Special Features

Black Hat and DEF CON

Can 'Mad Libs for incident response' prevent the next MOVEit fiasco?

IBM X-Force lead says yes


Black Hat While MOVEit is just the latest example of a managed file transfer (MFT) tool being exploited by criminals to maximize the amount of data – and money –— they can grab, these types of attacks aren't going to stop anytime soon. From the miscreant perspective, they represent the perfect crime.

That is, unless the defenders can get out ahead of the next MFT mass exploitation. John Dwyer, head of research for IBM Security X-Force, claims his team has developed a framework to make this happen.

Dwyer will detail this strategy during a Black Hat talk this week. The Register caught up with him prior to Hacker Summer Camp.

"It would be criminal not to learn from our past mistakes," Dwyer said.

The reason why MFTs make such attractive targets for criminals is because they are essentially a one-stop shop for extortion, he explained. 

"If you think about the goals and objectives of attackers, they basically boil down to two things: I'm going to steal data and then extort you against the theft of that data. Or I'm going to disrupt your operations and extort you against recovery of those systems," Dwyer told The Register.

"MFTs, by nature of their design, are meant to be a system that is exposed to external parties, and they transact and transfer sensitive data between enterprises," he continued. 

Hitting the extortion jackpot

This means that they are usually exposed to the internet, and if crooks can find a security hole-in-one, they don't need to establish persistence in the environment or move laterally looking for sensitive data. Exploiting a flaw in an MFT allows attackers to move right to the data exfiltration part of the attack – making it quick, relatively easy, and profitable for the criminals.

"So it fits into that nice little Venn diagram of what does an attacker need to do to cause enough pressure or create enough impact that an organization could be convinced to pay," Dwyer explained.

Typical behavior

Some of the organizations compromised by the Clop ransomware via the MOVEit vulnerability likely have an answer. Maximus – which does the admin for US government programs like Medicaid and Medicare – disclosed that personal information belonging to as many as 11 million individuals was "accessed" by Clop.  

Nearly 600 organizations' and 40 million individuals' data has been compromised because of the MOVEit bug to date, according to Emsisoft security researchers. 

Forta's GoAnywhere software is another MFT that was also exploited by Clop earlier this year and used to steal customers' data.

X-Force analyzed these and other MFT attacks and found that while the software and the vulnerabilities changed over the years, the criminals' behavior remained largely the same. 

"All you really need to do is know the context in which the attacker is going to be interacting with the system to know what it's going to look like when they're exploited, and this can be repeated across different software,"  Dwyer said.

MFT detection and response framework

The various MFTs share similar architecture, which means that defenders' approach to detection and response should also follow a set path. IBM's security shop used these when learning to develop a framework for detection and response for MFTs, which X-Force released to the community today via GitHub. 

It includes 13 common MFT tools that the X-Force team says were frequently exposed to the internet: Cerberus FTP Server, FileZilla, Cornerstone MFT, Solawinds Serv-U, JSCAPE, OracleMFT, WingFTP, Aspera, Diplomat MFT, MyWorkDrive, EasyFTPServer FTPD, ShareFile, and ShareTru.

Dwyer describes it as "Mad Libs for incident response." 

The IR team plugs in unique process names, paths, ports, log files, and the framework already knows how each software tool works. X-Force tested the framework against known CVEs and previous exploits, and found that "the majority of the time" it accurately detected and responded to these incidents.

Looking ahead to future such events, Dwyer said this will help IR teams more quickly respond and hopefully prevent mass exploitation.

"Now you have your playbook, so there isn't that 24, 48 hours everyone's scrambling to understand what this piece of software is and how it's put together," Dwyer said. ®

Send us news
5 Comments

Db2 is a story worth telling, even if IBM won't

Promise of AI features, but Big Blue won't reveal much more about next steps of its highly regarded relational database

Big Tech's eventual response to my LLM-crasher bug report was dire

Fixes have been made, it appears, but disclosure or discussion is invisible

Three words to send a chill down your spine: Snowflake. Intrusion. Alert

And can AI save us from the scourge of malware? In theory, why not, but in practice ... Color us skeptical

China's APT41 crew adds a stealthy malware loader and fresh backdoor to its toolbox

Meet DodgeBox, son of StealthVector

Critical Windows licensing bugs – plus two others under attack – top Patch Tuesday

Citrix, SAP also deserve your attention – because miscreants are already thinking about Exploit Wednesday

Ransomware crews investing in custom data stealing malware

BlackByte, LockBit among the criminals using bespoke tools

China's APT40 gang is ready to attack vulns within hours or days of public release

Lax patching and vulnerable small biz kit make life easy for Beijing's secret-stealers

'Gay furry hackers' say they've disbanded after raiding Project 2025's Heritage Foundation

Ultra-conservative org funnily enough not ready to turn the other cheek

Privacy expert put away for 9 years after 'grotesque' cyberstalking campaign

Scumbag targeted many victims – and those who tried to help them

You had a year to patch this Veeam flaw – and now it's going to hurt some more

LockBit variant targets backup software - which you may remember is supposed to help you recover from ransomware

Eldorado ransomware-as-a-service gang targets Linux, Windows systems

US orgs bear the brunt of attacks by probably-Russian crew

Cloudflare debuts one-click nuke of web-scraping AI

Take that for ignoring robots.txt!