The Cl0p ransomware gang has claimed a cyber attack on FIS Global.
FIS, a leading provider of technology solutions for the financial industry, allegedly fell victim to the exploitation of the MOVEit vulnerability that impacted organizations worldwide.
The company facilitates the movement of approximately $9 trillion and processes around 75 billion transactions for over 20,000 clients worldwide.
The FIS data breach incident was announced by threat analyst Brett Callow, who took to Twitter to share the information on the alleged attack.
Accompanying his tweet was an image previously used by the Cl0p ransomware gang during the recent MOVEit cyber attacks.
The threat actor sent a direct message to FIS Global, expressing their disappointment in the company’s security practices, which they felt were inadequate to protect customer data. “The company doesn’t care about its customers. It ignored their security!!!” the message read, as reported by Callow.
The Cyber Express reached out to the company to learn more about the alleged cyber attack on FIS Global. The spokesperson of the company conceded about the cybersecurity issue, but did not confirm the ransomware attack.
“FIS was one of many organizations impacted by the vulnerability issue experienced by Progress Software and their MOVEit Transfer product,” said the email response from the company.
“While the incident impacted a limited number of our clients, we are communicating with all clients whose information was potentially involved.”
Cyber attack on FIS Global and the MOVEit vulnerability
The recent cyber attack on FIS Global is part of a series of incidents specifically targeting companies that utilize MOVEit. The Cl0p ransomware gang has claimed responsibility for these data-theft incidents involving MOVEit Transfer.
According to Reports, the group has listed additional victims, including the University of California, Los Angeles, Siemens Energy, Abbvie Inc, and Schneider Electric.
The cybercriminals behind Cl0p ransomware have caused significant harm, with a total of 121 organizations falling victim to their online extortion ring. Brett Callow estimates that at least 15 million people have been affected.
Recognizing the severity of the situation, the U.S. State Department has stepped in, offering a substantial reward of up to $10 million for any information linking the Cl0p Ransomware Gang or other malicious cyber actors targeting critical U.S. infrastructure to a foreign government.
Through its Rewards for Justice (RFJ) program, originally established in 1984 to combat terrorist threats, the State Department aims to encourage individuals with knowledge of these cybercriminals to come forward and provide vital information.
In a tweet, RFJ stated that it seeks information on the identification or location of any individuals involved in malicious cyber activities against U.S. critical infrastructure, in violation of the Computer Fraud and Abuse Act.
The tweet also specified that information could be shared through various secure channels, including Signal, Telegram, WhatsApp, or the Tor-based tip line.
This reward offer follows the confirmation by the Cybersecurity and Infrastructure Security Agency (CISA) that a cyberattack had affected several federal agencies, compromising their MOVEit applications.
To address the growing threat, CISA and the FBI released a joint cybersecurity advisory on June 7, cautioning that cyber threat actors might exploit vulnerabilities in Progress Software’s managed file transfer solution, known as MOVEit.
These agencies have linked the exploitation of this vulnerability to the Cl0p Ransomware Gang.
Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.