Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Samsung showed me its secret HDR10+ Advanced TV samples – and I’m almost sold

    November 8, 2025

    Starbucks barista’s side hustle brings in $1 million a month

    November 8, 2025

    A new Chinese AI model claims to outperform GPT-5 and Sonnet 4.5 – and it’s free

    November 8, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Critical Gony Bug exploited in ransomware attacks
    Security

    Critical Gony Bug exploited in ransomware attacks

    PineapplesUpdateBy PineapplesUpdateOctober 6, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Critical Gony Bug exploited in ransomware attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Critical Gony Bug exploited in ransomware attacks

    A cybercrime group, which was tracked as Storm -1175, is exploiting MFT vulnerability with maximum severity in the Medusa ransomware attacks for approximately a month.

    Tracked Cve-2025-10035This security defect affects Fortra’s web-based safe transfer goanywhere MFT tool, which is caused by one Deserialization of incredible data weakness In the license serve. This vulnerability can be exploited from far away in low-complications attacks, which do not require user interactions.

    Security analysts are now monitoring in Shadowsers Foundation More than 500 GoanyWhere MFT Examples Online exposed, although it is not clear how many already patches have been patches.

    While Fortra picked the vulnerability on 18 September without mentioning active exploitation, the security researchers at Watchtower Labs tagged it as an exploitation in the wild, after receiving “reliable evidence” that the CVE-2025–10035 was benefited from 10 September as a zero-day.

    Exploited in Medusa ransomware attacks

    Today, Microsoft confirmed the report of the Watchtower Labs, stating that a known medusa ransomware is affiliated as it tracks as Hurricane -1175, at least from September 11, 2025, has been exploiting this vulgarity in attacks since September 11, 2025.

    “Microsoft defender researchers identified exploitation activity in many organizations, which are associated with strategy, techniques and procedures (TTPs), who are responsible for Hurricane -1175,” Microsoft said,

    “For the initial access, the danger actor exploited the then zero-day disorganization vulnerability at the Goyni MFT. To maintain firmness, he misused Remote Monitoring and Management (RMM) tools, especially simplyhalp and meshant.”

    In the next stage of the attack, ransomware affiliated launched RMM binergies, used netscan for network reconnaissance, executed commands for user and system discovery, and later transferred in several systems using the microsoft remote desktop client client (MTSC.EXE) through the agreement entered into several systems.

    During the attack, he deployed RCLONE in at least one victim’s environment to exfiltrate the stolen files and deployed the Medusa Ransomware payload to encrypse the files of the victims.

    In March, CISA issued a joint advice with FBI and Multi-State Information Sharing and Analysis Center (MS-Isac), warning that the Medusa ransomware operation affected over 300 important infrastructure organizations across the United States.

    Along with three other cybercrime gangs, Storm -1175 Threat Group was also added to Microsoft in July 2024 to exploit a VMWARE ESXI authentication bypass vulnerability in July 2024, which led to the deployment of Akira and Black Basta Rainmware.

    Targeting its Goanywhere MFT server to defend against the Medusa ransomware attacks, Microsoft and Fortra advised admins to upgrade the latest versions. Fortra also asked the customers to determine whether the institutions have been affected, to determine to inspect your log files for stack trace errors with signedobject.getobject string.


    Picus Base Summit

    attend Violation and attack simulation summit And experience Future of security verificationListen to top experts and see how AI-managed base Breach is changing and attacking simulation.

    Do not remember the event that will shape the future of your safety strategy

    attacks Bug Critical exploited Gony Ransomware
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleOkosix Techcrunch will show your biodegradable plastic in 2025
    Next Article Openai launched the app inside the chat
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    Windows 11 users affected by bizarre Task Manager duplication bug – here’s how to avoid it

    October 31, 2025
    Startups

    No one pays ransomware demands anymore – so attackers have a new target

    October 28, 2025
    Security

    Your Uber driver has a new endeavor: training an AI for cash

    October 18, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    Samsung showed me its secret HDR10+ Advanced TV samples – and I’m almost sold

    November 8, 2025

    Starbucks barista’s side hustle brings in $1 million a month

    November 8, 2025

    A new Chinese AI model claims to outperform GPT-5 and Sonnet 4.5 – and it’s free

    November 8, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.