The MOVEit Transfer Breach Could Have Been Stopped With Better Access Control

February 27, 2026
|
Read Time:
10 minutes

In May 2023, ransomware gang CL0P exploited a SQL injection vulnerability in Progress Software's MOVEit Transfer tool.

The result was 96 million people’s data exposed on the web, 2,773 organizations effectively compromised, and a total cleanup cost of $15 billion globally.

More than a year later, huge data repositories were still leaking onto the web. And in 2025, Nuance, a Microsoft subsidiary, paid $8.5 million as part of a suit brought by plaintiffs who alleged the company had failed to take reasonable security precautions.

So how did one vulnerability in a single file transfer tool cause one of the largest data breaches in history?

MOVEit Transfer had a SQL injection vulnerability, but that is not usual. Thousands of software instances are likely to be vulnerable to this attack vector. What was different (but also scarily common) about MOVEit Transfer was that it had become a single point of failure in the trust chain for thousands of organizations.

In most organizations, there were no architectural constraints on what MOVEit Transfer could access once compromised, so an attacker could access anything that MOVEit Transfer could. In many cases, this translated to unrestrained access to sensitive IP and PII.

Below, we'll show you exactly what went wrong during the MOVEit Transfer breach from a secrets management point of view, so that you can avoid a similar situation in your organization.

The MOVEit Transfer Attack Chain

Here's how the Moveit Transfer attack unfolded.

  1. CL0P identified a SQL injection vulnerability (CVE-2023-34362) in Progress Software's MOVEit Transfer, a managed file transfer tool used by thousands of organizations worldwide.
  1. Attackers exploited the vulnerability to deploy a web shell on internet-facing MOVEit Transfer servers, gaining persistent access without authentication.
  1. The web shell provided direct access to the underlying database, where files in transit and at rest were stored.
  1. MOVEit had been granted trusted access to sensitive data across every organization that used it. One compromised tool meant access to all of it.
  1. CL0P exfiltrated data systematically across MOVEit instances before Progress Software issued a patch.
  1. 2,773 organizations were compromised. 96 million individuals had their data exposed. Over 60 banks were affected. Flagstar Bank alone saw 837,390 customers exposed through a third-party payment processor.

Embedded Third-Party Trust Enabled the MOVEit Breach

MOVEit Transfer had been granted the same flat level of trust as internal systems across thousands of organizations. This meant there were no architectural constraints on accessing and exfiltrating sensitive data. Once the application was compromised, Cl0p was free to access and exfiltrate sensitive data as if they were trusted insiders.

How Centralized Trust Caused the MOVEit Transfer Breach

The easy, but wrong, way to think about the MOVEit transfer breach is that better third-party vendor risk evaluation by thousands of organizations would have stopped or mitigated it.

In reality, very few organizations will ever have full visibility into their third-party software supply chain, nor do they have the capacity to red team every app deployed in their environment or to fully analyze SBOMs.

The real reason the MOVEit Transfer breach was so damaging was that most organizations lack architectural third-party access control, instead relying on policy or procedure.

Most (70%+) organizations experience some kind of third-party incident each year. This means you have to expect that third parties will be exploited in some way and have controls in place that physically prevent a compromised tool or vendor from accessing data and secrets that, if exposed, would cause irreversible damage.

Control Why It Failed in the MOVEit Transfer Breach
Vendor risk assessment Evaluated the vendor's security posture, not the scope of access the tool was granted. MOVEit had broad, unconstrained access to sensitive files.
Access boundaries Trust was granted at onboarding and never constrained at the action level. No architectural limit on what a compromised tool could reach.
Data segmentation Sensitive data was accessible through a single file transfer pathway. No independent protection at the data layer.
Detection and response Reactive. CL0P operated across thousands of instances before the vulnerability was disclosed. For irreversible data exfiltration, detection after the fact is too late.

