Close Menu

    Subscribe to Updates

    Get the latest tech news from Tallwire.

      What's Hot

      Artemis II Splashdown Signals A Step Closer to Mass Space Travel

      April 12, 2026

      Anthropic Code Leak Raises Questions About AI Security and Industry Oversight

      April 8, 2026

      NASA Astronauts Use iPhones to Capture Historic Artemis II Mission Images

      April 8, 2026
      Facebook X (Twitter) Instagram
      • Tech
      • AI
      • Get In Touch
      Facebook X (Twitter) LinkedIn
      TallwireTallwire
      • Tech

        NASA Astronauts Use iPhones to Capture Historic Artemis II Mission Images

        April 8, 2026

        OpenAI Expands Influence With Strategic TBPN Media Acquisition

        April 8, 2026

        Cybersecurity Veteran Turns Focus To Drone Hacking After Decades Battling Malware

        April 6, 2026

        Anonymous Social App Surges In Saudi Arabia, Testing Limits Of Digital Freedom

        April 6, 2026

        Peter Thiel’s Bold Ag-Tech Gamble Signals High-Tech Disruption of Traditional Ranching

        April 6, 2026
      • AI

        Anthropic Code Leak Raises Questions About AI Security and Industry Oversight

        April 8, 2026

        The Rise Of Agentic AI Signals A Shift From Tools To Autonomous Digital Actors

        April 8, 2026

        AI Chatbots Draw Scrutiny As Teens Engage In Intimate Roleplay And Emotional Dependency

        April 8, 2026

        Ai-Powered Startup Signals Rise Of One-Person Billion-Dollar Companies

        April 8, 2026

        OpenAI Secures Historic $122 Billion Funding Round at $852 Billion Valuation

        April 7, 2026
      • Security

        Anthropic Code Leak Raises Questions About AI Security and Industry Oversight

        April 8, 2026

        DeFi Platform Drift Halts Operations After Multi-Million Dollar Crypto Hack

        April 7, 2026

        Fake WhatsApp App Exposes Users To Government Spyware Operation

        April 7, 2026

        ICE Deploys Controversial Spyware Tool In Drug Trafficking Investigations

        April 7, 2026

        Telehealth Firm Discloses Breach Amid Rising Digital Health Vulnerabilities

        April 6, 2026
      • Health

        European Crackdown Targets Social Media’s Impact on Children

        April 8, 2026

        AI Chatbots Draw Scrutiny As Teens Engage In Intimate Roleplay And Emotional Dependency

        April 8, 2026

        Australia Moves To Curb Social Media Addiction Among Youth With Expanded Under-16 Ban

        April 5, 2026

        Australia’s eSafety Regulator Warns Big Tech As Teens Circumvent Social Media Restrictions

        April 5, 2026

        Meta Finally Held Accountable For Harming Teens, But Real Reform Remains Uncertain

        April 2, 2026
      • Science

        Artemis II Splashdown Signals A Step Closer to Mass Space Travel

        April 12, 2026

        Peter Thiel’s Bold Ag-Tech Gamble Signals High-Tech Disruption of Traditional Ranching

        April 6, 2026

        White House Tech Advisor David Sacks Steps Down To Lead Presidential Science Advisory

        March 31, 2026

        Blue Origin’s Orbital Data Center Push Signals New Frontier in Tech Infrastructure

        March 27, 2026

        Quantum Cryptography Pioneers Awarded Computing’s Highest Honor

        March 25, 2026
      • Tech

        Peter Thiel’s Bold Ag-Tech Gamble Signals High-Tech Disruption of Traditional Ranching

        April 6, 2026

        Zuckerberg Quietly Offers Musk Support As Tech Titans Align Around Government Power

        April 4, 2026

        White House Tech Advisor David Sacks Steps Down To Lead Presidential Science Advisory

        March 31, 2026

        Another Billionaire Signals Exit As California’s Taxes Drives Out High-Profile Entrepreneurs

