Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
MFT Exploitation and Adversary Operations
Published:
November 29, 2023

MFT Exploitation and Adversary Operations

By:
Team Huntress
Share icon
Glitch effectGlitch effectGlitch effect

Threat actors of varying types continue to target managed file transfer (MFT) applications for exploitation. The latest concerning MFT vulnerability was identified by Converge Technology Solutions, originally in August 2023 impacting CrushFTP. Following responsible disclosure to the vendor, the vulnerability was publicly disclosed on November 16, 2023 as CVE-2023-43117.

What follows is the Huntress team's analysis of the threat posed by CVE-2023-43117 in CrushFTP, as well as a broader exploration of the ongoing challenges in managing the security of MFT applications.

Background & Context

CrushFTP exploitation allows for access to all hosted files on the victim system, as well as arbitrary file execution. As such, exploitation enables possible complete takeover of the compromised system along with enabling exfiltration of files hosted on the victim machine.

CrushFTP is a multi-platform file transfer application built in Java. As such, the vulnerability, which impacts all versions of CrushFTP prior to 10.5.2, can impact Windows, MacOS, and Linux devices running the software.

23

Notably, the necessary patch for CrushFTP was released in August 2023 following notification, giving victims a significant amount of time to patch and update systems prior to the public notification from Converge. Based on public reporting, over ten thousand CrushFTP applications are internet-facing as of early November 2023, although the specific version number is not available. Unfortunately, given that file transfer applications are typically “high availability” services for organizations, it is likely that a non-trivial number of these instances remain unpatched.

The vulnerability in CrushFTP is merely the latest in a series of attack vectors targeting MFT services and applications in 2023. Examples of adversaries leveraging file transfer software for exploitation include:

  • GoAnywhere MFT
  • MoveIT
  • WS_FTP Server

Activity in 2023 continues an observed trend of adversary interest in MFT applications. These applications are valuable both as initial access vectors for adversaries given that these are often external-facing services, as well as targets in their own right for data exfiltration for extortion. The latter was directly observed with MoveIT exploitation, where the cl0p criminal group rapidly exploited thousands of exposed MoveIT instances to exfiltrate sensitive data for follow-on extortion.

MFT applications are critical for business operations, but unfortunately, patch cycles are often not as rapid as needed. This is especially true in environments where adversaries have either identified and exploited these vulnerabilities as true zero days or rapidly reverse engineered patches to develop exploits. Even significantly after a patch release, threat actors continue to opportunistically exploit such items as “n-day” vulnerabilities, as seen in the long-tail of items in CISA’s Known Exploited Vulnerability catalog.

CrushFTP Specific Observations

While Converge researchers did not release a public POC for CrushFTP with their November 16 blog, sufficient details are available in the post, along with the long lead-time from the patch release in August 2023, to enable threat actors to develop a capability for this vulnerability. Theoretically, adversaries could have exploited this software as far back as August (or even earlier), but no evidence exists at this time indicating this has taken place.

17

From a defensive perspective, patching is certainly critical. However, as noted in Converge’s research, automatic updating for CrushFTP is not enabled by default. Thus any patching or updating will need to be manual—if not directly applied by administrators previously, asset owners should consider themselves vulnerable and take action accordingly.

Patching and updating details do not stop at this key point. Additional recommendations beyond patching include:

  • Changing the default CrushFTP application password algorithm to the “Argon” setting.
  • Running the CrushFTP application in a hardened, “Limited Server” mode to reduce attack surface and make future exploitation or compromise significantly more difficult.

Furthermore, some aspects of patching may not be straightforward. As documented in CrushFTP’s wiki, critical changes to address the vulnerability identified by Converge change some functional aspects of the application that may require manual configuration changes:

IMPORTANT: due to the security updates since CrushFTP version 10.5.2+ any JDBC driver jar file needs to be placed into the CrushFTP10/plugins/lib/ directory, or it won't load. In case of a server previously configured using an external SQL user DB, this new feature prevents access on next launch, will need to move the jar file, then edit prefs.XML, update the <db_driver> key value…

While failure to apply the above will not impact the security of the application post-patch, not following this guidance if these customizations or add-ons are present will result in impacts to application functionality. As a result, administrators are advised to fully review configuration and operational details before applying patches to ensure no interruption of service availability and functionality.

