MONTH-LONG EXPLOITATION CONFIRMED
Category: Critical Infrastructure Cyberattack
Features: Managed file transfer vulnerability exploitation, lateral movement, ransomware deployment, delayed disclosure
Delivery Method: CVE-2025-10035 zero-day in +Fortra +GoAnywhere MFT, remote access via SimpleHelp and MeshAgent tools
Threat Actor: Storm-1175 (Medusa Ransomware Group) — financially motivated, post-access extortion
Fortra’s managed file transfer platform GoAnywhere MFT has become the latest vector in a coordinated ransomware surge now tied to the Medusa strain — a group with confirmed attacks on over 300 global entities since 2021.
Microsoft’s threat intelligence unit published its findings this week, confirming active exploitation of CVE-2025-10035, a critical remote execution vulnerability in GoAnywhere.
According to Microsoft, exploitation began September 11 — the very same day Fortra claims it “discovered” the flaw internally. Evidence now shows adversaries had already gained access before public disclosure, establishing footholds across financial, educational, and government networks through public-facing application abuse and lateral movement tools such as SimpleHelp and MeshAgent.
“The impact of CVE-2025-10035 is amplified by the fact that attackers could perform system and user discovery, maintain long-term access, and deploy additional tools for lateral movement and malware,” Microsoft noted.
Despite these red flags, Fortra delayed confirmation of active exploitation until third-party security firms began raising alarms. watchTowr Labs, led by CEO Benjamin Harris, confirmed “silent assault” patterns weeks before CISA’s official directive, stating:
“Organizations running the file transfer tool have effectively been under silent assault since at least September 11, with little clarity from Fortra.”
CISA’s Binding Operational Directive (BOD) has now ordered all federal civilian agencies to patch or disconnect affected instances by October 20 — a rare move that signals the severity of the breach window.
THREAT ANALYSIS
Malware: Medusa Ransomware
First Observed: 2021
Variants: MedusaLocker, MedusaBlog leak portal
Capabilities: AES/RSA encryption, lateral movement via RMM tools, data exfiltration and timed release blackmail
Targets: Education, government, financial services, healthcare, municipalities
The Medusa group, operating through its Storm-1175 alias, is notorious for dual-extortion tactics — encrypting systems and threatening public data leaks on its dedicated leak site MedusaBlog. It has previously attacked Minneapolis Public Schools, exposing personal data of more than 100,000 individuals; Tonga’s national networks; and government agencies in France, the Philippines, and Canada.
The ransomware’s re-emergence through Fortra GoAnywhere underscores a dangerous pattern: attackers exploiting trusted enterprise infrastructure rather than consumer endpoints.
By hijacking a file-transfer platform designed for secure data exchange, threat actors effectively turned compliance software into an infection pipeline.
INFRASTRUCTURE AT RISK
GoAnywhere’s client base includes hospitals, banks, and supply chain vendors dependent on automated data exchange. Successful exploitation gives attackers a direct bridge into environments otherwise isolated by policy firewalls. Once inside, they can deploy PowerShell loaders, initiate network reconnaissance, and spread encrypted payloads laterally without triggering standard antivirus heuristics.
Microsoft observed SimpleHelp RMM being leveraged post-access to bypass EDR tools, execute shell commands, and install persistence scripts disguised as legitimate maintenance utilities.
POLICY AND CORPORATE ACCOUNTABILITY
Fortra’s refusal to disclose exploitation timelines — or how attackers obtained the private keys used in the intrusion — has reignited debates about vendor transparency laws.
Security analysts warn that delayed disclosure is no longer negligence; it’s a national security hazard, especially when vulnerabilities in compliance software provide adversaries with silent entry points into federal systems.
Industry experts are now urging Congress to mandate disclosure windows of under 72 hours for exploited vulnerabilities in enterprise platforms — a standard already seen in EU and Australian cyber policy but not yet codified in U.S. law.
FORECAST — 30 DAYS
- ↑ Ongoing Exploitation: Additional attacks leveraging the same CVE expected through unpatched third-party vendors.
- ↑ Supply-Chain Exposure: Managed IT providers using GoAnywhere likely already compromised.
