Medusa Mayhem: GoAnywhere MFT Vulnerability Sparks Ransomware Rampage!

Medusa ransomware is exploiting a CVSS 10.0 deserialization vulnerability in GoAnywhere MFT, granting attackers unauthenticated Remote Code Execution and system takeover. Despite a patch, exploitation began earlier, allowing attackers to persist and deploy ransomware. Organizations using GoAnywhere must patch immediately to avoid becoming the next unwilling guest of Medusa’s comedy of errors.

Pro Dashboard

Hot Take:

When you name your product “GoAnywhere,” you might want to clarify that it doesn’t include letting hackers go anywhere they want within your system. But hey, Fortra, at least you’re making headlines, right? Unfortunately, the Medusa ransomware group also RSVP’d to the party, and they’re bringing all their nasty tricks with them. Time to patch up those vulnerabilities, folks, unless you fancy hosting a cybercrime carnival!

Key Points:

  • Fortra’s GoAnywhere MFT solution has a CVSS 10.0 vulnerability actively exploited by Medusa ransomware.
  • The flaw allows unauthenticated Remote Code Execution (RCE) through a deserialization bug in the License Servlet.
  • Attackers have been exploiting this since September 10, 2025, prior to Fortra’s advisory and patch release.
  • Medusa ransomware group, tracked as Storm-1175, is deploying multi-stage attacks using the vulnerability.
  • Fortra urges immediate patching to version 7.8.4 or Sustain Release 7.6.3 to mitigate the risk.

License to Thrill: The Vulnerability That Could Take Over Your System

Fortra’s GoAnywhere Managed File Transfer (MFT) solution is suffering from a mid-life crisis, and it’s not pretty. A dangerous deserialization vulnerability, apparently rated a perfect 10 on the “Oh no, this is bad” scale, is now being exploited by the Medusa ransomware group. The flaw allows unauthenticated Remote Code Execution (RCE), which, in layman’s terms, means hackers can do whatever they want once they get inside. This vulnerability is lurking in the MFT’s License Servlet, which might as well have a neon sign saying “Hackers Welcome!” By forging a license response signature, attackers can bypass security checks, essentially opening the gate for malicious code to waltz right in. If your GoAnywhere instance is exposed to the internet, consider it a welcome mat for cybercriminals.

A Timeline to Make Your Head Spin

Fortra may have published an alert and patch on September 18, 2025, but it seems they were fashionably late to their party of panic. According to security researchers at watchTowr Labs, exploitation activity was detected as early as September 10, a whole eight days before Fortra’s advisory. Talk about being fashionably late! These crafty attackers didn’t stop at mere RCE; they went the whole nine yards. After achieving RCE, they established persistence by creating a stealthy admin account named ‘admin-go’ (because why not add a dash of irony?). Then, like cyber ninjas, they moved laterally, dropping binaries for legitimate Remote Monitoring and Management (RMM) tools like SimpleHelp and MeshAgent. Meanwhile, Fortra’s advisory section titled “Am I Impacted?” seemed to be a coy way of admitting to the whole mess without outright saying, “Oops, we goofed.”

Medusa Ransomware: Here to Add Drama and Chaos

As if things weren’t already exciting enough, Microsoft Threat Intelligence dropped a bombshell on October 6. They confirmed that a known cybercriminal group, Storm-1175, an affiliate of the Medusa ransomware, was actively targeting organizations since September 11. This multi-stage attack is like a really bad sequel you didn’t ask for. It started with exploiting the vulnerability for command injection and system discovery, then moved on to deploying RMM tools for persistent access. The grand finale? The successful deployment of Medusa ransomware in at least one compromised environment. Attackers also flaunted their tech-savvy skills by using data transfer tools like Rclone for data exfiltration and setting up Cloudflare tunnels for secure Command and Control (C2). WatchTowr CEO, Benjamin Harris, summed it up nicely by saying organizations using GoAnywhere MFT have been under “silent assault” since mid-September. Silent, but definitely not subtle.

The Urgent Call to Patch and Pray

Fortra isn’t just suggesting that users patch their systems; they’re practically begging. The vulnerability’s severe nature has landed it a spot in the CISA Known Exploited Vulnerabilities (KEV) Catalogue, which is basically the Hall of Fame for cybersecurity nightmares. Fortra has urgently advised customers to upgrade to version 7.8.4 or the Sustain Release 7.6.3. Failure to do so could mean more uninvited guests in your system. And given the confirmed exploitation activity, organizations with exposed systems should roll up their sleeves and dive into a full forensic review to check for any signs of compromise before the update was applied. Remember, the Medusa group isn’t known for sending “thank you” notes for easy access.

In conclusion, if you’re using GoAnywhere MFT, you might want to consider a name change to “GoNowhere” until you’ve patched things up. Cybersecurity is no joke, and the Medusa ransomware group is out here turning vulnerabilities into their own personal playground. Act fast, patch that software, and maybe, just maybe, you’ll keep the cybercriminals at bay. Stay safe out there!

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?