Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

New bug in SAP NetWeaver allows attackers to take over servers without logging in

Coinbase expands investment in India’s CoinDCX, with exchange value of $2.45 billion

Sam Altman says ChatGPT will soon allow erotica for adult users

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Microsoft links Storm-1175 to GoAnywhere exploits deploying Medusa ransomware
Identity

Microsoft links Storm-1175 to GoAnywhere exploits deploying Medusa ransomware

userBy userOctober 7, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 7, 2025Ravi LakshmananVulnerability/Cloud Security

Microsoft on Monday determined that the attacker it tracks as Storm-1175 was a exploiting a serious security flaw in the Fortra GoAnywhere software to facilitate deployment of Medusa ransomware.

This vulnerability is CVE-2025-10035 (CVSS score: 10.0) and is a critical deserialization bug that can cause command injection without authentication. This issue was resolved in version 7.8.4 or Sustain release 7.6.3.

“The vulnerability could allow an attacker with a validly forged license response signature to deserialize any object controlled by the attacker, which could lead to command injection and remote code execution (RCE),” the Microsoft Threat Intelligence team said.

According to the technology giant, Storm-1175 is a cybercrime group known for deploying Medusa ransomware since September 11, 2025 and exploiting published applications for early access. It is worth noting that watchTowr revealed last week that there have been signs of the flaw being actively exploited since at least September 10th.

DFIR Retainer Service

Additionally, successful exploiting CVE-2025-10035 could result in attackers performing system and user detection, maintaining long-term access, and deploying additional tools for horizontal movement and malware.

Attack chains following initial access require the drop of remote monitoring and management (RMM) tools such as SimpleHelp and MeshAgent to maintain persistence. It has also been observed that attackers often create .jsp files in the GoAnywhere MFT directory at the same time as the RMM tool is dropped.

The next phase involves user, network, and system discovery commands followed by horizontal movement of the entire network using mstsc.exe (i.e. Windows Remote Desktop Connection).

The downloaded RMM tool was used for command and control (C2) using Cloudflare tunnels, and Microsoft has observed that Rclone is being used for data leakage in at least one damaged environment. This attack ultimately paves the way for the deployment of Medusa ransomware.

“The organization that runs GoAnywhere MFT has been virtually silent assaulted since at least September 11th, but little has been revealed from Fortra,” said Benjamin Harris, CEO and founder of watchTowr. “Microsoft’s confirmation highlighted a very unpleasant situation of misuse, belongings and a month-long head start for attackers.

“What’s still missing is the answer only Fortra can provide. How did attackers get the private key needed to exploit this? Why have organizations been buried in the dark for so long? Customers need transparency rather than silence. We hope that the affected or likely to be affected will be shared in the near future so that they can understand their exposure to vulnerabilities that are actually actively exploited.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleStart a new era of growth
Next Article Vulnerability in CVSS 10.0 allows attackers to execute code remotely
user
  • Website

Related Posts

New bug in SAP NetWeaver allows attackers to take over servers without logging in

October 15, 2025

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

October 14, 2025

How Threat Hunting Builds Readiness

October 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

New bug in SAP NetWeaver allows attackers to take over servers without logging in

Coinbase expands investment in India’s CoinDCX, with exchange value of $2.45 billion

Sam Altman says ChatGPT will soon allow erotica for adult users

At Starbase, SpaceX is doing its own firefighting.

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Meet Your Digital Double: FySelf Unveils TwinH, the Future of Personalized Online Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.