We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Mass Hacks Perpetrated via Cleo File Transfer Tool Flaw

Mass Hacks Perpetrated via Cleo File Transfer Tool Flaw
Husain Parvez Published on 12th December 2024 Cybersecurity Researcher

Hackers are exploiting a critical vulnerability in Cleo’s file transfer software, impacting enterprises globally. The flaw, tracked as CVE-2024-50623, affects Cleo’s Harmony, VLTrader, and LexiCom products, widely used for managing secure data transfers. Cybersecurity firm Huntress revealed that despite a patch issued in October, the vulnerability remains exploitable, leading to widespread attacks that have been occurring since early December.

According to the security advisory released by Cleo, the vulnerability allows attackers to perform unrestricted file uploads/downloads and remote code execution, even on systems updated to version 5.8.0.21. Huntress observed exploitation beginning on December 3, with a sharp uptick in activity by December 8. The firm also highlighted that many Cleo servers remain internet-exposed, as evidenced by Shodan scans.

Cleo’s Senior Vice President of Product Development, Jorge Rodriguez, confirmed that the company is developing a new patch to address the issue. However, Cleo has not disclosed how many customers were affected by the attacks or whether sensitive data has been exfiltrated. At least 24 businesses, including logistics and food supply companies, have reported server compromises, Huntress researcher John Hammond told TechCrunch.

The ongoing exploitation of Cleo’s tools comes amid rising concerns over vulnerabilities in widely used enterprise software. Similar risks were recently highlighted when researchers discovered a Windows Update flaw enabling downgrade attacks, which shows the urgency of securing critical infrastructure.

Security researchers warn that the Cleo flaw is reminiscent of previous attacks on file transfer systems, such as those targeting MOVEit and GoAnywhere, which resulted in widespread data breaches. According to SecurityWeek, threat actors exploiting Cleo’s vulnerability have been observed establishing persistence on compromised systems, conducting reconnaissance, and other unspecified post-exploitation activity.

Huntress has urged organizations using Cleo products to move internet-exposed systems behind firewalls and to disable the autorun feature. The cybersecurity firm noted that the malicious XML or text files linked to the exploitation appear in the “hosts” subdirectory of a software installation, and can invoke PowerShell commands to download additional payloads.

Cleo has over 4,200 customers worldwide, including major companies such as Target, Walmart, and FedEx. As organizations await a new patch from Cleo, experts stress the importance of immediate protective measures to safeguard critical business operations.

About the Author

Husain Parvez is a Cybersecurity Researcher and News Writer at vpnMentor, focusing on VPN reviews, detailed how-to guides, and hands-on tutorials. Husain is also a part of the vpnMentor Cybersecurity News bulletin and loves covering the latest events in cyberspace and data privacy.

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address