        March 28, 2026

        Bezos Eyes $100 Billion War Chest To Rewire Legacy Industry With AI

        March 28, 2026
      TallwireTallwire
      Home»Tech»Critical GoAnywhere MFT Flaw Actively Exploited — Agencies Ordered to Patch
      Tech

      Critical GoAnywhere MFT Flaw Actively Exploited — Agencies Ordered to Patch

      Updated:February 21, 20264 Mins Read
      Facebook Twitter Pinterest LinkedIn Tumblr Email
      Critical GoAnywhere MFT Flaw Actively Exploited — Agencies Ordered to Patch
      Critical GoAnywhere MFT Flaw Actively Exploited — Agencies Ordered to Patch
      Share
      Facebook Twitter LinkedIn Pinterest Email

      A newly disclosed vulnerability in Fortra’s GoAnywhere Managed File Transfer (MFT), tracked as CVE-2025-10035, has rapidly escalated into a serious security incident: the flaw is a deserialization bug in the License Servlet allowing command injection via a forged license response signature, and security researchers report credible evidence that it was exploited in the wild as early as September 10, 2025 — eight days before public disclosure. Microsoft‘s security team attributes ongoing attacks to a known threat actor group, Storm-1175, which has leveraged the vulnerability in multiple stages including remote monitoring tool deployment, lateral movement, and ransomware installation. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has officially added CVE-2025-10035 to its Known Exploited Vulnerabilities (KEV) list and ordered federal civilian agencies to remediate the flaw by October 20, 2025. Users of GoAnywhere MFT are urged to immediately patch to versions 7.8.4 (or 7.6.3 for sustain release) and isolate the Admin Console from public network exposure.

      Sources: Microsoft, CISA.gov

      Key Takeaways

      – CVE-2025-10035 is a critical, unauthenticated deserialization vulnerability in the GoAnywhere License Servlet, rated CVSS 10.0, which enables remote code execution via a forged license response signature.

      – Evidence suggests the vulnerability was being actively exploited well before the public patch release, and a known ransomware-capable threat group (Storm-1175) is tied to real attacks leveraging it.

      – Because the exploit depends on Admin Console exposure, immediate mitigation steps include patching to GoAnywhere MFT 7.8.4 or sustain release 7.6.3, removing public access to the administration interface, and monitoring for suspicious “SignedObject.getObject” log entries.

      In-Depth

      This incident underscores once again how enterprise file transfer software can become a prime target for attackers, especially when flaws allow unauthenticated access to critical internal mechanisms. The root of the problem lies in GoAnywhere’s License Servlet, which, in vulnerable versions (pre-7.8.4 or pre-7.6.3 sustain), fails to sufficiently validate serialized data. If an attacker can forge a license response signature, they can cause the system to deserialize attacker-controlled objects, leading to arbitrary code execution deep inside the server environment.

      What intensifies the severity here is that exploitation does not require prior authentication; an attacker merely needs network access to the vulnerable endpoint. That means that any Admin Console or License interface exposed to the internet becomes a direct attack vector. Security firms — in particular watchTowr — assert they have credible evidence of exploitation dating back to September 10, 2025, which predates the public advisory on September 18. This timeline suggests that attackers leveraged zero-day capabilities before most defenders had awareness or time to respond.

      Microsoft’s reporting ties the exploitation to Storm-1175, a group already known for deploying the Medusa ransomware family. In observed campaigns, the attackers exploited CVE-2025-10035 for initial access, dropped remote monitoring/management (RMM) tools like SimpleHelp and MeshAgent, planted web shells (.jsp files), used internal discovery (e.g. netscan) and lateral movement (mstsc.exe), and set up command-and-control infrastructure (sometimes via Cloudflare tunnels). The final payload in at least one observed environment was Medusa ransomware.

