• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Microsoft: Lace Tempest Hackers Behind Active Exploitation of MOVEit Transfer App

You are here: Home / Cyber Security News / Microsoft: Lace Tempest Hackers Behind Active Exploitation of MOVEit Transfer App

Microsoft has officially linked the ongoing lively exploitation of a critical flaw in the Progress Computer software MOVEit Transfer application to a danger actor it tracks as Lace Tempest.

“Exploitation is frequently adopted by deployment of a web shell with information exfiltration abilities,” the Microsoft Risk Intelligence group explained in a sequence of tweets currently. “CVE-2023-34362 makes it possible for attackers to authenticate as any user.”

Lace Tempest, also called Storm-0950, is a ransomware affiliate that overlaps with other teams these kinds of as FIN11, TA505, and Evil Corp. It is also recognized to run the Cl0p extortion web page.

The menace actor also has a track record of exploiting distinctive zero-day flaws to siphon information and extort victims, with the group just lately observed weaponizing a extreme bug in PaperCut servers.

CVE-2023-34362 relates to an SQL injection vulnerability in MOVEit Transfer that permits unauthenticated, distant attackers to gain obtain to the database and execute arbitrary code.

There are considered to be at least around 3,000 exposed hosts employing the MOVEit Transfer company, in accordance to details from attack surface area management company Censys.

Future WEBINAR 🔐 Mastering API Security: Comprehending Your True Attack Surface

Uncover the untapped vulnerabilities in your API ecosystem and just take proactive measures towards ironclad security. Sign up for our insightful webinar!

Sign up for the Session.advert-button,.ad-label,.advertisement-label:right afterexhibit:inline-block.ad_two_webinarmargin:20px 10px 30px 0background:#f9fbffcolor:#160755padding: 5%border:2px strong #d9deffborder-radius:10pxtext-align:leftbox-shadow:10px 10px #e2ebff-webkit-border-top-still left-radius:25px-moz-border-radius-topleft:25px-webkit-border-base-ideal-radius:25px-moz-border-radius-bottomright:25px.ad-labelfont-dimension:13pxmargin:20px 0font-bodyweight:600letter-spacing:.6pxcolor:#596cec.ad-label:afterwidth:50pxheight:6pxcontent:”border-prime:2px good #d9deffmargin: 8px.ad-titlefont-dimension:21pxpadding:10px 0font-weight:900text-align:leftline-top:33px.advertisement-descriptiontextual content-align:leftfont-measurement:15.6pxline-top:26pxmargin:5px !importantcolor:#4e6a8d.advert-buttonpadding:6px 12pxborder-radius:5pxbackground-colour:#4469f5font-sizing:15pxcolor:#fff!importantborder:0line-peak:inherittext-decoration:none!importantcursor:pointermargin:15px 20pxfloat:leftfont-weight:500letter-spacing:.2px

Google-owned Mandiant, which is tracking the exercise less than the moniker UNC4857 and has labeled the web shell LEMURLOOT, reported it determined broad tactical connections with FIN11.

The U.S. Cybersecurity and Infrastructure Security Company (CISA), last 7 days, included the flaw to its Acknowledged Exploited Vulnerabilities (KEV) catalog, recommending federal companies to apply vendor-supplied patches by June 23, 2023.

The advancement follows the comparable zero-day mass exploitation of Accellion FTA servers in December 2020 and GoAnywhere MFT in January 2023, making it vital that people use the patches as before long as probable to protected from prospective hazards.

Located this post appealing? Observe us on Twitter  and LinkedIn to examine more exceptional information we write-up.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « The Annual Report: 2024 Plans and Priorities for SaaS Security
Next Post: Spanish Bank Globalcaja Hit By Ransomware Attack »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
  • Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers
  • ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files
  • ⚡ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams
  • The Persistence Problem: Why Exposed Credentials Remain Unfixed—and How to Change That

Copyright © 2025 · AllTech.News, All Rights Reserved.