803f31acbc5<br \/>\n348e435196dd795e1ec31169bd111c7ec964e5a6ab525a562b17f10de0ab031d<br \/>\n387cee566aedbafa8c114ed1c6b98d8b9b65e9f178cf2f6ae2f5ac441082747a<br \/>\n3a977446ed70b02864ef8cfa3135d8b134c93ef868a4cc0aa5d3c2a74545725b<br \/>\n3ab73ea9aebf271e5f3ed701286701d0be688bf7ad4fb276cb4fbe35c8af8409<br \/>\n4359aead416b1b2df8ad9e53c497806403a2253b7e13c03317fc08ad3b0b95bf<br \/>\n48367d94ccb4411f15d7ef9c455c92125f3ad812f2363c4d2e949ce1b615429a<br \/>\n5b566de1aa4b2f79f579cdac6283b33e98fdc8c1cfa6211a787f8156848d67ff<br \/>\n6015fed13c5510bbb89b0a5302c8b95a5b811982ff6de9930725c4630ec4011d<br \/>\n702421bcee1785d93271d311f0203da34cc936317e299575b06503945a6ea1e0<br \/>\n9d1723777de67bc7e11678db800d2a32de3bcd6c40a629cd165e3f7bbace8ead<br \/>\n9e89d9f045664996067a05610ea2b0ad4f7f502f73d84321fb07861348fdc24a<br \/>\na1269294254e958e0e58fc0fe887ebbc4201d5c266557f09c3f37542bd6d53d7<br \/>\nb1c299a9fe6076f370178de7b808f36135df16c4e438ef6453a39565ff2ec272<br \/>\nc56bcb513248885673645ff1df44d3661a75cfacdce485535da898aa9ba320d4<br \/>\nc77438e8657518221613fbce451c664a75f05beea2184a3ae67f30ea71d34f37<br \/>\ncf23ea0d63b4c4c348865cefd70c35727ea8c82ba86d56635e488d816e60ea45<br \/>\nd477ec94e522b8d741f46b2c00291da05c72d21c359244ccb1c211c12b635899<br \/>\nd49cf23d83b2743c573ba383bf6f3c28da41ac5f745cde41ef8cd1344528c195<br \/>\ndaaa102d82550f97642887514093c98ccd51735e025995c2cc14718330a856f4<br \/>\ne8012a15b6f6b404a33f293205b602ece486d01337b8b3ec331cd99ccadb562e<br \/>\nea433739fb708f5d25c937925e499c8d2228bf245653ee89a6f3d26a5fd00b7a<br \/>\nf0d85b65b9f6942c75271209138ab24a73da29a06bc6cc4faeddcb825058c09d<br \/>\nfe5f8388ccea7c548d587d1e2843921c038a9f4ddad3cb03f3aa8a45c29c6a2f<br \/>\n4546144efb671ad4f12d81d976134903b587c31f85991626850dec3d07859d5c<br \/>\n53a8ef6df8ded48541178a8136d2ea6ab629a64cb44b922b2c37f3f96f77a640<br \/>\n93137272f3654d56b9ce63bec2e40dd816c82fb6bad9985bed477f17999a47db<br \/>\n01a693874c7a08826332390c7c1012cb99e5834b90917e2ee7ffb5de56a61e17<br \/>\n02d9a530964c8b7b8c1ff960ab078f806cb933bda0f2011abc2a25d7e89bc8a9<br \/>\n6cbf38f5f27e6a3eaf32e2ac73ed02898cbb5961566bb445e3c511906e2da1fa<br \/>\nbdd4fa8e97e5e6eaaac8d6178f1cf4c324b9c59fc276fd6b368e811b327ccf8b<br \/>\ne96a9a876ce4246781ef41a5316739a5711e393840e7f763e6e2a6c8c795ddb1<br \/>\n3c0dbda8a5500367c22ca224919bfc87d725d890756222c8066933286f26494c<br \/>\n769f77aace5eed4717c7d3142989b53bd5bac9297a6e11b2c588c3989b397e6b<br \/>\n7c39499dd3b0b283b242f7b7996205a9b3cf8bd5c943ef6766992204d46ec5f1<br \/>\nad8d9db2e65dde04fc017961e474e58e109114f561ddf33424d602f69e6c0e2d<br \/>\nc58c2c2ea608c83fad9326055a8271d47d8246dc9cb401e420c0971c67e19cbf<br \/>\nb9a0baf82feb08e42fa6ca53e9ec379e79fbe8362a7dac6150eb39c2d33d94ad<br \/>\nf40e9833ac1e31252edc39c9800742dfef5886e137bf302127b9adcb8adc2f27<br \/>\n367fa8b3bafd99cb0fa5efc23ffb91d0daef6e33be1378ee1eb525ff9ddd9095<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>Download the full threat briefing report for more details on the incident and the deployed payload.<\/p>\n<a href=\"\/resources\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/\"  title=\"DOWNLOAD REPORT\" class=\"c-btn c-btn--primary icon-position-right\" target=\"new\"><span class=\"cta-button-text\">DOWNLOAD REPORT<\/span><\/a>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On May 31, Forescout Research &#8211; Vedere Labs uncovered a significant incident where threat actors exploited a critical zero-day vulnerability in the MOVEit Transfer software, which resulted in unauthorized access to and exfiltration of private data, as well as privilege escalation. MOVEit Transfer is a widely adopted managed file transfer (MFT) solution that enables organizations [&hellip;]<\/p>\n","protected":false},"author":177,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[562],"tags":[],"coauthors":[744,748],"class_list":["post-78915","post","type-post","status-publish","format-standard","hentry","category-news-and-views"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Mass Exploitation of MOVEit Transfer Critical Vulnerability - Forescout<\/title>\n<meta name=\"description\" content=\"How to mitigate exploitation of a critical zero-day vulnerability in the MOVEit managed file transfer software attributed to Cl0p ransomware group\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mass Exploitation of MOVEit Transfer Critical Vulnerability - Forescout\" \/>\n<meta property=\"og:description\" content=\"How to mitigate exploitation of a critical zero-day vulnerability in the MOVEit managed file transfer software attributed to Cl0p ransomware group\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-13T17:00:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-23T15:36:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/CVE-2023-34362.png\" \/>\n<meta name=\"author\" content=\"Prashant Tilekar, Sai Molige\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/\"},\"author\":{\"name\":\"Prashant Tilekar\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/cad25e89f0f8a6e91271f9cd4433d573\"},\"headline\":\"Mass