TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

Move It on Over: Reflecting on the MOVEit Exploitation | Huntress

2023-07-07 · Read original ↗

ATT&CK techniques detected

6 predictions
T1505.003Web Shell
96%
“other entities, the web shell deployed in moveit exploitation is essentially the same across victims aside from superficial filename changes and a hardcoded, seemingly randomly generated password. while insufficient evidence exists to definitively prove the following hypothesis, …”
T1486Data Encrypted for Impact
93%
“in the deployment of ransomware or the compromise of entire organizations. instead, identified tradecraft thus far, as documented by huntress and others, indicates initial access was used to deploy a web shell. this web shell could be used, within the context of the exploited ser…”
T1190Exploit Public-Facing Application
84%
“managing exploitation at scale the steady drumbeat of new moveit victims, whether through cl0p ’ s leak site or through victim notifications to users, seemingly implies continued exploitation of this vulnerability. however, within huntress telemetry and in discussions with indust…”
T1505.003Web Shell
74%
“managing exploitation at scale the steady drumbeat of new moveit victims, whether through cl0p ’ s leak site or through victim notifications to users, seemingly implies continued exploitation of this vulnerability. however, within huntress telemetry and in discussions with indust…”
T1190Exploit Public-Facing Application
42%
“move it on over : reflecting on the moveit exploitation | huntress in late may 2023, customers running the popular moveit file transfer software faced multiple, unexplained intrusions. as previously documented by huntress, moveit customers found themselves the victim of an active…”
T1657Financial Theft
37%
“in the deployment of ransomware or the compromise of entire organizations. instead, identified tradecraft thus far, as documented by huntress and others, indicates initial access was used to deploy a web shell. this web shell could be used, within the context of the exploited ser…”

Summary

In this blog, we explore the long-term impact of the MOVEit exploitation and how defenders can stay vigilant and learn from the past.