Site icon Blog Time

Hackers Exploit File-Transfer Tool Vulnerability in New Wave of Mass Attacks

Hackers exploiting file-transfer tool flaw

Security researchers are caution that hackers are actively exploiting another high-chance vulnerability in a famous report switch generation to release mass hacks. 

The vulnerability, tracked as CVE-2024-50623, influences software program developed through Illinois-primarily based employer software agency Cleo, consistent with researchers at cybersecurity company Huntress. 

The flaw became first disclosed through Cleo in a protection advisory on October 30 which warned that exploitation should cause faraway code execution. It influences ​​Cleo’s LexiCom, VLTransfer, and Harmony gear, which might be generally utilized by businesses to manage file transfers.

Cleo released a patch for the vulnerability in October, however in a weblog on Monday Huntress warned that the patch does not mitigate the software program flaw.

Huntress security researcher John Hammond said the corporation has determined chance actors “exploiting this software program en masse” due to the fact December 3. He added that Huntress — which protects greater than 1,700 Cleo LexiCom, VLTransfer, and Harmony servers — has discovered at the least 10 organizations whose servers had been compromised. 

“Victim agencies so far have protected numerous patron product groups, logistics and shipping organizations, and food suppliers,” wrote Hammond, including that many different customers are prone to being hacked.

Shodan, a search engine for publicly available gadgets and databases, lists hundreds of vulnerable Cleo servers, the bulk of which can be located in the U.S.

Cleo has extra than 4,two hundred clients, inclusive of U.S. Biotechnology employer Illumina, sports activities shoes giant New Balance, and Dutch logistics company Portable.

Huntress has not but diagnosed the hazard actor at the back of these assaults and it’s not known whether any information has been stolen from impacted Cleo customers. However, Hammond mentioned that the employer has observed hackers performing “post-exploitation interest” after compromising prone structures.

Cleo did now not respond to TechCrunch’s questions and has not but launched a patch that protects in opposition to the flaw. Huntress recommends that Cleo customers circulate any internet-uncovered systems behind a firewall till a new patch is launched.

Enterprise report switch equipment are a famous target amongst hackers and extortion companies. Last 12 months, the Russia-linked Clop ransomware gang claimed thousands of victims with the aid of exploiting a zero-day vulnerability in Progress Software’s MOVEit Transfer product. The identical gang had formerly taken credit for the mass exploitation of a vulnerability in Fortra’s GoAnywhere managed file transfer software, which became used to target greater than 130 groups. 

Exit mobile version