Exploitation of MOVEit Transfer Critical Vulnerability \u2013 Recommended Mitigations and How Forescout Can Help\",\"datePublished\":\"2023-06-13T17:00:13+00:00\",\"dateModified\":\"2024-04-23T15:36:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/\"},\"wordCount\":1515,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/CVE-2023-34362.png\",\"articleSection\":[\"News &amp; Views\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/\",\"name\":\"Mass Exploitation of MOVEit Transfer Critical Vulnerability - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/CVE-2023-34362.png\",\"datePublished\":\"2023-06-13T17:00:13+00:00\",\"dateModified\":\"2024-04-23T15:36:12+00:00\",\"description\":\"How to mitigate exploitation of a critical zero-day vulnerability in the MOVEit managed file transfer software attributed to Cl0p ransomware group\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/CVE-2023-34362.png\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/CVE-2023-34362.png\",\"width\":792,\"height\":442},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mass Exploitation of MOVEit Transfer Critical Vulnerability \u2013 Recommended Mitigations and How Forescout Can Help\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/cad25e89f0f8a6e91271f9cd4433d573\",\"name\":\"Prashant Tilekar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/b30f85c3e3ebd0cb52e8ff993f1e3f10\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/74658100d68b5c5b2d7bba32429c45e3c6ccd4a9b86ed7d187485ccc9e2e0135?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/74658100d68b5c5b2d7bba32429c45e3c6ccd4a9b86ed7d187485ccc9e2e0135?s=96&d=mm&r=g\",\"caption\":\"Prashant Tilekar\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mass Exploitation of MOVEit Transfer Critical Vulnerability - Forescout","description":"How to mitigate exploitation of a critical zero-day vulnerability in the MOVEit managed file transfer software attributed to Cl0p ransomware group","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Mass Exploitation of MOVEit Transfer Critical Vulnerability - Forescout","og_description":"How to mitigate exploitation of a critical zero-day vulnerability in the MOVEit managed file transfer software attributed to Cl0p ransomware group","og_url":"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2023-06-13T17:00:13+00:00","article_modified_time":"2024-04-23T15:36:12+00:00","og_image":[{"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/CVE-2023-34362.png","type":"","width":"","height":""}],"author":"Prashant Tilekar, Sai Molige","twitter_card":"summary_large_image","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/"},"author":{"name":"Prashant Tilekar","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/cad25e89f0f8a6e91271f9cd4433d573"},"headline":"Mass Exploitation of MOVEit Transfer Critical Vulnerability \u2013 Recommended Mitigations and How Forescout Can Help","datePublished":"2023-06-13T17:00:13+00:00","dateModified":"2024-04-23T15:36:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/"},"wordCount":1515,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/CVE-2023-34362.png","articleSection":["News &amp; Views"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/","url":"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/","name":"Mass Exploitation of MOVEit Transfer Critical Vulnerability - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/CVE-2023-34362.png","datePublished":"2023-06-13T17:00:13+00:00","dateModified":"2024-04-23T15:36:12+00:00","description":"How to mitigate exploitation of a critical zero-day vulnerability in the MOVEit managed file transfer software attributed to Cl0p ransomware group","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/CVE-2023-34362.png","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/CVE-2023-34362.png","width":792,"height":442},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Mass Exploitation of MOVEit Transfer Critical Vulnerability \u2013 Recommended Mitigations and How Forescout Can Help"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/cad25e89f0f8a6e91271f9cd4433d573","name":"Prashant Tilekar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/b30f85c3e3ebd0cb52e8ff993f1e3f10","url":"https:\/\/secure.gravatar.com\/avatar\/74658100d68b5c5b2d7bba32429c45e3c6ccd4a9b86ed7d187485ccc9e2e0135?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/74658100d68b5c5b2d7bba32429c45e3c6ccd4a9b86ed7d187485ccc9e2e0135?s=96&d=mm&r=g","caption":"Prashant Tilekar"}}]}},"featured_media_url":false,"is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/78915","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=78915"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/78915\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=78915"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=78915"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=78915"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=78915"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}