MOVEit & Zellis data security attack puts thousands of employees at risk

ramsac cybercovid 1 e1585644078953

In case you missed it, last week the news headlines once again featured a serious data breach, with the revelation that the personal information of thousands of employees’ personal data had been breached in planned attack on the data of Zellis, an outsourced payroll company.

In brief, Zellis are a payroll company that provide an outsourced service to some pretty large organisations, including the BBC, British Airways and Boots. They use a piece of software called MOVEit, for transferring files between themselves and their clients.

It has been reported that Cybercriminals are exploiting a zero-day vulnerability in MOVEit, to perform a mass download of data. Data stolen includes staff ID numbers, dates of birth, home addresses, national insurance numbers and banks details.

A zero-day vulnerability is a flaw in a system or application that there is no defense against because the system or application maker is unaware it exists.

Zellis have confirmed that data was stolen from 8 of its client firms. The BBC have informed employees that their personal data was stolen, while staff of British Airways were informed their bank details may have been stolen. Many other organisations have been impacted by this attack and the numbers are expected to rise. It is not confirmed who is behind this attack, but there is speculation that notorious Cl0p ransomware group, thought to be based in Russia, may be behind it according to Microsoft.

An updated version of the MOVEit software has been released and the National Cyber Security Centre has urged organisations using this software to carry out security updates as soon as possible. However, an internet scan revealed that thousands of company databases are still vulnerable because they haven’t been updated according to reports.

Attacks like these are a reminder that all of us need to have strong security resilience in place. It is essential that you

  1. Have an understanding of your supply chain. Your company data doesn’t just reside in your own system, you likely share data via your supply chain, be that professional advisors, outsourced service providers, or even your IT suppliers. Our recent blog gives more information on how to audit your supply chain
  2. Ensure that someone in your business is receiving daily alerts about zero day threats and is ascertaining if you need to take immediate action. Our secure+ service provides this service on your behalf.
  3. Have a plan for emergency patching when new vulnerabilities are released
  4. Have a plan for ongoing patching and software updates which should happen across all platforms at least once a month
  5. It is important that organisations have Cyber Incident Response Plans (CIRP) in place that outlines procedures and guidelines for responding to any potential cyber incidents that may occur within an organization such as this MOVEit cyber breach. This plan should not only highlight steps to recover from cyber-attacks but should also detail how to communicate with internal and external stakeholders

If you believe your data may have been impacted by this breach, the National Cyber Security Centre have issued guidance, available at https://www.ncsc.gov.uk/guidance/data-breaches

Brochure: secure+ from ramsac

secure+ is a proactive cybersecurity monitoring service designed to hunt for signs of malicious activity or potential cyberbreach, ramsac then takes action to prevent damage from being done.

Related Posts

  • What is Data Loss Prevention (DLP)?

    What is Data Loss Prevention (DLP)?

    CybersecurityTechnical Blog

    Explore how Data Loss Prevention (DLP) strategies and tools protect sensitive data, ensure regulatory compliance, and mitigate risks from insider threats, enabling organisations to stay secure and resilient in [...]

    Read article

  • AI-Driven Threat Detection and Response

    AI-Driven Threat Detection and Response

    AICybersecurityTechnical Blog

    This blog explores how AI-driven cybersecurity is transforming threat detection and response with real-time, adaptive defenses against evolving cyber threats. [...]

    Read article

  • Why you should invest in Cybersecurity Consultancy

    Why you should invest in Cybersecurity Consultancy

    Cybersecurity

    n an increasingly complex cyber threat landscape, investing in cybersecurity consultancy is essential to protect your business from potential risks and ensure long-term resilience. [...]

    Read article

  • Everything you need to know about the transition to ISO 27001:2022 

    Everything you need to know about the transition to ISO 27001:2022 

    Cybersecurity

    This blog explains the essential steps and timeline for transitioning from ISO 27001:2013 to ISO 27001:2022, ensuring your organisation maintains its certification before the October 2025 deadline. [...]

    Read article

  • Why your organisation needs VMaaS: Turning vulnerabilities into strengths

    Why your organisation needs VMaaS: Turning vulnerabilities into strengths

    Cybersecurity

    Discover how ramsac’s VMaaS can transform vulnerability management from a reactive headache into a proactive strategy that strengthens your organisation’s cybersecurity. [...]

    Read article

  • Machine Learning Algorithms in Cybersecurity

    Machine Learning Algorithms in Cybersecurity

    AICybersecurityTechnical Blog

    Learn how machine learning algorithms are transforming cybersecurity, improving threat detection and predicting future attacks to help secure your digital environment. [...]

    Read article

Quiz yourself

Are you more cyber savvy than an 11 year old?

11-14 year olds get asked these questions in school. Could you get these right?