Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
Gen Digital Inc., the parent company of Norton, has fallen victim to a ransomware attack that targeted the recently disclosed MOVEit zero-day vulnerability. Gen Digital is a multinational software company specializing in cybersecurity software and services, owning brands such as Norton, Avast, LifeLock, Avira, AVG, ReputationDefender, and CCleaner.
The attack leveraged the MOVEit Transfer vulnerability (CVE-2023-34362) which is a SQL injection vulnerability in the managed file transfer system used by enterprises for secure file transfers via SFTP, SCP, and HTTP-based uploads. The Clop ransomware group, also known as Lace Tempest, has claimed responsibility for the attack and has been credited by Microsoft for exploiting the zero-day vulnerability.
The Clop ransomware gang targeted hundreds of companies globally through the MOVEit Transfer vulnerability and published an extortion note on the dark web, stating that they possess sensitive information from these organizations.
During the attack, the threat actors gained access to the personal information of Gen Digital’s employees, including names, addresses, birth dates, and business email addresses. However, the company clarified that its core IT systems and services remained unaffected, and no customer or partner data was exposed.
“We use MOVEit for file transfers and have remediated all of the known vulnerabilities in the system. When we learned of this matter, we acted immediately to protect our environment and investigate the potential impact. We have confirmed that there was no impact to our core IT systems and our services and that no customer or partner data has been exposed”, told company
Gen Digital promptly took action to protect its environment, investigate the incident, and notify the relevant data protection regulators and affected individuals. Other notable victims of ransomware attacks exploiting the MOVEit Transfer zero-day vulnerability include the U.S. Department of Energy, British Airways, Boots, the BBC, Aer Lingus, Ofcom, Shell, and the University of Rochester.
MOVEit