The Oregon DoT Has Become The Latest Victim Of The MOVEit Vulnerability

Yesterday, the Oregon Department of Transportation said the drivers’ licenses and IDs of 3.5 million Oregonians are at risk after a data breach involving the now infamous MOVEit vulnerability  that has been responsible for pwnage left and right. 

State officials became aware on June 1 that the agency’s system had been hacked and within a few hours the systems were locked down. It took almost two weeks of analysis to determine that the hack compromised the state’s driver license and ID records. 

Currently, the DMV is not able to identify exactly whose IDs have been breached, but they say all Oregonians should assume their information has been compromised. Furthermore, it is unclear whether details beyond a license number, photo or address had been accessed. 

“For security purposes, we’re not going to discuss exactly what data points were potentially included in that file,” said Amy Joyce, ODOT DMV Administrator.  

Stephen Gates, Principal Security SME, Horizon3.ai had this to say:

   “News of this breach (and more like it) is a textbook example of attackers taking advantage of the window of opportunity predicament. Vulnerabilities in widely used software applications are publicly announced, and new patches are becoming available from the vendor, yet the patches have often not been applied – resulting in a breach.

   “The reason why attackers are successful at exploiting the window of opportunity is multi-fold. Often, organizations don’t always know what applications need to be patched, they give critical patching a lower priority than they should, they must wait for maintenance windows to patch vulnerable applications, and/or they often try to protect known vulnerabilities with other security controls not designed to mitigate the identified risk. Expect more of the same folks.”

I honestly don’t expect the announcements of organizations being pwned by the MOVEit vulnerability to slow down anytime soon. And it illustrates what happens when a threat actor gets their hands on a vulnerability in software or hardware that is widely used.

Leave a Reply

Discover more from The IT Nerd

Subscribe now to keep reading and get access to the full archive.

Continue reading