MFT products occupy a specific position in enterprise architecture. They sit on the public internet by design, because their job is to accept files from partners, vendors, customers, and other external parties. They authenticate to internal systems with durable service accounts, because their job is to deliver those files into business-critical workflows. They hold sensitive data in transit and at rest, because the files they carry are, by definition, the files worth moving over a formal transfer product.
Three properties compose into the attack shape. First, direct internet reach: the product is always there, always listening, always one scan away from any attacker building a target list. Second, high-trust internal access: the service account the MFT runs under can read and write to the destinations it delivers to, which is often a lot of places in the customer's environment. Third, data adjacency: the files being transferred are the ones customers pay money to move, which tends to be the ones with personnel data, financial records, healthcare information, or operational secrets.
Attackers pick MFT over other products because the ratio of reach to payoff is unusually high. A single working exploit against one MFT product instance unlocks file-level access to whatever that instance was processing, across whoever that instance served. In a managed-services configuration, one vendor's exploit fans out to every customer that vendor hosts. The 2023 MOVEit campaign remains the reference incident for this multiplier, but the pattern persists across the product category.
The design-level reason each incident keeps happening is covered in Design Debt Driver. MFT products tend to have decades-old codebases with parsing layers, authentication grafted on after the fact, and administrative interfaces exposed on the same ports as the data interface. The specific CVEs rhyme. The category selection is the strategic layer; the implementation-level bugs are the tactical layer.
Exhibits
CrushFTP CVE-2025-31161: MFT Is the Target Now. CrushFTP's pre-auth RCE continued the MFT category trajectory. The exploit reduces to a request path that reaches a sensitive operation without authentication. The exploitation predated the public advisory by weeks, with incident response firms seeing the same entry point across unrelated customers before the vendor's disclosure landed. The post names the specific pattern this incident inherits from MOVEit: pre-auth write reaching an execution path in a product whose job is accepting writes.