• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • MOVEit Vulnerability Yields Another 4 Million Breached Records

    August 16, 2023 Alex Woodie

    A zero-day security vulnerability in the MOVEit file transfer software discovered in late spring has been wreaking havoc across American companies this summer. The latest victims are people signed up for Colorado’s version of Medicaid, who had their data compromised when cybercriminals used the flaw to access their data in the IBM Cloud.

    The Colorado Department of Health Care Policy & Financing (HCPF) recently notified customers that a security incident took place that resulted in unauthorized actors having access to the protected health information of members involved in two of its programs, including Health First Colorado, which is the state’s version of Medicaid, and CHP+ members.

    Progress Software, the owner of the MOVEit Transfer software, on May 31 announced a zero-day security flaw was discovered in the software. The flaw, which is characterized as a SQL injection vulnerability, was labeled as CVE-2023-34362. Over the ensuing months, several more CVEs were released.

    Soon after the flaw was unveiled, IBM, which uses MOVEit Transfer software to move HCPF files in the normal course of business, notified HCPF that it was impacted by the vulnerability. The state agency then initiated an investigation to see the extent of the damage.

    “While HCPF confirmed that no HCPF systems or databases were impacted, on June 13, 2023, the investigation identified that certain HCPF files on the MOVEit application used by IBM were accessed by the unauthorized actor on or about May 28, 2023,” the agency said.

    The breach impacted more than four million customers, according to a story in Bleeping Computer. IT Jungle has not confirmed that number.

    IBM and HCPF were not the only organizations to suffer from the MOVEit breach, which is reportedly being perpetrated by the cl0p ransomware gang. According to an analysis by Emsisoft, a provider of anti-malware software, there have been more than 668 organizations impacted, resulting in more than 46 million compromised records.

    Other organizations impacted include Maximus, a Virginia-based government services company, which had 11 million records compromised; the Louisiana Office of Motor Vehicles, which lost control of 6 million records; the Oregon Department of Transportation, which had 3.5 million records compromised; and Genworth, a Southern California financial firm, which lost control of 2.5 million records.

    The flaw has highlighted the interconnected nature of modern IT systems, and how the impacts of a single security flaw can flow from one company to another, according to Reuters. For example, the security flaw in systems run by Pension Benefit Information in turn yielded sensitive data held by the Teachers Insurance and Annuity Association of America, the news agency reported.

    “Hacks by groups like cl0p occur with a numbing regularity,” Reuters reporters Raphael Satter and Zeba Siddiqui write. “But the sheer variety of victims of the MOVEit compromise, from New York public school students to Louisiana drivers to California retirees, have made it one of the most visible examples of how a single flaw in an obscure piece of software can trigger a global privacy disaster.”

    The MOVEit flaw doesn’t appear to impact IBM i. But it’s similar in some respects to another flaw in Fortra’s GoAnywhere MFT file transfer software, which did impact IBM i. When you consider that these sorts of vulnerabilities in file transfer products appear to be happening with greater regularity, and that IBM i itself has been subject to a number of security flaws this summer, a greater degree of vigilance may be in order.

    RELATED STORIES

    Midsummer Security Indicators: Hot and Gloomy

    Zero-Day Vulnerability in Fortra’s GoAnywhere MFT Being Actively Exploited

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: Colorado Department of Health Care Policy & Financing, HCPF, IBM Cloud, IBM i, MOVEit, SQL

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Four Hundred Monitor, August 16 Fighting Fake News in Digital Transformation

    One thought on “MOVEit Vulnerability Yields Another 4 Million Breached Records”

    • Ema tissani says:
      August 17, 2023 at 3:46 am

      Really absurd that still today in 2023 a silly thing like SQL Inj. is still present in some software… a law should exists that let users ask for damages if sql is built in the logic layer as is….this happen when a language or poor architecture allows to conflate layers …

      Impossible to do with native IBM i/o access btw… so how many billions of damages avoided by native io??? 😉
      Use prepared statements if you use SQL ffs!!!!

      Reply

    Leave a Reply Cancel reply

TFH Volume: 33 Issue: 50

This Issue Sponsored By

  • Rocket Software
  • Racksquared
  • ARCAD Software
  • Briteskies
  • WorksRight Software

Table of Contents

  • With Fresche’s New CEO, There Are No Problems, Just Solutions
  • Fighting Fake News in Digital Transformation
  • MOVEit Vulnerability Yields Another 4 Million Breached Records
  • Four Hundred Monitor, August 16
  • Raz-Lee Updates Anti-Ransomware

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • 2025: An IBM i Year In Review
  • A Tale Of Two Server Markets
  • Guru: CRTSRVPGM Parameters That Can Save or Sink You
  • As I See It: What’s Past is Prologue
  • IBM i PTF Guide, Volume 27, Numbers 49 Through 52
  • Learning And Laughing With Scott Forstie And Tim Rowe
  • IBM’s CEO Says GenAI Is Great For Enterprise, But It Will Not Be AGI
  • Guru: A First Look at Bob, The IBM i Assistant That’s Closer Than You Think
  • Happy Holidays To All Of You From All Of Us
  • IBM i PTF Guide, Volume 27, Number 48

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle