Medusa ransomware used during exploitation of GoAnywhere file transfer bug, Microsoft says

Cybercriminals are using the Medusa ransomware strain during exploitation of a vulnerability in a popular file transfer tool recently highlighted by federal cybersecurity officials. 

Microsoft published a report on Monday analyzing exploitation activity in multiple organizations involving CVE-2025-10035 — a critical vulnerability in Fortra’s GoAnywhere managed file transfer solution.

The researchers attributed the activity to a cybercriminal group they call Storm-1175, noting that the threat actors are known for deploying the Medusa ransomware and for exploiting public-facing applications for initial access. 

“The impact of CVE-2025-10035 is amplified by the fact that, upon successful exploitation, attackers could perform system and user discovery, maintain long-term access, and deploy additional tools for lateral movement and malware,” the company said.

After using the vulnerability for initial access, the hackers used the remote monitoring and management tools SimpleHelp and MeshAgent before moving laterally across systems within the compromised network. 

The researchers said they saw the successful deployment of Medusa ransomware in one compromised environment.

Fortra initially warned the public about the bug on September 18, saying they discovered it the week before, but the company has continually declined to say if they are aware of it being exploited by cybercriminals. According to Microsoft, exploitation was observed on September 11, the same day Fortra said they discovered the bug. 

Last week, the Cybersecurity and Infrastructure Security Agency (CISA) also confirmed that the vulnerability has been exploited and ordered all federal civilian agencies to patch the bug by October 20. 

For weeks prior to CISA’s notice, cybersecurity experts at the security firm watchTowr warned GoAnywhere users that the vulnerability was being exploited. Company CEO Benjamin Harris told Recorded Future News that organizations running the file transfer tool “have effectively been under silent assault since at least September 11, with little clarity from Fortra.” 

Fortra did not respond to requests for comment. 

“Microsoft’s confirmation now paints a pretty unpleasant picture — exploitation, attribution, and a month-long head start for the attackers,” Harris said. “What’s still missing are the answers only Fortra can provide. How did threat actors get the private keys needed to exploit this? Why were organizations left in the dark for so long?” 

The Medusa ransomware has been used to attack more than 300 organizations in critical infrastructure sectors since emerging in 2021, according to CISA and the FBI

Medusa drew widespread attention in 2023 for an attack on Minneapolis Public Schools that exposed troves of sensitive student documents impacting more than 100,000 people. 

In addition to attacks on the Pacific island nation of Tonga, it has targeted municipalities in France and government agencies in the Philippines as well as a technology company created by two of Canada’s largest banks. 

Government bodies in Illinois and Texas have also been affected by the group’s attacks. The group most recently took credit for an attack on NASCAR

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

FBI, UK gov’t urge orgs to patch Oracle E-Business vuln after alleged Clop campaign

Next Post

Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks

Related Posts

Learn How Leading Security Teams Blend AI + Human Workflows (Free Webinar)

AI is changing automation—but not always for the better. That’s why we’re hosting a new webinar, "Workflow Clarity: Where AI Fits in Modern Automation," with Thomas Kinsella, Co-founder & Chief Customer Officer at Tines, to explore how leading teams are cutting through the hype and building workflows that actually deliver.The rise of AI has changed how organizations think about automation.
Read More

Fortra Releases Critical Patch for CVSS 10.0 GoAnywhere MFT Vulnerability

Fortra has disclosed details of a critical security flaw in GoAnywhere Managed File Transfer (MFT) software that could result in the execution of arbitrary commands. The vulnerability, tracked as CVE-2025-10035, carries a CVSS score of 10.0, indicating maximum severity. "A deserialization vulnerability in the License Servlet of Fortra's GoAnywhere MFT allows an actor with a validly forged
Read More

Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362

Cisco on Wednesday disclosed that it became aware of a new attack variant that's designed to target devices running Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software releases that are susceptible to CVE-2025-20333 and CVE-2025-20362. "This attack can cause unpatched devices to unexpectedly reload, leading to denial-of-service
Read More