- Security researchers see a significant increase in intellectual property analyzes for travel instances
- This could point out a newly discovered vulnerability in the tool
- Most analyzes come from the United States, so be on your guard
“ Once bitten, twice shy ”, the old adage, so when the safety researchers see hackers scanner intensively for Moveit, it is not surprising that they ring the alarm.
Information outfit on the Graynoise threat has reported a “notable push” in the number of malicious scans for the systems running the Moveit Secure managed file transfer software.
In 2023, a major vulnerability was discovered in the software, which was quickly taken up by CL0P – at the time an infamous Russian ransomware operation. The pirates abused the flaw to steal sensitive information on hundreds of organizations and millions of people – extorting their path to wealth. Government agencies, health care companies, IT companies – have all been affected.
IP volume increases regularly
Even if the bug has been crushed and most of the cases corrected, threat actors continued to scan the wide web for potential victims. Graynoise says that an ordinary day, digitization was “minimal” with less than 10 IPS per day.
The researchers note on May 27, this number increased to more than 100 unique IPS, followed by 319 IPS on May 28.
Since then, the IP daily volume has never fallen below 200 and has oscillated around the 300 range. It is, according to them, proof that someone knows something and is looking for a feat.
Over the past 90 days, more than 600 unique IP addresses have been linked to this campaign, a number that increased regularly. Most of them are in the United States, with notable personalities from Germany, Japan, Singapore, Brazil, the Netherlands, South Korea, Hong Kong and Indonesia.
Manual file transfer tools, such as Moveit, are popular among SMEs and businesses, because they allow a secure and transparent means of sharing important and often sensitive files.
This makes tools a popular target, and in addition to the progress of progress, others have also been targeted, including GoanyWheremft, IBM Aspera Faspex and others.
Via The Hacker News