#GoAnywhere

RedPacket SecurityRedPacketSecurity
2025-12-19

Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed FileTransfer vulnerability - redpacketsecurity.com/investig


-2025-10035
MFT
vulnerability
-1175
ransomware

RedPacket SecurityRedPacketSecurity
2025-12-19

Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed FileTransfer vulnerability - redpacketsecurity.com/investig


-2025-10035
MFT
vulnerability
-1175
ransomware

Xavier Β«XΒ» Santolaria :verified_paw: :donor:0x58@infosec.exchange
2025-10-12

πŸ”₯ Latest issue of my curated #cybersecurity and #infosec list of resources for week #41/2025 is out!

β†’ It includes the following and much more:

😱 13-Year #Redis Flaw Exposed: CVSS 10.0 Vulnerability Lets Attackers Run Code Remotely;

🩹 #Google #DeepMind’s New #AI Agent Finds and Fixes Vulnerabilities;

πŸ’¬ 5.5 Million People Impacted in #Discord Breach;

πŸ‡―πŸ‡΅ 🍺 Qilin #ransomware says it attacked Japan’s Asahi;

πŸ‡ΊπŸ‡Έ Microsoft says the Storm-1175 cybercrime group exploited a zero-day in #GoAnywhere MFT;

πŸ”“ The Cl0p ransomware group stole data from Oracle E-Business Suite customers;

πŸ”₯ 🧱 #SonicWall admits attacker accessed all customer firewall configurations stored on #cloud portal;

--

πŸ‘‰ NEVER MISS my curations and updates on information security and cybersecurity news and challenges πŸ“¨ Subscribe to the #infosecMASHUP newsletter to have it piping hot in your inbox every week-end ⬇️

infosec-mashup.santolaria.net/

Offensive Sequenceoffseq@infosec.exchange
2025-10-12

πŸ”₯ CRITICAL: CVE-2025-10035 in GoAnywhere MFT (7.6.x–7.8.x) enables unauthenticated remote command injectionβ€”actively exploited for ransomware (Medusa). Restrict admin console access, patch now, and monitor for IOCs. Details: radar.offseq.com/threat/from-d #OffSeq #vuln #GoAnywhere #BlueTeam

Critical threat: From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation
Offensive Sequenceoffseq@infosec.exchange
2025-10-09

Medusa ransomware is exploiting CRITICAL vuln (CVE-2025-10035) in Fortra GoAnywhere MFT. Private key compromise enables data breaches & ransomware. Audit key management, monitor access, & apply vendor updates. radar.offseq.com/threat/medusa #OffSeq #GoAnywhere #Ransomware #Infosec

Critical threat: Medusa Ransomware Actors Exploit Critical Fortra GoAnywhere Flaw
2025-10-07

πŸ”’ Microsoft confirms Medusa ransomware is actively exploiting a CVSS 10.0 deserialization flaw in Fortra’s #GoAnywhere MFT. If your GoAnywhere instance is internet-exposed, patch immediately.

Read: hackread.com/medusa-ransomware

#CyberSecurity #Ransomware #Medusa #ZeroDay

2025-10-07

⚠️ Microsoft warns of critical GoAnywhere flaw under attack A zero-day in Fortra’s GoAnywhere MFT (CVE-2024-0204) is being actively exploited to steal data and deploy ransomware. Microsoft links the activity to Lace Tempest, known for CL0P ransomware. πŸ‘‰πŸ» patch immediately. #ransomNews #GoAnywhere

Tom's Hardware Italiatomshw
2025-10-07

⚠️ Una grave falla in mette a rischio milioni di PC Windows di essere compromessi - protegge le tue informazioni!

πŸ”— tomshw.it/business/microsoft-a

Offensive Sequenceoffseq@infosec.exchange
2025-10-07

🚨 CRITICAL GoAnywhere MFT bug is being exploited for ransomware. Remote code execution with no user interaction puts European orgs at high risk. Patch ASAP, restrict access, and monitor logs. No CVE yet. Details: radar.offseq.com/threat/micros #OffSeq #Ransomware #GoAnywhere #CyberAlert

Critical threat: Microsoft: Critical GoAnywhere bug exploited in ransomware attacks
2025-10-06

One overlooked bug in GoAnywhere MFT sparked a wave of ransomware attacks on over 500 systems. How did cybercriminals hide in plain sight using legit IT tools? Find out the tactics behind the chaos.

