2 min read
I (don't) like to MOVEit MOVEit
The PacketWatch Intelligence Team : Jun 1, 2023 11:10:41 AM
NOTICE
As this is actively being investigated and new information is continuously coming out, this information is subject to change. Please reach out to our team for corrections and see if PacketWatch can help detect and respond to any potential incidents.
June 15, 2023 Update
A new and separate vulnerability of critical severity again impacts MOVEit transfer, CVE-2023-35036. This SQL injection does not currently lead to RCE, but "could lead to escalated privileges and potential unauthorized access to the environment." (Source) Of particular concern, proof of concept code is online, increasing the risk of exploitation of web-facing MOVEit Transfer infrastructure.
Mitigations are in the article by Progress, which involves restricting HTTP and HTTPS traffic to the MOVEit Transfer server. Unfortunately, this will also impact usability until further information or a patch is released.
CVE-2023-34362: MOVEit File Transfer Software Critical Vulnerability
PacketWatch was made aware of a critical vulnerability being actively exploited with a file transfer software MOVEit, from the company Progress. In Progress’ article addressing these security concerns, there is currently a patch available, along with additional mitigation techniques if immediate patching is not possible.[1] This is being tracked under CVE-2023-34362 as an SQL injection vulnerability, which can also lead to Remote Code Execution (RCE).[5][6]
Security professionals in the links below have been actively working on aggregating information concerning this. BleepingComputer has also published an article with useful information.[2][3][4]
Am I Affected?
If you are a PacketWatch customer, we currently have no indications that our customers have been exploited. Please follow up with the PacketWatch team to discuss additional concerns and questions.
For everyone else, we want to echo the work done at large by other teams, such as Huntress Labs and individual security professionals, to ensure this message quickly gets out. Twitter user @UK_Daniel_Card shared ways to identify publicly exposed MOVEit instances via Shodan, an online scanning tool.
a better query:https://t.co/CEzYFe1cF8#MoveIT #Ransomware #Exploit pic.twitter.com/7pszUcJPtf
— mRr3b00t (@UK_Daniel_Card) June 1, 2023
Additionally, Twitter user @JimSycurity shared that businesses partnered with Fiserv may want to follow up with their reps to see if they may be potentially affected.
If Fiserv is your bank's technology partner, contact your Fiserv account rep and push them for details on what their response is to this situation. As of my knowledge a year ago, Fiserv was heavily vested in MOVEit sites for everything from Check21 to ACH.
— Jim Sykora (@JimSycurity) June 1, 2023
The most important step any company can take is actively and quickly responding to these threats as they emerge. Your security team, IT team, and leveraged security resources should be available to help.
If you still need assistance or have any active incidents, PacketWatch specializes in network detection, threat hunting, and incident response to meet your business needs.
Indicators of Compromise (IOCs)
Last Updated June 2, 2023
A security researcher Florian Roth on Twitter has created a comprehensive list of IOCs and references to IOCs other organizations have compiled in this thread:
Okay, let's cover the 0day exploitation of the #MOVEit Transfer service with some rules
— Florian Roth (@cyb3rops) June 1, 2023
Filename IOCshttps://t.co/sPbirtYPwt
Sigma rulehttps://t.co/QHZKlVphYo https://t.co/WIQyEghUFx pic.twitter.com/QlguICM1lX
File:
- human2.aspx [3][4]
IP:
- 89.39.105[.]108 [3]
- 5.252.190[.]197 [3][4]
- Also noted by the user that the entire 5.252.190.0/24 range is potentially suspect.
References
- [1] https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023
- [2] https://www.bleepingcomputer.com/news/security/new-moveit-transfer-zero-day-mass-exploited-in-data-theft-attacks/
- [3] https://www.reddit.com/r/sysadmin/comments/13wxuej/comment/jmh4ws8/
- [4] https://www.reddit.com/r/msp/comments/13xjs1y/tracking_emerging_moveit_transfer_critical/
-
[5] https://nvd.nist.gov/vuln/detail/CVE-2023-34362
-
[6] https://www.rapid7.com/blog/post/2023/06/01/rapid7-observed-exploitation-of-critical-moveit-transfer-vulnerability/