A dangerous authentication bypass vulnerability (CVE-2024-5806) has been discovered in Progress Software's MOVEit Transfer and MOVEit Cloud applications. This security risk allows attackers to bypass authentication restrictions and obtain unauthorized access to sensitive data. Active exploitation efforts were noticed soon after the publication of this vulnerability, leading to fears that many attacks will follow. This vulnerability occurs due to the SFTP component of MOVEit Transfer software, which suffers from poor validation in the authentication routine used. Consequently, attackers can manipulate parameters to bypass the need for authenticating themselves on the targeted machine. An analysis of this problem has shown that this vulnerability is related to ineffective authentication logic (CWE-287), which lets hackers pretend to be real users and make changes to files. Additionally, attackers can try various methods of capturing authentication hashes or use the specific flow of SFTP to elevate privileges. The availability of the working code of this exploit has triggered more exploitation attempts. In fact, security specialists have confirmed successful exploitation attempts, which makes patching even more necessary. Considering that MOVEit software is used by enterprises for transferring sensitive information, this vulnerability attracts attention from threat actors.
A threat actor identified as UAC-0184 has been linked to targeted cyber espionage campaigns against Ukrainian military and government organizations. The campaign leverages phishing...
Cybersecurity researchers have identified a widespread malware campaign abusing fake Google Chrome update prompts to infect users with malicious payloads. The attack leverages comp...
Microsoft has introduced a significant security enhancement in its Edge browser after security researchers disclosed that the browser was automatically loading all saved passwords ...