U.S. Energy Department and Other Agencies Compromised in MOVEit Cyber Attack
Several U.S. government agencies, including the U.S. Energy Department, have announced that they are among the businesses who have fallen victim to the MOVEit Cyber Attack. Officials reported on Thursday June 15th that data was compromised at two entities within the Energy Department when hackers exploited the MOVEit security flaw.
The entities affected were the DOE contractor Oak Ridge Associated Universities, and the Waste Isolation Pilot Plant, a New Mexico-based facility for the disposal of defence-related nuclear waste. In addition to these, a number of other organisations were also hit, including energy giant Shell, the University System of Georgia, Johns Hopkins University, and Johns Hopkins Health System, a non-profit that collaborates with the university and operates six hospitals and primary care centres.
The recent victims join a growing list of entities across the U.K., U.S., and other countries whose systems have been infiltrated via the MOVEit Transfer software. The hackers capitalised on a security flaw that the software maker, Progress Software, identified late last month. The Russia-linked extortion group Clop, which has claimed responsibility for the MOVEit hack, stated that it would not exploit any data taken from government agencies and asserted that all such data had been erased, something which Cyber Security specialists have brought into question.
The U.S. Cyber Security and Infrastructure Security Agency (CISA) confirmed that it was assisting several federal agencies that had been breached, without naming them specifically. The agency stated, “At this time, we are not tracking any significant impacts to the federal civilian executive branch (.gov) enterprise but are continuing to work with our partners on this issue”.
The Energy Department, responsible for managing U.S. nuclear infrastructure and energy policy, announced that it had informed Congress of the breach and was actively participating in investigations with law enforcement and CISA. Shell stated that there was no evidence of impact to the company’s core IT systems from the MOVEit Transfer-related breach, with approximately 50 users of the tool under urgent investigation for potential data impact.
Johns Hopkins University and the University System of Georgia, which comprises about 26 public colleges, are also investigating the extent of the data exposure from the MOVEit hack. Last week, large organisations including the UK’s telecom regulator Ofcom, British Airways, the BBC and Boots were identified as victims of this widespread hacking campaign.
Progress Software, the company behind MOVEit Transfer, is currently liaising with federal law enforcement and assisting customers in applying fixes to their systems. Despite the company’s shares ending down 6.1% on Thursday, it continues to investigate another “critical vulnerability” discovered in MOVEit Transfer, though it remains unclear whether this vulnerability has yet been exploited by hackers.
MOVEit Transfer is a frequently used tool by organisations to share sensitive information with partners or customers, including payroll and HR information as seen through Zellis, further highlighting the potential magnitude of this cyber attack. As the investigation continues, the full extent of the breach on companies around the world remains to be seen.
If your business is concerned about if account details have been leaked on the dark web, or if you want to lear how to implement a strong password policy, multi-factor authentication, prevent targeted phishing emails and much more download our FREE Cyber Security Self Assessment form to see if your business is practicing the best Cyber Security to protect you from attacks. You can also request for a FREE one off Dark Web scan to see if any of your business critical accounts are exposed, and we can also offer this as an ongoing live or monthly managed service. Click the links below to reach out to us.
Latest News Stories
(Updated 12/04/23 – 09:30BST) SECURITY ALERT: 3CX Desktop App Security Vulnerability
UPDATE 12/04/2023 - 09:30BST: Mandiant's initial investigation into the 3CX intrusion and supply chain attack attributes the activity to a North Korean-linked group, UNC4736. They discovered that the attackers infected targeted 3CX systems with Windows-based TAXHAUL...
FBI Issues Cyber Security Warning over using Public Charging Points
The FBI has issued a warning urging individuals and businesses to avoid using public USB ports due to the risk of malware infections. According to a tweet from the Denver FBI office (as reported by CNBC), cyber criminals have exploited charging stations and points...
New Cyber Alert – New Nexus Trojan on Android, Attacking Mobile Banking Accounts
The new Android trojan is being spread through phishing pages disguised as legitimate websites called YouTube Vanced. The botnet, named Nexus, was first made available on a forum in January 2023 for a monthly fee of $3,000 and was described as a "very new" project...
Our Customers
Testimonials
Woody World
Alex & Jordan provided the usual exceptional service that One2Call have always provided. Thanks, one and all.
Jane, Barca Leeds
Very quick at responding to problems – keep you updated – easy to deal with – very happy with the service !
James, Proove Restaurant
Very helpful, did exactly what I needed.