DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

National Student Clearinghouse notifies schools of MOVEit breach

Posted on June 28, 2023 by Dissent

On June 24, DataBreaches reported that the National Student Clearinghouse was one of the victims of the MOVEit breach by Clop, In that report, DataBreaches stated that the clearinghouse’s statements to date had not indicated whether they had paid any ransom demand, but DataBreaches had learned that their name had been removed from Clop’s leak site, which is often an indication that a victim paid.

DataBreaches emailed the clearinghouse on June 23 to ask for some straight answers about whether the clearinghouse had paid any ransom demand. They didn’t reply. DataBreaches repeated the inquiry on June 25. Again, there was no reply.

Today, the clearinghouse notified schools. The following was provided to DataBreaches by a recipient:

The National Student Clearinghouse (the “Clearinghouse”) is writing to notify you of a cybersecurity issue that affects certain personal data maintained by the Clearinghouse on behalf of your organization.

As you may be aware, third-party software provider Progress Software recently announced a security vulnerability related to its MOVEit Transfer product, potentially affecting thousands of organizations worldwide. MOVEit Transfer is a tool used by many organizations, including the Clearinghouse, to support the transfer of data files. According to Progress Software, unauthorized actors discovered a vulnerability in the MOVEit Transfer software that could allow unauthorized access to files being transferred using the tool.

Upon learning of this vulnerability, the Clearinghouse promptly launched an investigation and took steps to secure our relevant systems, including implementing patches to the MOVEit software pursuant to Progress Software’s instructions. We reported the issue to law enforcement and have been working with leading cybersecurity experts to understand the issue’s impact on our organization. We have followed, and will continue to follow, recommended guidelines to protect the security of your data and our systems in connection with the issue.

Based on our ongoing investigation, we believe that an unauthorized party obtained certain files transferred through the MOVEit Transfer tool, including files containing personal data that the Clearinghouse maintains on behalf of your organization. We have no evidence that the unauthorized party was specifically targeting your organization’s data on our systems.

While our investigation remains ongoing, we have initiated a review of the affected files and will follow up with additional information regarding the impact to your organization, including a list of individuals whose personal data is identified in the relevant files and the types of data that generally were affected. We are prepared to assist your organization in responding to this issue. Although the Clearinghouse is not able to provide you with legal advice regarding the issue or any related legal notification obligations, if you determine that your organization is required by law to report the issue to affected individuals and regulators, the Clearinghouse will send notification on your organization’s behalf if you would like us to do so. Accordingly, we will follow up with additional information on our offer to assist with notification and how we will coordinate these efforts with your organization.

If you have any questions, please email mailto:[email protected]. We regret that your organization was affected by this issue.

Their notification is more informative than prior updates, but it seems like they just can’t get themselves to be really transparent on the extortion aspect. Their name was never re-listed on the leak site. Did they pay or didn’t they? DataBreaches wouldn’t be surprised if they hadn’t paid, but why won’t the answer the question?


Related:

  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Hackers Say They Have Personal Data of Thousands of NSA and Other Government Officials
  • John Bolton Indictment Provides Interesting Details About Hack of His AOL Account and Extortion Attempt
  • UK: 'Catastrophic' attack as Russians hack files on EIGHT MoD bases and post them on the dark web
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
Category: HackMiscellaneousU.S.

Post navigation

← HHS Office for Civil Rights Settles HIPAA Investigation with iHealth Solutions Regarding Disclosure of Protected Health Information on an Unsecured Server for $75,000
‘No credible evidence,’ Formal complaint filed against local doctor at center of alleged cyber attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.