AI security, cybersecurity, and cyber insurance research for modern businesses.

The MOVEit Breach Case Study: Anatomy of a Supply-Chain Disaster

Updated May 4, 2026

In May 2023, the Clop ransomware group exploited a zero-day vulnerability in the MOVEit Transfer file-sharing software, triggering one of the most expansive supply-chain attacks in history. Unlike traditional breaches that target a single entity, the MOVEit exploit allowed attackers to hijack a trusted data-routing tool used by thousands of organizations, leading to the compromise of over 2,700 entities and the personal data of more than 90 million individuals. This case study analyzes the technical exploit, the cascade of downstream victims, and the long-term implications for cyber insurance and vendor risk management.

The Vulnerability: CVE-2023-34362

The MOVEit breach began not with a phishing link or a stolen credential, but with a critical SQL injection vulnerability in Progress Software’s MOVEit Transfer application. This zero-day vulnerability (later designated CVE-2023-34362) allowed authenticated and unauthenticated attackers to gain unauthorized access to the MOVEit database.

Unlike the SolarWinds Supply Chain Attack, which involved the insertion of malicious code into a software update, the MOVEit exploit was a direct attack on an existing administrative flaw. By sending a specially crafted web request to a MOVEit Transfer instance, the Clop threat actors were able to drop a custom webshell, dubbed "LEMURLOOT," which allowed them to:

  1. Discover the structure of the underlying SQL database.
  2. Exfiltrate files stored within the application.
  3. Impersonate administrative users to ensure persistent access.

The efficiency of the attack was high because MOVEit is designed specifically to handle large, sensitive file transfers. By compromising the "post office," the attackers didn't need to break into the "houses" of individual corporations; they simply intercepted the mail as it passed through the hub.

Timeline of a Global Cascade

The MOVEit exploit moved with startling speed, transitioning from a localized zero-day exploit to a global crisis within 72 hours. While the technical fix was released shortly after the discovery, the damage was already done—the attackers had been quietly exfiltrating data during the Memorial Day holiday weekend in the United States, when IT staffing is typically at its lowest.

PhaseActivityImpact
Pre-ExploitMassive scanning for MOVEit instances by Clop actors.Identification of thousands of vulnerable servers globally.
May 27-31, 2023Exploitation of CVE-2023-34362 across multiple industries.Initial data theft from early targets like Zellis and the BBC.
June 1, 2023Progress Software issues public patch and advisory.Race between defenders to patch and attackers to finalize exfiltration.
June 14, 2023Clop begins naming victims on their "Leaked" site.Public disclosure forces entities to activate breach notifications.
Q3 2023 - 2024Downstream vendor notification cycles.Total victim count surpasses 2,700 organizations worldwide.

The Downstream Effect: The Real Cost of Supply Chains

The defining characteristic of the MOVEit breach was the "n+1" impact. The primary victim was Progress Software, the secondary victims were the organizations running the software (such as Zellis, a payroll provider), and the tertiary victims were those companies' clients (such as British Airways and the BBC).

In many Major Data Breach Case Studies, the victim is the entity that was directly hacked. With MOVEit, many organizations that didn't even license the software found their data compromised because one of their vendors used it. For example, the Oregon and Louisiana Departments of Transportation lost the records of millions of drivers, and massive financial entities like TIAA and Genworth were caught in the crossfire through their use of third-party pension administration services.

"The MOVEit breach redefined our understanding of 'aggregate risk.' It proved that a single flaw in a niche utility tool can create a systemic insurance event that bypasses the perimeter defenses of the world’s most sophisticated enterprises."

This systemic nature is what makes MOVEit more comparable to the Change Healthcare Breach Analysis than a standard ransomware attack. In both cases, the concentration of data in a single "pipe" created a single point of failure for an entire industry.

Ransomware Without the Encryption

Crucially, the MOVEit campaign deviated from the traditional ransomware playbook seen in events like the MGM Resorts Ransomware Case Study. The Clop group did not deploy file-encrypting malware. Instead, they relied entirely on extortion via data theft.

This "extortion-only" model is highly efficient for attackers:

  • Reduced Detection: Without encryption slowing down systems or crashing servers, the attackers could maintain a lower profile for longer.
  • Lower Overhead: No need to manage decryption keys or help desks for victims to recover their data.
  • Unstoppable Leverage: Once data is stolen, it cannot be "un-stolen." Even if a firm has perfect backups, the threat of a public leak remains a powerful motivator for payment.

The total cost of these demands has reached the hundreds of millions, with some estimates suggesting the Clop group may have successfully extorted over $75 million from a fraction of the total victim pool.

Lessons for Cyber Insurance Underwriters

The MOVEit disaster has forced a reckoning in the cyber insurance market. Underwriters are moving away from simple questionnaires and toward deeper analysis of software dependencies.

  1. Concentration Risk Assessment: Carriers are now scrutinizing the "tech stack" of their policyholders to see how many rely on the same file-transfer, identity, or cloud services. This was similarly highlighted during the Okta Breach Lessons regarding identity providers.
  2. Contingent Business Interruption (CBI): The breach highlighted the need for clarity in CBI clauses. Many firms were surprised to find their policies didn't cover losses stemming from a vendor's breach if the firm’s own network remained operational.
  3. The Vendor "Nth" Degree: It is no longer enough to vet your Tier 1 vendors. Insurance applications are increasingly asking about "Tier 4" risk—who do your vendors' vendors use?

Key Takeaways

  • Zero-day exploitation is the new normal: Even perfectly patched systems are vulnerable to unknown flaws. Rapid response and "assume breach" mentalities are essential.
  • Data concentration is a liability: Centralizing sensitive data in a single tool or vendor creates a high-value target for sophisticated threat actors.
  • Exfiltrative extortion is effective: You cannot back up your way out of a data leak. Defense must focus on preventing data egress, not just maintaining availability.
  • Third-party risk is your risk: If your data lives on a vendor’s server, their security posture is effectively your security posture.
  • Contractual protections matter: Ensure vendor contracts include specific requirements for breach notification timelines and liability for downstream damages.

Frequently asked questions

Related reading