← Back to reports library

Breach Root-Cause Briefs and Mitigations (5+ Minute Depth)

1) MOVEit Transfer SQL Injection Exploitation (Progress Software, 2023) Root cause. A SQL injection flaw (CVE-2023-34362) in MOVEit Transfer’s web interface allowed unauthenticated exploitation. Insufficient input validation on the Progress MOVEit web…

Operational Reports · Coverage focus 2025 · Updated December 12, 2025

1) MOVEit Transfer SQL Injection Exploitation (Progress Software, 2023)

  • Root cause. A SQL injection flaw (CVE-2023-34362) in MOVEit Transfer’s web interface allowed unauthenticated exploitation. Insufficient input validation on the Progress MOVEit web application and permissive database privileges let attackers execute arbitrary SQL and deploy web shells.
  • Attack path. Threat actors (including the Cl0p group) mass-scanned exposed MOVEit instances, used the injection to drop ASPX web shells, harvested Azure Blob storage keys, and exfiltrated files from underlying databases and object storage. Many victims were compromised within hours of public disclosure due to lack of virtual patching.
  • Detection gaps. Limited WAF rules specific to the parameterized MOVEit endpoints, inadequate SQL audit logging, and missing integrity monitoring on MOVEit’s wwwroot directory delayed identification. Some SOCs treated outbound data movement to cloud object storage as expected service traffic and did not flag anomalies.
  • Actionable mitigations.
  • Immediate: Apply all Progress MOVEit hotfixes; if patching is delayed, place MOVEit behind a WAF with vendor-published signatures and restrict administration to VPN-only access lists. Disable public access to Azure Blob/S3 buckets tied to MOVEit until keys are rotated.
  • Near term (30–60 days): Rotate MOVEit service accounts and storage access keys; enable SQL Server/Azure SQL auditing with alerts on xp_cmdshell, OPENROWSET, or abnormal role changes; deploy file integrity monitoring on MOVEit wwwroot to detect shell drops.
  • Sustained control: Require pre-production security testing for file-transfer platforms, including authenticated dynamic analysis of upload/download endpoints. Maintain SBOMs and monitor vendor advisories so virtual patching can be applied via WAF rules within hours of disclosure.

2) SolarWinds Orion Supply-Chain Compromise (2020)

  • Root cause. Attackers inserted malicious DLLs (SUNBURST) into Orion Platform builds after breaching the build environment. Weak network segmentation and insufficient code-signing pipeline integrity allowed tampering to propagate signed updates.
  • Attack path. Compromised Orion updates were distributed to ~18,000 customers; implants communicated with attacker infrastructure using DNS-based C2 and, in selected victims, loaded secondary payloads that enabled privilege escalation and lateral movement in Windows AD environments.
  • Detection gaps. Build artifacts were trusted implicitly; code-signing did not verify provenance of compiled DLLs. Many customers lacked egress filtering on Orion servers and did not monitor Orion process behavior, allowing C2 traffic to blend into normal management activity.
  • Actionable mitigations.
  • Immediate: Validate whether affected Orion versions (2019.4–2020.2.1 HF1) existed in inventory; if present, isolate servers, collect forensic images, and rotate credentials stored or accessed by Orion.
  • Near term (30–90 days): Enforce build-pipeline hardening (signed source control commits, reproducible builds, isolated signing keys on HSMs, mandatory code reviews on installer changes). Deploy egress controls so Orion servers can only reach vendor update domains via TLS inspection.
  • Sustained control: Adopt software supply chain security frameworks (SLSA Level 2+), require SBOM attestation from vendors, and continuously validate update packages with behavior-based allowlists before deployment to management networks.

