Fortra GoAnywhere MOVEit Data Breach Class Action

Yes, a $20 million settlement was reached in the Fortra GoAnywhere MOVEit data breach class action. The U.S.

Yes, a $20 million settlement was reached in the Fortra GoAnywhere MOVEit data breach class action. The U.S. District Court for the Southern District of Florida granted final approval to the settlement in the In re Fortra File Transfer Software Data Security Breach Litigation (MDL No. 24-md-03090-RAR), making compensation available to an estimated 5 million individuals affected by a cyberattack on Fortra’s GoAnywhere platform that occurred on January 30, 2023. This settlement represents one of the largest recoveries tied to the broader 2023 MOVEit exploitation campaign, which ultimately compromised data across thousands of organizations worldwide.

The breach exploited a zero-day vulnerability in Progress Software’s MOVEit file transfer software, a tool used by organizations to exchange large files securely. Attackers from the Cl0p ransomware group leveraged this flaw to gain unauthorized access to sensitive information held by healthcare providers, educational institutions, financial services companies, and government agencies. The exploitation continued and expanded through May 2023, affecting an estimated 93.3 million individuals across 2,700 or more organizations before patches were deployed. For affected individuals, the settlement provides multiple paths to compensation: documented losses up to $5,000 per person, or a flat cash payment of approximately $85. Additionally, all claimants receive one year of dark web monitoring to help detect if their information appears in criminal marketplaces. Understanding this settlement, the original breach, and your options as a potential class member is essential for protecting your rights and financial recovery.

Table of Contents

How Did the Fortra GoAnywhere MOVEit Breach Happen?

The breach originated from a zero-day vulnerability in Progress software‘s MOVEit application, a widely-deployed secure file transfer solution trusted by thousands of organizations. On January 30, 2023, the Cl0p ransomware group discovered and exploited this unpatched flaw to infiltrate systems and exfiltrate sensitive data. Progress Software did not release a patch until after the group had already gained access to numerous networks, meaning many organizations had no opportunity to defend themselves in the critical days between discovery and vulnerability disclosure. The vulnerability remained exploitable well into May 2023, creating a months-long window during which attackers could infiltrate additional organizations.

Unlike typical ransomware attacks that encrypt data and demand payment, Cl0p primarily focused on data theft, stealing personal information and then threatening victims with public disclosure unless they paid ransom demands. Many organizations opted to settle ransom payments quietly rather than notify affected individuals, delaying public disclosure of the breach scope. This pattern—where the vulnerability window stayed open for months due to slow patch deployment and adoption—illustrates why MOVEit became so catastrophic. Organizations in critical sectors like healthcare and education were particularly vulnerable because MOVEit is deeply embedded in their file-sharing infrastructure, and patching systems serving patient care or student records carries operational risks that sometimes delayed security updates.

How Did the Fortra GoAnywhere MOVEit Breach Happen?

Which Organizations and Sectors Were Hit Hardest by MOVEit?

The MOVEit exploitation affected 2,700 or more organizations across diverse sectors, with education bearing the heaviest impact. Schools and universities made up 39.1% of identified victims, likely because these institutions rely heavily on MOVEit to exchange student records, research data, and financial information. The healthcare sector accounted for 20.1% of victims, including hospitals and health systems storing patient medical records and protected health information, making this breach particularly consequential for those affected. Finance and professional services represented 13.3% of affected organizations, with victims including banks, investment firms, accounting practices, and law offices.

Government agencies and other sectors made up the remaining victims, though many breaches went unreported or unconfirmed. The geographic distribution skewed heavily toward the United States, where 78.9% of identified victims were located, with Canada representing 13.5% of victims and smaller percentages in Germany, the UK, and other countries. A critical limitation in understanding the full breach scope is that not all affected organizations disclosed their compromise publicly. Some paid ransoms and settled quietly without notifying victims, and some may still be unaware they were compromised. This means the actual number of individuals and organizations affected could be substantially higher than the 93.3 million figure reported, making it difficult for some affected people to determine whether their information was stolen.

