July 20, 2023 Breach

The Anatomy of Mass Vendor Exploitation

In late May 2023, the Cl0p ransomware gang began exploiting a critical zero-day vulnerability in MOVEit Transfer, a managed file transfer (MFT) product developed by Progress Software. The vulnerability, tracked as CVE-2023-34362, was a SQL injection flaw that allowed unauthenticated attackers to access MOVEit Transfer databases and execute arbitrary code on affected servers. Within weeks, the exploitation had grown to affect more than 2,700 organizations and an estimated 90+ million individuals, making it one of the most consequential third-party risk events in cybersecurity history.

How the Attack Worked

The vulnerability resided in MOVEit Transfer's web application component. By sending specially crafted SQL injection payloads to the application, attackers could bypass authentication and interact directly with the underlying database. Cl0p used this access to deploy a custom web shell, which Mandiant named LEMURLOOT, to enumerate files, extract data, and maintain persistent access to compromised servers.

Evidence later emerged that Cl0p had been testing the MOVEit vulnerability as early as July 2021 and had conducted additional testing in April 2023 before launching the mass exploitation campaign over the U.S. Memorial Day weekend (May 27–28, 2023). This long testing window suggests the group recognized the scale of the opportunity and prepared accordingly.

Progress Software issued a patch on May 31, 2023, and CISA added CVE-2023-34362 to its Known Exploited Vulnerabilities (KEV) catalog on June 2, 2023, ordering federal agencies to patch within the prescribed timeline.

The Scale of the Impact

The MOVEit exploitation affected organizations across virtually every sector and geography. According to tracking by security firm Emsisoft, the confirmed victim count continued climbing through the second half of 2023:

Victim Organization Sector Impact
BBC Media Employee personal data via payroll vendor Zellis
British Airways Aviation Employee data exposed via Zellis
Shell Energy Employee data compromised
U.S. Department of Energy Government Data from Oak Ridge and Waste Isolation Pilot Plant
Johns Hopkins University & Health System Healthcare / Education Patient and student personal data
Maximus Government Services Up to 11 million individuals' data (largest single victim)
BORN Ontario Healthcare 3.4 million mothers and newborns in Ontario

Many victims were not direct MOVEit customers. Instead, they were compromised because their service providers, payroll processors, or other third-party vendors used MOVEit Transfer to handle sensitive data. This nth-party risk dynamic dramatically amplified the blast radius of the vulnerability.

The Cl0p Playbook: Data Theft Without Encryption

Notably, Cl0p did not deploy ransomware to encrypt victim systems in the MOVEit campaign. Instead, the group relied purely on data exfiltration and extortion, posting victim names on their leak site and threatening to release stolen data unless ransoms were paid. This approach reduced the group's operational complexity while still generating significant pressure on victims. Cl0p set June 14 as the initial deadline for victims to make contact, and subsequently began publishing data from organizations that refused to negotiate.

TPRM Lesson Learned: The MOVEit incident is the definitive case study for managed file transfer as a critical risk vector. Organizations should inventory all file transfer mechanisms used by their vendors, not just those they operate directly. TPRM programs must ask vendors: "What file transfer technologies do you use?" and "Do you use any third-party MFT products to process or store our data?" Vendor risk assessments that do not cover data-in-transit and data-at-rest mechanisms for file transfer leave a critical blind spot in the risk register.

Third-Party Risk Management Implications

FAIR Risk Quantification

The MOVEit event challenges traditional risk quantification because a single vulnerability in a vendor product generated thousands of simultaneous loss events. A FAIR analysis should account for the conditional probability that if a vendor uses a widely deployed product like MOVEit, the organization is exposed to mass exploitation events with correlated losses across the entire vendor portfolio. This systemic risk dimension is increasingly important in TPRM as attackers shift toward mass exploitation of common infrastructure.

Protect Your Organization from Third-Party Risk

Fair TPRM is a free, open-source platform for vendor risk management, GRC compliance, and FAIR risk quantification.

Free Demo Download Source

Sources & References

  1. MOVEit Transfer Critical Vulnerability (CVE-2023-34362) - Progress Software Security Advisory
  2. CL0P Ransomware Gang Exploits MOVEit Vulnerability - CISA Cybersecurity Advisory
  3. Unpacking the MOVEit Breach: Statistics and Analysis - Emsisoft
  4. Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft - Mandiant
  5. BBC, BA, and Boots Among Companies Hit by MOVEit Cyberattack - BBC News