What happened
Attackers exploited a previously unknown zero-day vulnerability (CVE-2023-34362
) in
Progress Software’s MOVEit Transfer, a widely used managed file transfer product.
The flaw enabled unauthenticated SQL injection, allowing data theft at scale. The Clop ransomware group
operationalized the bug quickly, compromising hundreds of organizations worldwide.
Who’s affected
- Enterprises and government agencies running MOVEit Transfer.
- Organizations indirectly exposed via vendors/partners who used MOVEit for file sharing.
Scale: One of 2023’s largest supply-chain incidents with broad cross-industry reach.
Speed: Active exploitation began within days; patch windows were extremely tight.
Impact: Mass data exfiltration, regulatory exposure (e.g., GDPR/HIPAA), expensive breach responses.
Mitigation (action now)
- Patch to the latest supported MOVEit Transfer version immediately.
- Audit for unauthorized downloads and anomalous file-access patterns.
- Review vendor exposure—confirm which third parties used MOVEit and assess downstream risk.