Schneider Electric Probing MOVEit Claim By Cybercrime Group | #cybercrime | #infosec

Schneider Electric Probing MOVEit Claim By Cybercrime Group | #cybercrime | #infosec

Security News

Kyle Alspach June 27, 2023, 06:36 PM EDT

The company, along with companies including Cognizant, have been listed in recent days on the darkweb site of the Russian-speaking cybercriminal gang Clop.

Schneider Electric said Tuesday it is investigating after its name appeared on the darkweb site of the cybercriminal group Clop, a Russian-speaking gang that has claimed responsibility for breaching dozens of organizations by exploiting a vulnerability in the MOVEit file transfer software.


Clop’s tactics have included posting the names of its alleged victims on its darkweb site in an attempt to pressure the organizations to pay an extortion fee, purportedly to avoid the disclosure of stolen data.


[Related: PwC: ‘Limited’ Client Data Impacted In MOVEit Cyberattacks]


The widespread cyberattack campaign has involved exploiting a critical vulnerability in in MOVEit, a popular managed file transfer tool from Progress. More than 100 organizations have been listed on Clop’s darkweb site or have separately disclosed a security incident related to the MOVEit vulnerability, according to a tally by Emsisoft threat analyst Brett Callow.


In a statement provided to CRN Tuesday, Schneider Electric confirmed that it has previously used the MOVEit product and that its security team is “currently investigating” the claim that the company has become a victim of the MOVEit attack campaign.


“On May 30th, 2023, Schneider Electric became aware of vulnerabilities impacting Progress MOVEit Transfer software. We promptly deployed available mitigations to secure data and infrastructure and have continued to monitor the situation closely,” the company said in the statement.


“Subsequently, on June 26th, 2023, Schneider Electric was made aware of a claim mentioning that we have been the victim ..

Support the originator by clicking the read the rest link below.