Ransomware Strikes Again: Fortra GoAnywhere Vulnerability Exploited by Chinese Hackers!

Chinese ransomware group Storm-1175 turned Fortra GoAnywhere MFT into a zero-day buffet, exploiting a deserialization flaw for remote code execution. With a CVSS score of 10/10, this flaw was like a backstage pass to hacking heaven. Now, the only thing more elusive than the attackers’ private keys is Fortra’s updated advisory.

Pro Dashboard

Hot Take:

Oh, the drama! Fortra’s GoAnywhere MFT feels like it’s in a cyber episode of “Who Dunnit?” with a mysterious Chinese ransomware group, Storm-1175, stealing the show. The plot twist? It’s all about a tiny flaw that turned into a massive headache. If this were a blockbuster movie, it’d be called “The Zero-Day Exploitation: Rise of the Bugs.”

Key Points:

  • Fortra’s GoAnywhere MFT hit by a vulnerability tracked as CVE-2025-10035, with a perfect 10/10 CVSS score.
  • Chinese ransomware group Storm-1175 exploited it as a zero-day since September 11.
  • RCE achieved using forged license response signatures, deploying RMM tools and ransomware.
  • Fortra hasn’t updated its advisory despite evidence and warnings from cybersecurity firms.
  • Success of the exploitation hinges on attackers accessing a ‘serverkey1’ private key.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?