The GoAnywhere data breach explained
How a zero-day vulnerability in Fortra’s GoAnywhere MFT product led to breaches of high-profile firms across the globe


In February 2023, security researchers uncovered a zero-day vulnerability affecting GoAnywhere MFT, a secure file transfer service sold by GoAnywhere parent company Fortra.
Threat actors have since abused the flaw to breach several large organizations. The ransomware group Cl0p has taken credit for attacks on over 130 companies through the vulnerability, including Hitachi Energy, Proctor and Gamble, and Rubrik.
In a change of pattern for the group, Cl0p did not follow a double extortion method for these attacks, nor did it appear to leave a locker - malware that locks user files or their entire device until a ransom is paid to hackers.
Information on the exact ransoms demanded of Cl0p’s victims in this campaign has been scarce.
Although the vulnerability was patched quickly after it was made public, many firms fail to promptly apply updates following security disclosures. This means that attacks continued to rise, and many businesses may still be vulnerable.
GoAnywhere data breach: Timeline of events
After uncovering evidence of suspicious activity in GoAnywhere MFT in January 2023, Fortra opened an investigation. On 1 February, the firm then made a disclosure available to its users, which was placed behind a login screen.
The information was not available to the wider public and still isn’t via the company’s official channels.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Information about the issue was slowly disseminated throughout the industry via external reports. It was first brought to light by security expert Brian Krebs who copied Fortra’s advisory to a Mastodon instance.
Using details from the advisory, proof of concept exploit code was developed and later circulated a day before Fortra could issue a patch for the vulnerability on 7 February. Researchers from CloudSEK said at the time there were “thousands” of GoAnywhere admin panels that were vulnerable according to a Shodan scan indexing them running on port 8000.
GoAnywhere data breach: Zero-day vulnerability details
The exploited vulnerability in GoAnywhere MFT tracked as CVE-2023-0669, is a remote code execution (RCE) flaw - one of the most severe and damaging types of security weakness. Attackers can abuse these vulnerabilities to run code, execute malware, steal data, and more - all without needing physical access to the targeted systems.
The vulnerability is a deserialisation bug which is exploited by sending a post request to the endpoint at ‘/goanywhere/lic/accept’, CloudSEK says. There is also a module already in the Metasploit hacking tool allowing for much easier exploitation.
The vulnerability can only be exploited through a compromised admin console, Fortra says, but its web client interface itself isn’t exploitable - just the admin interface. In most cases, such access can only be achieved from within a company, remotely via a company virtual private network (VPN), or by allow-listed IP addresses. Fortra advised any of its customers to work with its customer service team if they believe their consoles were exposed to the public internet.
GoAnywhere customers were also advised to audit all admin users within the organisation and check for unrecognised usernames. Rapid7 suggested this piece of advice could signal that Fortra had noticed follow-on activity from real-world exploits that could have seen attackers creating new admin users to maintain persistence on targeted machines.
The other mitigation measure in Fortra’s advisory instructed users to remove a servlet and servlet-mapping configuration on the file system where GoAnywhere MFT is installed. Full details can be found in Krebs’ post.
GoAnywhere data breach: What organizations became victims?
Cyber security firm Rubrik was among the first to reveal it had been breached via exploitation of the GoAnwhere vulnerability.
It did not comment on whether ransomware was involved in the incident. Cl0p published a score of data belonging to the company on its dark web blog which appeared to include details of partner and customer business names, contact information, and purchase orders - an observation later confirmed in a public disclosure.
Hitachi Energy was another to confirm it was one of the circa 130 victims from Cl0p’s attacks. It said in a public advisory that the attack “could have resulted in unauthorized access to employee data in some countries”. The multinational energy firm employs 40,000 people across 90 countries and generates business volumes of around $10 billion.
Australia’s largest gambling company, Crown Resorts, also confirmed it was impacted and that “a small number of files” were stolen. These included employee attendance records and some membership numbers from its Crown Sydney resort.
Employee data from the UK’s Pension Protection Fund (PPF) was also stolen, though it was quick to confirm that no pension details were involved. It did, however, say that Fortra initially misled the organization about the nature of the incident, originally telling it that no data was taken. In response, the PPF “immediately” stopped using the company’s services.
