A critical deserialization vulnerability (CVE-2025-10035) in Fortra’s GoAnywhere Managed File Transfer (MFT) has been actively exploited by the Storm-1175 threat actor group since September 2025. The flaw affects GoAnywhere MFT Admin Console versions up to 7.8.3 and allows attackers to bypass license-signature verification, inject malicious objects, and achieve remote code execution (RCE), resulting in complete system compromise.
The campaign culminated in the deployment of Medusa ransomware within multiple enterprise environments. The exploitation chain involved deserialization of untrusted data, abuse of remote monitoring tools, and data exfiltration using Rclone, highlighting Storm-1175’s operational sophistication and focus on financially motivated attacks.
CVE-2025-10035 resides in the License Servlet of GoAnywhere MFT, enabling attackers to craft forged license-response signatures that bypass signature validation. This triggers unsafe deserialization, allowing the injection and execution of arbitrary commands on vulnerable systems.
Storm-1175 gained initial access through the deserialization flaw, followed by persistence and lateral movement via SimpleHelp and MeshAgent RMM tools hidden beneath MFT processes. The attackers dropped .jsp web shells within GoAnywhere directories, enabling remote command execution.
Post-Compromise Activities:
netscan
.mstsc.exe
for internal traversal.This campaign mirrors prior Cl0p ransomware operations from 2023 that abused CVE-2023-0669 in GoAnywhere MFT, indicating continued targeting of file transfer software ecosystems.
userdata/logs/
for suspicious entries such as SignedObject.getObject
or license parsing errors, potential indicators of deserialization exploitation.SHA256 Hashes:
IPv4 Addresses:
213[.]183[.]63[.]41
Tactic | Technique | ID |
---|---|---|
Initial Access | Exploit Public-Facing Application | T1190 |
Execution | Command and Scripting Interpreter | T1059 |
Persistence | Web Shell | T1505.003 |
Privilege Escalation | Valid Accounts | T1078 |
Defense Evasion | External Remote Services | T1133 |
Discovery | System & Network Service Discovery | T1082, T1046 |
Lateral Movement | Remote Desktop Protocol (RDP) | T1021.001 |
Exfiltration | Exfiltration to Cloud Storage, Exfiltration Over C2 Channel | T1567.002, T1041 |
Impact | Data Encrypted for Impact | T1486 |
Command & Control | Proxy Communication | T1090 |
Resource Development | Obtain Capabilities – Vulnerabilities | T1588.006 |
Get through updates and upcoming events, and more directly in your inbox