Recorded Future’s 2023 analysis finds threat actors increasingly weaponized enterprise software and shared cloud infrastructure—highlighting incidents like the MOVEit exploit attributed to the CL0P gang and nation-state espionage targeting Taiwanese semiconductor firms. The report also flags growing abuse of legitimate internet services for malware distribution, exploitation of Linux/macOS vulnerabilities, and scams such as SIM swapping. #CL0P #MOVEit #China #TaiwanSemiconductors

Keypoints

  • Adversaries exploited “as‑a‑service” enterprise software and shared cloud infrastructure, increasing weaponized vulnerabilities and large-scale breaches.
  • The MOVEit vulnerability was exploited by the CL0P gang, demonstrating high profitability in targeting enterprise file transfer systems.
  • Nation-state actors—including China—conducted targeted espionage against Taiwanese semiconductor companies.
  • Threat actors abused legitimate internet services to distribute malware, expanding distribution channels and evasion options.
  • Linux and macOS vulnerabilities were actively exploited, broadening the range of targeted operating systems beyond Windows.
  • Compromise of business process organizations enabled scams such as SIM swapping to facilitate account takeovers and fraud.
  • The report forecasts these trends to continue into 2024, shaped by geopolitical and regulatory factors.

MITRE Techniques

  • [T1190] Exploit Public-Facing Application – Used to exploit enterprise and cloud services: [‘…MOVEit exploit by the ransomware gang CL0P…’]
  • [T1195] Supply Chain Compromise – Leveraging vulnerabilities in shared/cloud service dependencies: [‘…exploitation of “as-a-service” enterprise software and shared cloud infrastructure…’]
  • [T1105] Ingress Tool Transfer – Abuse of legitimate internet services to deliver malicious payloads and distribution channels: [‘…abuse of legitimate internet services for malware distribution…’]
  • [T1203] Exploitation for Client Execution – Targeting OS-specific flaws to execute code on Linux and macOS hosts: [‘…exploitation of Linux and macOS vulnerabilities…’]
  • [T1589] Gather Victim Identity Information – Collecting identity and organizational data to enable SIM swapping and related scams: [‘…compromise of business process organizations for scams like SIM swapping…’]
  • [T1041] Exfiltration Over C2 Channel – Data theft and espionage activities following access to enterprise systems: [‘…steal data, conduct espionage, and disrupt geopolitics…’]

Indicators of Compromise

  • [URL] Report and advisory – https://go.recordedfuture.com/hubfs/reports/ta-2024-0321.pdf (downloadable PDF report), https://www.recordedfuture.com/2023-annual-report (original post)
  • [Domain] Affected/published domains – recordedfuture.com, go.recordedfuture.com
  • [File] Report filename – ta-2024-0321.pdf (report containing full analysis)
  • [URL] Media asset – https://cms.recordedfuture.com/uploads/unnamed_3_740b5ef73c.jpg (illustrative image used in the article)

Adversaries increasingly focused on enterprise-facing software and cloud-hosted services in 2023, weaponizing vulnerabilities in “as-a-service” platforms to gain access and pivot across environments. High-impact examples include the exploitation of MOVEit—used by the CL0P gang—to rapidly harvest sensitive files from enterprise systems, demonstrating the effectiveness of targeting widely deployed file-transfer solutions and their supply chains.

Attackers also diversified distribution and access techniques by abusing legitimate internet services to host or deliver malware, reducing detection likelihood and complicating attribution. Concurrently, exploitation of Linux and macOS vulnerabilities expanded the attacker target set beyond traditional Windows environments, enabling remote code execution and client-side compromise on non‑Windows hosts.

Social-engineering and business-process abuse, such as using compromised or coerced business services to perform SIM swapping, supported account takeovers and fraud that complemented technical intrusions. These combined methods—software exploitation, cloud/supply-chain leverage, abuse of legitimate services, OS-specific exploits, and identity-focused scams—drove data theft and espionage activity and are expected to persist into 2024.

Read more: https://www.recordedfuture.com/2023-annual-report