Tuesday, March 4, 2025
HomeCyber Security NewsHoneywell Server Compromised by MOVEit Hackers

Honeywell Server Compromised by MOVEit Hackers

Published on

SIEM as a Service

Follow Us on Google News

A flaw was discovered in Progress MOVEit Transfer, a popular third-party online transfer application. By exploiting the flaw, attackers compromised multiple organizations, including U.S. Government agencies.

Honeywell is the recent victim of MOVEit Hackers as they gained Unauthorized access to a single MOVEit server.

Multinational firm Honeywell detected data that an unauthorized third party had accessed through the MOVEit app, including some personally sensitive information. 

“Honeywell immediately launched an investigation upon learning of the vulnerability in Progress MOVEit Transfer, a third-party web transfer application used by many companies.

The investigation detected unauthorized access on a single MOVEit server”, Honeywell reports.

The company’s primary business sectors are aircraft, building technologies, performance materials and technologies (PMT), and safety and productivity solutions (SPS).

Around 97,000 workers worldwide worked for the company in 2022, down from 113,000 in 2019.

As necessary, the corporation is getting in touch with the impacted people, clients, and partners.

Unauthorized Access to Servers

“All of our systems are fully online, and this has had no impact on company operations. At this time, we do not expect that the unauthorized access on the MOVEit server we used will have a material impact on our business operations”, Honeywell said.

Additionally, the same Progress MOVEit vulnerability has affected certain Honeywell suppliers, and as a result, their data may have been affected. 

Progress MOVEIt is the top secure Managed File Transfer (MFT) software. It is used by thousands of organizations across the world to give full visibility and control over file transfer activity.

MOVEit helps to satisfy compliance requirements, effortlessly assure the reliability of key business operations, and securely transmit sensitive data among partners, clients, users, and systems whether it is installed as-a-Service, in the Cloud, or locally.

The organization assesses the issue and takes necessary action as soon as one of these vendors reports that the data has been stolen.

The business claimed that its cybersecurity safeguards prevented the damage to this server and, before resuming service, completely patched and upgraded the Progress MOVEit app as soon as the provider’s updates were available.

“Our cybersecurity defenses limited the impact to this server and we fully patched and upgraded the Progress MOVEit app as soon as the patches were made available from the provider before restoring service”, the company said.

The company mentioned that they are in touch with certain law enforcement and regulatory agencies since the inquiry is still underway.

“We will assess and respond to any impacts as part of our ongoing investigation as we receive notification from suppliers that our data has been compromised,” the company stated.

“AI-based email security measures Protect your business From Email Threats!” – .

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hunters International Claims Tata Technologies Cyberattack

Multinational engineering and technology services firm Tata Technologies has reportedly fallen victim to a...

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance...

Google, Meta, and Apple Power the World’s Biggest Surveillance System

Imagine a government that tracks your daily movements, monitors your communications, and catalogs your...

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hunters International Claims Tata Technologies Cyberattack

Multinational engineering and technology services firm Tata Technologies has reportedly fallen victim to a...

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance...

Google, Meta, and Apple Power the World’s Biggest Surveillance System

Imagine a government that tracks your daily movements, monitors your communications, and catalogs your...