top of page

Security advisory: MOVEit Transfer vulnerability

There’s been a lot in the news about a zero-day vulnerability in the MOVEit file transfer software that has been exploited by threat actors. One of the areas they’ve been able to exploit is gaining access to sensitive employee information, including credit card information, and from across a range of organisations, including healthcare, finance and government.


The vulnerability, which was first reported by Mandiant, allowed threat actors to remotely execute code on a victim’s system by sending a file, which when opened, allows the attackers to then steal data from the system including credit card details, national insurance numbers and other sensitive information.


Progress Software have released patch updates for the vulnerability in their MOVEit Transfer product and the advice is to install these latest patches immediately to protect users as it will affect all versions of the software prior to version 22.0.2.


In addition to installing the latest patches, organisations should also take steps to protect themselves from this vulnerability, including:

  • Using a firewall to block incoming connections from untrusted sources.

  • Using antivirus software to scan all incoming files for malware.

  • Educating employees about the dangers of opening attachments from unknown senders.

For more information, the link to the official advisory is here. Additionally, guidance on data breaches from the NCSC can be found here.


If you have any questions or concerns, or would like to discuss how Crossword can support you, please get in touch.


Comments


bottom of page