By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware
Computing

Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware

News Room
Last updated: 2025/10/07 at 6:11 AM
News Room Published 7 October 2025
Share
Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware
SHARE

Oct 07, 2025Ravie LakshmananVulnerability / Cloud Security

Microsoft on Monday attributed a threat actor it tracks as Storm-1175 to the exploitation of a critical security flaw in Fortra GoAnywhere software to facilitate the deployment of Medusa ransomware.

The vulnerability is CVE-2025-10035 (CVSS score: 10.0), a critical deserialization bug that could result in command injection without authentication. It was addressed in version 7.8.4, or the Sustain Release 7.6.3.

“The vulnerability could allow a threat actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection and potential remote code execution (RCE),” the Microsoft Threat Intelligence team said.

According to the tech giant, Storm-1175 is a cybercriminal group known for deploying Medusa ransomware and exploiting public-facing applications for initial access since September 11, 2025. It’s worth noting that watchTowr revealed last week that there were indications of active exploitation of the flaw since at least September 10.

DFIR Retainer Services

Furthermore, successful exploitation of CVE-2025-10035 could allow attackers to perform system and user discovery, maintain long-term access, and deploy additional tools for lateral movement and malware.

The attack chain following initial access entails dropping remote monitoring and management (RMM) tools, such as SimpleHelp and MeshAgent, to maintain persistence. The threat actors have also been observed creating .jsp files within the GoAnywhere MFT directories, often at the same time as the dropped RMM tools.

In the next phase, commands for user, network, and system discovery are executed, followed by leveraging mstsc.exe (i.e., Windows Remote Desktop Connection) for lateral movement across the network.

The downloaded RMM tools are used for command-and-control (C2) using a Cloudflare tunnel, with Microsoft observing the use of Rclone in at least one victim environment for data exfiltration. The attack ultimately paves the way for the Medusa ransomware deployment.

“Organizations running GoAnywhere MFT have effectively been under silent assault since at least September 11, with little clarity from Fortra,” watchTowr CEO and Founder, Benjamin Harris, said. “Microsoft’s confirmation now paints a pretty unpleasant picture — exploitation, attribution, and a month-long head start for the attackers.

“What’s still missing are the answers only Fortra can provide. How did threat actors get the private keys needed to exploit this? Why were organizations left in the dark for so long? Customers deserve transparency, not silence. We hope they will share in the very near future so affected or potentially affected organizations can understand their exposure to a vulnerability that is being actively exploited in the wild.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article My favourite Apple Watch dupe is now less than £100 | Stuff My favourite Apple Watch dupe is now less than £100 | Stuff
Next Article As an Android expert, these are the 5 Android phones I’d buy during Prime Big Deal Days As an Android expert, these are the 5 Android phones I’d buy during Prime Big Deal Days
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

T-Mobile makes satellite 911 texting free for everyone — even Verizon and AT&T users
T-Mobile makes satellite 911 texting free for everyone — even Verizon and AT&T users
News
Qualcomm China announces Wi-Fi 8 for 2028 · TechNode
Qualcomm China announces Wi-Fi 8 for 2028 · TechNode
Computing
Why Families Should Pack the TESSAN Voyager 205 for Holiday Travel This Black Friday
Why Families Should Pack the TESSAN Voyager 205 for Holiday Travel This Black Friday
Gadget
Apple blocks iOS 26.2, iPadOS 26.2 betas on devices with C1 – 9to5Mac
Apple blocks iOS 26.2, iPadOS 26.2 betas on devices with C1 – 9to5Mac
News

You Might also Like

Qualcomm China announces Wi-Fi 8 for 2028 · TechNode
Computing

Qualcomm China announces Wi-Fi 8 for 2028 · TechNode

1 Min Read
China’s top food delivery platforms pledge to curb unfair subsidies following regulator talks · TechNode
Computing

China’s top food delivery platforms pledge to curb unfair subsidies following regulator talks · TechNode

4 Min Read
Huawei launches Mate 70 Air pre-sale at around 0, powered by Kirin 9020A/9020B chip · TechNode
Computing

Huawei launches Mate 70 Air pre-sale at around $580, powered by Kirin 9020A/9020B chip · TechNode

1 Min Read
Zama Announces Strategic Acquisition of KKRT Labs to Scale Confidentiality On Public Blockchains | HackerNoon
Computing

Zama Announces Strategic Acquisition of KKRT Labs to Scale Confidentiality On Public Blockchains | HackerNoon

5 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?