American advanced technology conglomerate Honeywell International confirms some sensitive company data has been compromised as part of the MOVEit attack spree.
Honeywell now joins a growing list of companies who have been impacted by the massive breach of the MOVEit file transfer system, carried out by the Cl0p ransom gang in late May.
The North Carolina headquartered company was added to the latest batch of victims released by the gang on their dark leak site this week.
Honeywell’s Director of External Communications Caitlin Leopold told Cybernews that the company had been aware of the leak, releasing an official statement on its corporate website on June 16th.
“The investigation detected unauthorized access on a single MOVEit server, the company said in its statement.
“As part of our ongoing investigation, we have found data, including certain personally identifiable information, that has been accessed through the MOVEit app by an unauthorized third party. We are contacting affected individuals, customers, and partners as appropriate,” Honeywell said.
Honeywell went on to say that the breach has had no material impact on business operations, and all of its systems are fully online.
The Fortune 100 company also stated that its cybersecurity defenses limited the impact to the affected server, and IT teams fully patched and upgraded the MOVEit app as soon as fixes were available.
Honeywell International spans numerous industrial sectors providing products and services to clients around the world, including manufacturing aerospace and automotive products; industrial control systems; specialty chemicals and plastics; and engineered materials.
The present company was formed in 1999 through the merger of Allied Signal Inc.
MOVEit and Cl0p impact hundreds
Progress, the American software maker and distributor of MOVEit Transfer, has released three critical security patches since the Russian-affiliated Cl0p gang claimed responsibility for exploiting a zero-day vulnerability in the system.
The MOVEit Transfer system is just one of the dozens of third-party tools the Progress software company offers to its business customers.
Experts we’ve spoken to say that around 3,000 deployments of MOVEit Transfer were in use when the zero-day flaw was first exploited by the Cl0p gang.
Presently there are at least 150 victims listed on Cl0p's dark leak site, including Honeywell.
Along with victims' names, the gang often posts details on its dark leak site revealing how much data was allegedly stolen in the company breach, as well as providing alleged samples of their handiwork.
On June 14th, Cl0p threatened to release the names of its victims, along with troves of stolen data, if victims did not contact them and pay an undisclosed ransom demand.
More from Cybernews:
Subscribe to our newsletter