Security firm Rubrik is latest to be felled by GoAnywhere vulnerability

0
155


Getty Photographs

Rubrik, the Silicon Valley knowledge safety firm, stated that it skilled a community intrusion made attainable by a zero-day vulnerability in a product it used known as GoAnywhere.

In an advisory posted on Tuesday, Rubrik CISO Michael Mestrovich stated an investigation into the breach discovered that the intruders gained entry to primarily inner gross sales data, together with firm names and call data, and a restricted variety of buy orders from Rubrik distributors. The investigation, which was aided by an unnamed third-party firm, concluded there was no publicity of delicate data comparable to Social Safety numbers, monetary account numbers, or fee card knowledge.

Tight-lipped

“We detected unauthorized entry to a restricted quantity of knowledge in one in all our non-production IT testing environments on account of the GoAnywhere vulnerability,” Mestrovich wrote. “Importantly, based mostly on our present investigation, being carried out with the help of third-party forensics specialists, the unauthorized entry did NOT embrace any knowledge we safe on behalf of our prospects by way of any Rubrik merchandise.”

Mestrovich left key particulars out of the disclosure, most notably when the breach occurred and when or if Rubrik patched the vulnerability. On February 2, Cybersecurity firm Fortra privately warned customers it had recognized zero-day exploits of a vulnerability in its GoAnywhere MFT, an enterprise-grade managed file switch app. Fortra urged prospects to take steps to mitigate the menace till a patch grew to become obtainable. On February 6, Fortra fixed the vulnerability, tracked as CVE-2023-0669, with the discharge of model 7.1.2

With out realizing when the intrusion occurred, it’s not possible to find out if the vulnerability was a zero-day on the time it was exploited towards Rubrik, or whether or not the breach was the results of Rubrik failing to put in an obtainable patch or take different mitigation measures in a well timed method.

Representatives of Rubrik didn’t reply to an electronic mail looking for remark in regards to the timing of the intrusion and when or if the corporate patched or mitigated the vulnerability. This put up will likely be up to date if this data turns into obtainable later.

The CVE that retains on giving

CVE-2023-0669 has confirmed to be a precious asset to menace actors. Two weeks after Fortra first disclosed the vulnerability, one of many greatest hospital chains within the US stated hackers exploited it in an intrusion that gave hackers entry to protected well being data for a million sufferers. The compromised knowledge included protected well being data as outlined by the Well being Insurance coverage Portability and Accountability Act, in addition to sufferers’ private data, stated the hospital chain, Group Well being Methods of Franklin, Tennessee.

Lately, Bleeping Computer reported that members of the Clop ransomware gang took credit score for hacking 130 organizations by exploiting the GoAnywhere vulnerability. Analysis from safety agency Huntress confirmed that the malware utilized in intrusions exploiting CVE-2023-0669 had oblique ties to Clop.

Lately, the darkish website for Clop claimed that the ransomware group had breached Rubrik. As proof, the menace actor posted 9 screenshots that appeared to point out proprietary data belonging to Rubrik. The screenshots appeared to verify Rubrik’s declare that the information obtained within the intrusion was largely restricted to inner gross sales data.

The Clop website additionally claimed that the group had hacked Hatch Financial institution and supplied 10 screenshots that appeared to verify the declare. A financial institution that gives providers for fintech firms, Hatch Financial institution said in late February that it had skilled a breach that gave entry to names and Social Safety numbers of roughly 140,000 prospects. A letter Hatch Financial institution despatched to some prospects recognized a zero-day vulnerability in GoAnywhere because the trigger.

If it wasn’t clear earlier than, it ought to be now: CVE-2023-0669 poses a serious menace. Anybody utilizing GoAnywhere ought to make it a precedence to research their publicity to this vulnerability and reply accordingly.



Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here