Delta Airlines and Amazon have recently confirmed that employee data was compromised through a third-party vendor breach tied to the MOVEit file transfer tool. This resurgence of MOVEit-related concerns follows a dark web post by a hacker identifying as “Nam3L3ss,” who threatens to release extensive data obtained through the MOVEit vulnerability, which led to numerous high-profile breaches last summer.
Delta and Amazon Respond to Data Breach
Delta’s spokesperson clarified that the breach involved internal directory data sourced from a third-party vendor, not Delta’s own systems. According to Delta, the compromised dataset contains employee names, contact details, and office locations, but no sensitive information like Social Security numbers or financial data.
“Delta teams work continuously to safeguard our data as the security and integrity of that information is of the utmost importance,” the spokesperson assured.
Amazon, which also confirmed the breach to media outlet 404 Media, reported similar findings. The unnamed vendor received basic employee contact information but did not collect more sensitive data. The company affirmed that the vulnerability has since been addressed, and Amazon’s systems remain secure.
“Amazon and AWS systems remain secure, and we have not experienced a security event,” an Amazon representative explained. “The only Amazon information involved was employee work contact information, such as work email addresses, desk phone numbers, and building locations.”
MOVEit Breach Expands in Scope
The confirmation of this data breach involving Delta and Amazon is the latest fallout from last year’s MOVEit data breach campaign. Cybersecurity firm Emsisoft estimates that approximately 2,773 organizations worldwide were affected, with nearly 96 million personal records exposed or stolen. The breach caused international concern as government agencies, Fortune 500 companies, and educational institutions revealed that hackers had accessed large datasets, allegedly linked to the Clop ransomware group.
In recent dark web posts, Nam3L3ss claimed they would release a fresh wave of data from the MOVEit breach, mentioning Delta, Amazon, and 23 other organizations. Some of these companies had previously been confirmed as victims, while others had not. The newly leaked data dates back to May 2023, when the initial MOVEit breaches were first identified.
The Dark Web Actor Nam3L3ss: Motives and Alleged Intentions
Nam3L3ss claims to operate out of frustration with large companies’ failure to protect customer and employee data. In one post, the hacker expressed discontent with a recent legal controversy in Columbus, Ohio, where a cybersecurity researcher was sued for accessing city data that had been stolen by a ransomware gang. Although the lawsuit was dropped, Nam3L3ss cited this incident as a “last straw” that fueled their decision to release troves of sensitive data.
Nam3L3ss asserts they are not actively hacking but merely accessing and publicizing data stored on insecure platforms or leaked on ransomware sites. “I’m not a hacker,” the individual claimed in one post. “I simply download data already exposed.” Nam3L3ss further warned of “1,000 releases coming,” hinting at future data dumps that could include employee information and data archives from other entities.
Security Experts Confirm Authenticity of Leaked Data
Hudson Rock, a cybersecurity firm, confirmed that data posted by Nam3L3ss appears legitimate. Hudson Rock CTO Alon Gal stated that while there is no clear link between Nam3L3ss and Clop, the data could enable phishing, identity theft, or large-scale social engineering attacks. The dataset includes detailed employee directories from 25 major organizations, containing names, email addresses, phone numbers, cost center codes, and in some cases, entire organizational structures.
According to Gal, “Such data could serve as a goldmine for cybercriminals seeking to engage in phishing, identity theft, or even social engineering attacks on a large scale.” Recorded Future researchers also verified portions of the data in the Nam3L3ss post as authentic.
MOVEit Breach Fallout Continues to Escalate
The initial MOVEit campaign has reportedly earned Clop between $75 million and $100 million in ransomware payments. The MOVEit breach has also triggered over 100 lawsuits against Progress Software, the company behind the file transfer tool. Organizations around the world continue to grapple with the fallout as new data leaks surface, underscoring the enduring vulnerabilities in third-party software tools.
This latest wave of data exposure reinforces concerns about corporate and government reliance on third-party vendors, particularly in handling sensitive employee and customer information. With many major organizations named in these breaches, the MOVEit vulnerability highlights a broader issue in cybersecurity: the risks associated with outsourced data management and the potentially devastating consequences of vendor vulnerabilities.
As MOVEit’s impact widens, security experts urge organizations to strengthen their vetting processes for third-party vendors and invest in monitoring and response protocols that ensure rapid detection of threats.
Looking Forward: Heightened Security Standards and Vigilance Needed
The Delta and Amazon breach confirmations illustrate how vulnerabilities in widely-used tools can have far-reaching impacts, affecting not only the companies directly compromised but also their customers, partners, and the larger security landscape. With threats continuing to evolve, the MOVEit saga serves as a reminder of the importance of proactive cybersecurity, especially when third-party vendors are involved.
The breach has once again placed a spotlight on the importance of vendor security, vigilance, and robust response plans. Experts emphasize that without stringent monitoring and constant reassessment of data transfer protocols, vulnerabilities will continue to pose significant risks to organizations worldwide.

