Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2.
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-207a
https://blog.talosintelligence.com/common-ransomware-actor-ttps-playbooks/
https://research.checkpoint.com/2024/sharp-dragon-expands-towards-africa-and-the-caribbean/
https://services.google.com/fh/files/misc/m-trends-2024.pdf
https://www.scworld.com/news/fortra-filecatalyst-rce-bug-disclosed-full-poc-exploit-available
https://www.tenable.com/blog/cve-2024-0204-fortra-goanywhere-mft-authentication-bypass-vulnerability
https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml#zerodayfeb1
https://infosec.exchange/@briankrebs/109795710941843934
https://github.com/rapid7/metasploit-framework/pull/17607
https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html
https://duo.com/decipher/fortra-patches-actively-exploited-zero-day-in-goanywhere-mft
https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis