Urgent Security Alert! Ransomware Attacks Exploiting Critical GoAnywhere MFT Vulnerability
I was truly surprised to hear this news! 😱 A severe security vulnerability (CVE-2025-10035) discovered in GoAnywhere MFT is reportedly being exploited by the ransomware group 'Storm-1175'. With over 500 instances still exposed to risk, it's crucial to exercise extreme caution.

Hello everyone! Today, I bring you some incredibly important security news. Microsoft recently issued a warning about a highly critical security vulnerability discovered in their GoAnywhere Managed File Transfer (MFT) product, and I was quite taken aback when I learned about it.
What's the Issue with GoAnywhere MFT?
Found this article helpful?
Never miss insights like this - delivered every morning
The vulnerability in question has been designated CVE-2025-10035. It's described as a 'deserialization vulnerability' found in the License Servlet component of GoAnywhere MFT. This vulnerability has received a perfect score of 10 out of 10, indicating it is 'critical'. 🚨
Despite Fortra discovering this vulnerability and promptly releasing a patch, reports from security researchers indicate that the ransomware group known as 'Storm-1175' is already actively exploiting it. 😲
What is the 'Storm-1175' Ransomware Group Targeting?
This vulnerability allows even unauthenticated attackers to execute code remotely. This essentially means that attackers can infiltrate systems, deploy malicious code, encrypt data, and demand ransom. 😱
Indeed, it has been confirmed that the 'Medusa' ransomware has been deployed through this vulnerability in at least one attack case. This is truly frightening, isn't it?
Over 500 Instances Still at Risk of Exposure!
Microsoft emphasized that even though a patch for this vulnerability was released on September 18th, over 500 GoAnywhere MFT instances remain exposed to this risk. This serves as a strong warning to immediately apply the patch or, at the very least, implement other security measures. ⏳
If you haven't applied the patch yet, it's crucial to check for and install the update immediately. If your organization uses GoAnywhere MFT, we strongly recommend contacting your security team right away for an assessment!
What Can We Do?
This incident once again highlights the importance of promptly applying the latest security patches. Furthermore, organizations must enhance regular security checks and monitoring for critical systems like file transfer solutions.
Are you using GoAnywhere MFT in your work environment? Or how do you typically prepare for such security issues? Please share your thoughts and experiences in the comments!
To ensure a safe digital environment for everyone, it's important to maintain consistent attention to security. Have a safe day today! 😊