3) Equifax Apache Struts RCE Breach (2017)

  • Root cause. Unpatched Apache Struts CVE-2017-5638 (Jakarta Multipart parser RCE) persisted on an internet-facing dispute portal despite available patches. Asset inventory gaps and ineffective vulnerability management left the server exposed for months.
  • Attack path. Attackers sent crafted Content-Type headers to trigger OGNL injection, gained remote code execution, pivoted inside Equifax’s network, and accessed databases containing ~147 million individuals’ PII.
  • Detection gaps. IDS signatures for the OGNL exploit were absent or misconfigured; outbound traffic monitoring did not flag large data exfiltration from the dispute portal segment. Certificate misconfigurations also caused expired TLS inspection certificates, degrading scanner coverage.
  • Actionable mitigations.
  • Immediate: Verify Struts components against CVE-2017-5638 and decommission or patch any vulnerable services; block multipart requests with unexpected Content-Type values at the edge while validating patch status.
  • Near term (30–60 days): Implement authenticated vulnerability scanning tied to CMDB entries; automate patch SLAs for critical CVSS 9+ flaws with executive escalation paths. Instrument WAF rules for OGNL patterns and perform tabletop exercises on critical CVE response.
  • Sustained control: Enforce network segmentation for consumer-facing dispute/claims portals, implement DLP on database egress, and maintain continuous attack surface monitoring to detect forgotten internet-facing assets.

4) Colonial Pipeline Ransomware (2021)

  • Root cause. A compromised VPN account with reused credentials and absent MFA allowed DarkSide affiliates to access the IT network. Insufficient network segmentation between IT assets and operational technology (OT) led to operational shutdown to prevent spread.
  • Attack path. After VPN access, attackers deployed Cobalt Strike, harvested AD credentials, and deployed ransomware across Windows systems. Business disruption drove the operator to preemptively halt pipeline operations, causing fuel supply impacts across the U.S. East Coast.
  • Detection gaps. No MFA on legacy VPN, limited lateral movement detection (Kerberoasting/Pass-the-Hash), and inadequate OT/IT boundary controls. Backup validation was insufficient, prolonging recovery timelines.
  • Actionable mitigations.
  • Immediate: Enforce MFA on all remote access paths; disable unused VPN accounts; deploy conditional access rules that block logins from anomalous geolocations and impossible travel events.
  • Near term (30–90 days): Segment OT from IT with firewalled jump hosts; deploy EDR with lateral movement detections (PSExec, WMI, Kerberoasting) and prioritize backup integrity testing with offline recovery points.
  • Sustained control: Implement identity governance with privileged access management (PAM) for domain admins, require password rotation for service accounts, and conduct red team exercises that validate ransomware containment playbooks across IT and OT zones.

5) LastPass Developer Workstation Compromise (2022)

  • Root cause. An engineer’s home PC running Plex was exploited (CVE-2020-5741), and credentials reused for LastPass cloud backups enabled attackers to exfiltrate password vault backups. Insufficient separation between personal and corporate assets and lack of hardened developer endpoint monitoring were key contributors.
  • Attack path. Attackers leveraged the Plex exploit to harvest credentials, authenticated to LastPass cloud storage, and copied backups containing encrypted customer vaults and configuration secrets. Although vaults were encrypted, metadata and certain unencrypted fields increased phishing risk.
  • Detection gaps. Endpoint logging on the personal device was minimal; abnormal cloud storage access patterns were not detected quickly; MFA was not enforced on the Plex admin interface and personal accounts tied to corporate systems.
  • Actionable mitigations.
  • Immediate: Require hardware-backed MFA for cloud storage and administrative consoles; invalidate tokens/keys tied to developer accounts; review access logs for unusual download volumes.
  • Near term (30–60 days): Mandate corporate-managed endpoints for engineers with enforced EDR, disk encryption, and patch baselines; prohibit personal services (e.g., media servers) on the same devices used for privileged work; deploy CASB/UEBA rules for anomalous backup access.
  • Sustained control: Separate personal and corporate identity providers; adopt client certificate authentication for administrative tools; run quarterly tabletop exercises on third-party/bring-your-own-device breach scenarios to pressure-test containment and notification steps.