Microsoft: Lace Tempest Hackers Behind Active Exploitation of MOVEit Transfer App,
Microsoft has officially linked the ongoing active exploitation of a critical flaw in the Progress Software MOVEit Transfer application to a threat actor it tracks as Lace Tempest.
« Exploitation is often followed by deployment of a web shell with data exfiltration capabilities, » the Microsoft Threat Intelligence team said in a series of tweets today. « CVE-2023-34362 allows attackers to
« Exploitation is often followed by deployment of a web shell with data exfiltration capabilities, » the Microsoft Threat Intelligence team said in a series of tweets today. « CVE-2023-34362 allows attackers to
,
Microsoft has officially linked the ongoing active exploitation of a critical flaw in the Progress Software MOVEit Transfer application to a threat actor it tracks as Lace Tempest.
« Exploitation is often followed by deployment of a web shell with data exfiltration capabilities, » the Microsoft Threat Intelligence team said in a series of tweets today. « CVE-2023-34362 allows attackers to
« Exploitation is often followed by deployment of a web shell with data exfiltration capabilities, » the Microsoft Threat Intelligence team said in a series of tweets today. « CVE-2023-34362 allows attackers to
, ,
https://thehackernews.com/2023/06/microsoft-lace-tempest-hackers-behind.html