Microsoft Threat Intelligence has formally attributed the exploitation of a maximum-severity vulnerability in Fortra's GoAnywhere Managed File Transfer (MFT) solution to the financially motivated threat group Storm-1175. The vulnerability, tracked as CVE-2025-10035, is a deserialization flaw that allows for unauthenticated remote code execution (RCE) and has been assigned a CVSS score of 10.0. Storm-1175, the operator behind the Medusa ransomware, has been actively exploiting this flaw as a zero-day since mid-September 2025. The group uses the initial access to deploy backdoors, exfiltrate data, and ultimately encrypt victim networks, posing a critical threat to users of the affected software.
The attack targets GoAnywhere MFT, a popular enterprise solution for secure file transfers. The CVE-2025-10035 vulnerability allows an attacker to achieve a full system compromise without any authentication. Storm-1175 has weaponized this flaw to breach organizations across multiple sectors, including finance, healthcare, and technology. Their attack chain is methodical: gain access via the exploit, establish persistence using legitimate Remote Monitoring and Management (RMM) tools, move laterally, exfiltrate sensitive data, and then deploy the Medusa ransomware for double extortion. This follows a pattern of ransomware groups targeting MFT solutions, which are high-value targets due to the sensitive data they process and store.
CVE-2025-10035 is a deserialization vulnerability. An attacker can craft a malicious payload and send it to the server, disguised as a valid license response. When the server deserializes this malicious object, it leads to arbitrary code execution with the privileges of the GoAnywhere MFT service. This provides a direct path to system compromise.
Once inside, Storm-1175's post-exploitation TTPs include:
SimpleHelp and MeshAgent, and placing JSP backdoors in GoAnywhere web directories.Rclone utility to copy large amounts of sensitive data to attacker-controlled cloud storage.T1210 - Exploitation of Remote Services: Specifically targeting the vulnerable GoAnywhere MFT service.T1203 - Exploitation for Client Execution: The core of the attack, leveraging a deserialization flaw.T1219 - Remote Access Software: Using SimpleHelp and MeshAgent for persistent C2.T1572 - Protocol Tunneling: RDP used for lateral movement.T1567.002 - Exfiltration to Cloud Storage: Using Rclone to steal data.T1486 - Data Encrypted for Impact: The final payload delivery of Medusa ransomware.A CVSS 10.0 vulnerability in a widely used MFT solution represents a worst-case scenario for affected organizations. Successful exploitation grants attackers complete control over a system designed to handle a company's most sensitive data transfers. The consequences include immediate data breach, massive operational disruption from ransomware, significant financial costs for recovery and potential ransom payments, and severe reputational damage. The targeting of finance and healthcare sectors raises the stakes, with potential for regulatory penalties under frameworks like HIPAA and GLBA.
| Type | Value | Description |
|---|---|---|
| file_name | SimpleHelp.exe, MeshAgent.exe |
Presence of these legitimate RMM tools in unexpected locations or on MFT servers. |
| file_name | *.jsp |
Look for newly created or modified JSP files in the GoAnywhere web directories, which could be backdoors. |
| process_name | rclone.exe |
The execution of the Rclone tool on servers is a major red flag for data exfiltration. |
| network_traffic_pattern | Connections to mega.nz, pcloud.com |
Rclone is often configured to exfiltrate data to these and other cloud storage providers. |
| log_source | GoAnywhere MFT Audit Logs |
Review for anomalous license update activities or errors that could indicate an exploit attempt. |
Network Traffic Analysis (D3-NTA) to spot anomalous connections.Rclone, SimpleHelp, or MeshAgent.Process Analysis (D3-PA).Software Update (D3-SU).Inbound Traffic Filtering (D3-ITF).Rclone and RMM tools on MFT servers.Apply the patch from Fortra (version 7.8.4) to remediate the vulnerability.
Mapped D3FEND Techniques:
Restrict network access to the GoAnywhere MFT administrative interface.
Mapped D3FEND Techniques:
Implement egress filtering to block connections to unauthorized cloud storage providers.
Mapped D3FEND Techniques:
Use application control to prevent unauthorized tools like Rclone from running on MFT servers.
Mapped D3FEND Techniques:
The immediate and most crucial action for all organizations using Fortra's GoAnywhere MFT is to upgrade to the patched version 7.8.4 or later. Given the 10.0 CVSS score and active exploitation by a known ransomware group, this should be treated as an emergency change. Prioritize patching on internet-facing systems immediately. After patching, it is vital to verify the update was successful and then to initiate a threat hunt for any signs of compromise that may have occurred prior to the patch being applied, as exploitation was observed in the wild before the patch was widely available. Maintaining an aggressive patch management cycle for critical, internet-exposed infrastructure like MFT solutions is non-negotiable in the current threat environment.
Implement strict outbound traffic filtering (egress filtering) on the firewalls protecting GoAnywhere MFT servers. The default policy should be to deny all outbound connections. Explicit allow rules should then be created only for known, legitimate business destinations. This countermeasure is highly effective at disrupting the Storm-1175 attack chain, specifically the data exfiltration phase using Rclone. By blocking connections to common cloud storage providers (e.g., Mega, pCloud, etc.) and other non-essential internet services, you can prevent attackers from stealing data, which is a precursor to the Medusa ransomware deployment. This forces the attacker's C2 and exfiltration tools to fail, generating noise that can be detected by network monitoring systems.
On the servers hosting GoAnywhere MFT, deploy application allowlisting technologies like AppLocker. This hardens the system by preventing the execution of any unauthorized software. In the context of this attack, it would block Storm-1175 from running post-exploitation tools such as Rclone.exe, SimpleHelp.exe, and MeshAgent.exe. The allowlist should be configured in a 'default deny' mode, only permitting the core GoAnywhere MFT binaries and essential operating system processes to run. This effectively neutralizes the attacker's ability to establish persistence with RMM tools or use utilities for data exfiltration, forcing them to rely on more complex and potentially easier-to-detect living-off-the-land binaries and scripts.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats