{"id":113772,"date":"2025-10-10T16:53:09","date_gmt":"2025-10-10T16:53:09","guid":{"rendered":"https:\/\/www.europesays.com\/ie\/113772\/"},"modified":"2025-10-10T16:53:09","modified_gmt":"2025-10-10T16:53:09","slug":"fortra-confirms-unauthorized-activity-hit-goanywhere-mft","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ie\/113772\/","title":{"rendered":"Fortra Confirms &#8216;Unauthorized Activity&#8217; Hit GoAnywhere MFT"},"content":{"rendered":"<p>                    Medusa Ransomware Group Tied to Exploits of Now-Patched Zero-Day Vulnerability<\/p>\n<p>                                                <a class=\"author-link\" href=\"https:\/\/www.bankinfosecurity.com\/authors\/mathew-j-schwartz-i-892\" rel=\"nofollow noopener\" target=\"_blank\">Mathew J. Schwartz<\/a> (<a href=\"https:\/\/www.twitter.com\/euroinfosec\" rel=\"nofollow noopener\" target=\"_blank\">euroinfosec<\/a>)                                                    \u2022<br \/>\n                        October 10, 2025 \u00a0 \u00a0 <a href=\"https:\/\/www.bankinfosecurity.com\/fortra-confirms-unauthorized-activity-hit-goanywhere-mft-a-29701#disqus_thread\" rel=\"nofollow noopener\" target=\"_blank\"><\/p>\n<p>                <img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2025\/10\/fortra-confirms-unauthorized-activity-hit-goanywhere-mft-image_large-3-a-29701.jpg\" alt=\"Fortra Confirms 'Unauthorized Activity' Hit GoAnywhere MFT\" class=\"img-responsive \"\/><br \/>\n                Image: Shutterstock\/ISMG            <\/p>\n<p>Attacks targeting Fortra&#8217;s GoAnywhere managed file transfer software recently exploited on-premises installations where system administrators exposed the management console to the internet, a configuration the vendor recommends against.<\/p>\n<p><b>See Also:<\/b> <a href=\"https:\/\/www.bankinfosecurity.com\/when-identity-protection-fails-rethinking-resilience-for-modern-threat-a-29538?rf=RAM_SeeAlso\" rel=\"nofollow noopener\" target=\"_blank\">When Identity Protection Fails: Rethinking Resilience for a Modern Threat Landscape<\/a><\/p>\n<p>Publishing findings from its investigation into the hacking campaign on Thursday, Fortra <a href=\"https:\/\/www.fortra.com\/blog\/summary-investigation-related-cve-2025-10035\" target=\"_blank\" rel=\"nofollow noopener\">said<\/a> a &#8220;limited&#8221; number of customers appear to have been breached by attackers who exploited a zero-day deserialization vulnerability, now tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-10035\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-10035<\/a>, in GoAnywhere MFT&#8217;s License Servlet (see: <a href=\"https:\/\/www.bankinfosecurity.com\/medusa-ransomware-affiliates-tied-to-fortra-goanywhere-hacks-a-29665\" rel=\"nofollow noopener\" target=\"_blank\">Medusa Ransomware Affiliates Tied to Fortra GoAnywhere Hacks<\/a>).<\/p>\n<p>&#8220;The scope of the risk of this vulnerability is limited to customers with an admin console exposed to the public internet,&#8221; says Fortra&#8217;s report. &#8220;Other web-based components of the GoAnywhere architecture are not affected by this vulnerability. We continue to monitor the situation. At this time, we have a limited number of reports of unauthorized activity related to CVE-2025-10035.&#8221;<\/p>\n<p>Minnesota-based Fortra first <a href=\"https:\/\/www.fortra.com\/security\/advisories\/product-security\/fi-2025-012\" target=\"_blank\" rel=\"nofollow noopener\">said<\/a> in a Sept. 18 security advisory that attackers were exploiting CVE-2025-10035, which has a maximum CVSS score of 10. The flaw &#8220;allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection.&#8221;<\/p>\n<p>As <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/10\/06\/investigating-active-exploitation-of-cve-2025-10035-goanywhere-managed-file-transfer-vulnerability\/\" target=\"_blank\" rel=\"nofollow noopener\">detailed<\/a> by Microsoft on Monday, a cybercrime group, the computing giant tracks as Storm-1175, has exploited the flaw &#8211; and could still have access to a victim&#8217;s environment even after admins apply a patch. The threat actor previously exploited internet-connected applications to gain access to a victim&#8217;s network on order to deploy Medusa ransomware.<\/p>\n<p>&#8220;The impact of CVE-2025-10035 is amplified by the fact that, upon successful exploitation, attackers could perform system and user discovery, maintain long-term access and deploy additional tools for lateral movement and malware,&#8221; Microsoft warned.<\/p>\n<p>Fortra said a customer first alerted it to the attacks on Sept. 11, after which it launched an investigation. &#8220;We inspected customer logs, researched the exposure of on-premises customer admin consoles and analyzed our MFTaaS &#8211; Fortra-hosted &#8211; instances for indicators of compromise,&#8221; including reviewing the logs for every one of the cloud-based instances.<\/p>\n<p>The same day, the company directly contacted on-premises customers that exposed GoAnywhere MFT software&#8217;s admin console to the internet. &#8220;Our support team provided risk mitigation measures and further assistance to these customers as requested,&#8221; it said.<\/p>\n<p>Fortra said that when reviewing its managed-file-as-a-transfer service environment instances and verifying that they didn&#8217;t expose admin controls, it did find three MFTaaS instances that showed signs of attackers having attempted to exploit the vulnerability against them. &#8220;We promptly isolated these instances for further investigation and contacted the customers,&#8221; it said.<\/p>\n<p>Fortra Lets the Mystery Be<\/p>\n<p>Vulnerability researcher Benjamin Harris, CEO of threat intelligence firm watchTowr, while lauding Fortra&#8217;s overall transparency, said the vendor still hasn&#8217;t answered questions pertaining to exactly how attackers were able to forge valid GoAnywhere MFT licenses.<\/p>\n<p>Fortra declined to comment.<\/p>\n<p>Harris said his &#8220;conjecture&#8221; is that the company&#8217;s private key leaked, which &#8220;would let attackers sign malicious objects that every GoAnywhere instance on the planet would happily accept.&#8221; Another possibility is that the private key fell victim to an attacker who activated a GoAnywhere product and slipped a malicious object into the automatically generated request for a new license to be signed.<\/p>\n<p>&#8220;The mystery remains &#8211; watchTowr researchers and others are still unclear how this vulnerability could be exploited without access to a private key that only Fortra is believed to have access to,&#8221; Harris said.<\/p>\n<p>            <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"Medusa Ransomware Group Tied to Exploits of Now-Patched Zero-Day Vulnerability Mathew J. Schwartz (euroinfosec) \u2022 October 10, 2025&hellip;\n","protected":false},"author":2,"featured_media":113773,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[74],"tags":[982,18,70248,70250,19,21713,17,70252,70251,70249,21807,82,27983],"class_list":{"0":"post-113772","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-cybersecurity","9":"tag-eire","10":"tag-flaw","11":"tag-goanywhere","12":"tag-ie","13":"tag-information-security","14":"tag-ireland","15":"tag-medusa","16":"tag-mft","17":"tag-patch","18":"tag-ransomware","19":"tag-technology","20":"tag-vulnerability"},"share_on_mastodon":{"url":"","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts\/113772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/comments?post=113772"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts\/113772\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/media\/113773"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/media?parent=113772"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/categories?post=113772"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/tags?post=113772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}