Geographic Distribution of MOVEit Breach VictimsUnited States78.9%Canada13.5%Germany1.3%United Kingdom0.7%Other5.6%Source: Wikipedia – 2023 MOVEit Data Breach

Understanding the $20 Million Settlement and Court Approval

The $20 million settlement in the Fortra MDL represents the primary recovery mechanism for class members, with final approval granted by U.S. District Court Judge Robert A. Rosenberg for the Southern District of Florida. This settlement fund will be distributed among eligible class members—estimated at 5 million individuals—after accounting for administrative costs, payment for claims administrator services, and attorney fees. The settlement is not a judgment against Fortra based on a finding of liability; rather, it represents a negotiated resolution in which Fortra agreed to compensate affected individuals without admitting wrongdoing. It is important to note that the settlement amount is fixed.

If many more people than anticipated file claims, individual awards will be smaller. Conversely, if fewer people submit claims, the average payment per claimant could be higher. The $5,000 reimbursement option is available only for individuals who can document actual losses related to the breach, such as fraudulent charges, credit monitoring services paid for out of pocket, or time spent dealing with identity theft—this option typically requires receipts and proof of expense. One limitation of any settlement of this size is that $20 million, divided among 5 million affected individuals, cannot fully compensate everyone for the complete harm caused by a large-scale data breach. The average recovery per person is modest, which is why the lawsuit also secured the one-year dark web monitoring benefit for all class members. For those with documented losses, the $5,000 reimbursement option provides a meaningful recovery, but many affected people will receive the flat cash payment instead.

Understanding the $20 Million Settlement and Court Approval

What Compensation Options Are Available to Class Members?

Affected individuals have two primary ways to recover compensation from the settlement: either seeking reimbursement for documented losses up to $5,000, or accepting an automatic cash payment of approximately $85. The documented loss option requires proof of expenses directly connected to the breach, such as credit monitoring services purchased before the settlement, costs of replacing a stolen identity, fraudulent charges, or professional services to address identity theft. Keeping receipts and documentation is essential if you choose this path, as the claims administrator will request evidence of your losses. The $85 automatic payment requires minimal documentation and is designed for individuals who did not incur significant quantifiable losses but still suffered the inconvenience, stress, and potential risk of having their personal information exposed. This option is available to everyone in the class and does not require proving that your data was actually used fraudulently.

Additionally, all class members—regardless of which compensation option they choose—receive one year of complimentary dark web monitoring, a service that alerts you if your personal information surfaces in criminal forums or data marketplaces. A practical consideration is that you must affirmatively submit a claim to receive compensation. Simply being affected by the breach does not automatically deliver a settlement check to your door. The claims administrator will manage the filing process, and there will be specific deadlines by which claims must be submitted to be eligible for payment. Missing the deadline means forfeiting your compensation, making timely action essential. The distributed benefits are expected to arrive in January 2026.

Important Deadlines and Filing Process for Your Claim

The settlement process operates on specific timelines that all class members must follow. Benefits and compensation were expected to be distributed starting in January 2026, but individual claim deadlines will be set well before that date. When you receive notice of the settlement—either by mail, email, or through a class settlement website—pay close attention to the claim filing deadline, which is typically 60 to 90 days from the notice date. Missing this deadline means you lose your right to recover compensation and cannot appeal that decision later. The filing process generally involves visiting a dedicated settlement website, providing your contact information and proof of class membership (often your name and the dates during which you were a customer or contact of a victim organization), and selecting your compensation option.