The list of other high-profile victims includes Proctor and Gamble, the City of Toronto, Virgin Red, Axis Bank, the Tasmanian government, Saks Fith Avenue, Hatch Bank, and Investissement Québec.
GoAnywhere data breach: Who is behind the attacks?
Cl0p claimed a number of attacks that made use of the GoAnywhere vulnerability. The ransomware outfit offers its own eponymous ransomware payload through its affiliate program.
RELATED RESOURCE
Trend Micro security predictions for 2023
Prioritise cyber security strategies on capabilities rather than costs
Run as a ransomware as a service (RaaS) operation, Russia-based Cl0p is known for using double extortion tactics.
According to the Secureworks Counter Threat Unit (CTU), the threat actors behind the 130-organization attack have been attributed to Gold Tahoe, also tracked as TA505 and Dudear by other security firms.
NCC Group stated that the group has actively used Cl0p ransomware since at least 2019, and has additionally run its own RaaS and malware distribution operations.
Gold Tahoe is also responsible for the exploits of vulnerabilities in Accellion FTA in 2021, which impacted major organizations such as Morgan Stanley.
The 91 victims posted to Cl0p’s leak site in March 2023 accounted for more than 65% of all victims claimed by the ransomware group between August 2020 and February 2023, Secureworks CTU says.
Cl0p ransomware has been around since 2019 and has been involved in attacks on major organizations. Attribution of ransomware organizations is often difficult to do with certainty, but Cybereason says is “most likely based in Russia – which has a history of tacitly supporting cybercriminals with state-condoned and state-ignored attacks”.
In April, Microsoft linked a series of attacks on print management software company PaperCut to Cl0p, with similarities in the vulnerabilities exploited in both cases as well as Cl0p’s changing methodology.

Connor Jones has been at the forefront of global cyber security news coverage for the past few years, breaking developments on major stories such as LockBit’s ransomware attack on Royal Mail International, and many others. He has also made sporadic appearances on the ITPro Podcast discussing topics from home desk setups all the way to hacking systems using prosthetic limbs. He has a master’s degree in Magazine Journalism from the University of Sheffield, and has previously written for the likes of Red Bull Esports and UNILAD tech during his career that started in 2015.
-
Jensen Huang thinks the UK has immense AI potential – but it still has a lot of work to do
News The Nvidia chief exec described the UK as a “fantastic place for VCs to invest” but stressed hardware has to expand to reap the benefits
-
Crayon targets mid-market gains with expanded Google Cloud partnership
News The collaboration will enable mid-market channel partners to deliver Google Cloud’s AI technologies and cloud solutions
-
‘I take pleasure in thinking I can rid society of at least some of them’: A cyber vigilante is dumping information on notorious ransomware criminals – and security experts say police will be keeping close tabs
News An anonymous whistleblower has released large amounts of data allegedly linked to the ransomware gangs
-
It's been a bad week for ransomware operators
News A host of ransomware strains have been neutralized, servers seized, and key players indicted
-
Everything we know about the Peter Green Chilled cyber attack
News A ransomware attack on the chilled food distributor highlights the supply chain risks within the retail sector
-
Scattered Spider: Who are the alleged hackers behind the M&S cyber attack?
News The Scattered Spider group has been highly active in recent years
-
Ransomware attacks are rising — but quiet payouts could mean there's more than actually reported
News Ransomware attacks continue to climb, but they may be even higher than official figures show as companies choose to quietly pay to make such incidents go away.
-
Cleo attack victim list grows as Hertz confirms customer data stolen – and security experts say it won't be the last
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
-
‘Phishing kits are a force multiplier': Cheap cyber crime kits can be bought on the dark web for less than $25 – and experts warn it’s lowering the barrier of entry for amateur hackers
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
-
Hackers are targeting Ivanti VPN users again – here’s what you need to know
News Ivanti has re-patched a security flaw in its Connect Secure VPN appliances that's been exploited by a China-linked espionage group since at least the middle of March.