Accounts payable software maker popular with banks hit with cyberattack

211013_AVDXIPO_02a.jpg
AvidXchange
Accounts payable software maker AvidXchange said it had suffered a data security incident, which it learned about early last month. The group that claimed responsibility for the attack leaked stolen passwords and account numbers.

A cybersecurity attack against a major accounts payable software provider popular with banks led to hackers leaking passwords, bank account numbers and nondisclosure agreements last week.

The company, AvidXchange, is used by more than 1,700 banks and credit unions, according to the company's website. The attackers, known as Ransomhouse, appear to steal data and threaten victims that they'll publish it unless they pay ransom, an attack known as data exfiltration. AvidXchange is investigating whether Ransomhouse did in fact obtain customer data.

According to cybersecurity experts, cyber gangs are increasingly deploying attacks like this one, which work like ransomware but skip the encryption step. While such attacks can leave a company's systems intact to continue operating as normal, they still expose sensitive data.

Despite the name, Ransomhouse's cyberattack against AvidXchange was not a ransomware attack by most definitions. Ransomhouse stole AvidXchange data — about 450 gigabytes, the group says — held the data hostage and demanded a ransom, but it apparently did not encrypt AvidXchange's files or otherwise interrupt the company's operations.

Ransomhouse published roughly 9 megabytes of the data it stole and threatened to publish the rest if the company did not contact the group, presumably to negotiate a ransom payment.

"Dear AvidXchange, we strongly recommend you to contact us to prevent your confidential data, documents from being leaked," Ransomhouse said on its dark web blog (also known as an onion site) listing the attack.

AvidXchange quietly published a brief statement about the incident on its website within the past two weeks. The company said the statement went live on April 28. Security researcher and ransomware specialist Brett Callow said on May 2 that Ransomhouse had listed the AvidXchange leak on its onion site. Ransomhouse said it leaked the data on April 16.

AvidXchange learned about this incident in "early April," according to the company's statement. Without naming Ransomhouse, the company said a threat actor had infiltrated "some" of its systems but did not specify which ones or how many. AvidXchange said it would directly contact customers whose data had been compromised.

"Our solutions are operational and we are processing customer invoices and payments," AvidXchange said. "However, our efforts to respond to the incident and enhance our security may result in temporary disruptions to certain features or products."

The data Ransomhouse has published so far from the AvidXchange leak reveals a few damning details about AvidXchange's security practices. For example, a list of more than 3,000 passwords that appears to have been exported from an enterprise password manager indicates that, while AvidXchange used apparently random combinations of letters and numbers for many systems, it also used insecure passwords for some.

Examples of weak passwords AvidXchange used were "password" and "AvidXchange!".

Cybersecurity experts have warned that as cybersecurity threats evolve, criminal organizations like Ransomhouse will multiply — namely, threat actors who infiltrate systems just to exfiltrate data rather than encrypt it. Enterprise cybersecurity company Cyberint warned of exactly this kind of threat last year in a blog post.

"One of Cyberint's predictions about the ransomware landscape in 2022 is that ransomware groups will develop and make efforts, when possible, to request payment for stolen data only, and eliminate the encryption phase in their campaigns," Cyberint wrote in May 2022. "Ransomhouse is one of the groups that has adopted this type of technique, as they are claiming that they do not use any encryption in their campaigns."

Dangerous hackers hack into corporate servers.They often have mu

To combat cybercriminals, banks and credit unions turn to white-hat hackers to uncover system vulnerabilities. But what motivates these computer whizzes can be surprising.

February 20

Ransomhouse shares other similarities with ransomware groups, including blaming cyberattack victims for cybersecurity incidents.

"We believe that the culprits are not the ones who found the vulnerability or carried out the hack, but those who did not take proper care of security," the group writes on its onion site.

Cyberint said of Ransomhouse that "the group's obvious drive is personal gain," and they appear to be "disgruntled bug bounty hunters," looking to be taken more seriously by the companies on which they do penetration testing.

For reprint and licensing requests for this article, click here.
Cyber attacks Ransomware Cyber security Technology
MORE FROM AMERICAN BANKER