If you are claiming documented losses, you will need to upload receipts, invoices, or other proof of the expenses you incurred. False or fraudulent claims can result in civil penalties and potential criminal prosecution, so be honest and accurate in your submissions. A warning worth emphasizing: scammers often impersonate settlement claims administrators or create fraudulent settlement websites to steal personal information or direct people to file fake claims. If you receive unsolicited contact about this settlement via email or phone, verify the sender’s legitimacy before providing information. The legitimate claims administrator and court will have a verified website address, and they will never ask you to wire money or pay fees to receive your settlement payment.

Important Deadlines and Filing Process for Your Claim

The Broader MOVEit Exploitation Campaign and Total Impact

The Fortra GoAnywhere settlement covers only claims tied to the January 30, 2023 initial compromise, but it represents part of a much larger story. The broader 2023 MOVEit exploitation campaign ultimately affected approximately 93.3 million individuals across 2,700 or more organizations worldwide. Beyond the Fortra $20 million settlement, additional recoveries have been secured in related litigation, including a $7 million settlement from Brightline plan holders in September 2024, bringing total MDL recovery to $27 million. Real-world examples of the breach’s impact illustrate its severity. In healthcare, entire hospital systems had patient medical records stolen, exposing sensitive diagnoses, medication histories, and financial information.

In education, universities lost records containing students’ Social Security numbers, financial aid information, and research data. Financial institutions had customer account information and transaction records compromised. Many victims did not immediately know their information had been stolen, only discovering the breach weeks or months later when organizations sent formal notification letters or when they encountered suspicious activity on their accounts. This settlement is one of several recoveries tied to the MOVEit incident. Affected individuals may be eligible for multiple settlements depending on which organization’s systems compromised their data. Consulting with class action websites or an attorney experienced in data breach litigation can help determine if you qualify for additional settlements beyond the Fortra MDL.

Lessons from the MOVEit Breach and Future Data Protection Outlook

The MOVEit breach reveals critical weaknesses in how organizations deploy and maintain security patches for widely-used software. When a single vulnerability affects thousands of organizations, the coordination challenge is immense. Some companies patch quickly; others delay for operational reasons. Vendors face pressure to disclose vulnerabilities to drive patch adoption, but early disclosure can also accelerate exploitation. This tension remains unresolved in cybersecurity, and future breaches will likely follow similar patterns.

For individuals, the recovery options available through this settlement—documented loss reimbursement, flat payment, and dark web monitoring—have become standard in data breach settlements over the past decade. However, the modest average recovery highlights the reality that settlements, while important, cannot fully compensate victims for the long-term risks of having their personal information publicly exposed. The dark web monitoring benefit is valuable, but it is a temporary measure covering only one year; proactive credit monitoring and identity theft protection through your own efforts or insurance remains necessary beyond the settlement period. The broader cybersecurity landscape continues to shift as regulators demand better security standards and organizations face increased pressure to invest in vulnerability management and employee security training. The MOVEit exploitation serves as a case study in how critical infrastructure companies must patch vulnerabilities rapidly, and how individuals must remain vigilant in monitoring their accounts and credit for years after a breach, not just during a one-year monitoring period.

Conclusion

The $20 million Fortra GoAnywhere MOVEit settlement provides compensation to an estimated 5 million individuals affected by a January 2023 cyberattack that ultimately compromised data across 2,700 or more organizations. Eligible class members can pursue documented loss reimbursement up to $5,000, receive an automatic $85 cash payment, and obtain one year of dark web monitoring. Final court approval has been granted, and benefits are expected to be distributed starting in January 2026, with claims deadlines approaching.

To protect your rights, monitor your mail and email for official settlement notices, verify the legitimacy of any settlement communications, and submit your claim before the filing deadline expires. If you were affected by the MOVEit breach—either directly as a user of GoAnywhere or indirectly as a customer of a compromised organization—taking action to claim your compensation and enroll in the dark web monitoring benefit is essential. Beyond this settlement, maintain vigilance over your credit reports and financial accounts, consider long-term identity theft protection, and remain alert for any suspicious activity that could indicate misuse of your stolen data.


You Might Also Like