US energy department, other agencies hit in global hacking spree
Send a link to a friend
[June 16, 2023]
By Zeba Siddiqui and Raphael Satter
(Reuters) - The U.S. Department of Energy and several other federal
agencies were hit in a global hacking campaign that exploited a
vulnerability in widely used file-transfer software, officials said on
Thursday.
Data was "compromised" at two entities within the energy department when
hackers gained access through a security flaw in MOVEit Transfer, the
department said in a statement.
A DOE official said those entities were the DOE contractor Oak Ridge
Associated Universities, and the Waste Isolation Pilot Plant - the New
Mexico-based facility for disposal of defense-related nuclear waste.
British energy giant Shell, the University System of Georgia, the Johns
Hopkins University and the Johns Hopkins Health System were also hit,
all three groups said in separate statements. The latter is a nonprofit
that collaborates with the university and runs six hospitals and primary
care centers.
The new victims add to a growing list of entities in the U.S., Britain
and other countries whose systems were infiltrated through the MOVEit
Transfer software. The hackers took advantage of a security flaw that
its maker, Progress Software, discovered late last month.
The Russia-linked extortion group Cl0p, which has claimed credit for the
MOVEit hack, earlier said in a statement that it would not exploit any
data taken from government agencies, and that it had erased all such
data. It did not immediately respond to a request for further comment.
The U.S. Cybsecurity and Infrastructure Security Agency (CISA) said it
was helping several federal agencies that had been breached, but did not
name them.
"At this time, we are not tracking any significant impacts to the
federal civilian executive branch (.gov) enterprise but are continuing
to work with our partners on this issue," the agency said in a
statement.
The energy department, which manages U.S. nuclear infrastructure and
energy policy, said it had notified Congress of the breach and is
participating in investigations with law enforcement and CISA.
A Shell spokesperson said there was no evidence of impact to Shell’s
core IT systems from the MOVEit Transfer-related breach. "There are
around 50 users of the tool, and we are urgently investigating what data
may have been impacted," she added.
[to top of second column]
|
The Washington Monument is seen in
Washington, U.S., March 17, 2022. REUTERS/Emily Elconin/File photo
Johns Hopkins also said it was "investigating a recent cybersecurity
attack targeting a widely used software tool that affected our
networks."
The University System of Georgia, which groups about 26 public
colleges, said it was "evaluating the scope and severity of this
potential data exposure" from the MOVEit hack.
Large organizations including the UK's telecom regulator, British
Airways, the BBC and drugstore chain Boots emerged as victims last
week.
CISA did not immediately respond to requests seeking further
comment. The FBI and National Security Agency also did not
immediately respond to emails seeking details on the breaches.
A MOVEit spokesperson said the company had "engaged with federal law
enforcement" and was working with customers to help them apply fixes
to their systems.
Progress Software's shares ended down 6.1% on Thursday. The company
disclosed another "critical vulnerability" it found in MOVEit
Transfer on Thursday, although it was not clear whether it had been
exploited by hackers.
MOVEit Transfer is a popular tool used by organizations to share
sensitive information with partners or customers. It could be used
by a bank's customers, for instance, to upload their financial data
for loan applications, said John Hammond, a security researcher at
Huntress.
"There's a whole lot of potential for what an adversary might be
able to get into," he said earlier this month.
(Reporting by Raphael Satter and Kanishka Singh in Washington; Zeba
Siddiqui in San Francisco; Shivani Tanna and Chandni Shah in
Bengaluru; editing by Cynthia Osterman and Stephen Coates)
[© 2023 Thomson Reuters. All rights
reserved.]This material may not be published,
broadcast, rewritten or redistributed.
Thompson Reuters is solely responsible for this content.
|