Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed FileTransfer vulnerability - https://www.redpacketsecurity.com/investigating-active-exploitation-of-cve-2025-10035-goanywhere-managed-filetransfer-vulnerability/

#threatintel
#CVE-2025-10035
#GoAnywhere MFT
#Deserialization vulnerability
#Storm-1175
#Medusa ransomware

Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed FileTransfer vulnerability - https://www.redpacketsecurity.com/investigating-active-exploitation-of-cve-2025-10035-goanywhere-managed-filetransfer-vulnerability/

#threatintel
#CVE-2025-10035
#GoAnywhere MFT
#Deserialization vulnerability
#Storm-1175
#Medusa ransomware

🔥 CRITICAL: CVE-2025-10035 in GoAnywhere MFT (7.6.x–7.8.x) enables unauthenticated remote command injection—actively exploited for ransomware (Medusa). Restrict admin console access, patch now, and monitor for IOCs. Details: https://radar.offseq.com/threat/from-detection-to-patch-fortra-reveals-full-timeli-d569181c #OffSeq #vuln #GoAnywhere #BlueTeam
Medusa ransomware is exploiting CRITICAL vuln (CVE-2025-10035) in Fortra GoAnywhere MFT. Private key compromise enables data breaches & ransomware. Audit key management, monitor access, & apply vendor updates. https://radar.offseq.com/threat/medusa-ransomware-actors-exploit-critical-fortra-g-c90501d0 #OffSeq #GoAnywhere #Ransomware #Infosec
GoAnywhere MFT zero-day used by Storm-1175 in Medusa ransomware campaigns

Storm-1175 exploits GoAnywhere MFT flaw CVE-2025-10035 in Medusa attacks, allowing easy remote code execution via License Servlet bug.

Security Affairs

🔒 Microsoft confirms Medusa ransomware is actively exploiting a CVSS 10.0 deserialization flaw in Fortra’s #GoAnywhere MFT. If your GoAnywhere instance is internet-exposed, patch immediately.

Read: https://hackread.com/medusa-ransomware-goanywhere-mft-flaw-microsoft/

#CyberSecurity #Ransomware #Medusa #ZeroDay

Medusa Ransomware Exploiting GoAnywhere MFT Flaw, Confirms Microsoft

Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

Hackread - Latest Cybersecurity, Hacking News, Tech, AI & Crypto
⚠️ Microsoft warns of critical GoAnywhere flaw under attack A zero-day in Fortra’s GoAnywhere MFT (CVE-2024-0204) is being actively exploited to steal data and deploy ransomware. Microsoft links the activity to Lace Tempest, known for CL0P ransomware. 👉🏻 patch immediately. #ransomNews #GoAnywhere

⚠️ Una grave falla in #GoAnywhere mette a rischio milioni di PC Windows di essere compromessi - protegge le tue informazioni! #CyberSecurity

🔗 https://www.tomshw.it/business/microsoft-accusa-medusa-per-exploit-goanywhere-2025-10-07

Una grave falla in GoAnywhere compromette milioni di PC Windows

Una volta nel sistema, gli hacker possono fare quello che vogliono, dall'installare backdoor a diffondere ransomware.

Tom's Hardware
🚨 CRITICAL GoAnywhere MFT bug is being exploited for ransomware. Remote code execution with no user interaction puts European orgs at high risk. Patch ASAP, restrict access, and monitor logs. No CVE yet. Details: https://radar.offseq.com/threat/microsoft-critical-goanywhere-bug-exploited-in-ran-c18f5ff1 #OffSeq #Ransomware #GoAnywhere #CyberAlert

One overlooked bug in GoAnywhere MFT sparked a wave of ransomware attacks on over 500 systems. How did cybercriminals hide in plain sight using legit IT tools? Find out the tactics behind the chaos.

https://thedefendopsdiaries.com/exploitation-of-goanywhere-mft-vulnerability-by-storm-1175-impact-tactics-and-lessons-learned/

#goanywhere
#ransomware
#storm1175
#cve202510035
#cyberattack
#medusaransomware
#remotemanagement
#databreach
#patchmanagement

Exploitation of GoAnywhere MFT Vulnerability by Storm-1175: Impact, Tactics, and Lessons Learned

Explore how Storm-1175 exploited the GoAnywhere MFT vulnerability, unleashing ransomware attacks and data breaches, plus key lessons for defense.

The DefendOps Diaries