General Lessons & MFT Defense

MFT exploitation will remain popular with threat actors as long as they present both a valuable target to access victim networks and in themselves to harvest sensitive information. As a result, network defenders and system administrators must be vigilant, monitoring available news sources and vendor notifications to identify critical software updates and action them as appropriate.

Unfortunately, as seen in the MoveIT example, “just patch” is an unsatisfactory solution when threat actors are able to identify and exploit true zero-day vulnerabilities. As a result, while rapid vulnerability identification and agile patch management are necessary steps to securing MFT applications, they remain insufficient on their own to mitigate the potential attack vectors available to adversaries.

MFT Defense

Network defenders and system administrators must therefore adopt a tiered, defense-in-depth approach to not just MFT applications, but to any exposed system, to manage attack surface and rapidly identify compromise should it take place. Such strategies include high-level business and use-case decision making, determining whether such applications need to be externally accessible in the first place for core functionality. If such access is necessary, controlling that access through security mechanisms such as requiring a VPN or allow-listing known partners and entities can reduce the associated risk.

In the event of compromise, investment in visibility is necessary. This includes both visibility on devices running applications such as MFT software to determine exploitation and post-exploit activity (e.g., large-scale exfiltration of data), as well as internal network visibility in those cases where the exploited host serves as a “beachhead” for further compromise. A combination of network visibility and monitoring (for exfiltration as well as post-exploitation command and control behaviors), as well as endpoint visibility and monitoring (for signs of exploitation as well as lateral movement within the victim network), are now minimally necessary items for most organizations to detect and defeat threat actors taking advantage of vulnerable applications.

Conclusions

MFT application exploitation remains a popular and concerning tactic used by multiple adversaries, either as a mechanism to deliver disruptive attacks such as ransomware or as an immediate method to exfiltrate data for extortion purposes. Asset owners and operators must remain aware of updates in such software and prioritize patching of such applications, particularly if they are external-facing, given the rapid weaponization of vulnerabilities by multiple threat actors.

Where patching remains difficult or to further harden environments, defenders and network operators are urged to reduce their attack surface by restricting access to such applications via security tools or products, and applying hardened configurations where possible. Through such techniques, along with visibility and monitoring of such applications, asset owners can either prevent future exploitation entirely or identify potentially malicious activity quickly, even when vulnerability information remains scarce or incomplete.

Want more analysis into trending attacker tradecraft? Download our 2024 Cyber Threat Report.

Categories
Threat Analysis
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

Get Your Inside Look at Today's Hacker Trends.

If you want to learn how to adapt to the latest attacker tradecraft and behaviors, this report’s for you.
Get the Report
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Move It on Over: Reflecting on the MOVEit Exploitation

    In this blog, we explore the long-term impact of the MOVEit exploitation and how defenders can stay vigilant and learn from the past.
  • MOVEit Transfer Critical Vulnerability CVE-2023-34362 Rapid Response

    Our team is tracking in-the-wild exploitation of a zero-day vulnerability against Progress' MOVEit Transfer web application that allows for escalated privileges and unauthorized access.
  • CrushFTP CVE-2025-31161 Auth Bypass and Post-Exploitation

    Huntress observed in-the-wild exploitation of CVE-2025-31161, an authentication bypass vulnerability in versions of CrushFTP and further post-exploitation leveraging MeshCentral and other malware.
  • Investigating Intrusions From Intriguing Exploits

    On 02 February 2023, an alert triggered in a Huntress-protected environment. We dive into triaging the threat in this blog.
  • Confluence to Cerber: Exploitation of ​​CVE-2023-22518 for Ransomware Deployment

    CVE-2023-22518 is being exploited in Confluence for Cerber ransomware deployment. Read up on Huntress’ observations and mitigation guidance.
  • Do Tigers Really Change Their Stripes?

    Across the larger cybersecurity community, an often-used adage is that “threat actors always change their tactics.” However, when we really start to look at and track incident data, we begin to see that while some changes may be necessitated based on infrastructures and other challenges the threat actor may encounter, there are times when tactics remain consistent across incidents. Recent investigations into exploitation activity for CVE-2025-31151 and CVE-2025-30406 show similar TTPs across different incidents.
  • Calm In The Storm: Reviewing Volt Typhoon

    Explore the recent disclosures concerning Volt Typhoon, a threat actor engaged in the widespread exploitation of external-facing services and network appliances.
  • Best Practices to Reduce Your Attack Surface

    Read expert insights on how to strengthen your cybersecurity strategy with asset inventory and attack surface reduction.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy