Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Well, I’m a little less angry about the “Magnificent Ambersons” AI project

Dozens of people march in support of billionaire in San Francisco

From Svedka to Anthropic, brands are boldly leveraging AI in their Super Bowl ads

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Microsoft links Storm-1175 to GoAnywhere exploits deploying Medusa ransomware
Identity

Microsoft links Storm-1175 to GoAnywhere exploits deploying Medusa ransomware

userBy userOctober 7, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 7, 2025Ravi LakshmananVulnerability/Cloud Security

Microsoft on Monday determined that the attacker it tracks as Storm-1175 was a exploiting a serious security flaw in the Fortra GoAnywhere software to facilitate deployment of Medusa ransomware.

This vulnerability is CVE-2025-10035 (CVSS score: 10.0) and is a critical deserialization bug that can cause command injection without authentication. This issue was resolved in version 7.8.4 or Sustain release 7.6.3.

“The vulnerability could allow an attacker with a validly forged license response signature to deserialize any object controlled by the attacker, which could lead to command injection and remote code execution (RCE),” the Microsoft Threat Intelligence team said.

According to the technology giant, Storm-1175 is a cybercrime group known for deploying Medusa ransomware since September 11, 2025 and exploiting published applications for early access. It is worth noting that watchTowr revealed last week that there have been signs of the flaw being actively exploited since at least September 10th.

DFIR Retainer Service

Additionally, successful exploiting CVE-2025-10035 could result in attackers performing system and user detection, maintaining long-term access, and deploying additional tools for horizontal movement and malware.

Attack chains following initial access require the drop of remote monitoring and management (RMM) tools such as SimpleHelp and MeshAgent to maintain persistence. It has also been observed that attackers often create .jsp files in the GoAnywhere MFT directory at the same time as the RMM tool is dropped.

The next phase involves user, network, and system discovery commands followed by horizontal movement of the entire network using mstsc.exe (i.e. Windows Remote Desktop Connection).

The downloaded RMM tool was used for command and control (C2) using Cloudflare tunnels, and Microsoft has observed that Rclone is being used for data leakage in at least one damaged environment. This attack ultimately paves the way for the deployment of Medusa ransomware.

“The organization that runs GoAnywhere MFT has been virtually silent assaulted since at least September 11th, but little has been revealed from Fortra,” said Benjamin Harris, CEO and founder of watchTowr. “Microsoft’s confirmation highlighted a very unpleasant situation of misuse, belongings and a month-long head start for attackers.

“What’s still missing is the answer only Fortra can provide. How did attackers get the private key needed to exploit this? Why have organizations been buried in the dark for so long? Customers need transparency rather than silence. We hope that the affected or likely to be affected will be shared in the near future so that they can understand their exposure to vulnerabilities that are actually actively exploited.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleStart a new era of growth
Next Article Vulnerability in CVSS 10.0 allows attackers to execute code remotely
user
  • Website

Related Posts

OpenClaw integrates VirusTotal scanning to detect malicious ClawHub skills

February 8, 2026

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

February 7, 2026

The Legal Revolution is Digital: Meet TwinH, Your AI Partner in the Courtroom of the Future

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Well, I’m a little less angry about the “Magnificent Ambersons” AI project

Dozens of people march in support of billionaire in San Francisco

From Svedka to Anthropic, brands are boldly leveraging AI in their Super Bowl ads

OpenClaw integrates VirusTotal scanning to detect malicious ClawHub skills

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.