CNN
—
Millions of people in Louisiana and Oregon have had their data compromised in the sprawling cyberattack that has also hit the US federal government, state agencies said late Thursday.
The breach has affected 3.5 million Oregonians with driver’s licenses or state ID cards, and anyone with that documentation in Louisiana, authorities said. Casey Tingle, a senior official in the Louisiana governor’s office, said Friday that more than 6 million records were compromised while noting that that number is duplicative because some people have both vehicle registrations and a driver’s license.
The states did not blame anyone in particular for the hack, but federal officials have attributed a broader hacking campaign using the same vulnerability to a Russian ransomware gang.
The hackers exploited a flaw in a popular file-transfer software known as MOVEit made by Massachusetts-based Progress Software.
Hundreds of organizations across the globe have likely had their data exposed after the hackers used the flaw to break into networks in recent weeks. Multiple US federal agencies, including the Department of Energy, were breached, CNN first reported on Thursday. The US Office of Personnel Management was also impacted by the sweeping hack, multiple sources told CNN Friday, but none of the breaches of federal agencies so far have been deemed serious.
US officials have described the cyberattack as an opportunistic, financially motivated hack that has not caused disruptions to agency services.
The list of confirmed victims grew Friday afternoon after multinational consulting giant Aon told CNN that files related to a “select number of our clients” were accessed by hackers in the MOVEit breach. Other big corporations, including the BBC and British Airways, and universities such as the University of Georgia, have also been impacted by the breach.
The data exposed in the breach of the Oregon and Louisiana motor vehicle departments may include Social Security numbers and driver’s license numbers, prompting state authorities to advise their residents on how they can protect themselves from identity fraud.
There is no sign that the hackers have sold or released data stolen from the Louisiana Office of Motor Vehicles, and the hackers have not contacted the state government, the office of Louisiana Gov. John Bel Edwards said in a statement.
Heading into the weekend, US officials and corporate executives across the country continue hunt for signs of stolen data and to try to keep keep the hackers from extorting victims.
“We can’t just rely on technical and security data related to vulnerable [software installations, but also business relationships – contracts, for example – to really understand how bad this is, and how bad it’s going to get,” Munish Walther-Puri, senior director of critical infrastructure at consultancy Exiger, told CNN.
US cybersecurity officials have ordered federal agencies to apply updates from Progress Software, but the recovery process was complicated on Thursday by the discovery of a fresh vulnerability in the software that the company is racing to fix.
Clop, the Russian-speaking hackers that claimed credit, are known to demand multimillion-dollar ransoms, though US and state governments say they have not received any demands. The hackers appear to be focusing their extortion on companies that may pay, adding alleged victims to their dark-web site to pressure them.
The OPM is one of multiple federal agencies impacted by the sweeping hack, current and former US officials familiar with the matter told CNN Friday.
Officials are still investigating what data in OPM’s custody may be affected. The agency is in charge of human resources, retirement and other services for the vast federal bureaucracy.
A spokesperson for the agency had no comment when reached by CNN on Friday evening.
The Biden administration has “focused on rapid response to cyber incidents,” National Security Council spokesperson Adam Hodge said in a statement this week. He pointed to a recent public advisory from federal agencies “to help affected companies and government agencies rapidly find compromises and fix them.”
One person with direct knowledge of negotiations between Clop and its victims said the hackers had in one case asked for more than $100 million from one corporate victim — an audacious number that was a nonstarter.
The hackers are being “extremely aggressive” in negotiations to try to extort victims, said the source, who spoke on the condition of anonymity because they were not authorized to speak to the press.
“Several hundred” companies and organizations in the US could be affected by the hacking spree, a senior US official told reporters on Thursday. It’s another test of the US government’s ability to respond to a cyber incident that could take months to fully understand.
But after a spike in ransomware attacks in 2021, preparation for potential Russian cyberattacks around the Kremlin’s full-scale invasion of Ukraine and other serious cyber threats, the FBI and US Cybersecurity and Infrastructure Security Agency “are in a pretty good place to handle an influx of notifications and provide assistance,” said Jeff Greene, who was a senior cyber official at the National Security Council until last year.
“I watched firsthand as [those agencies] got better and better” at responding to threats, Greene, who is now senior director of the Aspen Institute’s cybersecurity program, told CNN.
This story has been updated with additional developments.