U.S. Energy Department and Other Agencies Compromised in MOVEit Cyber Attack
Several U.S. government agencies, including the U.S. Energy Department, have announced that they are among the businesses who have fallen victim to the MOVEit Cyber Attack. Officials reported on Thursday June 15th that data was compromised at two entities within the Energy Department when hackers exploited the MOVEit security flaw.
The entities affected were the DOE contractor Oak Ridge Associated Universities, and the Waste Isolation Pilot Plant, a New Mexico-based facility for the disposal of defence-related nuclear waste. In addition to these, a number of other organisations were also hit, including energy giant Shell, the University System of Georgia, Johns Hopkins University, and Johns Hopkins Health System, a non-profit that collaborates with the university and operates six hospitals and primary care centres.
The recent victims join a growing list of entities across the U.K., U.S., and other countries whose systems have been infiltrated via the MOVEit Transfer software. The hackers capitalised on a security flaw that the software maker, Progress Software, identified late last month. The Russia-linked extortion group Clop, which has claimed responsibility for the MOVEit hack, stated that it would not exploit any data taken from government agencies and asserted that all such data had been erased, something which Cyber Security specialists have brought into question.
The U.S. Cyber Security and Infrastructure Security Agency (CISA) confirmed that it was assisting several federal agencies that had been breached, without naming them specifically. The agency stated, “At this time, we are not tracking any significant impacts to the federal civilian executive branch (.gov) enterprise but are continuing to work with our partners on this issue”.
The Energy Department, responsible for managing U.S. nuclear infrastructure and energy policy, announced that it had informed Congress of the breach and was actively participating in investigations with law enforcement and CISA. Shell stated that there was no evidence of impact to the company’s core IT systems from the MOVEit Transfer-related breach, with approximately 50 users of the tool under urgent investigation for potential data impact.
Johns Hopkins University and the University System of Georgia, which comprises about 26 public colleges, are also investigating the extent of the data exposure from the MOVEit hack. Last week, large organisations including the UK’s telecom regulator Ofcom, British Airways, the BBC and Boots were identified as victims of this widespread hacking campaign.
Progress Software, the company behind MOVEit Transfer, is currently liaising with federal law enforcement and assisting customers in applying fixes to their systems. Despite the company’s shares ending down 6.1% on Thursday, it continues to investigate another “critical vulnerability” discovered in MOVEit Transfer, though it remains unclear whether this vulnerability has yet been exploited by hackers.
MOVEit Transfer is a frequently used tool by organisations to share sensitive information with partners or customers, including payroll and HR information as seen through Zellis, further highlighting the potential magnitude of this cyber attack. As the investigation continues, the full extent of the breach on companies around the world remains to be seen.
If your business is concerned about if account details have been leaked on the dark web, or if you want to lear how to implement a strong password policy, multi-factor authentication, prevent targeted phishing emails and much more download our FREE Cyber Security Self Assessment form to see if your business is practicing the best Cyber Security to protect you from attacks. You can also request for a FREE one off Dark Web scan to see if any of your business critical accounts are exposed, and we can also offer this as an ongoing live or monthly managed service. Click the links below to reach out to us.
Latest News Stories
TikTok Banned on Government Devices amid Security Concerns
Today the UK Government has announced that, on security grounds, the Chinese-owned social media app TikTok will be banned on devices utilised by civil servants and government ministers, taking immediate action. Cabinet Office Minister, Oliver Dowden, released a...
The Problems with Passwords, Transitioning to Passwordless Logons
Single password-based authentication has become outdated in the digital era due to powerful machines becoming more efficient at cracking (or brute forcing) passwords, amplifying weakness made by users creating predictable passwords that are easy to guess. With...
Failing to Patch Vulnerabilities can lead you Open to Attack
Software vulnerabilities are weaknesses in computer programs that are exploited by cyber attackers to gain unauthorised access to systems. Attackers can take advantage of these vulnerabilities to run malicious codes, bypass security measures, and access sensitive...
Our Customers
Testimonials
Kim, Intake Transport
Pav is brilliant, always quick to help us and resolve issues meaning minimal impact on our business.
Cheryl, Chisholm UK
Jordan was very prompt and very helpful. All issues were resolved, or progressed further, right away.
Peter, Peak Sensors
Very competent people completing tasks accurately and quickly.