thedefendopsdiaries.com/exploi

#goanywhere
#ransomware
#storm1175
#cve202510035
#cyberattack
#medusaransomware
#remotemanagement
#databreach
#patchmanagement

RedPacket SecurityRedPacketSecurity
2025-09-29
2025-09-27

🚨 Zero-day exploited in GoAnywhere MFT (CVE-2025-10035)

⚠️ Exploitation began before vendor disclosure
⚠️ Attackers gained RCE, created admin-go backdoor, uploaded payloads
⚠️ Persistence through SimpleHelp abuse
Admins: patch immediately, restrict console exposure, check logs for SignedObject.getObject.
πŸ’¬ How should the industry handle vendors who delay advisories when exploitation is already in the wild?
Follow @technadu for real-time infosec updates.

#Infosec #Cybersecurity #ZeroDay #GoAnywhere #RCE #ThreatIntel

Maximum severity GoAnywhere MFT flaw exploited as zero day
2025-09-26

GoAnywhere MFT's single zero-day flaw has already unleashed widespread breaches and exposed sensitive dataβ€”are we ready for what's next in the cybersecurity arms race?

thedefendopsdiaries.com/exploi

#goanywhere
#zeroday
#cve202510035
#databreach
#cybersecurity
#vulnerabilitymanagement
#infosec
#threatdetection
#sqlinjection
#regulatorycompliance

2025-09-25

⚠️ Critical CVSS 10 flaw in Fortra’s GoAnywhere MFT (CVE-2025-10035) lets attackers inject commands and take over sensitive systems. Patch to v7.8.4 now.

Read: hackread.com/critical-cvss-10-

#CyberSecurity #Vulnerability #Fortra #GoAnywhere #Infosec

PUPUWEB Blogpupuweb
2025-09-23

A critical 10.0 CVSS vulnerability (CVE-2025-10035) puts Fortra's GoAnywhere MFT servers at risk of full compromise. Immediate action is required. Here are the simple steps to secure your data.

pupuweb.com/what-simple-steps-

2025-09-20

It's been a packed 24 hours in the cyber world! We've got major arrests, critical vulnerabilities, nation-state activity, and a deep dive into AI's evolving role in both defence and attack. Let's get into it:

Scattered Spider Takedown & TfL Attack Details πŸ•·οΈ

- UK law enforcement, in coordination with the US DOJ, has arrested two teens, Thalha Jubair (19) and Owen Flowers (18), linked to the notorious Scattered Spider group.
- Jubair is charged with involvement in at least 120 network intrusions, extorting over $115 million from 47 US entities, including a breach of the US federal court system.
- Investigators traced Jubair's activities through cryptocurrency transactions used for gaming gift cards and food deliveries to his apartment, highlighting operational security failures.

πŸ“° The Hacker News | thehackernews.com/2025/09/uk-a
πŸ•΅πŸΌ The Register | go.theregister.com/feed/www.th
πŸ—žοΈ The Record | therecord.media/scattered-spid

Russian Airport Website Hacked ✈️

- Pulkovo Airport in St. Petersburg, Russia's second-largest air hub, reported its website was knocked offline due to a cyberattack.
- While airport operations remained unaffected, this incident follows other disruptions in Russia's aviation sector, including a system failure at KrasAvia and a major Aeroflot outage claimed by pro-Ukrainian groups.
- The attack highlights ongoing cyber warfare targeting Russian critical infrastructure since the 2022 invasion of Ukraine.

πŸ—žοΈ The Record | therecord.media/russia-pulkovo

Russian APTs Turla and Gamaredon Collaborate in Ukraine πŸ‡·πŸ‡Ί

- ESET researchers have documented the first technical evidence of collaboration between two Russian FSB-linked APTs, Gamaredon and Turla, in attacks against Ukrainian entities.
- Gamaredon's tools (PteroGraphin, PteroOdd) were observed deploying Turla's sophisticated Kazuar backdoor, with Gamaredon potentially providing initial access for Turla's targeted espionage.
- This convergence suggests a strategic alignment, likely intensified by the ongoing conflict, focusing on high-value targets within Ukraine's defence sector.

