Security

Cyber-crime

Data on 760K workers from Xerox, Nokia, BofA, Morgan Stanley and more dumped online

Yet another result of the MOVEit mess


Hundreds of thousands of employees from major corporations including Xerox, Nokia, Koch, Bank of America, Morgan Stanley and others appear to be the latest victims in a massive data breach linked to last year's attacks on file transfer tool MOVEit.

On Monday morning, an entity that uses the handle "Nam3L3ss" began leaking what they claimed to be personal data belonging to from the abovementioned corporations, plus workers at other firms affected by the MOVEit vulnerability.

The Russia-linked Cl0p ransomware crew began abusing this critical security hole in Progress Software's MOVEit product suite in May 2023. Thousands of organizations' and millions of individuals' data was accessed.

MOVEit appears to be the gift that keeps giving, as last month Nam3L3ss began dumping files – including those belonging to Amazon employees – on the cyber crime forum.

This week, the miscreant(s) added several other big names to the MOVEit victims list. The newly leaked data appears to be authentic, according to Zack Ganot, chief strategy officer at personal-data-removal deletion outfit Atlas Privacy.

Atlas Privacy operates databreach.com – which allows people to check if their info has been exposed in a breach, and then helps them remove their data from the internet. The service's initial analysis of the data Nam3L3ss disclosed is that it exposes hundreds of thousands of employees' names, phone numbers, email addresses, job addresses, employee badges, job titles, and usernames.

This includes more than 760,000 employee details belonging to workers from Xerox (42,735), Koch (237,487), Nokia (94,253), Bank of America (288,297), Bridgewater (2,141), Morgan Stanley (32,861), and JLL (62,349). All six firms were listed on BreachForums on Monday. None responded to The Register's requests for comment. We will update this story if and when we hear back from them.

"This data is a goldmine for social engineering," Ganot told The Register. "Knowing exactly what employee sits on which team, who they report to, what their badge number is, what building they work in, their organizational email and phone number – this is some wild stuff for an attacker looking to exploit an org." ®

Send us news
3 Comments

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

'Codefinger' crims on the hunt for compromised keys

Mitel 0-day, 5-year-old Oracle RCE bug under active exploit

3 CVEs added to CISA's catalog

Chinese cyber-spies peek over shoulder of officials probing real-estate deals near American military bases

Gee, wonder why Beijing is so keen on the – checks notes – Committee on Foreign Investment in the US

Russia's Star Blizzard phishing crew caught targeting WhatsApp accounts

FSB cyberspies venture into a new app for espionage, Microsoft says

China's Salt Typhoon spies spotted on US govt networks before telcos, CISA boss says

We are only seeing 'the tip of the iceberg,' Easterly warns

FBI wipes Chinese PlugX malware from thousands of Windows PCs in America

Hey, Xi: Zài jiàn!

Crims backdoored the backdoors they supplied to other miscreants. Then the domains lapsed

Here's what $20 gets you these days

Microsoft sues 'foreign-based' cyber-crooks, seizes sites used to abuse AI

Scumbags stole API keys, then started a hacking-as-a-service biz, it is claimed

FireScam infostealer poses as Telegram Premium app to surveil Android devices

Once installed, it helps itself to your data like it's a free buffet

Charter, Consolidated, Windstream reportedly join China's Salt Typhoon victim list

Slow drip of compromised telecom networks continues

Chinese cyber-spies reportedly targeted sanctions intel in US Treasury raid

OFAC, Office of the Treasury Secretary feared hit in data-snarfing swoop