SolarWinds Experienced a Similar Failure In 2020

In December 2020, attackers compromised the SolarWinds Orion build system and injected malicious code into a routine software update distributed to approximately 18,000 organizations.

Government agencies and Fortune 500 companies were breached because they had trusted a network management tool with broad access to their infrastructure.

The attack path was identical. A trusted third-party tool had been granted broad access without architectural constraints. When the tool was compromised, the trust it had been granted became the attack vector.

3 Secrets Management Lessons from the MOVEit Transfer Breach

As we saw with MOVEit, unlimited trust creates the potential for almost unlimited exposure to risk. Without an architectural constraint on access, the only protection from breach exposure at a fundamental level is policy and procedure.

Most security controls are reactive. You cannot rely on them to reduce your breach exposure when the data at stake exposes you to regulatory fines and lawsuits by default.

With that said, we can take three lessons from the MOVEit breach.

1. Third-party trust is a single point of failure

When one tool holds unconstrained access across thousands of organizations, its compromise becomes everyone's breach.

Trust must be constrained architecturally and not assumed at onboarding.

2. Access controls must exist at the action, not just the gate

MOVEit was authenticated and authorized. The problem was that once trusted, it could access everything.

Controls on sensitive data need to govern what a trusted identity can do and be split among identities.  

3. Your vendor's breach is your breach when credentials are shared

The organizations that suffered most had granted third-party tools direct access to sensitive data with no independent protection.

The boundary between your security and your vendor's security disappears when secrets are shared.

Distributed Secrets Management Would Have Reduced The Impact From The MOVEit Breach

Had SplitSecure privileged access management (PAM) been in use to protect access to sensitive data stores, no single identity would have held a complete secret and been able to authorize full access.

SplitSecure prevents incidents like the MOVEit Breach across three layers with:

No single point of failure

  • With SplitSecure, administrative secrets are split across multiple devices.
  • Protected credentials are never persisted on any device, and never exposed at any point
  • Attackers would need to compromise a majority of devices simultaneously to access highly sensitive data.

Separation of duties is enforced by architecture

  • No single identity can access high-sensitivity data stores.
  • Multi-party approval is required for actions with irreversible impact.

Every request is logged automatically

  • It is impossible for anyone to use the system without generating an audit trail.
  • Anomalous access patterns would have triggered alerts immediately.
  • Verifiable proof that controls were followed, not just that access was granted.

MOVEit Data Breach FAQs

What was the MOVEit Transfer breach?

In 2023, the CL0P ransomware group exploited a SQL injection vulnerability in Progress Software's MOVEit Transfer to steal data from 2,773 organizations, affecting 96 million individuals. The estimated global cost reached $15 billion.

How did poor access management make the MOVEit Transfer breach worse?

MOVEit Transfer was a trusted tool with unconstrained access to sensitive data across every organization that used it. When the tool was compromised, attackers could access all the data it was trusted to handle, including data from organizations that had no direct relationship with MOVEit.

How do you prevent a trusted third-party tool from becoming a single point of failure?

By distributing credentials across multiple devices, so no single tool, vendor, or system holds a complete secret. SplitSecure uses Shamir Secret Sharing to split credentials into fragments distributed across devices you control. Even if a trusted tool is compromised, it cannot reconstruct usable secrets.

Protect Your Organization from Third-Party Trust Failures

See how SplitSecure's distributed secrets architecture prevents single-point-of-failure attacks through your most trusted tools and vendors.

Tristan Morris
CEO, Co-Founder @ SplitSecure
A prodigy who started attending college at age 12. After graduating from Cornell with a degree in Aerospace Engineering, Tristan went on to lead product for Federal Security at KNOX, Samsung’s military and defense cybersecurity group.
LinkedIn
Share this post

Check out our Whitepaper on

The Next Generation of Enterprise Security

Download WhitePaper

Ready to see SplitSecure in action?

No jargon. No friction. Just stronger security for your organization.
Book a Demo