New mass scanning activity may be the first step in another MOVEit attack.
Hackers are actively scanning the internet for exposed MOVEit systemsâhundreds of unique IPs every dayâsuggesting the early stages of coordinated exploitation.
Threat intel firm GreyNoise warns this is the same pattern seen weeks before past mass attacks. Known MOVEit vulnerabilities, such as CVE-2023-34362 and CVE-2023-36934, are already being tested in the wild.
If your MOVEit Transfer instance is online and unmonitored, you may already be on an attackerâs target list.
Nowâs the time to:
⢠Patch all known MOVEit vulnerabilities
⢠Limit public-facing access
⢠Monitor for scan activity and open ports
⢠Block IPs identified by threat intelligence feeds
⢠Harden file transfer environments and deploy honeypots if needed
Scanning isnât randomâitâs reconnaissance. Act now before scanning turns into breach.
Read the article for details: https://www.cuinfosecurity.com/scans-probing-for-moveit-systems-may-be-precursor-to-attacks-a-28832
#MOVEit #Cybersecurity #MassScanning #ThreatIntel #AttackSurface #LMGSecurity #Infosec #ITsecurity #databreach #CISO #DFIR #pentesting #pentest #penetrationtesting