The GoAnywhere data breach explained
How a zero-day vulnerability in Fortra’s GoAnywhere MFT product led to breaches of high-profile firms across the globe
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
In February 2023, security researchers uncovered a zero-day vulnerability affecting GoAnywhere MFT, a secure file transfer service sold by GoAnywhere parent company Fortra.
Threat actors have since abused the flaw to breach several large organizations. The ransomware group Cl0p has taken credit for attacks on over 130 companies through the vulnerability, including Hitachi Energy, Proctor and Gamble, and Rubrik.
In a change of pattern for the group, Cl0p did not follow a double extortion method for these attacks, nor did it appear to leave a locker - malware that locks user files or their entire device until a ransom is paid to hackers.
Information on the exact ransoms demanded of Cl0p’s victims in this campaign has been scarce.
Although the vulnerability was patched quickly after it was made public, many firms fail to promptly apply updates following security disclosures. This means that attacks continued to rise, and many businesses may still be vulnerable.
GoAnywhere data breach: Timeline of events
After uncovering evidence of suspicious activity in GoAnywhere MFT in January 2023, Fortra opened an investigation. On 1 February, the firm then made a disclosure available to its users, which was placed behind a login screen.
The information was not available to the wider public and still isn’t via the company’s official channels.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Information about the issue was slowly disseminated throughout the industry via external reports. It was first brought to light by security expert Brian Krebs who copied Fortra’s advisory to a Mastodon instance.
Using details from the advisory, proof of concept exploit code was developed and later circulated a day before Fortra could issue a patch for the vulnerability on 7 February. Researchers from CloudSEK said at the time there were “thousands” of GoAnywhere admin panels that were vulnerable according to a Shodan scan indexing them running on port 8000.
GoAnywhere data breach: Zero-day vulnerability details
The exploited vulnerability in GoAnywhere MFT tracked as CVE-2023-0669, is a remote code execution (RCE) flaw - one of the most severe and damaging types of security weakness. Attackers can abuse these vulnerabilities to run code, execute malware, steal data, and more - all without needing physical access to the targeted systems.
The vulnerability is a deserialisation bug which is exploited by sending a post request to the endpoint at ‘/goanywhere/lic/accept’, CloudSEK says. There is also a module already in the Metasploit hacking tool allowing for much easier exploitation.
The vulnerability can only be exploited through a compromised admin console, Fortra says, but its web client interface itself isn’t exploitable - just the admin interface. In most cases, such access can only be achieved from within a company, remotely via a company virtual private network (VPN), or by allow-listed IP addresses. Fortra advised any of its customers to work with its customer service team if they believe their consoles were exposed to the public internet.
GoAnywhere customers were also advised to audit all admin users within the organisation and check for unrecognised usernames. Rapid7 suggested this piece of advice could signal that Fortra had noticed follow-on activity from real-world exploits that could have seen attackers creating new admin users to maintain persistence on targeted machines.
The other mitigation measure in Fortra’s advisory instructed users to remove a servlet and servlet-mapping configuration on the file system where GoAnywhere MFT is installed. Full details can be found in Krebs’ post.
GoAnywhere data breach: What organizations became victims?
Cyber security firm Rubrik was among the first to reveal it had been breached via exploitation of the GoAnwhere vulnerability.
It did not comment on whether ransomware was involved in the incident. Cl0p published a score of data belonging to the company on its dark web blog which appeared to include details of partner and customer business names, contact information, and purchase orders - an observation later confirmed in a public disclosure.
Hitachi Energy was another to confirm it was one of the circa 130 victims from Cl0p’s attacks. It said in a public advisory that the attack “could have resulted in unauthorized access to employee data in some countries”. The multinational energy firm employs 40,000 people across 90 countries and generates business volumes of around $10 billion.
Australia’s largest gambling company, Crown Resorts, also confirmed it was impacted and that “a small number of files” were stolen. These included employee attendance records and some membership numbers from its Crown Sydney resort.
Employee data from the UK’s Pension Protection Fund (PPF) was also stolen, though it was quick to confirm that no pension details were involved. It did, however, say that Fortra initially misled the organization about the nature of the incident, originally telling it that no data was taken. In response, the PPF “immediately” stopped using the company’s services.
The list of other high-profile victims includes Proctor and Gamble, the City of Toronto, Virgin Red, Axis Bank, the Tasmanian government, Saks Fith Avenue, Hatch Bank, and Investissement Québec.
GoAnywhere data breach: Who is behind the attacks?
Cl0p claimed a number of attacks that made use of the GoAnywhere vulnerability. The ransomware outfit offers its own eponymous ransomware payload through its affiliate program.
RELATED RESOURCE
Trend Micro security predictions for 2023
Prioritise cyber security strategies on capabilities rather than costs
Run as a ransomware as a service (RaaS) operation, Russia-based Cl0p is known for using double extortion tactics.
According to the Secureworks Counter Threat Unit (CTU), the threat actors behind the 130-organization attack have been attributed to Gold Tahoe, also tracked as TA505 and Dudear by other security firms.
NCC Group stated that the group has actively used Cl0p ransomware since at least 2019, and has additionally run its own RaaS and malware distribution operations.
Gold Tahoe is also responsible for the exploits of vulnerabilities in Accellion FTA in 2021, which impacted major organizations such as Morgan Stanley.
The 91 victims posted to Cl0p’s leak site in March 2023 accounted for more than 65% of all victims claimed by the ransomware group between August 2020 and February 2023, Secureworks CTU says.
Cl0p ransomware has been around since 2019 and has been involved in attacks on major organizations. Attribution of ransomware organizations is often difficult to do with certainty, but Cybereason says is “most likely based in Russia – which has a history of tacitly supporting cybercriminals with state-condoned and state-ignored attacks”.
In April, Microsoft linked a series of attacks on print management software company PaperCut to Cl0p, with similarities in the vulnerabilities exploited in both cases as well as Cl0p’s changing methodology.

Connor Jones has been at the forefront of global cyber security news coverage for the past few years, breaking developments on major stories such as LockBit’s ransomware attack on Royal Mail International, and many others. He has also made sporadic appearances on the ITPro Podcast discussing topics from home desk setups all the way to hacking systems using prosthetic limbs. He has a master’s degree in Magazine Journalism from the University of Sheffield, and has previously written for the likes of Red Bull Esports and UNILAD tech during his career that started in 2015.
-
Tomorrow's fraud techniquesITPro Podcast Leaders need to proactive as attackers launch more consistent, sophisticated attacks
-
Met Office hails huge efficiency gains in first year of cloud supercomputing with Microsoft AzureNews In moving to the cloud, the Met Office has bolstered operational resilience and helped to deliver more accurate forecasts
-
The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in lifeNews With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion
-
Security agencies issue warning over critical Cisco Catalyst SD-WAN vulnerabilityNews Threat actors have been exploiting the vulnerability to achieve root access since 2023
-
Millions of developers could be impacted by flaws in Visual Studio Code extensions – here's what you need to know and how to protect yourselfNews The VS Code vulnerabilities highlight broader IDE security risks, said OX Security
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
CVEs are set to top 50,000 this year, marking a record high – here’s how CISOs and security teams can prepare for a looming onslaughtNews While the CVE figures might be daunting, they won't all be relevant to your organization
-
Microsoft patches six zero-days targeting Windows, Word, and more – here’s what you need to knowNews Patch Tuesday update targets large number of vulnerabilities already being used by attackers
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites