{"id":30889,"date":"2023-06-30T18:35:18","date_gmt":"2023-06-30T18:35:18","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=30889"},"modified":"2023-06-30T18:35:20","modified_gmt":"2023-06-30T18:35:20","slug":"clop-moveit-vulnerability","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/","title":{"rendered":"Half of EDR Tools, Organizations Vulnerable to Clop Ransomware: Researchers"},"content":{"rendered":"\n<p>Nearly half of EDR tools and organizations are vulnerable to Clop ransomware gang tactics, according to tests by a cybersecurity company.<\/p>\n\n\n\n<p>Cymulate ran 3,107 assessments across 340 organizations recently to see if security controls were adequate against the Clop (sometimes called &#8220;Cl0p&#8221; with a zero) ransomware group&#8217;s exploitation of a MOVEit software vulnerability (<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-34362\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-34362<\/a>).<\/p>\n\n\n\n<p>The <a href=\"https:\/\/www.esecurityplanet.com\/products\/breach-and-attack-simulation-bas-vendors\/\">continuous threat exposure management<\/a> (CTEM) vendor tested to see if organizational controls would recognize the Indicators of Compromise (IoCs) of Clop ransomware attacks. What they found was alarming:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Out of 14,438 payloads sent, 43% of organizations in the U.S. were penetrated by Cymulate&#8217;s Clop ransomware assessments<\/li>\n\n\n\n<li>Half of the <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">endpoint detection and response<\/a> (EDR) tools tested \u2014 8 out of 16 tools \u2014 had a penetration rate of over 46%<\/li>\n<\/ul>\n\n\n\n<p>Mike DeNapoli, Cybersecurity Architect and Director at Cymulate, told <em>eSecurity Planet<\/em>, &#8220;While the EDRs could possibly recognize the behavior of the attack if it was executed, which Cymulate can do in other modules, they did not recognize the known binaries used in the attacks. So &#8230; the EDR missed an indicator of compromise, and while it may have compensated for it later, the firewall should have stopped inbound\/outbound traffic but failed to do so.&#8221;<\/p>\n\n\n\n<p>Organizations can still be protected even if their EDR technologies only identify attack patterns rather than individual files, he said.<\/p>\n\n\n\n<p>&#8220;The MOVEit vulnerability is shining a new light on exposure management because if the organization has an EDR tool that looks for the <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-user-and-entity-behavior-analytics-ueba-tools\/\">behaviors<\/a> of these attacks but not the files themselves, then they\u2019re still protected,&#8221; DeNapoli said.<\/p>\n\n\n\n<p>He added, &#8220;If the organization does not have any of the software platforms targeted by these attacks, like the MOVEit platform, then they are also safe even if they didn\u2019t block the indicators of compromise \u2014 the attackers don\u2019t have anything to leverage in order for the attack to work in the first place.&#8221;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Clop, Others Continue MOVEit Attacks<\/h2>\n\n\n\n<p>The Clop ransomware gang&#8217;s exploitation of a vulnerability in Progress Software&#8217;s MOVEit managed file transfer (MFT) system has hit dozens of major organizations so far, among them.<\/p>\n\n\n\n<p>Abbie, Aer Lingus, the BBC, British Airways, the California Public Employees\u2019 Retirement System, Johns Hopkins University, New York City public schools, Schneider Electric, Shell, Siemens, UCLA, the University of Rochester, the U.S. Department of Energy, and the U.S. Department of Health and Human Services, among others.<\/p>\n\n\n\n<p>However, instead of the typical <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware\/\">ransomware<\/a> tactics, Clop aka Lace Tempest has used the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-to-prevent-sql-injection-attacks\/\">SQL injection<\/a> vulnerability to steal sensitive data and threaten to release it unless a ransom is paid.<\/p>\n\n\n\n<p>The U.S. Government has offered a <a href=\"https:\/\/twitter.com\/RFJ_USA\/status\/1669740545403437056\" target=\"_blank\" rel=\"noreferrer noopener\">$10 million reward<\/a> for information on the threat actors.<\/p>\n\n\n\n<p>Cybersecurity experts have discovered extensive use of the zero-day vulnerability in MOVEit Transfer. Multiple threat actors \u2014 many of whom overlap or are used interchangeably \u2014 have been linked to the vulnerability, including FIN11, TA505, and Lace Tempest. While FIN11 and TA505 have been used interchangeably in the past, Mandiant classifies FIN11 as a subset of activity inside the TA505 group. Additionally, Lace Tempest, which runs the Clop extortion site, is also affiliated with FIN11.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"749\" height=\"821\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2023\/06\/figure_a-microsoft_threat_intelligence.png\" alt=\"Microsoft Threat Intelligence tweet\" class=\"wp-image-30890\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/figure_a-microsoft_threat_intelligence.png 749w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/figure_a-microsoft_threat_intelligence-274x300.png 274w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/figure_a-microsoft_threat_intelligence-150x164.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/figure_a-microsoft_threat_intelligence-300x329.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/figure_a-microsoft_threat_intelligence-696x763.png 696w\" sizes=\"(max-width: 749px) 100vw, 749px\" \/><\/figure>\n\n\n\n<p>\u201cLace Tempest (Storm-0950, overlaps w\/ FIN11, TA505) authenticates as the user with the highest privileges to exfiltrate files,\u201d Microsoft notes.<\/p>\n\n\n\n<p>The cybercriminals started exploiting the vulnerability on May 27th, during the U.S. Memorial Day holiday. Lace Tempest has a track record of exploiting different zero-day vulnerabilities to steal data and extort victims.<\/p>\n\n\n\n<p>TA505 is well-known for its involvement in global phishing and malware dissemination. Their victims include hundreds of companies worldwide, and they engage in various illegal activities, including providing ransomware-as-a-service, acting as an initial access broker, and orchestrating large-scale phishing assaults and financial fraud. This recent exploitation expands their repertoire, highlighting their ability to hack and steal critical data through the MOVEit Transfer web applications with the LEMURLOOT web shell.<\/p>\n\n\n\n<p>Another significant threat actor, FIN11, has been involved in a number of high-profile infiltration efforts that leverages zero-day vulnerabilities. The group has targeted pharmaceutical companies and other healthcare institutions during the COVID-19 pandemic. Their activities primarily target corporations in various industries in North America and Europe, with the goal of stealing data and deploying ransomware using Clop.<\/p>\n\n\n\n<p>The Clop gang&#8217;s exploitation of the MOVEit vulnerability has become a critical issue, causing concerns among several organizations about their own security procedures as well as their vulnerability to similar cyber assaults.<\/p>\n\n\n\n<p><strong>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">Ransomware Protection: How to Prevent Ransomware Attacks<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key Steps to Mitigate MOVEit Risk<\/h2>\n\n\n\n<p>In light of the Clop ransomware attacks and similar threats, the FBI and CISA <a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa23-158a\" target=\"_blank\" rel=\"noreferrer noopener\">published a joint advisory<\/a> recommending the following mitigation measures for organizations:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Inventory and Asset Management:<\/strong> Conduct an <a href=\"https:\/\/www.esecurityplanet.com\/networks\/it-asset-management\/\">asset<\/a> and data inventory, differentiating between authorized and unauthorized equipment and software.<\/li>\n\n\n\n<li><strong>Credential Protection:<\/strong> Prevent credential compromise by putting domain admin accounts in groups for protected users, avoiding plaintext credentials in scripts, and providing time-based access.<\/li>\n\n\n\n<li><strong>Administrative Privileges and Software Control:<\/strong> Restrict administrative rights and access to just those that are absolutely necessary, and create a list of authorized software that only allows the execution of genuine programs.<\/li>\n\n\n\n<li><strong>Backup and Restoration:<\/strong> Keep offline <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-backup-solutions-for-ransomware-protection\/\">backups<\/a> of data and execute backup and restore on a regular basis. Encrypt backup data to ensure the data infrastructure&#8217;s immutability and coverage.<\/li>\n\n\n\n<li><strong>Endpoint Security:<\/strong> Install and update <a href=\"https:\/\/www.esecurityplanet.com\/products\/antivirus-software\/\">antivirus software<\/a> on all hosts.<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">Network Security<\/a>:<\/strong> Monitor network ports, protocols, and services by activating security settings on network infrastructure devices such as <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\">firewalls<\/a> and routers. <a href=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/\">Segment networks<\/a> to regulate traffic flows and prevent ransomware outbreaks. To identify suspicious activity and malware traversal, use <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-network-monitoring-tools\/\">network monitoring tools<\/a>. Unused ports should be disabled, email banners should be considered, and hyperlinks in received emails should be disabled.<\/li>\n\n\n\n<li><strong>Password Policies:<\/strong> Enforce NIST password policy requirements, such as lengthier passwords and the use of <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-password-managers\/\">password managers<\/a>. Password suggestions should be disabled, and frequent password changes should be avoided.<\/li>\n\n\n\n<li><strong>PowerShell Security:<\/strong> Restrict <a href=\"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/\">PowerShell<\/a> usage and update to the latest version.<\/li>\n\n\n\n<li><strong>Remote Access Security:<\/strong> Limit <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/secure-access-for-remote-workers-rdp-vpn-vdi\/\">remote access<\/a> from within the network to approved solutions (e.g., VPNs, VDIs). To detect instances of remote access software loaded in memory, use security software. Inbound and outbound connections to typical remote access software ports are blocked. Implement remote access program application controls and allowlisting. Limit your usage of RDP and adhere to recommended practices (for example, auditing, terminating unused ports, and <a href=\"https:\/\/www.esecurityplanet.com\/applications\/mfa-advantages-and-weaknesses\/\">MFA<\/a>).