June 5, 2023, 12:48 p.m. | Tyler Lioi - Sean Palka

Cybersecurity Blog | CrowdStrike provinggrounds.cs.sys

Summary Points Organizations around the globe continue to experience the fallout of the MOVEit Transfer exploit CVE-2023-34362  CrowdStrike incident responders have identified evidence of mass file exfiltration from the MOVEit application, as a result of the webshell activity on compromised MOVEit systems Data exfiltration activity can be identified by analyzing the MOVEit application database and […]

application compromised continue crowdstrike cve cve-2023-34362 data data exfiltration exfiltration experience exploit featured file from the front lines incident incident responders investigations moveit moveit transfer organizations result systems transfer webshell

More from provinggrounds.cs.sys / Cybersecurity Blog | CrowdStrike

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Senior Software Engineer, Security

@ Niantic | Zürich, Switzerland

Consultant expert en sécurité des systèmes industriels (H/F)

@ Devoteam | Levallois-Perret, France

Cybersecurity Analyst

@ Bally's | Providence, Rhode Island, United States

Digital Trust Cyber Defense Executive

@ KPMG India | Gurgaon, Haryana, India

Program Manager - Cybersecurity Assessment Services

@ TestPros | Remote (and DMV), DC