Explained: How MOVEit Breach Shows Hackers' Interest in File Transfer Tools

Governments and companies globally are scrambling to deal with the consequences of a mass compromise made public on Thursday.

Advertisement
By Reuters | Updated: 17 June 2023 00:02 IST
Highlights
  • FTA, GoAnywhere MFT, MOVEit Transfer are corporate file sharing programs
  • Typical digital extortionists still encrypt a company's network
  • An MFT program typically faces the open internet

MFT software is what you want to exchange data between systems

Ransom-seeking hackers have increasingly turned a greedy eye toward the world of managed file transfer (MFT) software, plundering the sensitive data being exchanged between organizations and their partners in a bid to win big payouts.

Governments and companies globally are scrambling to deal with the consequences of a mass compromise made public on Thursday that was tied to Progress Software's MOVEit Transfer product. In 2021 Accellion's File Transfer Appliance was exploited by hackers and earlier this year Fortra's GoAnywhere MFT was compromised to steal data from more than 100 companies.

So what is MFT software? And why are hackers so keen to subvert it?

Advertisement

Corporate dropboxes

FTA, GoAnywhere MFT, and MOVEit Transfer are corporate versions of file sharing programs consumers use all the time, like Dropbox or WeTransfer. MFT software often promises the ability to automate the movement of data, transfer documents at scale and provide fine-grained control over who can access what.

Advertisement

Consumer programs might be fine for exchanging files between people but MFT software is what you want to exchange data between systems, said James Lewis, the managing director of UK-based Pro2col, which consults on such systems.

"Dropbox and WeTransfer don't provide the workflow automation that MFT software can," he said.

Advertisement

MFT programs can be tempting targets

Running an extortion operation against a well-defended corporation is reasonably difficult, said Recorded Future analyst Allan Liska. Hackers need to establish a foothold, navigate through their victim's network and exfiltrate data — all while remaining undetected.

Advertisement

By contrast, subverting an MFT program — which typically faces the open internet — was something more akin to knocking over a convenience store, he said.

"If you can get to one of these file transfer points, all the data is right there. Wham. Bam. You go in. You get out."

Hacker tactics are shifting

Scooping up data that way is becoming an increasingly important part of the way hackers operate.

Typical digital extortionists still encrypt a company's network and demands payment to unscramble it. They might also threaten to leak the data in an effort to increase the pressure. But some are now dropping the finicky business of encrypting the data in the first place.

Increasingly, "a lot of ransomware groups want to move away from encrypt-and-extort to just extort," Liska said.

Joe Slowik, a manager with the cybersecurity company Huntress, said the switch to pure extortion was "a potentially smart move."

"It avoids the disruptive element of these incidents that attract law enforcement attention," he said.

© Thomson Reuters 2023
 


Apple unveiled its first mixed reality headset, the Apple Vision Pro, at its annual developer conference, along with new Mac models and upcoming software updates. We discuss all the most important announcements made by the company at WWDC 2023 on Orbital, the Gadgets 360 podcast. Orbital is available on Spotify, Gaana, JioSaavn, Google Podcasts, Apple Podcasts, Amazon Music and wherever you get your podcasts.
Affiliate links may be automatically generated - see our ethics statement for details.
 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: hacking, WeTransfer, dropbox, MFT, moveit
Advertisement

Related Stories

Popular Mobile Brands
  1. Nothing Phone 4a Pro's  Battery, Durability, Charging Details Revealed
  2. Amazfit Active Max With 1.5-Inch AMOLED Display Launched in India: See Price
  3. Border 2 Revives "Sandese Aate Hain": Sunny Deol Returns
  4. Oppo K15 Launch Seems Imminent as Company Teases Launch of a New Phone
  5. HP HyperX Omen 15 Gaming Laptop With RTX 5060 GPU Launched in India
  6. Amazon to Cut Thousands More Jobs Globally With India Being the Worst-Hit
  7. The Conjuring: Last Rites OTT Release Date: When and Where to Watch it Online?
  8. Samsung Galaxy A57 Surfaces on Chinese Certification Site With This Design
  9. Here's How Much the iQOO 15R Might Cost in India
  10. Vivo X200T Launched in India With These Features
  1. James Webb Helps Astronomers Chart the Universe’s Hidden Dark Matter
  2. ESA’s Solar Orbiter Reveals How Magnetic Avalanches Trigger Solar Flares
  3. NASA Races to Restore Contact With MAVEN Mars Orbiter After Weeks of Silence
  4. iQOO 15R Price in India, Chipset Details Teased Ahead of Launch in India on February 24
  5. Nothing Phone 4a Pro Battery, Charging Speed and IP Rating Revealed via EPREL Label
  6. Honor Magic V6 Leak Hints at Slimmer Build, New Hardware Upgrades Ahead of Anticipated March Debut
  7. OpenAI Says ChatGPT's Writing Worsened Due to Overtraining Math, Coding
  8. Sony Said to Be Planning State of Play Broadcast for February
  9. Amazon to Reportedly Layoff 16,000 Employees, India Might Be Among Worst-Hit Regions
  10. Hashtag Star Now Available for Streaming on Chaupal: What You Need to Know About This Punjabi Film
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.