Last week, Colorado State University informed its students and staff that the Cl0p ransomware operation has gained access to their personal data through the recent MOVEit data-theft attacks on the University’s service vendors, TIAA, National Student Clearinghouse, Corebridge Financial, Genworth Financial, Sunlife, and The Hartford.”
Some data about prospective, current, and former CSU students and current and former employees maintained by the affected vendors contains personally identifiable information, which may include first name, middle initial, last name, date of birth, student or employee identification numbers, social security number, and demographic information such as gender, ethnicity, and level and area of education.” warned CSU.
All of the providers utilized the MOVEit Transfer security file transfer platform and since then, Stony Brook University, the University of Delaware, and the Western University of Health Sciences have posted data breach notices relating to the compromise of TIAA, NSC, and Corebridge Financial.
Stephen Gates, Principal Security SME, Horizon3.ai had this to say:
“Although most organization have regularly scheduled maintenance windows where they take systems offline, apply the latest patches, perform system updates, and complete any other scheduled maintenance, organizations must be able to make exceptions to their standard operational procedures, especially for times like these.
“In the case of the recent MOVEit vulnerabilities that threat actors are actively exploiting in the wild, organizations cannot wait for regularly scheduled maintenance windows to patch. If organizations have applied patches, good job! If they have not already applied patches, they must make an exception and update now. If not, the likelihood of more organizations falling victim is extremely high.”
The fact that new victims are appearing every day makes me wonder I this will never end. And the fact that in this case, it was a supply chain attack highlights the fact that you’re only as strong as your weakest link. And this illustrates that there are a lot of weak links out there.
Like this:
Like Loading...
Related
This entry was posted on July 17, 2023 at 3:53 pm and is filed under Commentary with tags Hacked. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
Colorado State Is The Latest To Be Pwned By The MOVEit Vulnerability
Last week, Colorado State University informed its students and staff that the Cl0p ransomware operation has gained access to their personal data through the recent MOVEit data-theft attacks on the University’s service vendors, TIAA, National Student Clearinghouse, Corebridge Financial, Genworth Financial, Sunlife, and The Hartford.”
Some data about prospective, current, and former CSU students and current and former employees maintained by the affected vendors contains personally identifiable information, which may include first name, middle initial, last name, date of birth, student or employee identification numbers, social security number, and demographic information such as gender, ethnicity, and level and area of education.” warned CSU.
All of the providers utilized the MOVEit Transfer security file transfer platform and since then, Stony Brook University, the University of Delaware, and the Western University of Health Sciences have posted data breach notices relating to the compromise of TIAA, NSC, and Corebridge Financial.
Stephen Gates, Principal Security SME, Horizon3.ai had this to say:
“Although most organization have regularly scheduled maintenance windows where they take systems offline, apply the latest patches, perform system updates, and complete any other scheduled maintenance, organizations must be able to make exceptions to their standard operational procedures, especially for times like these.
“In the case of the recent MOVEit vulnerabilities that threat actors are actively exploiting in the wild, organizations cannot wait for regularly scheduled maintenance windows to patch. If organizations have applied patches, good job! If they have not already applied patches, they must make an exception and update now. If not, the likelihood of more organizations falling victim is extremely high.”
The fact that new victims are appearing every day makes me wonder I this will never end. And the fact that in this case, it was a supply chain attack highlights the fact that you’re only as strong as your weakest link. And this illustrates that there are a lot of weak links out there.
Share this:
Like this:
Related
This entry was posted on July 17, 2023 at 3:53 pm and is filed under Commentary with tags Hacked. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.