Overview
- Fortra released fixes in GoAnywhere 7.8.4 and Sustain 7.6.3, shared limited indicators of compromise, and urged customers to keep the Admin Console off the public internet.
- watchTowr reports credible evidence of exploitation beginning on September 10, eight days before Fortra’s September 18 advisory, indicating zero-day use.
- Observed intrusions used pre-authentication remote code execution to create a backdoor admin account named “admin-go,” add a web user, and deploy payloads such as SimpleHelp and “zato_be.exe.”
- Rapid7 says the issue is a multi-step chain involving a known access-control bypass, the unsafe deserialization (CVE-2025-10035), and a required private key (“serverkey1”) that researchers have not located.
- Researchers estimate more than 20,000 GoAnywhere instances are internet-exposed; defenders are urged to upgrade immediately, restrict exposure, and hunt logs for strings like “SignedObject.getObject.”