The MOVEit event has affected organisations both large and small, and it has thrown up the need for stringent oversight of what data is being shared where, and what vendors have access to this.
Companies need to consider how the vendors they are using could impact their organisation both directly and indirectly:
Data is one of an organisation’s most important assets, as a result a robust data risk management strategy should be in place. An organisation should have visibility of:
Questions that an organisation should be asking themselves include:
While the CVE scoring system helps indicate what patches are critical and what are not, there is a business lens need to be applied to this. Applications that are holding sensitive data need to be prioritised especially if they are visible externally. Organisations should have a formal process for ingesting patches from vendors.
Organisations should not rely on vendors to provide secure products – additional monitoring should be put around an application, especially if it is related to other systems. Monitoring in front of filesharing tools is a must. In the event of a suspected incident, network monitoring data should be used to validate any IoCs (Indicators of Compromise) provided by the vendor.
As part of a well-managed detective capability, logs should be consumed from a variety of sources. File sharing applications are no exception to this, and this should be layered with network monitoring in the event the application is compromised, and the logs do not reflect the malicious activity.
In recent years we have seen that threat actors are typically impatient, and the corresponding organisation is often unstructured. This is evidenced by several breakaway threat actor groups that we have seen over the past 24 months.
In this current case CL0P (group behind MOVEit ) are more organised and there are reports that they have been testing the MOVEit transfer exploit since 2021. As a result of this, it has allowed them to exploit many organisations in short periods of time ahead of a patch being readily available.
CL0P have a track record of compromising file transfer tools, as they have been indicated to be behind the GoAnywhere and Accelion breachs in 2023 and 2021 respectively. While these tools had several clients using them, the MOVEit profile is significantly larger and therefore the number of clients impacted is greater.
Based on the above and what we have observed through our market analysis and own experience, we suggest four core areas of focus, not only for the MOVEit event but going forward to ensure a robust cyber risk management approach.