      Given the confirmed exploitation and the critical nature of this flaw, U.S. federal agencies were mandated to patch by October 20 via CISA’s binding directive, and the CVE has now been listed in the KEV catalog. But this isn’t just a U.S. government issue — any organization using GoAnywhere MFT faces serious risk if their Admin Console is exposed or their instances are unpatched.

      For defenders, patching is the first priority. But for systems that can’t be updated immediately, the workaround is to entirely restrict public access to the Admin / License endpoints — e.g., placing them behind VPN/NAT, firewall rules, or segmentation. Log monitoring is also essential: look for license validation activity, deserialization errors involving “SignedObject.getObject,” or the use of RMM tools in odd contexts. Threat hunting hammering on indicators tied to Storm-1175’s known toolset and tactics is warranted.

      In the broader picture, this flaw mirrors earlier exploits of managed file transfer platforms (such as MOVEit, Accellion, or earlier GoAnywhere vulnerabilities), reinforcing a pattern: systems designed to move sensitive data between systems (often under the assumption of internal trust) become high-value targets when a single flaw unlocks administrative power. Organizations must maintain defense in depth: network exposure controls, aggressive patch cycles, layered monitoring, and incident readiness. In this case, the margin for delay is slim — the evidence suggests attacks are already underway, making urgent remediation not just best practice, but imperative.

      Ransomware
      Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
      Previous ArticleCrimson Collective Claims Nintendo Breach Amid Broader Red Hat Hack Fallout
      Next Article Critical Password Reset Flaw in TheTruthSpy Spyware Exposes Victims to Hijacking

      Related Posts

      NASA Astronauts Use iPhones to Capture Historic Artemis II Mission Images

      April 8, 2026

      OpenAI Expands Influence With Strategic TBPN Media Acquisition

      April 8, 2026

      Cybersecurity Veteran Turns Focus To Drone Hacking After Decades Battling Malware

      April 6, 2026

      Anonymous Social App Surges In Saudi Arabia, Testing Limits Of Digital Freedom

      April 6, 2026
      Add A Comment
      Leave A Reply Cancel Reply

      Editors Picks

      NASA Astronauts Use iPhones to Capture Historic Artemis II Mission Images

      April 8, 2026

      OpenAI Expands Influence With Strategic TBPN Media Acquisition

      April 8, 2026

      Cybersecurity Veteran Turns Focus To Drone Hacking After Decades Battling Malware

      April 6, 2026

      Anonymous Social App Surges In Saudi Arabia, Testing Limits Of Digital Freedom

      April 6, 2026
      Popular Topics
      SpaceX Tim Cook Series A Series B Samsung Sundar Pichai Viral Robotics Startup Tesla Cybertruck Tesla Satya Nadella spotlight Quantum computing Ransomware Sam Altman Software UAE Tech trending Taiwan Tech
      Major Tech Companies
      • Apple News
      • Google News
      • Meta News
      • Microsoft News
      • Amazon News
      • Samsung News
      • Nvidia News
      • OpenAI News
      • Tesla News
      • AMD News
      • Anthropic News
      • Elbit News
      AI & Emerging Tech
      • AI Regulation News
      • AI Safety News
      • AI Adoption
      • Quantum Computing News
      • Robotics News
      Key People
      • Sam Altman News
      • Jensen Huang News
      • Elon Musk News
      • Mark Zuckerberg News
      • Sundar Pichai News
      • Tim Cook News
      • Satya Nadella News
      • Mustafa Suleyman News
      Global Tech & Policy
      • Israel Tech News
      • India Tech News
      • Taiwan Tech News
      • UAE Tech News
      Startups & Emerging Tech
      • Series A News
      • Series B News
      • Startup News
      Tallwire
      Facebook X (Twitter) LinkedIn Threads Instagram RSS
      • Tech
      • Entertainment
      • Business
      • Government
      • Academia
      • Transportation
      • Legal
      • Press Kit
      © 2026 Tallwire. Optimized by ARMOUR Digital Marketing Agency.

      Type above and press Enter to search. Press Esc to cancel.