πŸ“° The Hacker News | thehackernews.com/2025/09/russ
πŸ—žοΈ The Record | therecord.media/russian-spy-gr

Iranian UNC1549 Targets Telecoms via LinkedIn Lures 🎣

- The Iran-nexus cyber espionage group UNC1549 (aka Subtle Snail) has infiltrated 34 devices across 11 telecommunications firms in Europe, Canada, UAE, UK, and US.
- The group uses sophisticated LinkedIn job lures, posing as HR reps, to build trust and deliver the MINIBIKE backdoor via DLL side-loading from fraudulent domains.
- MINIBIKE is a modular backdoor capable of extensive reconnaissance, credential theft (including Outlook and browser data), and persistence, with C2 traffic proxied through Azure cloud services for stealth.

πŸ“° The Hacker News | thehackernews.com/2025/09/unc1

Global PhaaS Surge: Lighthouse & Lucid Campaigns 🌐

- The Phishing-as-a-Service (PhaaS) platforms Lighthouse and Lucid are linked to over 17,500 phishing domains, targeting 316 brands across 74 countries.
- These Chinese-speaking threat actors (XinXin group) use advanced techniques like homoglyph attacks (e.g., Japanese Hiragana character 'γ‚“' to mimic '/') and specific User-Agent/proxy country checks to evade detection.
- Phishing infrastructure is shifting, with a 25% increase in email-based credential harvesting, moving away from Telegram, and leveraging services like EmailJS to bypass self-hosted infrastructure.

πŸ“° The Hacker News | thehackernews.com/2025/09/1750

Max Severity Flaw in GoAnywhere MFT (CVE-2025-10035) ⚠️

- Fortra has patched a maximum-severity deserialization vulnerability (CVE-2025-10035) in GoAnywhere MFT's License Servlet, allowing potential command injection.
- This flaw is "virtually identical" to CVE-2023-0669, a zero-day exploited by the Clop ransomware gang two years ago, affecting over 100 organisations.
- While no active exploitation is confirmed yet, researchers anticipate it, urging immediate patching or ensuring the Admin Console is not publicly exposed to the internet.

🀫 CyberScoop | cyberscoop.com/goanywhere-file
πŸ€– Bleeping Computer | bleepingcomputer.com/news/secu
πŸ•΅πŸΌ The Register | go.theregister.com/feed/www.th

Ivanti EPMM Zero-Days Under Active Exploitation (CVE-2025-4427, CVE-2025-4428) 🚨

- CISA has detailed two malware strains actively exploiting Ivanti EPMM zero-days (CVE-2025-4427, authentication bypass; CVE-2025-4428, RCE) chained together.
- Exploitation was observed around May 15, 2025, following PoC publication, with suspected China-nexus espionage groups leveraging the flaws to deploy malicious Java class listeners.
- These listeners enable arbitrary code execution, data exfiltration, and persistence, delivered in segmented, Base64-encoded chunks to evade detection. Immediate patching and treating MDM systems as high-value assets are critical.

πŸ“° The Hacker News | thehackernews.com/2025/09/cisa
πŸ€– Bleeping Computer | bleepingcomputer.com/news/secu
πŸ•΅πŸΌ The Register | go.theregister.com/feed/www.th

Critical Entra ID Flaw (CVE-2025-55241) Could Grant Global Admin Access πŸ”‘

- A researcher discovered a critical flaw (CVE-2025-55241) in Microsoft Entra ID that could have allowed access to almost every tenant worldwide via undocumented "Actor tokens."
- The vulnerability in the legacy Azure Active Directory Graph API failed to validate originating tenants, enabling cross-tenant authentication as any user, including Global Admins, without logging.
- Microsoft has swiftly mitigated the issue, confirming no abuse was detected, but the potential impact underscores the severity of identity-related vulnerabilities in cloud environments.

πŸ•΅πŸΌ The Register | go.theregister.com/feed/www.th

ChatGPT "ShadowLeak" Bug Exfiltrated Gmail Secrets πŸ“§

- OpenAI patched a critical "ShadowLeak" flaw in ChatGPT's Deep Research assistant that allowed attackers to steal Gmail secrets with a single, maliciously crafted email.
- The attack hid instructions in white-on-white text or CSS within an email, which the AI agent would dutifully follow when summarising the inbox, exfiltrating sensitive data to an attacker-controlled server.
- This server-side execution bypasses traditional security controls, highlighting new risks with AI agents accessing private data and the need for robust input sanitisation and agent access controls.

