Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity NewsEducation: K-12Education:University

Security leaders weigh in on latest MOVEit data breach

By Rachelle Blair-Frasier, Editor in Chief
code on computer screen

Image via Unsplash

September 26, 2023

A U.S. educational nonprofit has announced that nearly 900 schools using the organization’s services may have been affected by a recent data breach.

In a security issue update released this week, the National Student Clearinghouse revealed it is investigating a recent cybersecurity issue involving a vulnerability in one of The Clearinghouse’s third-party software tools, MOVEit Transfer, which has potentially affected thousands of other organizations worldwide. The cyberattack exploits a vulnerability in MOVEit, a widely-used third-party data transfer service used to send large files.

“While we continue to investigate this issue, all Clearinghouse services are fully operational,” the update stated.

According to their website, the Clearinghouse is an educational nonprofit that provides reporting, verification and research services to colleges and universities in North America with a network of 3,600 participating colleges and universities and 22,000 high schools.

“As cyber teams continue to address this spate of attacks, the news should serve as a wakeup call to every organization that this serious zero-day vulnerability must be remediated immediately,” said Darren Guccione, CEO and Co-Founder at Keeper Security. “However, as any organization grows and becomes a more appealing target, the quality and focus of these attacks will increase accordingly. All organizations should take a proactive approach to regularly update software and immediately patch vulnerabilities that are being actively exploited in the wild. Organizations must ensure they have a patch deployment process defined and written down, with emergency levers for critical vulnerabilities. When organizations have a clear plan, their teams can execute it accordingly.”

Filings show that on May 31, the Clearinghouse was informed by third-party software provider, Progress Software, of a cybersecurity issue involving the provider’s MOVEit Transfer solution. The organization has been working with leading cybersecurity experts to assess the impact of the MOVEit vulnerability on the Clearinghouse and their systems. In addition to applying the relevant security patches and following guidance from the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI), the Clearinghouse also rebuilt the organization’s entire MOVEit environment.

“We also are coordinating with law enforcement,” the Clearinghouse said in the statement. “Based on our ongoing investigation, we have determined that an unauthorized party obtained certain files transferred through the Clearinghouse’s MOVEit environment, including files containing data that we maintain on behalf of some of our customers. We have notified the organizations whose data we have identified as affected by this issue. We have no evidence to suggest that the unauthorized party specifically targeted the Clearinghouse, our customers, or other organizations that provide data to the Clearinghouse.”

Security leaders weigh in

Colin Little, Security Engineer, Centripetal: 

Unfortunately, schools, and the professional organizations that serve them, will always be an attractive target for attackers due to their limited cyber expertise and budgets. Educational institutions can bolster their defenses against cyberattackszero like MOVEit by implementing a multifaceted cybersecurity strategy.

First, schools need to prioritize employee cybersecurity training to raise awareness about phishing threats and social engineering tactics. Strong password policies and multifactor authentication can enhance login security.

Second, regularly updating and patching software and systems is critical to addressing vulnerabilities.

Third, and most important, taking a proactive approach by implementing intelligence powered cybersecurity can help identify emerging threats and address potential weaknesses in their infrastructure.

By adopting these measures, education institutions can significantly reduce their vulnerability to MOVEit and similar cyberattacks in the future.

Darren Guccione, CEO and Co-Founder at Keeper Security:

Zero-day vulnerabilities are a significant cybersecurity risk that leave software open to exploitation which can lead to data theft, system compromise or other malicious activities. This SQL injection vulnerability in software designed to share sensitive data is just another example of the harm attackers can cause when they’re able to exploit these known vulnerabilities.

In this case, the attacker may be able to infer information about the structure and contents of a MOVEit Transfer database, or even alter or delete database elements.

Organizations that are the custodians of critical information require a much higher bar for security and monitoring than other types of organizations. Vendor selection, outsourcing, bringing in any third party products- all add layers of complexity to your defense strategy. Ensuring organizations select the correct vendors, via multiple facets including cost, functionality, usability, compatibility, and of course security, is becoming increasingly important. Does a vendor have the right certifications and do they have a proven track record? However, even making these seemingly right choices can lead to a breach. Unfortunately this is the reality we live in, and it is why "defense in depth" is an important pillar of cybersecurity.

The most effective method for minimizing sprawl when these attacks do occur is by investing in prevention with a zero-trust and zero-knowledge cybersecurity architecture that will significantly limit a bad actor’s access.

Gareth Lindahl-Wise, CISO at Ontinue:

It is no coincidence that cyber criminals target widely used products as they operate on a strict effort versus reward basis. Market penetration is a guiding light for some groups - and remember that we may be looking at secondary consequences of original motives (an initial attack for targeted data theft is then exploited by downstream baddies for other objectives).

Any customers of a compromised provider should be considering containment (isolation, credential resets), prevention (update or switch off) and enhanced monitoring. For this particular incident, I would ensure any stored historic transferee files / folders are removed from the platform.

Supervisory and management platforms should feature towards the top of incident management scenarios due to the potential wide reach they can have. With a focus on the fundamentals again:

  • Do we know how to update (is that internal or needs a partner)?
  • Can we isolate? Do we know the impact to our operations would be if we did?
  • Do we have logs (are they enabled, can we access them, can we ask for them)?
  • Do we know what ‘unusual’ looks like and are we looking for it?

Colin Little, Security Engineer, Centripetal: 

Unfortunately, schools, and the professional organizations that serve them, will always be an attractive target for attackers due to their limited cyber expertise and budgets. Educational institutions can bolster their defenses against cyberattacks like MOVEit by implementing a multifaceted cybersecurity strategy.

First, schools need to prioritize employee cybersecurity training to raise awareness about phishing threats and social engineering tactics. Strong password policies and multifactor authentication can enhance login security.

Second, regularly updating and patching software and systems is critical to addressing vulnerabilities.

Third, and most important, taking a proactive approach by implementing intelligence powered cybersecurity can help identify emerging threats and address potential weaknesses in their infrastructure.

By adopting these measures, education institutions can significantly reduce their vulnerability to MOVEit and similar cyberattacks in the future.

John Bambenek, Principal Threat Hunter at Netenrich:

MOVEIt is an inherently internet-facing service that has an actively exploited vulnerability used by several threat groups. Ransomware is the obvious one because the end of the attack is informing the victim to get a ransom, however, anyone who wants to steal data can take advantage.

The vulnerability (and patch) have been known for four months. There is a long tail of figuring out if you had been victimized. For organizations still using a vulnerable version of MOVEIt, the most important thing they should do is fire the CISO because there is no excuse for not having remediated it by now.

KEYWORDS: data breach data breach response security leaders zero-day vulnerability

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rachelle blairfrasier headshot white

Rachelle Blair-Frasier is Security magazine’s Editor in Chief. Blair-Frasier handles eMagazine features, as well as writes and publishes online news and web exclusives on topics including physical security, risk management, cybersecurity and emerging industry trends. She helps coordinate multimedia content and manages Security magazine's social media presence, in addition to working with security leaders to publish industry insights. Blair-Frasier brings more than 15 years of journalism and B2B writing and editorial experience to the role.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Laptop with coding on screen

    Security leaders weigh in on Life360 data breach

    See More
  • Public transportation system

    Ensuring safety on the move: Strengthening security in public transportation

    See More
  • Cybersecurity hand graphic

    Security leaders discuss new SEC disclosure rule as deadline nears

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing