Future Tech

Regulator, insurers and customers all coming for Progress after MOVEit breach

Tan KW
Publish date: Mon, 16 Oct 2023, 11:53 AM
Tan KW
0 461,419
Future Tech

Infosec in brief The fallout from the exploitation of bugs in Progress Software's MOVEit file transfer software continues, with the US Securities and Exchange Commission (SEC) now investigating the matter, and lots of affected parties seeking compensation. 

Progress admitted to the ill winds of corporate responsibility blowing its way in a quarterly SEC 10-Q filing. Per the disclosure, it received a subpoena from the SEC on October 2, in which the Commission asked for "various documents and information relating to the MOVEit Vulnerability."

"At this stage, the SEC investigation is a fact-finding inquiry, the investigation does not mean that Progress or anyone else has violated federal securities laws," the application vendor explained, adding that it intends to fully cooperate. 

Progress also admitted it's facing a slew of other litigation - both in the US and in other countries - over the breach, far in excess of the dozen or so cases it was reportedly facing as of July. 

"We are party to 58 class action lawsuits filed by individuals who claim to have been impacted by the exfiltration of data from the environments of our MOVEit Transfer customers," Progress stated in the filing. Those cases were consolidated into a single lawsuit in Massachusetts earlier this month. 

Again, that's not all.

Progress has also received "formal letters" from 23 MOVEit customers who claim the vulnerability has cost them money, and some "have indicated that they intend to seek indemnification." In addition, Progress is also facing a subrogation claim from an insurer, which means it's "seeking recovery for all expenses incurred in connection with the MOVEit Vulnerability." 

"We have also been cooperating with several inquiries from domestic and foreign data privacy regulators, inquiries from several state attorneys general," and it's also being investigated by an unnamed federal law enforcement agency. 

A recently discovered exploit in another Progress file transferring app, WS_FTP, merited barely a mention in the SEC filing. Progress wrote only that it had patched issues and acknowledged active exploitation. 

CISA adds new ransomware risk cataloging resources

The US Cybersecurity and Infrastructure Security Agency is expanding its pool of resources for those fighting to prevent ransomware infections, with two new initiatives as part of the agency's Ransomware Vulnerability Warning Pilot program.

The first takes the form of a new column in the Agency's Known Exploited Vulnerabilities catalog that indicates whether an actively exploited weakness is known to be used in ransomware campaigns. 

The change is already live and present on all vulnerabilities added to the catalog. The aforementioned Progress software exploits, along with Log4j and other well-known vulnerabilities, all indicate that they've been used by ransomware actors. 

The second, and arguably more important one for those trying to harden an environment, is the new list of Misconfigurations and Weaknesses Known to be Used in Ransomware Campaigns. The catalog isn't CVE-based, and still quite short, listing vulnerable services like RDP, VNC, SMB and the like, and what ports are commonly used to exploit misconfigurations.

17k+ WordPress sites hacked to add malware injector last month

Cyber security firm and GoDaddy subsidiary Sucuri said in a recent report that more than 17,000 WordPress websites have been hit by a cross-site scripting vulnerability in a Composer plugin used by WordPress premium theme maker tagDiv. 

Cross-site scripting attacks aren't a new issue for WordPress implementations that use various themes with plugins of questionable origin or software supply chain, and this latest issue seems like more of the same. 

In this case, tagDiv's Composer plugin is used in its Newspaper and Newsmag premium themes, which Sucuri said is used by over 135,000 paying customers. Newsmag is in use on another 18,579 sites, but neither figure accounts for pirated copies of the theme, Sucuri noted. 

Injectors like Balada hijack legitimate services and can be used to run malicious code on websites to phish users, hijack credentials and steal PII, among other actions. Sucuri includes infection mitigation steps in its report, starting critically with scanning WordPress sites to check for any malicious code - a tool for which Sucuri just happens to have handy. ®

 

https://www.theregister.com//2023/10/16/infosec_in_brief/

Discussions
Be the first to like this. Showing 0 of 0 comments

Post a Comment