πŸ•΅πŸΌ The Register | go.theregister.com/feed/www.th

China's GoLaxy AI Persona Army for Information Warfare πŸ‡¨πŸ‡³

- Leaked documents from Chinese company GoLaxy reveal a chilling new approach to information warfare: an army of AI personas designed for intimate, surgical persuasion.
- These aren't crude bots but highly realistic, adaptable digital identities, crafted using scraped social data and generative AI (DeepSeek) to build psychological profiles and shape narratives.
- The documents show dossiers on 2,000 American public figures and thousands of influencers, with operations already active in Hong Kong and Taiwan, signalling a new frontier in cognitive warfare.

πŸ—žοΈ The Record | therecord.media/golaxy-china-a

FBI Warns of Fake Crime Reporting Portals πŸ›‘οΈ

- The FBI has issued a warning about cybercriminals impersonating its Internet Crime Complaint Center (IC3) website to conduct financial scams and steal personal information.
- These spoofed sites often use slightly altered domains (e.g., icc3[.]live) and may even display legitimate-looking warnings to trick victims.
- The FBI advises users to always manually type www.ic3.gov, avoid clicking sponsored search results, and never share personal info or send money to individuals claiming to be from the FBI or IC3.

πŸ€– Bleeping Computer | bleepingcomputer.com/news/secu

ChatGPT Can Now Solve CAPTCHAs with Prompt Engineering πŸ€–

- Researchers have demonstrated that ChatGPT-4o can be tricked into solving complex, image-based CAPTCHAs by using cleverly worded prompts and "staged consent."
- This bypasses the chatbot's policy prohibitions, raising serious questions about the long-term reliability of CAPTCHAs as a human-proving security mechanism against increasingly capable AI systems.
- The technique involved initially "training" the LLM on "fake" CAPTCHAs in one chat, then transferring that context to an agent chat to solve real ones, highlighting the evolving threat of prompt injection.

πŸ•΅πŸΌ The Register | go.theregister.com/feed/www.th

Future of CVE Program in Limbo Amidst CISA Debate πŸ“‹

- The future governance of the globally critical CVE Program is being debated, with CISA asserting its leadership role following a recent funding scare.
- CISA released documents outlining its vision for a CISA-led, vendor-neutral program, arguing against privatisation due to potential conflicts of interest and national security risks.
- However, CVE Program board members have formed the CVE Foundation, advocating for a globally supported, collaborative model with CISA as one of many contributors, questioning CISA's historical role and financial transparency.

πŸ—žοΈ The Record | therecord.media/cve-program-fu

MI6 Launches Dark Web Portal "Silent Courier" for Spy Recruitment πŸ‡¬πŸ‡§

- The UK's Secret Intelligence Service (MI6) has launched "Silent Courier," an upgraded dark web portal on the Tor network, to securely recruit foreign informants globally.
- The initiative aims to attract individuals with sensitive information on global instability or hostile intelligence activity, providing anonymous direct contact with MI6.
- Instructions are available in eight languages via YouTube, advising potential sources on secure access methods, including using clean devices and VPNs where Tor is blocked.

πŸ•΅πŸΌ The Register | go.theregister.com/feed/www.th
πŸ—žοΈ The Record | therecord.media/mi6-darkweb-po

Automating Alert Triage with AI Agents and Confluence SOPs πŸ€–

- Tines has released a pre-built workflow that automates security alert triage by leveraging AI agents and Confluence SOPs, aiming to reduce MTTR and analyst fatigue.
- The workflow uses AI to classify alerts, automatically retrieves relevant SOPs from Confluence, creates structured case records, and orchestrates remediation actions across various security tools.
- This solution integrates with platforms like CrowdStrike, AbuseIPDB, Okta, and Slack, providing consistent handling of alerts and automated notifications to on-call teams.

πŸ“° The Hacker News | thehackernews.com/2025/09/how-

#CyberSecurity #ThreatIntelligence #Vulnerabilities #ZeroDay #RCE #APT #Ransomware #ScatteredSpider #Ivanti #GoAnywhere #EntraID #ChatGPT #AI #Phishing #PhaaS #DataPrivacy #COPPA #OnlineSafetyAct #CVE #QuantumComputing #InfoSec #CyberAttack #IncidentResponse

2025-09-19

Critical alert: A flaw in GoAnywhere MFT now makes it shockingly easy for attackers to hijack your file transfers. Are you sure your data's safe? Read on to get ahead of the threat.

thedefendopsdiaries.com/cve-20

#cve202510035
#goanywhere
#vulnerability
#cybersecurity
#databreach

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst