Rubrik Responds To a Zero-Day Vulnerability Affecting Fortra

Tyler Cross Tyler Cross

The developers behind the GoAnywhere Managed File Transfer Fortra alerted its clients to a zero-day remote code execution vulnerability affecting their software in February. It was almost immediately linked to the infamous Cl0p ransomware.

As a result of the GoAnywhere vulnerability, unauthorized access to a limited amount of information was detected in one of Rubrik’s non-production IT testing environments. Rubrik, a leading cybersecurity company, has been working diligently to address the situation.

With the support of third-party forensics experts, Rubrik’s investigation has determined that the unauthorized access did not involve any data secured on behalf of its customers through its products.

In collaboration with a third-party firm, Rubrik has conducted a thorough review of the data involved in the incident. To start, this vulnerability has been actively exploited in more than 100 organizations worldwide — though very few organizations have actually come forward with details about the exploit.

In this case, the data primarily consisted of internal sales information, including customer and partner company names, business contact details, and a limited number of purchase orders from Rubrik distributors.

Fortunately, the third-party firm has verified that no sensitive personal data, such as social security numbers, financial account numbers, or payment card numbers, were exposed.

The ongoing investigation also confirmed that the incident was contained within the non-production environment, with no lateral movement to other areas. Rubrik took the infected environment offline and employed its own security systems to restore the test environment and contain the threat.

“As a cybersecurity company, the security of customer data we maintain is our highest priority.” Rubrik went on to state that it will update its clients if any additional relevant information emerges during the ongoing investigation. “We sincerely regret any concern this may cause you, and as always, we appreciate your continued partnership and look forward to our ongoing work together.”

About the Author

About the Author

Tyler is a writer at SafetyDetectives with a passion for researching all things tech and cybersecurity. Prior to joining the SafetyDetectives team, he worked with cybersecurity products hands-on for more than five years, including password managers, antiviruses, and VPNs and learned everything about their use cases and function. When he isn't working as a "SafetyDetective", he enjoys studying history, researching investment opportunities, writing novels, and playing Dungeons and Dragons with friends."