- ↔ Copycat Activity: Other ransomware groups (Akira, LockBit) likely to adopt similar methods.
- ↓ Vendor Trust: Fortra reputation damage may trigger migration to competing platforms by Q1 2026.
- ↑ Sector Impact: Expect new advisories from financial and education regulators by late October.
TRJ VERDICT
This isn’t a breach — it’s an ecosystem failure.
When the very tools designed to transfer sensitive data become conduits for extortion, trust collapses at the protocol level. Fortra’s silence gave Storm-1175 a one-month lead time — long enough to establish persistence in networks that may still not know they’re compromised.
The Medusa operation continues to prove that ransomware isn’t just a criminal enterprise; it’s a market mechanism exploiting corporate negligence and communication delay. Until patch transparency becomes law, every managed service is a potential Trojan horse.
TRJ will continue monitoring telemetry from Microsoft, CISA, and independent SOCs to track new Medusa variants or secondary exploitation linked to CVE-2025-10035.
🔥 NOW AVAILABLE! 🔥
📖 INK & FIRE: BOOK 1 📖
A bold and unapologetic collection of poetry that ignites the soul. Ink & Fire dives deep into raw emotions, truth, and the human experience—unfiltered and untamed.
🔥 Kindle Edition 👉 https://a.co/d/9EoGKzh
🔥 Paperback 👉 https://a.co/d/9EoGKzh
🔥 Hardcover Edition 👉 https://a.co/d/0ITmDIB
🔥 NOW AVAILABLE! 🔥
📖 INK & FIRE: BOOK 2 📖
A bold and unapologetic collection of poetry that ignites the soul. Ink & Fire dives deep into raw emotions, truth, and the human experience—unfiltered and untamed just like the first one.
🔥 Kindle Edition 👉 https://a.co/d/1xlx7J2
🔥 Paperback 👉 https://a.co/d/a7vFHN6
🔥 Hardcover Edition 👉 https://a.co/d/efhu1ON
Get your copy today and experience poetry like never before. #InkAndFire #PoetryUnleashed #FuelTheFire
🚨 NOW AVAILABLE! 🚨
📖 THE INEVITABLE: THE DAWN OF A NEW ERA 📖
A powerful, eye-opening read that challenges the status quo and explores the future unfolding before us. Dive into a journey of truth, change, and the forces shaping our world.
🔥 Kindle Edition 👉 https://a.co/d/0FzX6MH
🔥 Paperback 👉 https://a.co/d/2IsxLof
🔥 Hardcover Edition 👉 https://a.co/d/bz01raP
Get your copy today and be part of the new era. #TheInevitable #TruthUnveiled #NewEra
🚀 NOW AVAILABLE! 🚀
📖 THE FORGOTTEN OUTPOST 📖
The Cold War Moon Base They Swore Never Existed
What if the moon landing was just the cover story?
Dive into the boldest investigation The Realist Juggernaut has ever published—featuring declassified files, ghost missions, whistleblower testimony, and black-budget secrets buried in lunar dust.
🔥 Kindle Edition 👉 https://a.co/d/2Mu03Iu
🛸 Paperback Coming Soon
Discover the base they never wanted you to find. TheForgottenOutpost #RealistJuggernaut #MoonBaseTruth #ColdWarSecrets #Declassified


“GoAnywhere’s client base includes hospitals, banks, and supply chain vendors dependent on automated data exchange.”
These targets are big hitters in our world and need adequate protections. Once again you are exposing corporate negligence and communication delay, John. It sounds to me that the patch transparency you mention needs to become law as soon as possible.
Thank you for this report.
You’re exactly right, Chris — those sectors are the backbone of modern infrastructure, and their exposure shows just how fragile the chain really is.
Corporate silence in moments like this isn’t strategy — it’s negligence disguised as caution. You nailed it: patch transparency should be law. The longer companies hide behind PR, the more time attackers get to weaponize delay.
Thank you very much, Chris — always greatly appreciated. 😎
You’re welcome, John, and thank you for your reply. I like your idea to make patch transparency law. It’s too bad it has to come to that but if these important companies don’t clean up their acts, someone has to make them.