The number of entities impacted by the MOVEit attack carried out by a notorious cybercrime group now reportedly exceeds 340 organizations and 18 million individuals.
Brett Callow, a threat analyst at cybersecurity firm Emsisoft who has been monitoring the campaign, said over the weekend that he is aware of 347 impacted organizations, including 58 educational institutions in the United States. This includes Colorado State University, which last week confirmed that student and employee data may have been stolen.
Callow believes more than 18.6 million individuals had their data compromised as a result of the MOVEit hack. He warned that the cybercrime group that conducted the attack, known for its use of the Cl0p ransomware, is in possession of a massive quantity of data that could be useful for business email compromise (BEC) and phishing attacks.
The expert clarified for SecurityWeek that the number of impacted organizations includes both ones that were directly affected and ones that were indirectly hit. For instance, UK-based payroll and HR company Zellis was hit directly and major companies using Zellis services, such as the BBC and British Airways, were impacted indirectly.
In the meantime, the Cl0p group continues naming more alleged victims of the MOVEit attack on its leak website. The list now includes industrial giant Honeywell, which issued a statement on the matter in mid-June, when it confirmed that some personally identifiable information had been accessed through the MOVEit app.
SecurityWeek has reached out to Honeywell for any updates on the incident and will update this article if the company responds.
Another industrial company that has confirmed being hit by the MOVEit attack is Emerson. The firm told SecurityWeek last week that “no data containing sensitive information impacting our business or customers was accessed”.
Emerson also pointed out that only the system hosting MOVEit software was impacted — IT applications or infrastructure were not accessed or otherwise affected.
Siemens Energy and Schneider Electric have also been impacted.
Netscout has also been named on the Cl0p website, but the cybersecurity firm has not issued any statements and it has not responded to SecurityWeek.
Photography platform Shutterfly and several German banks have also confirmed being targeted.
The ransomware group has started publishing files stolen from many organizations that have refused to pay up. The hackers claim to have deleted all data stolen from impacted government agencies.
Huntress has been monitoring the MOVEit hack and reported recently that the cybercriminals did not appear to have deployed file-encrypting ransomware against any of the organizations targeted through this campaign.
The attack involved exploitation of a MOVEit software zero-day vulnerability that hackers may have known about since 2021.
Related: MOVEit: Testing the Limits of Supply Chain Security
Related: After Zero-Day Attacks, MOVEit Turns to Security Service Packs

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- CISA Warns of Old JBoss RichFaces Vulnerability Being Exploited in Attacks
- NIST Publishes Final Version of 800-82r3 OT Security Guide
- Johnson Controls Hit by Ransomware
- Verisoul Raises $3.25 Million in Seed Funding to Detect Fake Users
- Government Shutdown Could Bench 80% of CISA Staff
- Google Rushes to Patch New Zero-Day Exploited by Spyware Vendor
- macOS 14 Sonoma Patches 60 Vulnerabilities
- New GPU Side-Channel Attack Allows Malicious Websites to Steal Data
Latest News
- Bankrupt IronNet Shuts Down Operations
- AWS Using MadPot Decoy System to Disrupt APTs, Botnets
- Generative AI Startup Nexusflow Raises $10.6 Million
- In Other News: RSA Encryption Attack, Meta AI Privacy, ShinyHunters Hacker Guilty Plea
- Researchers Extract Sounds From Still Images on Smartphone Cameras
- National Security Agency is Starting an Artificial Intelligence Security Center
- CISA Warns of Old JBoss RichFaces Vulnerability Being Exploited in Attacks
- Hackers Set Sights on Apache NiFi Flaw That Exposes Many Organizations to Attacks
