Skip to content

Cybercriminals Exploit Fortra's GoAnywhere Vulnerability, Deploy Medusa Ransomware

Storm-1175's latest attack targets Fortra's GoAnywhere. Patches are available, but time is running out to protect your systems.

there was a room in which people are sitting in the chairs,in front of a table looking into the...
there was a room in which people are sitting in the chairs,in front of a table looking into the laptop and doing something,beside them there are many flee xi in which different advertisements are present which different text.

Cybercriminals Exploit Fortra's GoAnywhere Vulnerability, Deploy Medusa Ransomware

Cybersecurity authorities have recently revealed that the notorious cybercriminal group, Storm-1175, has been exploiting a critical vulnerability in Fortra's GoAnywhere file transfer solution. The group is known for deploying the Medusa ransomware, causing significant disruption to various systems.

The vulnerability, identified as CVE-2025-10035, was discovered by Fortra on September 11. Microsoft's report, published on September 21, 2025, detailed the exploitation activity involving this bug. Upon successful exploitation, attackers can gain system and user discovery, maintain long-term access, and deploy additional tools for lateral movement and malware deployment. In one compromised environment, Medusa ransomware was successfully deployed.

WatchTowr initially warned GoAnywhere users about the vulnerability being exploited weeks before CISA's notice. After initial access, hackers used SimpleHelp and MeshAgent remote monitoring tools for lateral movement within the compromised network. CISA confirmed the vulnerability's exploitation and ordered federal civilian agencies to patch the bug by October 20.

The cybercriminal group Storm-1175 has been exploiting a critical vulnerability in Fortra's GoAnywhere solution, leading to the deployment of Medusa ransomware. With federal agencies ordered to patch the bug, it is crucial for all GoAnywhere users to apply the necessary updates to protect their systems from potential attacks.

Read also:

Latest