{"id":3136,"date":"2025-10-07T12:00:29","date_gmt":"2025-10-07T12:00:29","guid":{"rendered":"http:\/\/ft365.org\/index.php\/2025\/10\/07\/microsoft-critical-goanywhere-bug-exploited-in-medusa-ransomware-campaign\/"},"modified":"2025-10-07T12:00:29","modified_gmt":"2025-10-07T12:00:29","slug":"microsoft-critical-goanywhere-bug-exploited-in-medusa-ransomware-campaign","status":"publish","type":"post","link":"https:\/\/ft365.org\/index.php\/2025\/10\/07\/microsoft-critical-goanywhere-bug-exploited-in-medusa-ransomware-campaign\/","title":{"rendered":"Microsoft: Critical GoAnywhere Bug Exploited in Medusa Ransomware Campaign"},"content":{"rendered":"<div>\n<p><img decoding=\"async\" src=\"http:\/\/ft365.org\/wp-content\/uploads\/2025\/06\/localimages\/ea721ff9-8ba4-4d88-b386-57e9e1606077.jpg?width=64&#038;height=64&#038;mode=crop&#038;scale=both&#038;format=webp\" alt=\"Photo of Phil Muncaster\" loading=\"lazy\"><\/p>\n<\/div>\n<div id=\"cphContent_pnlArticleBody\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"0\">\n<p>A vulnerability in Fortra\u2019s GoAnywhere Managed File Transfer (MFT) tool with a CVSS score of 10.0 is being actively exploited in ransomware attacks, Microsoft has warned.<\/p>\n<p>The tech giant published a blog post yesterday to urge customers to patch CVE-2025-10035: a critical deserialization flaw in GoAnywhere MFT\u2019s License Servlet Admin Console.<\/p>\n<p>\u201cIt enables an attacker to bypass signature verification by crafting a forged license response signature, which then allows the deserialization of arbitrary, attacker-controlled objects,\u201d Microsoft explained.<\/p>\n<p>\u201cSuccessful exploitation could result in command injection and potential RCE [remote code execution] on the affected system. Public reports indicate that exploitation does not require authentication if the attacker can craft or intercept valid license responses, making this vulnerability particularly dangerous for internet-exposed instances.\u201d<\/p>\n<p>Following exploitation, threat actors can perform system and user discovery, maintain long-term access\u00a0and deploy other\u00a0tools for lateral movement and malware, it added.<\/p>\n<p><em>Read more on GoAnywhere: Exploit Code Released for Critical Fortra GoAnywhere Bug<\/em><\/p>\n<p>Although patched by developer Fortra on September 18, the vulnerability was originally exploited as a zero day a week earlier (September 11) by threat group Storm-1175.<\/p>\n<p>Following initial access, the group launched binaries from legitimate remote monitoring and management (RMM) tools SimpleHelp and MeshAgent, used tools like netscan for network discovery\u00a0and moved laterally using the Microsoft Remote Desktop Connection client\u00a0(\u201cmstsc.exe\u201d).<\/p>\n<p>\u201cFor command-and-control (C2), the threat actor utilized RMM tools to establish their infrastructure and even set up a Cloudflare tunnel for secure C2 communication,\u201d the report continued.<\/p>\n<p>\u201cDuring the exfiltration stage, the deployment and execution of Rclone was observed in at least one victim environment. Ultimately, in one compromised environment, the successful deployment of Medusa ransomware was observed.\u201d<\/p>\n<p>According to the Shadowserver Foundation, there are 513 GoAnywhere instances currently exposed, most of which (363) are located in North America.<\/p>\n<h2>Medusa Strikes Again<\/h2>\n<p>First identified in 2021, Medusa has snared over 300 global victims in critical infrastructure sectors,\u00a0according to a joint advisory from March published by the Cybersecurity and Infrastructure Security Agency (CISA), the FBI and the Multi-State Information Sharing and Analysis Center (MS-ISAC).<\/p>\n<p>It claimed over 40 victims in the first two months of 2025 alone, including a confirmed attack on a US healthcare organization.<\/p>\n<p>The affiliates using the ransomware-as-a-service variant usually achieve initial access either through phishing campaigns or by exploiting unpatched software vulnerabilities. In previous campaigns, they\u2019ve used a ScreenConnect authentication bypass (CVE-2024-1709) and Fortinet EMS SQL injection flaw (CVE-2023-48788).<\/p>\n<p>Microsoft urged\u00a0GoAnywhere customers to:<\/p>\n<ul>\n<li>Upgrade to the latest version of the software in line with\u00a0Fortra\u2019s recommendations<\/li>\n<li>Use an enterprise attack surface management product to discover unpatched systems on the network perimeter<\/li>\n<li>Check the perimeter firewall and proxy to ensure servers are not allowed to access the internet for arbitrary connections, like browsing and downloads<\/li>\n<li>Run\u00a0endpoint detection and response (EDR) tools in block mode to remediate malicious artifacts detected post-breach<\/li>\n<li>Turn on\u00a0block mode\u00a0in corporate anti-virus products<\/li>\n<\/ul><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A vulnerability in Fortra\u2019s GoAnywhere Managed File Transfer (MFT) tool with a CVSS score of 10.0 is being actively exploited in ransomware attacks, Microsoft has warned. The tech giant published a blog post yesterday to urge customers to patch CVE-2025-10035: a critical deserialization flaw in GoAnywhere MFT\u2019s License Servlet Admin Console. \u201cIt enables an attacker<\/p>\n","protected":false},"author":2,"featured_media":3137,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3136","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"featured_image_urls":{"full":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3136-6c3f6aa6-566f-4ad4-b9bc-0ccd64b3e789.jpg",300,300,false],"thumbnail":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3136-6c3f6aa6-566f-4ad4-b9bc-0ccd64b3e789-150x150.jpg",150,150,true],"medium":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3136-6c3f6aa6-566f-4ad4-b9bc-0ccd64b3e789.jpg",300,300,false],"medium_large":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3136-6c3f6aa6-566f-4ad4-b9bc-0ccd64b3e789.jpg",300,300,false],"large":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3136-6c3f6aa6-566f-4ad4-b9bc-0ccd64b3e789.jpg",300,300,false],"1536x1536":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3136-6c3f6aa6-566f-4ad4-b9bc-0ccd64b3e789.jpg",300,300,false],"2048x2048":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3136-6c3f6aa6-566f-4ad4-b9bc-0ccd64b3e789.jpg",300,300,false],"morenews-featured":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3136-6c3f6aa6-566f-4ad4-b9bc-0ccd64b3e789.jpg",300,300,false],"morenews-large":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3136-6c3f6aa6-566f-4ad4-b9bc-0ccd64b3e789.jpg",300,300,false],"morenews-medium":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3136-6c3f6aa6-566f-4ad4-b9bc-0ccd64b3e789.jpg",300,300,false],"crawlomatic_preview_image":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3136-6c3f6aa6-566f-4ad4-b9bc-0ccd64b3e789-146x146.jpg",146,146,true]},"author_info":{"display_name":"henry","author_link":"https:\/\/ft365.org\/index.php\/author\/henry\/"},"category_info":"<a href=\"https:\/\/ft365.org\/index.php\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","tag_info":"Uncategorized","comment_count":"0","_links":{"self":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/3136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/comments?post=3136"}],"version-history":[{"count":0,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/3136\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media\/3137"}],"wp:attachment":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media?parent=3136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/categories?post=3136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/tags?post=3136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}