Article Details
Scrape Timestamp (UTC): 2023-10-16 03:00:15.780
Source: https://www.theregister.com/2023/10/16/infosec_in_brief/
Original Article Text
Click to Toggle View
Regulator, insurers and customers all coming for Progress after MOVEit breach. Also, CISA cataloging new ransomware data points, 17k WP sites hijacked by malware in Sept., and more critical vulns. Infosec in brief The fallout from the exploitation of bugs in Progress Software's MOVEit file transfer software continues, with the US Securities and Exchange Commission (SEC) now investigating the matter, and lots of affected parties seeking compensation. Progress admitted to the ill winds of corporate responsibility blowing its way in a quarterly SEC 10-Q filing. Per the disclosure, it received a subpoena from the SEC on October 2, in which the Commission asked for "various documents and information relating to the MOVEit Vulnerability." "At this stage, the SEC investigation is a fact-finding inquiry, the investigation does not mean that Progress or anyone else has violated federal securities laws," the application vendor explained, adding that it intends to fully cooperate. Progress also admitted it's facing a slew of other litigation – both in the US and in other countries – over the breach, far in excess of the dozen or so cases it was reportedly facing as of July. "We are party to 58 class action lawsuits filed by individuals who claim to have been impacted by the exfiltration of data from the environments of our MOVEit Transfer customers," Progress stated in the filing. Those cases were consolidated into a single lawsuit in Massachusetts earlier this month. Again, that's not all. Progress has also received "formal letters" from 23 MOVEit customers who claim the vulnerability has cost them money, and some "have indicated that they intend to seek indemnification." In addition, Progress is also facing a subrogation claim from an insurer, which means it's "seeking recovery for all expenses incurred in connection with the MOVEit Vulnerability." "We have also been cooperating with several inquiries from domestic and foreign data privacy regulators, inquiries from several state attorneys general," and it's also being investigated by an unnamed federal law enforcement agency. A recently discovered exploit in another Progress file transferring app, WS_FTP, merited barely a mention in the SEC filing. Progress wrote only that it had patched issues and acknowledged active exploitation. Critical vulnerabilities of the week We start this week's list of the latest critical vulnerabilities and known exploits with Fortinet, which released several security updates – including a pair of critical ones in FortiSIEM, FortiManager and FortiAnalyzer. A bunch of FortiSIEM versions are vulnerable to multiple CVSS 9.7-level path traversal vulnerabilities that can lead to privilege escalation, while FortiManager and FortiAnalyzer (multiple versions) are vulnerable to privilege escalation via specially-crafted HTTP requests (CVSS 8.6). Patches are available for both issues. As for industrial control systems, despite CISA releasing a 19-item notification list, only a few of the issues were serious: As for newly discovered known exploited vulnerabiilties, there's only a couple to report that we didn't cover elsewhere this week. They may not be as severe as the others, but they're still being exploited in the wild, so take care: CISA adds new ransomware risk cataloging resources The US Cybersecurity and Infrastructure Security Agency is expanding its pool of resources for those fighting to prevent ransomware infections, with two new initiatives as part of the agency's Ransomware Vulnerability Warning Pilot program. The first takes the form of a new column in the Agency's Known Exploited Vulnerabilities catalog that indicates whether an actively exploited weakness is known to be used in ransomware campaigns. The change is already live and present on all vulnerabilities added to the catalog. The aforementioned Progress software exploits, along with Log4j and other well-known vulnerabilities, all indicate that they've been used by ransomware actors. The second, and arguably more important one for those trying to harden an environment, is the new list of Misconfigurations and Weaknesses Known to be Used in Ransomware Campaigns. The catalog isn't CVE-based, and still quite short, listing vulnerable services like RDP, VNC, SMB and the like, and what ports are commonly used to exploit misconfigurations. 17k+ WordPress sites hacked to add malware injector last month Cyber security firm and GoDaddy subsidiary Sucuri said in a recent report that more than 17,000 WordPress websites have been hit by a cross-site scripting vulnerability in a Composer plugin used by WordPress premium theme maker tagDiv. Cross-site scripting attacks aren't a new issue for WordPress implementations that use various themes with plugins of questionable origin or software supply chain, and this latest issue seems like more of the same. In this case, tagDiv's Composer plugin is used in its Newspaper and Newsmag premium themes, which Sucuri said is used by over 135,000 paying customers. Newsmag is in use on another 18,579 sites, but neither figure accounts for pirated copies of the theme, Sucuri noted. Injectors like Balada hijack legitimate services and can be used to run malicious code on websites to phish users, hijack credentials and steal PII, among other actions. Sucuri includes infection mitigation steps in its report, starting critically with scanning WordPress sites to check for any malicious code – a tool for which Sucuri just happens to have handy.
Daily Brief Summary
The US Securities and Exchange Commission (SEC) is investigating Progress Software after a cyber breach exploited bugs in its MOVEit file transfer software.
Progress stated in an SEC 10-Q filing that it had received a subpoena seeking various documents and information relating to the vulnerability.
The software firm is also facing 58 class action lawsuits filed by individuals claiming to have been impacted by the data exfiltration from environments of its MOVEit Transfer clients.
On top of this, the company has received formal letters from 23 MOVEit customers alleging that the vulnerability has cost them money and some are seeking indemnification.
An insurer has also filed a subrogation claim with Progress, seeking recovery for all expenses associated with the MOVEit vulnerability.
Domestically and internationally, the firm is cooperating with inquiries from data privacy regulators, state attorneys general, and a federal law enforcement agency who are all investigating the matter.
Another exploit in a Progress file transferring application, WS_FTP, was also briefly mentioned in the SEC filing. The firm stated that it had patched this issue.