Community Health Systems GoAnywhere MFT Breach (Cl0p, CVE-2023-0669)
Primary Source βIncident Details
Community Health Systems (CHS), one of the largest for-profit hospital operators in the United States, was among the earliest publicly disclosed victims of Cl0p’s mass-exploitation campaign targeting Fortra’s GoAnywhere MFT platform via CVE-2023-0669.
Fortra detected suspicious activity on the evening of January 30, 2023, and took the GoAnywhere system offline on January 31. It notified CHS subsidiary CHSPSC on February 2, 2023. CHS disclosed the breach in a U.S. Securities and Exchange Commission (SEC) 8-K filing on February 13, 2023 β one of the first public confirmations of Cl0p’s GoAnywhere campaign.
The unauthorized access window was January 28β30, 2023. Cl0p exploited CVE-2023-0669, a pre-authentication command injection flaw in GoAnywhere MFT’s administrative console (CVSS 7.2), which Fortra had privately disclosed to customers on January 30 via a security advisory in their customer portal. Fortra released emergency patch version 7.1.2 on February 7, 2023.
CHS reported the incident to the HHS Office for Civil Rights as affecting 962,884 individuals β approximately one million patients. Compromised data included protected health information (PHI) such as names, addresses, dates of birth, phone numbers, Social Security numbers, and health insurance information belonging to patients at CHS-affiliated hospitals.
CHS stated it was cooperating with law enforcement, CISA, and the FBI. Notification letters were sent in mid-March 2023, and affected individuals were offered 24 months of complimentary identity restoration and credit monitoring services.
Cl0p claimed responsibility for breaching more than 130 organizations over approximately ten days using the same zero-day. The GoAnywhere campaign was Cl0p’s proof-of-concept for the MFT-exploitation strategy it would replicate far more destructively with MOVEit Transfer (CVE-2023-34362, May 2023) and Cleo (CVE-2024-50623, December 2024). Healthcare organizations were disproportionately represented among GoAnywhere victims due to heavy use of MFT platforms for HIPAA-compliant data exchange.
A $20 million multidistrict litigation settlement against Fortra and affected healthcare organizations received preliminary approval in 2025.
Technical Details
- Initial Attack Vector
- Cl0p exploited CVE-2023-0669, a pre-authentication remote code injection vulnerability in Fortra's GoAnywhere MFT administrative interface, to exfiltrate data from Community Health Systems' managed file transfer environment between January 28β30, 2023; no ransomware encryption was deployed β data theft only
- Vendor / Product
- Fortra GoAnywhere Managed File Transfer (MFT)
- Malware Family
- Cl0p
- CVE / GHSA References
- CVE-2023-0669
- Supply Chain Attack
- β Confirmed third-party / vendor compromise
Timeline
- 2023-01-28 Breach occurred
- 2023-02-13 Publicly disclosed
- 2023-03-01 Customers notified