{"id":222979,"date":"2025-10-07T03:20:08","date_gmt":"2025-10-07T08:20:08","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2025\/10\/microsoft-critical-goanywhere-bug-exploited-in-ransomware-attacks"},"modified":"2025-10-07T03:20:08","modified_gmt":"2025-10-07T08:20:08","slug":"microsoft-critical-goanywhere-bug-exploited-in-ransomware-attacks","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2025\/10\/microsoft-critical-goanywhere-bug-exploited-in-ransomware-attacks","title":{"rendered":"Microsoft: Critical GoAnywhere bug exploited in ransomware attacks"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/microsoft-critical-goanywhere-bug-exploited-in-ransomware-attacks.jpg\"><\/a><\/p>\n<p>A cybercrime group, tracked as Storm-1175, has been actively exploiting a maximum severity GoAnywhere MFT vulnerability in Medusa ransomware attacks for nearly a month.<\/p>\n<p>Tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-10035\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025\u201310035<\/a>, this security flaw impacts Fortra\u2019s web-based secure transfer GoAnywhere MFT tool, caused by a <a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/502.html\" target=\"_blank\" rel=\"nofollow noopener\">deserialization of untrusted data weakness<\/a> in the License Servlet. This vulnerability can be exploited remotely in low-complexity attacks that don\u2019t require user interaction.<\/p>\n<p>Security analysts at the Shadowserver Foundation are now monitoring <a href=\"https:\/\/dashboard.shadowserver.org\/statistics\/iot-devices\/time-series\/?date_range=7&vendor=fortra&type=file-transfer&model=goanywhere+mft&dataset=count&limit=1000&group_by=geo&stacking=stacked&auto_update=on\" target=\"_blank\" rel=\"nofollow noopener\">over 500 GoAnywhere MFT instances<\/a> exposed online, although it\u2019s unclear how many have already been patched.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A cybercrime group, tracked as Storm-1175, has been actively exploiting a maximum severity GoAnywhere MFT vulnerability in Medusa ransomware attacks for nearly a month. Tracked as CVE-2025\u201310035, this security flaw impacts Fortra\u2019s web-based secure transfer GoAnywhere MFT tool, caused by a deserialization of untrusted data weakness in the License Servlet. This vulnerability can be exploited [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-222979","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/222979","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=222979"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/222979\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=222979"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=222979"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=222979"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}