The financial services company says the data was stolen by exploiting a flaw discovered in December.
Morgan Stanley hacked data that leaked sensitive customer data, and this was the last known infection of hackers exploiting a series of now-modified vulnerabilities Accellion FTA, the most used third-party file transfer service. p>
What took so long? “As per the evidence, the Accellion FTA vulnerability that led to the crash was fixed in January 2021, within 5 days of the patch becoming available,” Morgan Stanley said. Although the data was obtained by an unauthorized person at the time, the seller did not discover the attack until March 2021 and did not discover its impact on Morgan Stanley until May 2021, due to the difficulty of definitively determining the files stored in it. Accellion FTA when the device was weak. The evidence informed Morgan Stanley that it found no evidence that Morgan Stanley distributed data beyond the threat.
The moderators did not immediately respond to an email about why it took so long to discover the company. Do this, inform clients, and check if other Guidehouse clients are at risk. If a reply is sent after publication, this post will be updated. Accellion clients use File Transfer Appliance as a secure email alternative for sending large data files. Instead of receiving attachments, email recipients receive links to files hosted in the FTA, which they can download. Although the product is nearly 20 years old and Accellion is transitioning the customer to a newer product, FTA Heritage is still used by hundreds of organizations in the financial, government and insurance sectors.
According to Accellion research by security firm Mandiant, anonymous hackers exploited these vulnerabilities to install a web shell that gave them a text-based interface to install malware and issue other commands on compromised networks . Mandiant also said that several of the hacked organizations subsequently received extortion allegations that threaten to publish the stolen information on a dark website belonging to the Cl0p ransomware group unless they demand a ransom. Advertising
The first activity discovered in the hacking campaign began in mid-December, when Mandiant identified hackers using a SQL injection vulnerability in Accellion FTA. The exploit was the main point of the hack. Over time, attackers exploited additional FTA vulnerabilities to gain sufficient control over the installation of the web shell. In mid-December 2020, Mandiant responded to a number of incidents, in which a web shell called DEWMODE used Accellion FTA hardware to process data. Tighten Accellion FTA is a targeted application designed to securely transfer large files to a business. Peeling activity has affected organizations in a wide range of sectors and countries. During these events, Mandiant noted the use of shared infrastructure and TTPs, including the use of FTA devices to publish the DEWMODE web envelope. Mandiant identified a common threat factor that we are now tracking as UNC2546. While full details of the vulnerabilities used to install DEWMODE are still under investigation, evidence from numerous customer investigations reveals many features common to UNC2546's activities. Other organizations that researchers suspect may be compromised by the vulnerabilities include Shell Oil, Kwalis Security, Gasoline Trading Company Ricetrack Petroleum, Law Firm Jones Day International, Washington State Auditor, Flagstar Bank of the United States, Stanford University in California and University of California Reserve Bank of New Zealand.
Read more A week after the arrest, the Cl0p ransomware group dumped a new piece of stolen data Last month, the Ukrainian authorities arrested six Cl0p affiliates. One week later, the dark web site published information released by Cl0p ransomware, indicating that the core group of members is still active.
No Advanced Warning h2>
FTA vulnerabilities were discovered in late December. The company initially said it notified all affected customers and removed zero-day exploits that allowed them to attack within 72 hours of learning. Later, Mandiant discovered two more days of zero.
Some customers have complained in the past that Accellion is slow to report attack vulnerabilities.
"We relied a lot on RBNZ officials in May saying that Accellion - the provider of the FTA program - was aware of any vulnerabilities in their system." Their notifications did not leave us their system, so the Reserve Bank did not reach us before the breach. We have not received any previous warnings. "Protecting customer data is extremely important and an issue we take very seriously," Morgan Stanley representatives wrote in a statement. We are in close contact with the guide and take steps to minimize potential risks to clients. p>
Morgan Stanley exposes data breaches from Accellion FTA breaches
Google has released an official "glimpse" of its upcoming flagship Pix...
At $12 per month, YouTube Premium offers ad-free videos, background playback on phones, an...
For at least a decade, privacy advocates have yearned ...
On Wednesday, Amazon sent out an email notification to customers who pu...