 All right, I am joined by Matt Lee. We're just going to jump into it here. And Matt Lee, he's been on channel before, specialized cybersecurity researcher, also really fun to hang out with and do talks with. But we're here today to talk about Move It. I seen Matt was doing something today about Move It directly contacting companies. He's got one hell of a list because if you haven't heard or if you've been under a rock or a movie has been in the news and is a file transfer tool used in the enterprise, actually I've been chatting at the same time. I've seen Matt Lee talking about this. I was chatting with one of my enterprise friends that they are scrambling and because they use this across their hospitals, which is not my story. Oh, no. Oh, no. At least they're aware that you don't have to call any of them. Well, what is Move It in terms of the vulnerability with it? Let's start there. Yeah. So I mean, there's a whole host of them. Tom, there's a remote sequel injection, I think. I haven't, I'll be honest with you. I've been so busy in the remediation and explanation and calling and trying to do victim notification, at least hopefully pre-victim notification of these that I haven't dug into it as much as you have. But I know that there has been a slew of them that have come out that make this a very, very easy methodology. And it's been rather exploited, right? We saw Louisiana and several of other states. So others in there. And to catch people up very quickly, it's June 16th and it was only what like two weeks ago, I think was one of the first realization that this was being exploited, which we didn't know there was an exploit in the software. The exploit was found. And when they said, here's a patch. And then our friends who are at Huntress goes, nope, we have another one. We found yet another flaw. And then another flaw dropped yesterday. So, yeah. Accidentally wearing the Hunter's shirt. Accidentally wearing Hunter's shirt. So there's been just a whole series of flaws. Is it not just in the medical facility that you use in government agencies? And Matt Lee was actually literally reaching out through, you can, these are publicly exposed. There's ways to discover them, if you will. We're not going to go into that methodology, but Matt has quite the list of government agencies, because as they're being actively targeted, we wanted to raise some awareness because it's actually easier to make a YouTube video and hopefully someone goes, I think we might use that software. Yeah, yeah, exactly. Yeah. And I'll tell you the process, Tom, right? Like I've been, you know, like you said, we won't share exactly the technique because I don't want to make this a lot easier. But you know, we've parsed it through. I got about 60 pages or so of dense, dense, dense URLs. And all of these are active and online. I'm scraping them through a good friend of mine, Cody, that has been doing a lot of this work as well and making the ugly Python script that made the ugly results that I'm parsing through. God bless us all. Yeah. But it's down and dirty. It's getting it done. And I'm looking for copyright dates that are exposed, right? And this is one of the things I think Movet did poorly that they, in their web, in their web software, it says copyright date, 2001 to Dash. Well, if that Dash is before 2023, and probably quite even presumably, if it says 2023, because some of the newer versions don't have any copyright data, we are seeing that it's vulnerable and it's up and it's online. And so what I'm doing is hitting that page. And they have a contact section now, to varying degrees, it's filled out, mostly not. And then there's a phone number. And so I'm calling and emailing those. So if you get an email from me that says critical vulnerability found online, here's your site. And in it, it has a body explaining and linking to the vulnerabilities. And then your site link, please, God, take it down. Yes. Have it find some other alternate method to continue doing business and get through this storm as it continues on. But yeah, that's been what I've been working on now for the last 14 or so hours. Yeah. And this is why, you know, I just seen him doing this, we were, we were chatting because some of the behind the scenes stuff that, you know, as they participate in a community, just like Matt Lee does, we all want to see better outcomes. Our goal is to raise awareness, tell you to patch it or turn it off, whichever those options are. What you can do person watching this is even if you're just at the help desk, one of these companies and go, Hey, I think we use that suggests whoever the powers may be, that they should, you know, point out our video, point at several links, there's plenty of notices, there's plenty of validity. And if you happen to see a Matt Lee email, don't ignore it. He's not the bad guy. He's among the people who are trying to do this. That's why I figured a quick video on this topic just to talk about it and leave some comments down below because I think Matt wants to put a research project. We like to do debriefs on this in the future to talk about what happened because that's how we learning it better. What could be better, right? Maybe having good contact information, a lot of that things operational systems. I spent three hours on the phone with the police and I think it was Indianapolis and in the state and you know, you have all these things playing out. So yeah, there's so much to talk about on this. This will be a very juicy paper that Tom and I might end up doing on stage together one day. I think it'd be a fun debrief. So leave your comments down below. Remind us that we should come back and revisit all of this. But for now, that's it. Just patch it. You got to move off, move it or move it, move your butt to patch it. I just keep on to play that, you know, the song in my hand. Move it, move it. Oh no. I'm gonna have that in my head the rest of the day while I'm making these phone calls. Yeah. So best of luck to all of you that are tasked with doing this and thanks. I'll links down below if you want more information about Matt Lee and all this move it stuff. All right. Thanks.