<\/li>\n\n\n\n<li><strong>Software and <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">Patch Management<\/a>: <\/strong>Consistently update and patch software and apps to the most latest versions, while performing <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment\/\">vulnerability assessments<\/a> on a regular basis. Patch operating systems, software, and firmware on a regular basis.<\/li>\n<\/ul>\n\n\n\n<p>These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) established by CISA and NIST. The CPGs are based on current cybersecurity frameworks and recommendations, and they provide a set of minimum procedures and policies to defend against common and significant threats.<\/p>\n\n\n\n<p>As cybercriminals continue to evolve their strategies, organizations must assess their security measures, minimize risks, and guarantee the efficiency of their defenses against growing ransomware and cyber attacks. Implementing a comprehensive and layered security approach will help strengthen organizations\u2019 systems, secure critical data, and stop potentially disastrous ransomware assaults.<\/p>\n\n\n\n<p><strong>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-a-network\/\">Network Protection: How to Secure a Network<\/a><\/strong><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6e32752269-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6e32752269\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6e32752269\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6e32752269\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6e32752269\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6e32752269\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6e32752269\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Alarming statistics revealed in Cymulate&#8217;s assessments as organizations continue to be at risk from MOVEit vulnerability.<\/p>\n","protected":false},"author":331,"featured_media":30892,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[3790,14404,3414,2478,730,4218],"b2b_audience":[35],"b2b_industry":[],"b2b_product":[31788,382,403,378,395,31780,31790,31777,31775,392],"class_list":["post-30889","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-cybersecurity","tag-endpoint-security","tag-network-security","tag-ransomware","tag-security","tag-vulnerabilities","b2b_audience-implementation-and-support","b2b_product-advanced-persistent-threats","b2b_product-application-security-vulnerability-management","b2b_product-cyber-terrorists-and-cyber-crime","b2b_product-endpoint-security","b2b_product-firewalls-and-intrusion-prevention-and-detection","b2b_product-patch-management","b2b_product-ransomware","b2b_product-ueba","b2b_product-web-applications-security","b2b_product-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Half of EDR Tools, Organizations Vulnerable to Clop Ransomware: Research<\/title>\n<meta name=\"description\" content=\"Alarming statistics revealed in Cymulate&#039;s assessments as organizations continue to be at risk from MOVEit vulnerability.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Half of EDR Tools, Organizations Vulnerable to Clop Ransomware: Research\" \/>\n<meta property=\"og:description\" content=\"Alarming statistics revealed in Cymulate&#039;s assessments as organizations continue to be at risk from MOVEit vulnerability.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-30T18:35:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-30T18:35:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-clop-moveit-vulnerability.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"891\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Maine Basan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Maine Basan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/\"},\"author\":{\"name\":\"Maine Basan\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/48c58015ca79ab3ed057abd7a52b2206\"},\"headline\":\"Half of EDR Tools, Organizations Vulnerable to Clop Ransomware: Researchers\",\"datePublished\":\"2023-06-30T18:35:18+00:00\",\"dateModified\":\"2023-06-30T18:35:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/\"},\"wordCount\":1187,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-clop-moveit-vulnerability.png\",\"keywords\":[\"cybersecurity\",\"endpoint security\",\"network security\",\"ransomware\",\"security\",\"vulnerabilities\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/\",\"name\":\"Half of EDR Tools, Organizations Vulnerable to Clop Ransomware: Research\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-clop-moveit-vulnerability.png\",\"datePublished\":\"2023-06-30T18:35:18+00:00\",\"dateModified\":\"2023-06-30T18:35:20+00:00\",\"description\":\"Alarming statistics revealed in Cymulate's assessments as organizations continue to be at risk from MOVEit vulnerability.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-clop-moveit-vulnerability.