GoAnywhere MFT Zero-Day 2023

7 min read
2023-01-28
Share Article
BREACH INTELLIGENCE
breach date

2023-01-28

Industry

Multi-Sector

Severity

Critical

Records Exposed

130+ orgs affected

Financial Impact

Multiple ransoms

Breach Summary

In January-February 2023, the Cl0p ransomware group exploited a zero-day vulnerability in Fortra's GoAnywhere Managed File Transfer software, compromising over 130 organizations in a campaign that directly preceded and presaged their MOVEit attack three months later. The GoAnywhere and MOVEit attacks together established Cl0p's strategy of mass exploitation of managed file transfer vulnerabilities as a core business model.

What Happened

Cl0p exploited CVE-2023-0669 in GoAnywhere MFT beginning in late January 2023 before Fortra disclosed the vulnerability. Confirmed victims included Hatch Bank, Community Health Systems (approximately 1 million patients affected), Rubrik, and Hitachi Energy. Fortra issued emergency guidance February 1 and a patch February 7. The attack pattern was identical to what Cl0p would repeat with MOVEit in May 2023.

Attack Vector Detail

CVE-2023-0669 was a pre-authentication remote code injection flaw in Fortra's GoAnywhere MFT web console. Cl0p exploited the vulnerability to install webshells providing persistent access and automated data exfiltration. Like MOVEit, exploitation required no credentials and could be executed against any internet-accessible instance. Organizations that patched promptly after public disclosure were already compromised because exploitation had been active for days before the advisory.

Breach Pattern Timeline

January 18, 2023

Fortra (formerly HelpSystems) publishes private security advisory to GoAnywhere MFT customers about a remote code execution vulnerability requiring administrative console exposure.

February 1, 2023

Cl0p ransomware group begins mass exploitation of CVE-2023-0669 against internet-exposed GoAnywhere MFT instances. Attack predates public disclosure.

February 6, 2023

Fortra publishes patches. Cl0p has already established access in dozens of victim environments.

February 10, 2023

Cl0p publicly takes credit for exploiting the GoAnywhere zero-day. Begins listing victims on its dark web leak site.

March-April 2023

Confirmed GoAnywhere/Cl0p victims include Community Health Systems (1 million patients), Procter & Gamble, Hatch Bank, Brightline (mental health), Hitachi Energy, Rio Tinto, and ~130 organizations total.

March 2023

Major U.S. healthcare victim Community Health Systems discloses 1 million patient records exposed via the GoAnywhere/Cl0p incident — same MFT-mass-exploitation pattern Cl0p will replicate three months later with MOVEit.

April-September 2023

Class actions filed against Fortra, GoAnywhere customers, and downstream affected organizations. Cl0p continues extorting victims.

2023-2024

GoAnywhere/Cl0p establishes the template Cl0p applies at much greater scale to MOVEit (May 2023) and Cleo Harmony/VLTrader/LexiCom (October-November 2024). Managed file transfer software becomes Cl0p's strategic attack surface.

Total impact: ~130 organizations affected including 1M+ patients via Community Health Systems, foundational precedent for Cl0p's managed file transfer mass exploitation model that culminates in MOVEit (May 2023) and Cleo MFT (Oct-Nov 2024).

Executive Lessons

GoAnywhere established that managed file transfer infrastructure — often treated as low-risk administrative tooling — represents a high-value attack vector because it has authorized access to sensitive data across many organizational systems by design. The Clop gang's systematic exploitation of the vulnerability across 130+ organizations before patches were widely applied demonstrated the economics of zero-day exploitation: find one vulnerability in widely-used software and the return on investment is extraordinary.

Related Reading

Private Equity Implications

For PE sponsors with portfolio companies in healthcare, financial services, or manufacturing, any use of GoAnywhere, MOVEit, Accellion, or similar MFT software should trigger an immediate assessment of patch currency and internet exposure. These tools are not low-risk productivity applications; they are high-value data repositories that ransomware operators have specifically targeted across consecutive years.

How Cloudskope Can Help

Cloudskope's external attack surface assessments identify internet-exposed managed file transfer platforms as priority review targets. Our M&A due diligence specifically assesses MFT software versions, patch currency, and security configuration for acquisition targets across regulated industries.

Frequently Asked Questions