Advertisement
UK markets closed
  • FTSE 100

    8,175.46
    -4.22 (-0.05%)
     
  • FTSE 250

    20,268.17
    -63.63 (-0.31%)
     
  • AIM

    765.10
    +0.63 (+0.08%)
     
  • GBP/EUR

    1.1797
    -0.0008 (-0.07%)
     
  • GBP/USD

    1.2644
    +0.0002 (+0.02%)
     
  • Bitcoin GBP

    48,150.42
    -589.61 (-1.21%)
     
  • CMC Crypto 200

    1,269.03
    -14.80 (-1.15%)
     
  • S&P 500

    5,502.19
    +19.32 (+0.35%)
     
  • DOW

    39,297.38
    +133.32 (+0.34%)
     
  • CRUDE OIL

    81.30
    -0.44 (-0.54%)
     
  • GOLD FUTURES

    2,338.60
    +2.00 (+0.09%)
     
  • NIKKEI 225

    39,583.08
    +241.54 (+0.61%)
     
  • HANG SENG

    17,718.61
    +2.14 (+0.01%)
     
  • DAX

    18,228.29
    +17.74 (+0.10%)
     
  • CAC 40

    7,466.44
    -64.28 (-0.85%)
     

Explainer-How MOVEit breach shows hackers' interest in corporate file transfer tools

Man types on a computer keyboard in front of the displayed cyber code in this illustration picture

By Raphael Satter

(Reuters) - Ransom-seeking hackers have increasingly turned a greedy eye toward the world of managed file transfer (MFT) software, plundering the sensitive data being exchanged between organizations and their partners in a bid to win big payouts.

Governments and companies globally are scrambling to deal with the consequences of a mass compromise made public on Thursday that was tied to Progress Software Corp's MOVEit Transfer product. In 2021 Accellion Inc's File Transfer Appliance was exploited by hackers and earlier this year Fortra's GoAnywhere MFT was compromised to steal data from more than 100 companies.

So what is MFT software? And why are hackers so keen to subvert it?

ADVERTISEMENT

CORPORATE DROPBOXES

FTA, GoAnywhere MFT, and MOVEit Transfer are corporate versions of file sharing programs consumers use all the time, like Dropbox or WeTransfer. MFT software often promises the ability to automate the movement of data, transfer documents at scale and provide fine-grained control over who can access what.

Consumer programs might be fine for exchanging files between people but MFT software is what you want to exchange data between systems, said James Lewis, the managing director of UK-based Pro2col, which consults on such systems.

"Dropbox and WeTransfer don't provide the workflow automation that MFT software can," he said.

MFT PROGRAMS CAN BE TEMPTING TARGETS

Running an extortion operation against a well-defended corporation is reasonably difficult, said Recorded Future analyst Allan Liska. Hackers need to establish a foothold, navigate through their victim's network and exfiltrate data - all while remaining undetected.

By contrast, subverting an MFT program - which typically faces the open internet - was something more akin to knocking over a convenience store, he said.

"If you can get to one of these file transfer points, all the data is right there. Wham. Bam. You go in. You get out."

HACKER TACTICS ARE SHIFTING

Scooping up data that way is becoming an increasingly important part of the way hackers operate.

Typical digital extortionists still encrypt a company's network and demands payment to unscramble it. They might also threaten to leak the data in an effort to increase the pressure. But some are now dropping the finicky business of encrypting the data in the first place.

Increasingly, "a lot of ransomware groups want to move away from encrypt-and-extort to just extort," Liska said.

Joe Slowik, a manager with the cybersecurity company Huntress, said the switch to pure extortion was "a potentially smart move."

"It avoids the disruptive element of these incidents that attract law enforcement attention," he said.

(Reporting by Raphael Satter; editing by Grant McCool)