U.S. Energy Department and Other Agencies Compromised in MOVEit Cyber Attack
Several U.S. government agencies, including the U.S. Energy Department, have announced that they are among the businesses who have fallen victim to the MOVEit Cyber Attack. Officials reported on Thursday June 15th that data was compromised at two entities within the Energy Department when hackers exploited the MOVEit security flaw.
The entities affected were the DOE contractor Oak Ridge Associated Universities, and the Waste Isolation Pilot Plant, a New Mexico-based facility for the disposal of defence-related nuclear waste. In addition to these, a number of other organisations were also hit, including energy giant Shell, the University System of Georgia, Johns Hopkins University, and Johns Hopkins Health System, a non-profit that collaborates with the university and operates six hospitals and primary care centres.
The recent victims join a growing list of entities across the U.K., U.S., and other countries whose systems have been infiltrated via the MOVEit Transfer software. The hackers capitalised on a security flaw that the software maker, Progress Software, identified late last month. The Russia-linked extortion group Clop, which has claimed responsibility for the MOVEit hack, stated that it would not exploit any data taken from government agencies and asserted that all such data had been erased, something which Cyber Security specialists have brought into question.
The U.S. Cyber Security and Infrastructure Security Agency (CISA) confirmed that it was assisting several federal agencies that had been breached, without naming them specifically. The agency stated, “At this time, we are not tracking any significant impacts to the federal civilian executive branch (.gov) enterprise but are continuing to work with our partners on this issue”.
The Energy Department, responsible for managing U.S. nuclear infrastructure and energy policy, announced that it had informed Congress of the breach and was actively participating in investigations with law enforcement and CISA. Shell stated that there was no evidence of impact to the company’s core IT systems from the MOVEit Transfer-related breach, with approximately 50 users of the tool under urgent investigation for potential data impact.
Johns Hopkins University and the University System of Georgia, which comprises about 26 public colleges, are also investigating the extent of the data exposure from the MOVEit hack. Last week, large organisations including the UK’s telecom regulator Ofcom, British Airways, the BBC and Boots were identified as victims of this widespread hacking campaign.
Progress Software, the company behind MOVEit Transfer, is currently liaising with federal law enforcement and assisting customers in applying fixes to their systems. Despite the company’s shares ending down 6.1% on Thursday, it continues to investigate another “critical vulnerability” discovered in MOVEit Transfer, though it remains unclear whether this vulnerability has yet been exploited by hackers.
MOVEit Transfer is a frequently used tool by organisations to share sensitive information with partners or customers, including payroll and HR information as seen through Zellis, further highlighting the potential magnitude of this cyber attack. As the investigation continues, the full extent of the breach on companies around the world remains to be seen.
If your business is concerned about if account details have been leaked on the dark web, or if you want to lear how to implement a strong password policy, multi-factor authentication, prevent targeted phishing emails and much more download our FREE Cyber Security Self Assessment form to see if your business is practicing the best Cyber Security to protect you from attacks. You can also request for a FREE one off Dark Web scan to see if any of your business critical accounts are exposed, and we can also offer this as an ongoing live or monthly managed service. Click the links below to reach out to us.
Latest News Stories
Major Australian Law Firm Suffers Cyber Attack: Dark Web Leak Threatens Government Data
After a recent & significant escalation of cyber criminal activity in Australia, Russian-linked threat actors, known as the AlphV ransomware gang or "Blackcat", have targeted the major Australian law firm HWL Ebsworth. On the June 8th, the group claimed to have...
Details of 85 Million People Leaked: Turkish Government Site Hacked
The Turkish e-Devlet government services website has fallen victim to a significant hacking incident. The platform, which is the main public administration portal in Turkey, stores personal information including details about education, health, banking credentials,...
The Devastating Results of Ransomware Attacks: Illinois Hospital Closes
A Hospital in Illinois (US) has has announced it will be closing after failing to financially recover from a Ransomware Attack which hit the hospital in 2021 which halted the hospital’s ability to submit claims to insurers, Medicare or Medicaid for months, sending it...
Our Customers
Testimonials
Annette, Blastcom
Ryan was very helpful and sorted out the problem for me.
Robert Prince, St. Bedes College
Quick response times and excellent customer service.
Claire H, MSP PLC
Made a call into day, to arrange an engineer visit and was able to get there before 12noon and solve the issue.