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-clop-moveit-vulnerability.png\",\"width\":1400,\"height\":891,\"caption\":\"3D render of a warning sign atop virtual obsidian blocks.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Half of EDR Tools, Organizations Vulnerable to Clop Ransomware: Researchers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/48c58015ca79ab3ed057abd7a52b2206\",\"name\":\"Maine Basan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/HH50049850_Maine_Basan-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/HH50049850_Maine_Basan-150x150.jpg\",\"caption\":\"Maine Basan\"},\"description\":\"Maine is an eSecurity Planet writer with a foundation in eLearning content development, research, and academic CRM implementation. She studied BA Communication Arts at the University of the Philippines. She now leverages her communication experiences as a writer and product analyst, engaging the B2B audience with insights into cybersecurity trends and solutions. Off the clock, Maine\u2019s probably immersed in her spreadsheets, organizing her life or planning her next K-pop concert and beach getaways.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/mbasan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Half of EDR Tools, Organizations Vulnerable to Clop Ransomware: Research","description":"Alarming statistics revealed in Cymulate's assessments as organizations continue to be at risk from MOVEit vulnerability.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Half of EDR Tools, Organizations Vulnerable to Clop Ransomware: Research","og_description":"Alarming statistics revealed in Cymulate's assessments as organizations continue to be at risk from MOVEit vulnerability.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/","og_site_name":"eSecurity Planet","article_published_time":"2023-06-30T18:35:18+00:00","article_modified_time":"2023-06-30T18:35:20+00:00","og_image":[{"width":1400,"height":891,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-clop-moveit-vulnerability.png","type":"image\/png"}],"author":"Maine Basan","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Maine Basan","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/"},"author":{"name":"Maine Basan","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/48c58015ca79ab3ed057abd7a52b2206"},"headline":"Half of EDR Tools, Organizations Vulnerable to Clop Ransomware: Researchers","datePublished":"2023-06-30T18:35:18+00:00","dateModified":"2023-06-30T18:35:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/"},"wordCount":1187,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-clop-moveit-vulnerability.png","keywords":["cybersecurity","endpoint security","network security","ransomware","security","vulnerabilities"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/","url":"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/","name":"Half of EDR Tools, Organizations Vulnerable to Clop Ransomware: Research","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-clop-moveit-vulnerability.png","datePublished":"2023-06-30T18:35:18+00:00","dateModified":"2023-06-30T18:35:20+00:00","description":"Alarming statistics revealed in Cymulate's assessments as organizations continue to be at risk from MOVEit vulnerability.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-clop-moveit-vulnerability.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-clop-moveit-vulnerability.png","width":1400,"height":891,"caption":"3D render of a warning sign atop virtual obsidian blocks."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Half of EDR Tools, Organizations Vulnerable to Clop Ransomware: Researchers"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/48c58015ca79ab3ed057abd7a52b2206","name":"Maine Basan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/HH50049850_Maine_Basan-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/HH50049850_Maine_Basan-150x150.jpg","caption":"Maine Basan"},"description":"Maine is an eSecurity Planet writer with a foundation in eLearning content development, research, and academic CRM implementation. She studied BA Communication Arts at the University of the Philippines. She now leverages her communication experiences as a writer and product analyst, engaging the B2B audience with insights into cybersecurity trends and solutions. Off the clock, Maine\u2019s probably immersed in her spreadsheets, organizing her life or planning her next K-pop concert and beach getaways.","url":"https:\/\/www.esecurityplanet.com\/author\/mbasan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/30889"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/331"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=30889"}],"version-history":[{"count":1,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/30889\/revisions"}],"predecessor-version":[{"id":30891,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/30889\/revisions\/30891"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/30892"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=30889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=30889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=30889"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=30889"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=30889"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=30889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}