![]() ![]() Alfred State College in New York (impact by NSC, TIAA and Corebridge).Alfa Laval, Swedish manufacturing company.Aging Services Access Points (ASAP), based in Massachusetts.Aetna Life Insurance Company (impacted by PBI).Aerlingus, Irish airline (impacted by Zellis).Advanced Integration Technology, Texas based aviation component manufacturer.Adare SEC, UK based advertising services provider.Accelya Global Ltd, European IT services provider (impacted by Alight).Abilene Christian University in Texas (impacted by NSC).AbbVie, US based pharmaceutical company.A + Federal Credit Union, Texas based Credit Union.1871, German life insurance provider (impacted by Majorel).Let’s take a look at the victims that have been announced to date: ![]() We’ll be following this attack closely and updating this blog with new information as the story unfolds. The current victim list is massive and growing, and Clop continues to share new entries every day, which begs the question, how many companies have actually been affected by this attack? Some victims have publicly announced their involvement in the breach, other have simply been named by Clop themselves. Websites have also been created for Aon, EY, Kirkland and TD Ameritrade. The first site was created by threat actors for PwC, where all leaked company data was posted in four spanned ZIP archives. It has emerged that Clop ransomware gang has started to create clearweb sites to leak stolen stolen during these recent MOVEit Transfer data theft attacks. The group has stated that it will start publishing content from those organizations that do not negotiate an extortion payment by June 21 st.Ĭlop have recently released a statement claiming that it has erased all data stolen from government, city, and police services as they have “no interest to expose such information.” In the days that have followed, numerous other companies have been named. On that deadline day, the names of 13 companies was released on their leak site. The ransomware group gave impacted companies until June 14 th to contact them. Since then, advisories on other vulnerabilities have been issued with fixes closely following. Shortly after attacks began, Progress identified the vulnerability and a patch was offered in late May, though not all clients applied it. The vulnerability, now tracked as CVE-2023-34362, is believed to have been exploited since around May 27 th and has led to multiple waves of data breaches in the weeks following. The aim of the attack was data theft, particularly personally identifiable information (PII) from customer databases. The Clop ransomware group has created the MOVEit exploit using a zero-day vulnerability in third-party file transfer software MOVEit Transfer, owned by Progress Software. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |